Posts by Category: Privacy Resources

Tails – Amnesic Incognito Live System – Privacy for Anyone Anywhere

September 24, 2013

Tails – Amnesic Incognito Live System – Privacy for Anyone Anywhere
https://tails.boum.org/

Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly. It is a complete operating system designed to be used from a DVD or a USB stick independently of the computer’s original operating system. It is Free Software and based on Debian GNU/Linux. Tails comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. This will be added to Privacy Resources Subject Tracer™. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog.

1548 views

Awareness Watch Talk Show for Saturday September 21, 2013 at 2:00pm EDST

September 21, 2013

 

Awareness Watch Talk Show for Saturday September 21, 2013 at 2:00pm EDST
http://www.BlogTalkRadio.com/AwarenessWatch/

This program will highlight Privacy Resources available on the Internet. In today’s new digital economy we must be completely prepared and knowledgeable in all aspects to protect our privacy from competitors and related associations/organizations. These resources will be your guides and subject tracers that will protect your privacy both online and offline.  We will also be reviewing the latest happenings from my blog during the last week. We will be also discussing my latest freely available Awareness Watch Newsletter V11N9 September 2013 featuring eReference Resources as well as my freely available September 2013  Zillman Column titled Finding Experts By Using the Internet – Resources and Sites. You may call in to ask your questions at (718)508-9839. The show is live and thirty minutes in length starting at 2:00pm EDST on Saturday, September 21, 2013 and then archived for easy review and access. Listen, Call and Enjoy!!

1445 views

Zeekly – Private and Secure Web Search

September 16, 2013

 

  

Zeekly – Private and Secure Web Search
https://zeekly.com/

Zeekly searches the web’s best resources (Google, Yahoo, Bing, Amazon, Youtube, iTunes, etc) and provides this information to you in a safe and secure environment that protects your privacy. Contrary to most internet search engines, they do not store a history of your search activity (search terms & sites visited), and their site is running on 2048-bit SSL encryption to insure your web searches are private and protected from others. There are several “privacy based” search engines on the internet. All of these companies solely pull search results from other places. However, in addition to doing this, Zeekly has it’s own spider technology (ZeeklyBot) built on Hypertable (equivalent to BigTable that runs Google’s high powered web indexing system). Zeekly is building it’s own proprietary indexes of the web. So, in addition to protecting your privacy, they are in this to help shape the future of internet search. This makes us a very unique company in the market. This will be added to Privacy Resources Subject Tracer™. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Entrepreneurial Resources Subject Tracer™.

2010 views

Spikes – Security and Performance Without Sacrificing Convenience

August 31, 2013

Spikes – Security and Performance Without Sacrificing Convenience
http://spikes.com/

The New Spikes Remote Browser Model— Moves the Browser Off the User’s Local Machine and Outside the Firewall. 94 percent of undetected malware comes through the browser. Modern malware easily breaks through virus scanners, detection software, zero day heuristic programs, and even sandboxes. With the recent prevalence of watering hole attacks, even white listed sites can’t be fully trusted. To run a browser is to run malware— the only effective solution is to move the browser off the endpoint user’s machine and outside the firewall. Spikes achieves true hardware separation without sacrificing user experience— making the easiest enterprise target into one of the hardest targets. Instant launching browsers, low-latency remote display, easy to use secured clipboards and printing— with a unified experience across all devices ensuring that users will adopt The Spikes Browser without difficulty. A rich set of easy to use administrator features allows the IT department of each enterprise to fine tune access, file downloading policies, load balancing, and failover— including optional cloud failover. This will be added to Privacy Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™.

1821 views

Guardster – Your Privacy Headquarters

August 30, 2013

Guardster – Your Privacy Headquarters
http://guardster.com/

Guardster offers various services to let you use the Internet anonymously and securely. From our popular free web proxy service, to our secure SSH tunnel proxy, we have a variety of services to suit your needs. Features include: a) FREE Anonymous Web Proxy: Browse the web anonymously, hiding your identity. Our free web proxy service allows you to browse the web and protect your identity from the sites you browse. Your requests appear to be coming from the Guardster servers so third parties cannot find you. Includes support for JavaScript and cookies. Note that encrypted SSL sites will not work with the free service; b) Encrypted SSL Proxy Subscription: Faster, fully encrypted, ability to use SSL sites, and more! All the same great features as our free web proxy service, but even more useful. You can access encrypted sites (SSL) and all your browsing is done through an encrypted SSL connection to our servers. Additionally, the service is faster and more reliable than our free service. Completely ad free and ready to use when you want it; and c) Secure SSH Tunnel & SOCKS Proxy: Encrypt any SOCKS-compatible application through our SSH tunnel. We provide a restricted SSH account and a SOCKS v5 server. You just need an SSH client and to configure your applications to use our SOCKS server. The most powerful option that lets you encrypt just about anything you do online. We recommend that users have prior knowledge of SSH clients and configuring applications to use SOCKS proxies. This will be added to Privacy Resources Subject Tracer™ .

1846 views

Cloudfogger – Security Made Easy

August 23, 2013

Cloudfogger – Security Made Easy
http://www.cloudfogger.com/

Cloudfogger encrypts your data on the local device before it gets uploaded to the cloud. That guarantees that Dropbox and others never get access to the content of your files.Cloudfogger protects your privacy with 256bit AES (Advanced Encryption Standard) encryption. Cloudfogger uses transparent encryption, which makes daily use fast and simple: On the local system you still access your data as you always did – while all files are securely encrypted when they get uploaded to the cloud. Manual encryption and decryption of your files is not necessary with Cloudfogger. Cloudfogger-protected files can also be shared without sacrificing security. You can for example use your shared Dropbox folders securely together with others – without the need of giving them your Cloudfogger credentials. Also, distributing files via e-mail or USB sticks is easy with the portable Cloudfogger file format. Cloudfogger automatically detects cloud storage providers that are installed on your system. Additionally you can select any other folder on your computer that you want to protect. All files in protected folders will now be securely encrypted on your hard drive – and will only be uploaded to
your Dropbox fully protected. With Cloudfogger, you can also easily encrypt and decrypt single files via the Windows Explorer context menu. Handy when you only want to encrypt a few files because you want to take them with you on your USB pen drive. This will be added to Privacy Resources Subject Tracer™. This will be added to Grid, Distributed and Cloud Computing Resources Subject Tracer™.

2215 views

Sqrrl Security – Cell-Level Security for Big Data

August 23, 2013

Sqrrl Security – Cell-Level Security for Big Data
http://www.sqrrl.com/

Sqrrl develops Sqrrl Enterprise, which is the most secure and scalable Big Data platform for building real-time analytical applications. Sqrrl Enterprise is powered by Apache Accumulo, Hadoop, other open source projects, and Sqrrl-developed software. This will be added to Statistics Resources and Big Data Subject Tracer™, This will be added to Privacy Resources Subject Tracer™.

1888 views

Complete Update> Privacy Resources White Paper Link Dataset Compilation

August 19, 2013

Complete Update> Privacy Resources White Paper Link Dataset Compilation
http://whitepapers.virtualprivatelibrary.net/Privacy%20Resources.pdf

The white paper link dataset compilation of Privacy Resources Subject Tracer™ by Marcus P. Zillman, M.S., A.M.H.A. is a 29 page .pdf document 245KB. [Updated August 19, 2013].  Privacy Resources and Sites on the Internet is a comprehensive listing of privacy resources currently available on the Internet. These include associations, indexes, search engines as well as individual websites and sources that supply the latest technology and information about privacy and how it relates to you and the Internet. This is a MUST reference for today’s New Economy where privacy and security have become major issues! Keep your privacy and security with this excellent Subject Tracer™. Completely reviewed
and all links verified on this update.

Bookmark: http://www.PrivacyResources.info/

1698 views

Seecrypt – Privacy Smartphone App for Secure Voice Calls and Text Messages

August 16, 2013

Seecrypt – Privacy Smartphone App for Secure Voice Calls and Text Messages
https://www.seecrypt.com/

Seecrypt is a user-friendly privacy communications app that is simple to use, easy to share, and looks and feels like your favourite apps. More importantly, it protects your conversations over any public network. Each and every call or text message is encrypted on the device with a unique key. This affords maximum protection when communicating with another trusted Seecrypt user. With its easy-to-use interface, similar to popular social messaging apps, you will be securing your conversations in no time, with no technical skills needed. Download today from Google Play or the App Store and get your privacy back! Windows Phone and BlackBerry 10 coming soon. This will be added to Privacy Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™.

1593 views

Orbot – Proxy with Tor

August 16, 2013

Orbot – Proxy with Tor
https://play.google.com/store/apps/details?id=org.torproject.android&hl=en

Orbot is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Orbot is the only app that creates a truly private internet connection. As the New York Times writes, “when a communication arrives from Tor, you can never know where or whom it’sfrom.” Tor won the 2012 Electronic Frontier Foundation (EFF) Pioneer award. Orbot is the safest way to use the Internet on Android. Period. Orbot bounces your encrypted traffic several times through computers around the world, instead of connecting you directly like VPNs and proxies. This process takes a little longer, but the strongest privacy and identity protection available is worth the wait. This will be added to Privacy Resources Subject Tracer™.

1407 views