Sunday, February 24, 2013

Protect your privacy and stay anonymous witn TOR

Inception

Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others.

Overview

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.
Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.
Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.
Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers?
A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.
The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.

Why we need Tor

Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you're travelling abroad and you connect to your employer's computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.
How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that's an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you're doing and, possibly, what you're saying. That's because it focuses on the header, which discloses source, destination, size, timing, and so on.
A basic problem for the privacy minded is that the recipient of your communications can see that you sent it by looking at headers. So can authorized intermediaries like Internet service providers, and sometimes unauthorized intermediaries as well. A very simple form of traffic analysis might involve sitting somewhere between sender and recipient on the network, looking at headers.
But there are also more powerful kinds of traffic analysis. Some attackers spy on multiple parts of the Internet and use sophisticated statistical techniques to track the communications patterns of many different organizations and individuals. Encryption does not help against these attackers, since it only hides the content of Internet traffic, not the headers.

The solution: a distributed, anonymous network

How Tor works Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you — and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it's going.
To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through relays on the network. The circuit is extended one hop at a time, and each relay along the way knows only which relay gave it data and which relay it is giving data to. No individual relay ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through.
Tor circuit step two
Once a circuit has been established, many kinds of data can be exchanged and several different sorts of software applications can be deployed over the Tor network. Because each relay sees no more than one hop in the circuit, neither an eavesdropper nor a compromised relay can use traffic analysis to link the connection's source and destination. Tor only works for TCP streams and can be used by any application with SOCKS support.
For efficiency, the Tor software uses the same circuit for connections that happen within the same ten minutes or so. Later requests are given a new circuit, to keep people from linking your earlier actions to the new ones.
Tor circuit step three

Hidden services

Tor also makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server. Using Tor "rendezvous points," other Tor users can connect to these hidden services, each without knowing the other's network identity. This hidden service functionality could allow Tor users to set up a website where people publish material without worrying about censorship. Nobody would be able to determine who was offering the site, and nobody who offered the site would know who was posting to it. Learn more about configuring hidden services and how the hidden service protocol works.

Staying anonymous

Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use Torbutton while browsing the web to withhold some information about your computer's configuration.
Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit.

Sunday, February 17, 2013

Download Torrent Files With regular download manager using Zbigz service



Zbigz.com is a Torrent Caching Site that helps Us To Download Torrent Files with Download manger or internet browser .ou can Download Your Torrent Files Through Zbigz.com Via Simple Methods.You can Use Zbigz For free And Without Registration. You can Download Torrent Files of your Choice with Internet Download Manager(IDM)  By Zbigz.com


Sunday, February 10, 2013

Sapido Mobile Office All in one



Feature 1 : Share USB Devices and Data

  • Secure Data Sharing – File, Picture, Video, Audio…etc.
  • USB Devices Sharing – Printer, Webcam, HDD, Flash and Cardreader

With administrator management and password protection, the authorized user can safely share data with each other. The printer is not attached to a dedicated computer. By connecting USB printer to Sapido NES Storage Server Router, everyone can use the printer through Sapido NES Storage Server Router instead of a dedicated computer. Apply USB webcam for instant surveillance of your home, garage, office, baby, pets, grandparents…etc. The easy way to setup an efficient data center by installing HDD or connecting USB storage devices, HDD, Flash and Cardreader to Sapido NES Storage Server Router




 Feature 2: One Touch Copy and Files Backup

  • Internal SATA HDD Support
  • Press One Button to Backup, No Computer and Software Required
  • Data is Automatically Dispatched while Backup

By Installing an internal SATA HDD in Sapido NES Storage Server Router or attaching USB HDD to it, you can share the files in local network or Internet. It allows multiple users to read, write or edit all files. No more hassles for sharing and managing files. Backup all the files from the Flash Disk or USB HDD to the HDD without computer applying. The files will be dispatched into the different folders such as Document, Video, Audio and Picture folders




 Feature 3: Automatic Download Center

  • Built-in FTP Server
  • No Computer and Software Required
  • Big Size Email – No Worries!
  • Scheduling Download - Automatically Download While You are Away or Busy

No need FTP software. No need to turn on computer. No need to wait for download. Sapido NES Storage Server Router makes the file download and upload convenient and simple. You can schedule to automatically download the files to the internal HDD or the attached USB storage devices. Sometimes the email size is too big to send. Authorized users can easily upload and download files anytime anywhere.




 Feature 4: HDD Capacity Management

  • Disk Management - Freely Set Disk Usage Among Features and File Types.
  • Capacity Alert E-mail

HDD capacity management is to deliver a cost-effective and sustained level of availability. The disk space for FAX, Webcam, FTP, users…etc can be assigned by percentage in one hard drive. With capacity alert e-mail, the administrator can be notified before the potential capacity problem occurs.




 Feature 5: A “FAX Machine” for Anyone and Anywhere Use

  • Review Incoming Faxes Before Printing Out
  • Receive and Send Faxes Anytime Anywhere
  • Notification E-mail (You Got a “FAX”!)

With the 2 RJ-11 phone jacks, you don't even need a fax machine, just edit the document and send it out directly through the FAX modem built in Sapido NES Storage Server Router. For all incoming faxes, you can choose to save them to internal HDD or send to the appointed e-mail address. Just print out what you need, don't waste papers for junk messages.




 Feature 6: User Website and Internet Album

  • Users can Create Their Own Website and Internet Album
  • Easy Tools - Built-in Utility or Upload Existing Homepage

Personal website and Internet album is one of the easiest ways to share information and photos with your friends and families. Following step-by-step setting of built-in utility, users can easily create their own website and Internet album. Uploading the homepage created by other tools is another option. Sapido NES Storage Server Router and one ISP account can make it happen.




 Feature 7: Internet Video Surveillance

  • Access Live Images or Video Recording Anytime Anywhere
  • Real Time Motion Detection and Automatically E-mail Alert
  • Instant Surveillance of Your Home, Garage, Office, Baby, Pets, Grandparents,…etc.

Apply USB webcam for instant surveillance of your home, garage, office, baby, pets, grandparents…etc. View live images or video files through Internet with computer or mobile phone browser when you are in office, park, gym, coffee shop, shopping mall, overseas,…etc. Moreover, Sapido NES Storage Server Router will automatically send out alert e-mail while detecting motion.




 Feature 8: Efficient Bandwidth Usage – QoS (Quality of Service)

  • Optimize the Use of your Internet Bandwidth
  • 3 Priorities to Manage

Quality of Service (QoS) refers to the capability of a network to provide better service to selected network traffic over various technologies. The primary goal of QoS is to provide priority including dedicated bandwidth, controlled jitter and latency (required by some real-time and interactive traffic), and improved loss characteristics. Also important is making sure that providing priority for one or more flows does not make other flows fail. For example, you can arrange bandwidth percentage for internet browse and internet download. So there will be no traffic jam for internet browse and internet download users. Sapido NES Storage Server Router also provides 3 priorities for easy and quick setup, i.e. high, medium and low level.




 Feature 9: Security and Parental Control

  • Firewall Defends your Network from Intruders Attack
  • 128 bit Encryption Protects Your Data from Peeper
  • Scheduling Filter Easily Manages Internet Access and Blocks Inappropriate Internet Content.

The firewall function keeps your local network away from attack of Intruders. Wi-Fi encryption, WEP and WPA protects your network resource such as internet access, from unauthorized user. Sapido NES Storage Server Router parental control, available with IP, MAC and URL filter, provides parents a centralized, secure, flexible and easy-to-use management tool that can help protect their families from the perils of the Internet. The filter scheduling feature simplifies the management of internet access policy.




 Feature 10: User Account Management

  • Web-base User Interface
  • Define User Authorization
  • Event Log and E-Mail Alert
As an administrator, you can monitor, maintain and manage the network anywhere anytime with internet browser. Authorized and unauthorized access can be viewed via the web-based interface or be sent by email automatically. Besides, you can authorize assign. Different users can have different rights for FTP, webcam, Internet access,…etc.




 Feature 11: Name your own Sapido NES Storage Server Router on the Internet

  • URL Name for Easy Access
  • Update Your Dynamic WAN IP Automatically

You may receive a dynamic WAN IP from your ISP (Internet Service Provider) for Sapido NES Storage Server Router, which is not convenient for the access of users. DDNS (Dynamic Domain Name Services) is free. After registration, you can have your own URL name for Sapido NES Storage Server Router access. With DDNS (Dynamic Domain Name Services) utility, Sapido NES Storage Server Router can update the dynamic WAN IP automatically to keep the registered URL name available.




 Feature 12: More Powerful Features for Advanced Users

  • Virtual Server Keeps all Internet Service Co-reside in One Computer
  • Virtual DMZ Allows Intranet Servers to Communicate with Internet Users.


Virtual server simply means the entire computer is not dedicated to running one kind of internet service. By specifying the port number for services, you can keep all internet services co-reside in one computer. For example, port 80 is used for HTTP traffic and port 21 is used for FTP traffic. Sapido NES Storage Server Router can assist you in building the virtual server. Virtual DMZ (Demilitarized Zone) allows a set of computers to be exposed to the Internet. Some applications require multiple TCP/IP ports to be open. DMZ allows computers to be exposed for that purpose.

Wednesday, February 6, 2013

How to install CyanogenMod on Samsung Galaxy S III

How to install CyanogenMod on Samsung Galaxy S III
Cyanonenmod is open source  firmware form  android based phones its give many exiting future which cant be fond in vendor supplied firmware's. CyanogenMod is developed as free and open source software based on the official releases of Android by Google, with added original and third-party code.

 Make sure to flash ClockworkMod Recovery if you haven't done it already.
Please note that after rooting the device, you'll void your warranty. IBTimes will not be held responsible if any user loses data or the device gets damaged while following the steps explained below. Users must proceed at their own risk.
Step 1: Download CyanogenMod 10 for your Galaxy S3
Place the .zip file directly under /sdcard directory on your S3 for easy flashing in Step 5.

Step 2: Shut down your Galaxy S3. Press and hold Volume Up, Home and Power buttons until you boot into ClockworkMod Recovery.
Step 3: Take a Nandroid backup.
Step 4: Navigate to install zip from sdcard > choose zip from sdcard >.
Must note that all your personal data will be deleted in this step. This is a safety requirement for whenever you flash a new ROM.
From the main menu, select wipe data / factory reset.
Step 5: From the main menu, choose reboot system now.

Tuesday, February 5, 2013

YotaPhone: a phone with dual display


YotaPhone: a phone with dual display
You can have a whole new relationship with your smartphone. Thanks to the new YotaPhone, with two displays to help you enjoy life’s virtual side without missing the real one.







One side is a high resolution LCD Android phone. The other side is an electronic paper display (EPD), which is your personal space for information, images and interaction you always use and always need.

Windows 8 tips and tricks

Windows 8 tips and tricks

Make the most of your Windows Start screen tiles by adjusting the sizes, where they are located, and what is listed.

 

  • Move any tile by clicking and dragging the tile. While moving a tile, if you need a larger view of the Start screen move the tile towards the top or bottom of the screen to zoom out.
  • Use your mouse wheel to scroll left-to-right through your tiles.
  • Any Desktop shortcut or program can be pinned to the Start screen by right-clicking the icon and choosing Pin to Start.
  • In the bottom right-hand corner of the start screen is a magnifying glass with tiles, click this icon to get a zoomed out view of your Start screen. In this view, if you right-click on a group of tiles you'll be given the option to name group, which can be useful if you have a group of related tiles (e.g. games). In this view, you can also click and drag a group to organize your tile groups.
  • Create a new speed bump between tile groups by moving a tile to a speed bump.
  • Resize any User tile or Live tile by right-clicking the tile and choosing resize.
  • If there is a tile you want on your Taskbar, right-click the tile and choose Pin to taskbar.
  • Show admin applications on the Start screen by clicking Settings in Charms, click Settings, and change the Show administrative tools from No to Yes.
  • In Internet Explorer 10, you can also pin any of your favorite web pages to your Start Screen.


Windows 8 keyboard shortcuts:

Knowing at least some of the Windows 8 keyboard shortcuts will make your Windows 8 experience much more enjoyable. Try to memorize these top Windows 8 shortcut keys.
  • Press the Windows key to open the Start screen or switch to the Desktop (if open).
  • Press the Windows key + D will open the Windows Desktop.
  • Press the Windows key + . to pin and unpin Windows apps on the side of the screen.
  • Press the Windows key + X to open the power user menu, which gives you access to many of the features most power users would want (e.g. Device Manager and Command Prompt).
  • Press the Windows key + C to open the Charms.
  • Press the Windows key + I to open the Settings, which is the same Settings found in Charms.
  • Press and hold the Windows key + Tab to show open apps.
  • Press the Windows key + Print screen to create a screen shot, which is automatically saved into your My Pictures folder.

Windows 8 Task Manager:

The Windows 8 Task Manager has been significantly improved over previous versions of Windows. Some of the new changes include showing a total percent usage at the top of your Processes, which makes it easier to determine total memory and CPU usage, improved Performance graphs, a Startup tab to see startup processes and their impact to system performance, and the App history tab (as shown below) that gives you the total resources an app has used over a period of time. Press Ctrl + Shift + Esc to start exploring the new Task Manager.

Use a picture password to log into your computer
Windows 8 includes a new feature called Picture password, which allows you to authenticate with the computer using a series of gestures that include circles, straight lines, and taps. Enable this feature if you want a new way to access your computer or have a hard time with passwords.
  1. Open the Windows Charms.
  2. Click Settings and then More PC settings
  3. In the PC settings window click Users and then select Create a picture password
Bonus tip: A four digit pin password can also be created and used to access your computer.