Internet Privacy

What's the top issue most companies face with cloud computing and data security?

I think that the biggest issue with cloud anything is the worry about a breach, clients and companies both want to make sure that their data is safe....

Medical record theft: gateway to identity theft?

Ugh, this is really concerning. Recently we've heard a lot about data breaches and hackers stealing customer information from retailers, now medical...

Check out our top sponsors:

  • The Stalkers Home Page

Gov't and corporations are the most dangerous threats to the internet

This is absolutely, one hundred percent accurate. The government attempts to censor the internet via laws meant to make it seem like they are...

Poodle: another web bug that makes browsing less safe

I have not yet heard of Poodle. What a strange name for a web bug though. I think that web bugs are going to always be around. This is why it is...
  


 Surveillance

Surveillance paradise: How one man spied on NSA in Bahamas

I think it is really cool that he was able to turn it around on the NSA and spy back at them. I hope it made them think about what they are doing and...

FBI says driverless cars good for surveillance but could be used as deadly weapo

Of course driverless cars could be hacked and turned into bomb-wielding drones. I’m surprised that it has taken this long for people to realize the...

Beyond the law: Are encrypted smartphones too private for the FBI?

Surveillance is an issue we should all care about. We could quickly lose more and more rights if we don't challenge this issue now. We are somewhat...

Massive tarp hung to block neighbor's surveillance camera

Some people say that we all have a right to privacy. I would agree. No one, not even a neighbor, has the right to point a surveillance camera on...

'We see ourselves as the vanguard': the police force using drones to fight crime

I don't mind the police using drones. But, I do worry about drones crashing to the ground. Either way, there is something for everyone to worry...

Twitter Sues US Government on Surveillance Disclosure Rules

I'm glad Twitter is taking the lead on something like this. Unfortunately, companies have been given such power in our legal system that I think only...


 Biometrics

Questions: Fingerprinting done, PD is current; now what?

I applied for EAD and I140 & I485 together in march. I received a biometrics (fingerprint) appointment for next week. My priority date is current...

Immigration Control

All visitors to the US now have a digital photo and forefinger prints taken. This system obviously requires a huge databank somewhere, but presumably...

Blog post: Global Biometric Forecast to 2012

Biometrics as an accurate, reliable and cost-saving way for better and advanced security surveillance. Over the years, the biometric technology has...


 CCTV Footage: Make sure is it suitable for all audiences!

Builder sacked after being caught on CCTV urinating in back garden

Some people really need to remember that they are professionals and not take an opportunity like this to make wee-wee in someone’s garden. How...

Video: The little things can make a big difference

This video seems to show how some insignificant events can have a profound impact on your life.

A woman is walking with her baby and apparently...

Video: BMW Accident video ... By Gathiya Rath CCTV ..

"cctv video"

BMW Accident video ... By Gathiya Rath CCTV...



 CCTV Surveillance

CCTV provides great assistance to Police

I have a real problem with police or government organizations using hidden cameras as tools to spy on the population. We have surrendered our privacy...

Look this newest model M68 ,but it is 3G UFO CAMERA

I am Julie from Hwawo technologies Co, .ltd .

ztcmobile#hotmail#com

www#hwawo#com

I want to know that whether you are interested in 3G UMTS...

Is your smart TV spying on you?

This should not be a shock to many, but hackers or government agents can remotely enter your smart tv, (which is just a computer), and look an your...


 Corporate Abuse

Profitable Espionage

With all the money I made from Industrial Espionage... I should buy a boat. What about...

Embeded YouTube: Occupy Chicago Saturday

Occupy Chicago protest outside Grant Park in Chicago. Occupy Chicago is fighting corporate abuse. ++....

Article: Big Brother Apple

Apple's fight on the jailbreaking issue is far from over. Even though the court have ruled in favor of the act, Apple is doing its best to stop it....


 Credit Reporting

What can I do to increase my credit score?

I don't have bad credit, I just don't have much credit at all. I don't want to loan for a car or house. I just want to build credit. How can I get my...

intent to file a complaint ftc

RE: Dispute Letter of xxxxxx, Follow-up Letter of xxxxxx

NOTICE OF INTENT TO FILE COMPLAINT

Dear Sir/Madame:

This letter shall serve as...

good dispute letter

John doe

458-71-

123 somewhere st

any city, state 12345

Midland Credit

8875 Aero Drive

San Diego, CA 92123

Dear Sir or Madam:

I...



 Cryptography

CFP - International Journal of Computer Science and Security (IJCSS)

Computer Science Journals (CSC Journals) invites researchers, editors, scientists & scholars to publish their scientific research papers in an...

YouTube: Cryptography

Cryptic messages, carrier pigeons, secret codes words. Cryptography used to be...

YouTube: Information Security—Before & After Public-Key Cryptography

[Recorded Jan 26, 2005] Whitfield Diffie, a key figure in the discovery of public-key cryptography, traces the growth of information security through...


 Data Leaks

Watch what you Say

As many politicians have discovered over the past few months, what you say either in person, over the internet or on a cell phone can be recorded...

Why do people leak data?

There must be some psychological problem that causes people to leak confidential data from their companies.

It is backwards espionage, instead of...

Anonymous "doxes" Bank of America CEO

Today, I read on Ars Technica that Anonymous just posted all of the personal data for the current Bank of America CEO, including his home address,...


 Data Recovery

Data recovery urgent help...Please!!

I just recently lost all my pictures (or so I think?) from a MEMORY CARD ERROR from my Canon digital camera. I have no idea how this happened but in...

Answers: How much should it cost to retrieve data from a hard drive with broken/

I have a broken laptop hard drive that probably has bad or broken heads. I'm thinking of getting it sent in to a data recovery service. I've gotten...

Quick Recovery for RAID-0

Unistal Systems offers RAID Data Recovery from both RAID-0 & RAID-5 of windows OS. Quick Recovery RAID is automated RAID Data Recovery Software to...


 Databases

Live Green Life, Choose Paper Tableware

With advanced technology, People live more convenient than ever before, and meanwhile more emission and pollutants are produced. Being kind to the...

Article: National DNA Databases: Should They Be A Cause for Concern?

You would think that with the advancements in genetics, it is only a matter of time before governments take it out of their way and construct a...

Video: How To Create Access Database Relationships

Access is a relational database. Data is related via separate tables, linked by columns with a primary and foreign key. Each table should represent a...


 Encryption

Who uses this besides the government?

I suppose encryption is mostly used by the goverment when they are being secretive about events or projects. Does anyone else really use encryption....

Yahoo! Answers: How much does corporate email encryption software cost?

My employer wants staff to use encryption options on each individual email because encryption software "costs too much". I would like to find out how...

Answers: What Wireless Card Types Support WPA Encryption?

I have an IBM Thinkpad T40 laptop, and it has a wireless b card in it, which only supports WEP. Can someone tell me what card would work? I was...


 GPS Tracking

Video: New GPS Bracelet Could Save Human Rights Activists' Lives

"surveillance"

A new GPS bracelet created by Civil Rights Defenders can alert people though social media if a human rights activist is in danger. ....

what cellphone works with metro pcs that I can locate my kids with gps?

I need a metro pcs phone that I can track my kids...

Google Map GPS Cell Phone Tracker

Go to www.websmithing.com for the full explanation and source code, you'll find it on the programming menu tab. You can download the source code from...


 Identity Theft

Someone Stole My Name

Before, my name was used by someone. I discovered it one time when I try to search for my name Google.

I am actually blogging by that time, 2005,...

e-mail fishing

Recently I received an email saying that I won a sweepstake from coca-cola. The email stated that I was selected randomly. I only had to fill out an...

Questions: If someone Co-Signs for me with a car, do I build credit?

I'm dealing with identity theft right now and was wondering if I had someone Co-Sign for me if I would build my credit back up. Well it's not really...


 Internet Security

The strawman of the Tor care at Harvard

If you haven't heard about it... the news media has been announcing that TOR isn't so anonymous after all.

What I read the story, the first thing...

Risk of Leaving Computer On Overnight

Is it much of a risk to leave a computer turned on and connected to the internet when not using it?

I use a software...

Yahoo! Answers: yahoo email asks me to sign in every time even though i select t

this is so frustrating. i have to sign in every time to check e mail even though i have selected the option to stay signed in for two weeks. only had...


 Introductions

Who has it better then us No

Who has it better then us No...

Daine

Really love to see land and watch surveillance...

Apoorv Srivastava

I am here to get myself aware of security world stuff and share my...


 Intrusion Detection

Cameras and alarms

Take it from me, use the current means of detecting intrusion. The world is not the pleasant and easy place it used to be.

A friend says that there...

New Intrusion Detection Evaluation Dataset

Hello,

The Information Security Centre of Excellence (ISCX) 2012 intrusion detection evaluation dataset consists of labeled network traces,...

Video: Anomaly-Based Unsupervised Intrusion Detection

At Black Hat Europe we met Stefano Zanero who talked about anomaly based unsupervised intrusion detection. In this video he provides an overview of...


 Investigations

a scam???-- - Trade Food Investment - NWC?

I got by email a request to supply a large quantity of goods to NWC in TOGO .The email came by mr.James Kosi from Trade Food Investment (from 222 rue...

How to stop people from following you!

If you think people are following you and want them to stop, there is a quick, easy, sure-fire method of putting an end to it.

Don't go anywhere....

Is it legal to have someone do investigations for you?

I was wondering if there is any law against hiring someone to investigate things for you? I'm not talking about breaking the law per-se, but what...


 Locks and Safes

Fireking Gary McGunn CK 3221 safe

How to change the combination on a Fireking Gary McGunn CK 3221 safe?

I bought a safe from a closed Blockbuster Video store that I have open and it...

Electronic vs dial safe lock security

Oh boy. I took the dial lock off of my Liberty safe to put the S&G electronic lock on my safe, and have been happy as a clam ever since. I thought...

Problems with tracker?

I don't understand, our house got burgled months ago since then my mother insured everything and put a tracker on both cars so she rested assured...


 National ID

2008, 2009 statistics on national id identity theft

Has there been a large increase in id theft in 2009 compared to 2008? What has Obama been doing to help resolve this...

Can my new landlord ask for my bank account number, sort code, etc?

I moved into a room (as a lodger) about 3 weeks ago and my new landlady has now presented me with a form to fill out asking for my bank account...

YouTube: RFID - Real ID - National ID - Mark Of The Beast

Adam Savage of the MythBusters TV show on Discovery channel explains what happened when they wanted to do a show on RFID. It will shock you. This is...


 Phishing

Trust Inheritance Scam

One morning upon waking I go directly to my computer to check on some mails. I come to this mail that sounds really interesting for it mentions...

Spam / Scam / Phishing / Nonsense

I received the email copied below the other day. Of course, without even opening it, it was clear that it was some kind of spam. Of course, the...

Could they have still gotten this information?

Recently I received a phishing email that pretended to be my bank account. I tried logging in using their URL so I know they got my login info, but...


 Phone Privacy

Any way to prove a phone was tapped AFTER the fact?

I have read several blogs and feel more confused than ever.

What I have determined is that my phone was tapped for a long time.

I suspected when...

YouTube: 3M Mobile Privacy Film demo on a BlackBerry phone

Here's a quick demonstration of the Mobile Privacy Film that 3M makes for cell phones and smartphones. It allows the phone's user to view the display...

How long does it take to triangulate a cell phone?

I think the length of time to triangulate a cell phone would be the sum of the speed of light (speed of radio waves) of the cell phone and the towers...


 Photos

Car Show

Its for all ages...

Securing Your World

We provide state of the art surveillance equipment and offer standard and covert security installations, along with PI services by licensed private...

300m Synchronous laser Night Vision PTZ Camera GCS-L5M Series

300m Synchronous laser Night Vision High Speed Dome Camera GCS-L5M Series

——Riot-proof camouflage

Speed Dome Laser Night Vision...



 Privacy

Thoughts about Privacy and Censorship

There's no need to worry about your privacy if you have nothing to hide, but there's also no need to restrict access to information if you have...

Privacy, individuals, and the government

It is sad that our very own government, and governments around the world, have resorted to more-or-less outright spying on their own citizens in the...

The State of Privacy

The state of America as it is today creates an atrocious thing to come to terms with for most citizens who've become aware of recent privacy...


 RFID

RFID Jammers

I saw a web page bragging about their RFID tags operating at 125khz.

What would happen if someone started cranking out RF on the RFID operating...

RFID adoption questionnaire

Dear members viewing this thread.

I am doing a research for my thesis on master's degree on RFID technology and I have created a questionnaire in...

Video: Katie Deolloz, Andrea Hernandez : RFID (Spy) Chip Tracking in Public Scho

Katie Deolloz, Andrea Hernandez : RFIDChip Tracking in Public Interview w/Henrik Palmgren on Red Ice Radio, . . ....



 Security

Target data breach affects 40 million accounts, payment info compromised

If Target used Bitcoin then they wouldn't have the same issues?

It could be easy and effective for consumers. They could use either a mobile...

pen drive with write protect problem

Hi folks my problem is my pen drive with write protect problem

My Kingston 8gb pen drive is write protected . so how to solve...

NSA: Dangers of an unbridled state actor

The National Security Administration (NSA) routinely infringes upon the constitutional rights of the American people on a regular basis. While the...


 Social Networking

Video: 4/12/2013 Police threats against deOccupy Honolulu

In the final days before passing Bill 7, legislation that will cripple the houseless, police harassment of protesters increased. This was the 3rd...

Article: Anonymous threats to bring down Facebook on November 5

Mark your calendars. Controversial hackers' group Anonymous recently released a YouTube video warning that they are going to shut down social...

Article: Privacy of Tagged Photos in Facebook

Facebook, with its continuous changing and modification of its features and privacy policy, caught me off-guard the other day when I was working with...


 Spam

SPAM: The bottom line!

Spam is just like most things in life.. you get what you pay for.

Since email is considered "free", it draws the lowest of the low quality nonense....

Spam Folder... 380,000

System Post for

Photo: Spam Folder

How many messages can you spam folder hold? Can you view them all to make sure nothing was errantly sent to...

how do you remove a wall post after blocking someone on facebook?

i asked someone i had in my friends list that i met on a farmville forum to stop posting spam on my wall but they ignored me, so i just blocked them,...


 Spyware

Yahoo! Answers: Facebook Problem from dowloaded bot?

My (stupid) brother downloaded some stupid bot for the Zynga Poker Game on Facebook, I don't know exactly what he did, but now nobody can log on to...

Free anti virus download

Where can I get a free anti virus download?...

Blog post: Spyware Doctor 2010 7.0.0.514 + key

Spyware Doctor 2010 7.0.0.514 + key | 33 Mb | Direct Download Spyware Doctor provides three-way spyware protection for your PC ...Spyware Doctor is a...


 Technology

Vodaphone and Government Spying....

The newsclip says: "Vodafone has granted governments direct access to its networks in several countries, allowing them to listen to all conversations...

NBFC software, Co-operative Banking Software in Mangalore

Websoftex Software Solutions Private Limited, a Bangalore based Company, an authorized software service provider engaged in Microfinance Software,...

Cable companies soon to be listening to your conversations?

I read that Verizon will soon have a way to listen to our conversation so they can tailor advertisements. I think this is an invasion of privacy and...


 Top Blogs

Mahindra Special Services Group Interview

Name of your website?

Mahindra Special Services Group

Your name?

Nitin Bhogan

Your Location (city,...

Phishing Email and HSBC

My email is regularly loaded with phishing type emails. 99.99999% of them or better are obviously bogus without even opening them. They all lack...

Upholding company privacy for security

Upholding or protecting privacy is an ongoing concern for all companies because it is necessary to secure its operations and its business. Data...


 Viruses

Up to date virus list

I have bookmarked the page below that shows me the most recent viruses or threats that are out there so that I am up to date. It really has come in...

YouTube: How Computer Viruses Work

Computer viruses range from pesky to outright dangerous. Some just display a message, while others erase your entire hard disk. Clicking on what...

YouTube: Top 5 Deadliest computer viruses

Top 5 Deadliest computer viruses.....save your...


 Wiretapping

What is Wiretapping?

Let us understand what is wiretapping;

Telephone tapping (or wire tapping/wiretapping in the USA) is the monitoring of telephone and Internet...

HOW DO YOU KNOW IF YOUR ANDROID IS TAPPED?

Weird things go on with my phone!! Is their anyway to find out if its tapped? And what would the signs that its...

Cell Phone Tapped

Well, this is weird. One of my partners it´s getting normal messages after making or recieving a call of the like of: xxx.xxx.xxxx called 2 mins ago,...


 eBooks

Understanding Cryptography: A Textbook for Students and Practitioners

  • I really enjoy math and might be taking my math skills for granted.

  • It makes very difficult and arcane topic available to the...

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruder

  • If you want to be entertained and learn something new each time you pick up the book, you can't go wrong with The Art of Intrusion.

  • ...

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration

  • Finally, chapter 7, gives the a reader a basic overview in how to conduct the writing of the final penetration test report, useful for the...


Social Networking

Share this with your friends on facebook, twitter and Google+

Social sharing because it feels good

Please share this page on your favorite social networks:

Please like our homepage page for fd:
 
Top Searches: • full disclosure • fulldisclosure • fulldisclosure org • full disclosure org • full disclosure blog • disclosure • fulldisclosure com • full disclosure forum • disclosure forum • disclosure org • http fulldisclosure org • privacy blog • privacy disclosure • www fulldisclosure org • web proxy • full disclosure live • privacy logo • full disclosure forums • what is full disclosure • http www fulldisclosure org • disclosure blog • xeex exe • http www glr com stalk html • blog full disclosure • www fulldisclosure com • full disclousure • full disclosure com • full disclosure now • please do not click submit more than once blog • fulldisclosure blog •
Disclaimer

Important information.

This page is part of a social network. People may choose to participate here for personal, commercial or other reasons. Please keep in mind that posts or other information here may be: 1) advertisements and not personal opinions, and 2) that any products or services mentioned here may not work exactly as the promoter describes or promises.

Please verify all claims and use an escrow service for any signficiant purchases.

Full Disclosure first published on paper in 1984. Full Disclosure Live broadcast on World Wide Shortwave. Now fulldisclosure.org is your voice. Support fd by sharing. Cut and paste one of these links to your website, blog, or social network:
You have just read:

Website copyright (c) 2006-2014 GLR Sales LLC.


(:Nxqxqx)

Privacy PolicyDMCA Policy • -- WelcomeSitemap