well, a fully random 40-char-long password itself poses another threat - lost/forget. if you store it somewhere other than your brain, you...
+8. a second-level CA from EnTrust.net and CNNIC trusted as root
Related Information : about CNNIC: - Who is CNNIC? CNNIC is directly administrated by MII and CAS, the latter one is heavily related GFW...
How to untrust? http://www.imminentweb.com/technologies/remove-cnnic-ca What the hack is this fuss?...
A pain for normal browsing, good for browsing suspicious site. But there are a number of infiltrations coming from the dailiy sites; even google...
rule/zone editor is frequently used by many users in interactive mode. could you add it to the context menu? its not convenient to open the main...
OK It looks like a rule for the "Block network traffic" function. but i dont remember i have used this function before. maybe this rule is...
I have been using ESS firewall for several months, and it works fine. but now it blocks all program except the known ones with rules. I swtiched...
Hey, just bump into this. Looks like the gifc is planing an English forum section. "Pool-->Do you need a English board for the related...
hi i have difficulty in understanding some of the introductions on eset web site. I am assuming you mean "star topology"? I wonder if it is a...
then pls use Tor bundle. you can find some online proxy first and download Tor bundle from torproject.org through these the web proxy.
Nop. signons3.txt is in your firefox profile folder. Yep, domains are saved in clear text, while passwords are encrypted. I am not sure. I...
hi i am helping tor trasnlate the FAQ page.I think the answer to your question would be the following few lines in your "torrc" configuration....
how it leaks: [ATTACH] I just dont store pws on pr0n sites. I think that's enough. I use password keeper because my passwords tends to be long...
FF remembers your password but that thing leaks privacy. It shows which sites you have logged on. Of course most people wouldn't bother, cauz...
xb vpn will remain the best private line in its eyes until one day it suddenly find out how easily gfw block it and turn this most valuable and...
hey, guys I would say, a windows logon script would serve me better.;)
Hello, Blocking the port used by certain risky service that you dont use is enough, or you have ~1000 ports to block. Firewalls often come with...
If there is such a sys snapshot tool, the "firest aid" would be a lot easier This tool can run at each startup and quit after making a new...
hi, just googled a few numbers for you. These are ports used by some cisco management service/clients. check it here:...
For xp, there is a simple solution. Just install a dos7 or linux and check the location under a different OS. Removing a rootkit is easy as pie....
Welcome to the month of conspiracies and scary facts...;D
thanks, no wonder, it happens that way.
I still think emulators like Cygwin and coLinux are great starting point. IMHO, what stands in between the user and Linux are the commands lines...
Hi, I dont think this question make much sense. Tor is widely used as proxy. i2p as darknet, Freenet as static content caching pool. They have...
Separate names with a comma.