From: Katrien Pype
“Being a Muslim in the Age of Facebook, Youtube and Twitter.
Anthropological Reflections on Media and Religion in Bamako, Cairo and
Dar-Es-Salam”
Symposium, April 18-19th, 2013, KU Leuven
With
Kelly Askew (UMichigan)
Charles Hirschkind (UCBerkeley)
Dorothea Schulz (University
Apple publishes a security configuration guide for OS X:
https://ssl.apple.com/support/security/guides/
The NSA also publishes hardening tips:
http://www.nsa.gov/ia/_files/factsheets/macosx_10_6_hardeningtips.pdf
Cheers,
Joe
--
Joseph Mornin
http://www.mornin.org/
On 1/27/13 4:52 PM, sam de
Hi there,
Are there any guides that tell me how to make a new computer secure, for both
use and connecting and communicating via the net?
My set up is as follows:
- Macbook Pro, running Mac OS 10.6.8
My requirements are as follows:
- I am almost always connected to the net, and need fast acce
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi everyone,
Whonix hasn't been mentioned or discussed on this list. It looks like
a great list, providing lots of feedback and discussion. Therefore I
re-post an updated version of the original release announcement.
Whonix (called TorBOX or aos in
Hi,
> But now that I think, fidonet would also be easy for spam. Or (about
> my first idea) attacker could make many mails with huge attachments
> to destroy efficiency.
I don't know SplinterNet - but good old FIDO was not spam-ridden. You
had to have BBS access to post to groups or send PMs - an
On Sun, Jan 27, 2013 at 02:03:37AM -0800, Brad Beckett wrote:
> Mega needs an optional Chrome and Firefox plugin -- what Crypto.cat did,
> but it could be optional.
>
> They also need a desktop client like Dropbox so I can encrypt my files
> automatically prior to uploading.
No. What they, and e
Thanks a lot. Please keep me updated if you find the new resources.
Cheers,
A
On 25 January 2013 19:15, Cooper Quintin wrote:
> Hi Amin,
> I did a presentation on mobile device security a while ago. IT mostly
> focuses on Android, but there is some IOS stuff in there as well. I
> have been c
On 01/27/2013 04:48 PM, Jerzy Łogiewa wrote:
> Who have tried SplinterNet? It sounds like very strong activist tool and
> maybe works like as described.
Unfortunately, it hasn't been touched in a year. Not a good sign.
I think the idea is sound (using personal/local area network
communications t
Yes exactly what I was thinking, but MegaUpload needs to come up with Mac,
PC, and Linuxdesktop clients -- stat.
On Sun, Jan 27, 2013 at 2:20 AM, scarp wrote:
> Randolph D.:
> > *www.cloudfogger.com*
> >
> > or: http://retroshare.sf.net
> >
> > 2013/1/27 Brad Beckett
> >
> >> Mega needs
> >>
>
- Forwarded message from The Doctor -
From: The Doctor
Date: Sat, 26 Jan 2013 16:08:00 -0500
To: byzant...@hacdc.org
Subject: Re: [HacDC:Byzantium] Request from a Researcher
Reply-To: byzant...@hacdc.org
Organization: Virtual Adept Networks, Unlimited
User-Agent: Mozilla/5.0 (X11; Linux
Randolph D.:
> *www.cloudfogger.com*
>
> or: http://retroshare.sf.net
>
> 2013/1/27 Brad Beckett
>
>> Mega needs
>>
>> They also need a desktop client like Dropbox so I can encrypt my files
>> automatically prior to uploading.
>>
I believe Cyphertite will encrypt your files prior to uploading.
http://esa11thconference.eu/call-for-papers/research-networks/RN18
Deadline: FEBRUARY 1st
European Sociological Association
2013 Conference "Communication, Crisis and Change"
University of Torino, Italy
August 28-31, 2013
The ESA 2013 conference asks the overall questions:
What is behind the cr
Mega needs an optional Chrome and Firefox plugin -- what Crypto.cat did,
but it could be optional.
They also need a desktop client like Dropbox so I can encrypt my files
automatically prior to uploading.
On Sun, Jan 27, 2013 at 1:56 AM, Jerzy Łogiewa wrote:
> More danger with Mega because more
More danger with Mega because more users.
A hot subject means security researcher also get noticed by bloggers and
newspaper :-)
--
Jerzy Łogiewa -- jerz...@interia.eu
On Jan 21, 2013, at 11:52 PM, micah anderson wrote:
> I've always wondered why something like Mega gets a lot of attention and
Also is easy for spam :(
But now that I think, fidonet would also be easy for spam. Or (about my first
idea) attacker could make many mails with huge attachments to destroy
efficiency.
--
Jerzy Łogiewa -- jerz...@interia.eu
On Jan 6, 2013, at 10:57 PM, Rich Kulawiec wrote:
> I'll second this.
Who have tried SplinterNet? It sounds like very strong activist tool and maybe
works like as described.
https://github.com/megamattron/SplinterNet#readme
--
Jerzy Łogiewa -- jerz...@interia.eu
--
Unsubscribe, change to digest, or change password at:
https://mailman.stanford.edu/mailman/listinf
16 matches
Mail list logo