Search results

Jump to navigation Jump to search
  • ...cryption]] and [[decryption]] computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, e PGP and similar software follow the OpenPGP standard (RFC 4880) for encrypting and decrypting data.
    719 bytes (91 words) - 15:21, 3 May 2020
  • ...egtlin in 2013. Its mission is to develop, package and distribute Electrum software, and to provide services to Bitcoin users and businesses. * [[GNU Privacy Guard]] ([[GnuPG]] or [[GPG]])
    791 bytes (87 words) - 15:08, 3 May 2020
  • ...approach to instant messaging that doesn’t trust anyone in protecting your privacy. Ricochet Refresh uses the original Ricochet open-source software but has improved on it substantially, such as upgrading its security and ma
    926 bytes (129 words) - 21:33, 15 July 2021
  • ...ement |title=Microsoft Enterprise and Developer Privacy Statement |website=privacy.microsoft.com |publisher=Microsoft |access-date=4 November 2016 |archive-ur ''[[VSCodium]]'' is an alternative binary distribution of the software which uses only the open-source parts and omits Microsoft’s trademarks an
    4 KB (536 words) - 08:22, 18 April 2020
  • ...n Identification]] system.<ref name=Verge2014/> One of the creators of the software, Yaniv Taigman, came to Facebook via their 2007 acquisition of [[Face.com]] ...its users in early 2015, with the exception of users in the EU due to data privacy laws there.<ref name=DailyMail2015/>
    6 KB (751 words) - 03:05, 3 April 2019
  • *[[Pretty Good Privacy]] ([[PGP]]) [[Category:Privacy]]
    2 KB (294 words) - 15:24, 3 May 2020
  • '''Tribler''' is a traditonal [[BitTorrent]] compatible software. But you can use one to three [[hop]]s([[node]]s) to prevent to trace by th >This is not what i expect from a client claiming to protect my [[privacy]].
    1 KB (211 words) - 02:09, 24 October 2019
  • ...[[Tor hidden service]] and needed to have [[Tor (anonymity network)|Tor]] software installed on a computer to access Tor hidden services. Users were not requi ...ard drive]] of those servers was the [[Exim|Exim mail server]] and the Tor software. "No emails, logs or personal data were stored on those servers, thus it do
    5 KB (778 words) - 16:18, 12 March 2020
  • ...ting. Use Linux, BSD.|website=distrowatch.com}}</ref> It aims to provide [[privacy]], [[Computer Security|security]] and [[anonymity]] on the internet. The op * Whonix - Software That Can Anonymize Everything You Do Online
    6 KB (954 words) - 15:24, 30 June 2020
  • {{Primary sources|date=October 2018}}{{Infobox software | programming language = [[Electron (software framework)|Electron]] (back-end), [[CoffeeScript]] / [[JavaScript]] / [[Les
    11 KB (1,413 words) - 09:50, 2 July 2019
  • ...ll, ready-to-use and easy to use. The project goal is to combine security, privacy, stability, usability, openness, freedom and to be free of charge. ...2013]</ref> || November 7, 2013 || {{Dunno}} || {{Unbulleted list|[[MATE (software)|MATE]] 1.6|[[Xfce]] 4.10}} || [[LibreOffice]] exchanged for [[Apache OpenO
    6 KB (754 words) - 05:01, 16 July 2021
  • {{Infobox software ...d under the terms of the [[GNU General Public License]], so Phex is [[free software]]. Phex is based on [[Java SE]] 5.0 or later.
    8 KB (1,124 words) - 19:14, 9 September 2018
  • [[Category:2003 software]] [[Category:Cross-platform free software]]
    11 KB (1,743 words) - 17:12, 27 March 2019
  • *'''GNU Privacy Assistant'''&mdash;comes with the GPG binary package for almost every platf #**GNU Privacy Assistant:
    15 KB (2,409 words) - 14:40, 29 November 2017
  • *'''GNU Privacy Assistant'''&mdash;comes with the GPG binary package for almost every platf #**GNU Privacy Assistant:
    15 KB (2,409 words) - 12:24, 14 November 2019
  • ...an open-source [[cryptocurrency]] created in April 2014 that focuses on [[privacy]], decentralization, and [[scalability]] that runs on Windows, MacOS, Linux The focus on privacy has attracted illicit use by people interested in evading law enforcement.
    14 KB (2,081 words) - 02:25, 3 February 2021
  • ...as a [[web application]] running on a [[web server]]. Examples of webmail software are [[Roundcube]] and [[SquirrelMail]]. Examples of [[Comparison of webmail ...eed to be connected to the internet while using it. There exist also other software tools to integrate parts of the webmail functionality into the OS (e.g. cre
    13 KB (1,982 words) - 02:13, 24 October 2016
  • {{Infobox software | programming language = [[Python language]] (server tools), [[Jekyll (software)]] (site), [[Java language]] (client)
    15 KB (1,929 words) - 18:02, 27 March 2019
  • [[gpg4usb]] is an encryption software using [[GPG]] ([[PGP]]). It is for [[Linux]] and [[Windows]]. * [[GNU Privacy Guard]] ([[GnuPG]] or [[GPG]])
    9 KB (1,429 words) - 08:04, 14 June 2021
  • | industry = [[Software]] '''Wickr''' is an American software company based in San Francisco.<ref name=WSJ2014>{{cite news |title=A start
    21 KB (2,715 words) - 15:00, 27 March 2019
  • ...]] that is a [[Linux]] version of [[eMule]]. [[eMule]] is an [[open source software]] version of [[eDonkey]]. ...nk is for download but it will work in [[I2P]] network only. An encryption software [[TrueCrypt]] make secure your data from police. Current supported systems
    20 KB (3,310 words) - 01:48, 23 April 2021
  • {{Infobox software ...nse>{{Cite web |url=https://code.visualstudio.com/license |title=Microsoft Software License Terms |website=code.visualstudio.com |publisher=[[Microsoft]] |acce
    27 KB (3,641 words) - 17:31, 12 May 2019
  • {{hatnote|This article is about the organization. For the organization's software, see [[Tor (anonymity network)]]}} ...rights and freedoms by creating and deploying free and open anonymity and privacy technologies, supporting their unrestricted availability and use, and furth
    24 KB (3,070 words) - 05:26, 6 April 2019
  • {{hatnote|This article is about the organization. For the organization's software, see [[Tor (anonymity network)]]}} ...rights and freedoms by creating and deploying free and open anonymity and privacy technologies, supporting their unrestricted availability and use, and furth
    24 KB (3,065 words) - 15:23, 30 June 2020
  • The importance of decentralization in terms of freedom of expression, privacy and anonymity cannot be emphasized. Because without a central power to cont ...tory is different. This is because the company does not'operate' messenger software.
    8 KB (1,241 words) - 19:21, 8 December 2020
  • ...ng]], [[internet chat|chatting]], [[blogging]] and [[file transfer]]s. The software that [[Implementation|implements]] this layer is called an ''I2P [[Router ( ...Free software|free]] and [[open source]] and is published under multiple [[software license|licenses]]. The name ''I2P'' is derived from ''Invisible Internet P
    29 KB (4,622 words) - 01:48, 23 April 2021
  • {{Infobox software | operating system = [[Windows]], [[Linux]], [[OS X]], [[Android (software)|Android]], [[iOS]], [[FreeBSD]], [[OpenIndiana]], [[Sailfish OS]]
    16 KB (2,294 words) - 07:25, 10 April 2020
  • ...n nations in a coordinated effort to crack down on the [[Tor|Tor anonymity software]] and capitalize on the inherent weaknesses of [[Tor]] to attack and pinpoi ...tp://nomadcapitalist.com/2013/12/15/top-5-best-countries-host-website-data-privacy/</ref>
    16 KB (2,447 words) - 02:14, 24 October 2016
  • {{Infobox software ...ox/addon/noscript/developers|archivedate=2011-10-09|df=}}</ref> an Italian software developer and member of the Mozilla Security Group.<ref name="mozilla-sec-g
    22 KB (3,055 words) - 19:44, 6 September 2019
  • Unlike [[computer virus]]es, [[Computer worm|worms]], and [[rogue security software]]s, trojans generally do not attempt to inject themselves into other files ...an horses? Perhaps it is more important to trust the people who wrote the software.'' He mentioned that he knew about the possible existence of trojans from a
    16 KB (2,048 words) - 14:11, 10 May 2020
  • A '''virtual assistant''' or '''intelligent personal assistant''' is a [[software agent]] that can perform tasks or services for an individual. Sometimes the ...on software were [[automated attendant]] and medical [[digital dictation]] software.<ref>{{cite web|last=Zwass |first=Vladimir |url=https://www.britannica.com/
    27 KB (3,675 words) - 20:50, 20 November 2018
  • {{Infobox software | discontinued = <!-- Set to yes if software is discontinued, otherwise omit -->
    11 KB (1,482 words) - 14:46, 8 August 2020
  • ...ered easily by unauthorized people. Disk encryption uses [[disk encryption software]] or [[disk encryption hardware|hardware]] to [[encryption|encrypt]] every ...fly encryption''' ('''OTFE'''), is a method used by some [[disk encryption software]]. "Transparent" refers to the fact that data is automatically encrypted or
    16 KB (2,315 words) - 11:24, 18 May 2020
  • http://shadowlife.i2p/ focuses on Privacy · how to protect it and why it matters | Blog and Forum{{verified link|dat ...://freedomforum.i2p/ Privacy Forum - surveillance, censorship, encryption, software &amp; more{{verified link|date=November 2013}}
    11 KB (1,640 words) - 13:31, 25 December 2019
  • * [[Tribler]]: It's a traditonal [[BitTorrent]] compatible software. But you can use one to three [[hop]]s([[node]]s) to prevent to trace by th * [[Tor]]: It is a [[dark web]] software. You can download [[Tor Browser]] from Google [[Play Store]]. https://www.t
    17 KB (2,596 words) - 17:55, 14 June 2021
  • ...deal with a new bloated, unaudited, closed-source, and different piece of software for each device and protocol. [[Pidgin (software)]]
    20 KB (2,715 words) - 07:25, 10 April 2020
  • A '''web browser''' (commonly referred to as a '''browser''') is a [[software application]] for accessing information on the [[World Wide Web]]. Each ind ...e [[Mozilla Foundation]] to create a new browser using the [[open source]] software model. This work evolved into [[Firefox]], first released by Mozilla in 200
    11 KB (1,600 words) - 04:15, 17 November 2018
  • = Software installation methods = ...an compile a [[software]] using this version ports, but I couldn't run the software. Maybe there are some problems.
    17 KB (2,650 words) - 22:25, 20 February 2020
  • ...ty-focused]] [[Debian]]-based [[Linux distribution]] aimed at preserving [[privacy]] and [[anonymity]].<ref name="lwn" /> All its incoming and outgoing connec ...]]. Because sometimes you need [[root]]'s [[permission]] to install some [[software]]. Normally, the administration password is disabled for better [[security]
    36 KB (5,168 words) - 15:22, 30 June 2020
  • ...o public website traffic and can be better understood by using web metrics software to track overall activity. User surveys also improve intranet website effec ...y controlled or devolve. These decisions sit alongside to the hardware and software considerations (like [[content management systems]]), participation issues
    18 KB (2,562 words) - 04:29, 6 May 2020
  • ...9 |title=Metasploit 3.0 day |publisher=SecurityFocus.com}}</ref> and often software intended for legitimate security auditing.<ref name="Rodriguez">{{Cite web ...title=Error Reporting Oops: Microsoft, Meter Maids and Malicious Code|work=Privacy and Security Fanatic|publisher=[[Network World]]}}</ref>
    6 KB (829 words) - 03:58, 15 March 2019
  • ...], [[ColdFusion]], [[Java Platform, Enterprise Edition|Java EE]], [[Plack (software)|Perl/Plack]], [[PHP]] or [[Ruby on Rails]]). These facilities allow custom ...with this type of service can be quite basic and not flexible in terms of software and updates. Resellers often sell shared web hosting and web companies oft
    19 KB (2,825 words) - 20:17, 12 September 2018
  • ==Privacy concerns and ethics== ...n the [[Total Information Awareness]] Program or in [[ADVISE]], has raised privacy concerns.<ref>{{cite journal |author=Taipale, Kim A. |title=Data Mining and
    43 KB (5,879 words) - 11:26, 10 May 2020
  • They have also become a source of security and privacy issues, as some built-in webcams can be remotely activated by [[spyware]]. ...ed by webcams can be used for a number of purposes, each using appropriate software:
    31 KB (4,443 words) - 11:14, 4 February 2019
  • ...rested in mitigating the vulnerability (including the vendor of the target software). Until the vulnerability is mitigated, [[Hacker|hackers]] can [[Exploit (c | quote= A zero day vulnerability refers to an exploitable bug in software that is unknown to the vendor. This security hole may be exploited by crack
    22 KB (3,197 words) - 09:20, 17 December 2018
  • | source_model = [[Open-source software|Open source]] ([[GPLv2]]), double license<ref>{{cite web |url=https://www.q | ui = [[KDE Software Compilation|KDE]], [[Xfce]]
    17 KB (2,474 words) - 09:33, 17 January 2021
  • ...net/pricing/?p=aws openvpn.net: Pricing], retrieved 12 December 2018</ref> software that implements [[virtual private network]] (VPN) techniques to create secu ...ew Lockhart|title=Network Security Hacks: Tips & Tools for Protecting Your Privacy|url=https://books.google.com/books?id=6weH75ATpbUC&pg=PA339|year=2006|publi
    18 KB (2,436 words) - 12:32, 12 May 2020
  • ...ormation is going, which is the reason that proxies can be used to protect privacy.]] ...ity of the request, or provide additional benefits such as load balancing, privacy, or security. Proxies were devised to add structure and [[Encapsulation (ne
    41 KB (6,149 words) - 21:25, 22 June 2021
  • {{short description|software released under a license restricting intellectual property rights}} ...ce software" is non-[[Free software|free]] computer software for which the software's publisher or another person retains [[intellectual property]] rights—us
    39 KB (5,441 words) - 15:36, 27 January 2019
  • ! Software facility for webmail | {{Yes}}{{efn|Also can be used on non-mobile devices via third-party software.<ref>[http://www.bravurasoftware.com/yahoo-imap/ Yahoo IMAP Connector]</ref
    35 KB (4,406 words) - 02:06, 24 October 2016

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)