Search results
Jump to navigation
Jump to search
- ...cryption]] and [[decryption]] computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, e PGP and similar software follow the OpenPGP standard (RFC 4880) for encrypting and decrypting data.719 bytes (91 words) - 15:21, 3 May 2020
- ...egtlin in 2013. Its mission is to develop, package and distribute Electrum software, and to provide services to Bitcoin users and businesses. * [[GNU Privacy Guard]] ([[GnuPG]] or [[GPG]])791 bytes (87 words) - 15:08, 3 May 2020
- ...approach to instant messaging that doesn’t trust anyone in protecting your privacy. Ricochet Refresh uses the original Ricochet open-source software but has improved on it substantially, such as upgrading its security and ma926 bytes (129 words) - 21:33, 15 July 2021
- ...ement |title=Microsoft Enterprise and Developer Privacy Statement |website=privacy.microsoft.com |publisher=Microsoft |access-date=4 November 2016 |archive-ur ''[[VSCodium]]'' is an alternative binary distribution of the software which uses only the open-source parts and omits Microsoft’s trademarks an4 KB (536 words) - 08:22, 18 April 2020
- ...n Identification]] system.<ref name=Verge2014/> One of the creators of the software, Yaniv Taigman, came to Facebook via their 2007 acquisition of [[Face.com]] ...its users in early 2015, with the exception of users in the EU due to data privacy laws there.<ref name=DailyMail2015/>6 KB (751 words) - 03:05, 3 April 2019
- *[[Pretty Good Privacy]] ([[PGP]]) [[Category:Privacy]]2 KB (294 words) - 15:24, 3 May 2020
- '''Tribler''' is a traditonal [[BitTorrent]] compatible software. But you can use one to three [[hop]]s([[node]]s) to prevent to trace by th >This is not what i expect from a client claiming to protect my [[privacy]].1 KB (211 words) - 02:09, 24 October 2019
- ...[[Tor hidden service]] and needed to have [[Tor (anonymity network)|Tor]] software installed on a computer to access Tor hidden services. Users were not requi ...ard drive]] of those servers was the [[Exim|Exim mail server]] and the Tor software. "No emails, logs or personal data were stored on those servers, thus it do5 KB (778 words) - 16:18, 12 March 2020
- ...ting. Use Linux, BSD.|website=distrowatch.com}}</ref> It aims to provide [[privacy]], [[Computer Security|security]] and [[anonymity]] on the internet. The op * Whonix - Software That Can Anonymize Everything You Do Online6 KB (954 words) - 15:24, 30 June 2020
- {{Primary sources|date=October 2018}}{{Infobox software | programming language = [[Electron (software framework)|Electron]] (back-end), [[CoffeeScript]] / [[JavaScript]] / [[Les11 KB (1,413 words) - 09:50, 2 July 2019
- ...ll, ready-to-use and easy to use. The project goal is to combine security, privacy, stability, usability, openness, freedom and to be free of charge. ...2013]</ref> || November 7, 2013 || {{Dunno}} || {{Unbulleted list|[[MATE (software)|MATE]] 1.6|[[Xfce]] 4.10}} || [[LibreOffice]] exchanged for [[Apache OpenO6 KB (754 words) - 05:01, 16 July 2021
- {{Infobox software ...d under the terms of the [[GNU General Public License]], so Phex is [[free software]]. Phex is based on [[Java SE]] 5.0 or later.8 KB (1,124 words) - 19:14, 9 September 2018
- [[Category:2003 software]] [[Category:Cross-platform free software]]11 KB (1,743 words) - 17:12, 27 March 2019
- *'''GNU Privacy Assistant'''—comes with the GPG binary package for almost every platf #**GNU Privacy Assistant:15 KB (2,409 words) - 14:40, 29 November 2017
- *'''GNU Privacy Assistant'''—comes with the GPG binary package for almost every platf #**GNU Privacy Assistant:15 KB (2,409 words) - 12:24, 14 November 2019
- ...an open-source [[cryptocurrency]] created in April 2014 that focuses on [[privacy]], decentralization, and [[scalability]] that runs on Windows, MacOS, Linux The focus on privacy has attracted illicit use by people interested in evading law enforcement.14 KB (2,081 words) - 02:25, 3 February 2021
- ...as a [[web application]] running on a [[web server]]. Examples of webmail software are [[Roundcube]] and [[SquirrelMail]]. Examples of [[Comparison of webmail ...eed to be connected to the internet while using it. There exist also other software tools to integrate parts of the webmail functionality into the OS (e.g. cre13 KB (1,982 words) - 02:13, 24 October 2016
- {{Infobox software | programming language = [[Python language]] (server tools), [[Jekyll (software)]] (site), [[Java language]] (client)15 KB (1,929 words) - 18:02, 27 March 2019
- [[gpg4usb]] is an encryption software using [[GPG]] ([[PGP]]). It is for [[Linux]] and [[Windows]]. * [[GNU Privacy Guard]] ([[GnuPG]] or [[GPG]])9 KB (1,429 words) - 08:04, 14 June 2021
- | industry = [[Software]] '''Wickr''' is an American software company based in San Francisco.<ref name=WSJ2014>{{cite news |title=A start21 KB (2,715 words) - 15:00, 27 March 2019
- ...]] that is a [[Linux]] version of [[eMule]]. [[eMule]] is an [[open source software]] version of [[eDonkey]]. ...nk is for download but it will work in [[I2P]] network only. An encryption software [[TrueCrypt]] make secure your data from police. Current supported systems20 KB (3,310 words) - 01:48, 23 April 2021
- {{Infobox software ...nse>{{Cite web |url=https://code.visualstudio.com/license |title=Microsoft Software License Terms |website=code.visualstudio.com |publisher=[[Microsoft]] |acce27 KB (3,641 words) - 17:31, 12 May 2019
- {{hatnote|This article is about the organization. For the organization's software, see [[Tor (anonymity network)]]}} ...rights and freedoms by creating and deploying free and open anonymity and privacy technologies, supporting their unrestricted availability and use, and furth24 KB (3,070 words) - 05:26, 6 April 2019
- {{hatnote|This article is about the organization. For the organization's software, see [[Tor (anonymity network)]]}} ...rights and freedoms by creating and deploying free and open anonymity and privacy technologies, supporting their unrestricted availability and use, and furth24 KB (3,065 words) - 15:23, 30 June 2020
- The importance of decentralization in terms of freedom of expression, privacy and anonymity cannot be emphasized. Because without a central power to cont ...tory is different. This is because the company does not'operate' messenger software.8 KB (1,241 words) - 19:21, 8 December 2020
- ...ng]], [[internet chat|chatting]], [[blogging]] and [[file transfer]]s. The software that [[Implementation|implements]] this layer is called an ''I2P [[Router ( ...Free software|free]] and [[open source]] and is published under multiple [[software license|licenses]]. The name ''I2P'' is derived from ''Invisible Internet P29 KB (4,622 words) - 01:48, 23 April 2021
- {{Infobox software | operating system = [[Windows]], [[Linux]], [[OS X]], [[Android (software)|Android]], [[iOS]], [[FreeBSD]], [[OpenIndiana]], [[Sailfish OS]]16 KB (2,294 words) - 07:25, 10 April 2020
- ...n nations in a coordinated effort to crack down on the [[Tor|Tor anonymity software]] and capitalize on the inherent weaknesses of [[Tor]] to attack and pinpoi ...tp://nomadcapitalist.com/2013/12/15/top-5-best-countries-host-website-data-privacy/</ref>16 KB (2,447 words) - 02:14, 24 October 2016
- {{Infobox software ...ox/addon/noscript/developers|archivedate=2011-10-09|df=}}</ref> an Italian software developer and member of the Mozilla Security Group.<ref name="mozilla-sec-g22 KB (3,055 words) - 19:44, 6 September 2019
- Unlike [[computer virus]]es, [[Computer worm|worms]], and [[rogue security software]]s, trojans generally do not attempt to inject themselves into other files ...an horses? Perhaps it is more important to trust the people who wrote the software.'' He mentioned that he knew about the possible existence of trojans from a16 KB (2,048 words) - 14:11, 10 May 2020
- A '''virtual assistant''' or '''intelligent personal assistant''' is a [[software agent]] that can perform tasks or services for an individual. Sometimes the ...on software were [[automated attendant]] and medical [[digital dictation]] software.<ref>{{cite web|last=Zwass |first=Vladimir |url=https://www.britannica.com/27 KB (3,675 words) - 20:50, 20 November 2018
- {{Infobox software | discontinued = <!-- Set to yes if software is discontinued, otherwise omit -->11 KB (1,482 words) - 14:46, 8 August 2020
- ...ered easily by unauthorized people. Disk encryption uses [[disk encryption software]] or [[disk encryption hardware|hardware]] to [[encryption|encrypt]] every ...fly encryption''' ('''OTFE'''), is a method used by some [[disk encryption software]]. "Transparent" refers to the fact that data is automatically encrypted or16 KB (2,315 words) - 11:24, 18 May 2020
- http://shadowlife.i2p/ focuses on Privacy · how to protect it and why it matters | Blog and Forum{{verified link|dat ...://freedomforum.i2p/ Privacy Forum - surveillance, censorship, encryption, software & more{{verified link|date=November 2013}}11 KB (1,640 words) - 13:31, 25 December 2019
- * [[Tribler]]: It's a traditonal [[BitTorrent]] compatible software. But you can use one to three [[hop]]s([[node]]s) to prevent to trace by th * [[Tor]]: It is a [[dark web]] software. You can download [[Tor Browser]] from Google [[Play Store]]. https://www.t17 KB (2,596 words) - 17:55, 14 June 2021
- ...deal with a new bloated, unaudited, closed-source, and different piece of software for each device and protocol. [[Pidgin (software)]]20 KB (2,715 words) - 07:25, 10 April 2020
- A '''web browser''' (commonly referred to as a '''browser''') is a [[software application]] for accessing information on the [[World Wide Web]]. Each ind ...e [[Mozilla Foundation]] to create a new browser using the [[open source]] software model. This work evolved into [[Firefox]], first released by Mozilla in 20011 KB (1,600 words) - 04:15, 17 November 2018
- = Software installation methods = ...an compile a [[software]] using this version ports, but I couldn't run the software. Maybe there are some problems.17 KB (2,650 words) - 22:25, 20 February 2020
- ...ty-focused]] [[Debian]]-based [[Linux distribution]] aimed at preserving [[privacy]] and [[anonymity]].<ref name="lwn" /> All its incoming and outgoing connec ...]]. Because sometimes you need [[root]]'s [[permission]] to install some [[software]]. Normally, the administration password is disabled for better [[security]36 KB (5,168 words) - 15:22, 30 June 2020
- ...o public website traffic and can be better understood by using web metrics software to track overall activity. User surveys also improve intranet website effec ...y controlled or devolve. These decisions sit alongside to the hardware and software considerations (like [[content management systems]]), participation issues18 KB (2,562 words) - 04:29, 6 May 2020
- ...9 |title=Metasploit 3.0 day |publisher=SecurityFocus.com}}</ref> and often software intended for legitimate security auditing.<ref name="Rodriguez">{{Cite web ...title=Error Reporting Oops: Microsoft, Meter Maids and Malicious Code|work=Privacy and Security Fanatic|publisher=[[Network World]]}}</ref>6 KB (829 words) - 03:58, 15 March 2019
- ...], [[ColdFusion]], [[Java Platform, Enterprise Edition|Java EE]], [[Plack (software)|Perl/Plack]], [[PHP]] or [[Ruby on Rails]]). These facilities allow custom ...with this type of service can be quite basic and not flexible in terms of software and updates. Resellers often sell shared web hosting and web companies oft19 KB (2,825 words) - 20:17, 12 September 2018
- ==Privacy concerns and ethics== ...n the [[Total Information Awareness]] Program or in [[ADVISE]], has raised privacy concerns.<ref>{{cite journal |author=Taipale, Kim A. |title=Data Mining and43 KB (5,879 words) - 11:26, 10 May 2020
- They have also become a source of security and privacy issues, as some built-in webcams can be remotely activated by [[spyware]]. ...ed by webcams can be used for a number of purposes, each using appropriate software:31 KB (4,443 words) - 11:14, 4 February 2019
- ...rested in mitigating the vulnerability (including the vendor of the target software). Until the vulnerability is mitigated, [[Hacker|hackers]] can [[Exploit (c | quote= A zero day vulnerability refers to an exploitable bug in software that is unknown to the vendor. This security hole may be exploited by crack22 KB (3,197 words) - 09:20, 17 December 2018
- | source_model = [[Open-source software|Open source]] ([[GPLv2]]), double license<ref>{{cite web |url=https://www.q | ui = [[KDE Software Compilation|KDE]], [[Xfce]]17 KB (2,474 words) - 09:33, 17 January 2021
- ...net/pricing/?p=aws openvpn.net: Pricing], retrieved 12 December 2018</ref> software that implements [[virtual private network]] (VPN) techniques to create secu ...ew Lockhart|title=Network Security Hacks: Tips & Tools for Protecting Your Privacy|url=https://books.google.com/books?id=6weH75ATpbUC&pg=PA339|year=2006|publi18 KB (2,436 words) - 12:32, 12 May 2020
- ...ormation is going, which is the reason that proxies can be used to protect privacy.]] ...ity of the request, or provide additional benefits such as load balancing, privacy, or security. Proxies were devised to add structure and [[Encapsulation (ne41 KB (6,149 words) - 21:25, 22 June 2021
- {{short description|software released under a license restricting intellectual property rights}} ...ce software" is non-[[Free software|free]] computer software for which the software's publisher or another person retains [[intellectual property]] rights—us39 KB (5,441 words) - 15:36, 27 January 2019
- ! Software facility for webmail | {{Yes}}{{efn|Also can be used on non-mobile devices via third-party software.<ref>[http://www.bravurasoftware.com/yahoo-imap/ Yahoo IMAP Connector]</ref35 KB (4,406 words) - 02:06, 24 October 2016