How to disappear completely

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

How to disappear completely


How to disappear completely

Posted: 03 May 2011 07:28 AM PDT


In a world where we share more information online than ever before, it might seem impossible to disappear completely. But Frank Ahearn can help. A professional skip tracer for many years, he tracked down 'missing' persons for clients who were searching for them for legal or financial reasons. His arsenal included use of public records, credit reports, utility bills, criminal background checks, tax information and other revealing documents.

Reports: Computers seized at bin Laden compound

Posted: 03 May 2011 07:24 AM PDT


The U.S. raid that killed terrorist leader Osama bin Laden in Pakistan Sunday also turned up an "intelligence harvest" of computer-based data, according to media reports.

Caveat emptor in the cloud

Posted: 03 May 2011 06:05 AM PDT


Just as I finished writing the last issue ("SCIMing the provisioning landscape") an interesting new study -- about cloud computing providers -- popped into my inbox.

South Korea raids Google over illegal mobile data collection

Posted: 03 May 2011 12:35 AM PDT


Police in South Korea said they had raided Google's Korea head office in Seoul on Tuesday on suspicion that the subsidiary of the search engine company had illegally collected location data from application subscribers.

Sony cuts off Sony Online Entertainment service after hack

Posted: 02 May 2011 04:17 AM PDT


The widely publicized hack of Sony's computer networks is worse than previously thought, also affecting 24.6 million Sony Online Entertainment network accounts.

Man who liveblogged Bin Laden raid was hacked

Posted: 02 May 2011 02:45 AM PDT


The Pakistani programmer who dubbed himself "the guy who liveblogged the Osama raid without knowing about it" is also the guy who got his website hacked without knowing about it.

Fake security software takes aim at Mac users

Posted: 02 May 2011 12:24 AM PDT


Scammers are distributing fake security software aimed at the Mac by taking advantage of the news that al-Qaeda leader Osama Bin Laden has been killed by U.S. forces, a security researcher said today.

Osama Bin Laden news spurs wave of scams, malware

Posted: 02 May 2011 09:54 AM PDT


Malware creators are already using the news of Osama Bin Laden's death as a opportunity to try and dupe people into clicking on malicious links. According to cloud-security firm Zscaler, researchers were already seeing malicious sites emerge to capitalize on the news within hours of the announcement.

Fake AV makers, scammers exploit Bin Laden news

Posted: 02 May 2011 09:50 AM PDT


The death of Osama Bin Laden is the latest event to spur malware makers and scammers into action.

Security stepped up around U.S. following Bin Laden news

Posted: 02 May 2011 09:47 AM PDT


While many around the world rejoiced at news that Osama Bin Laden, Al-Qaeda founder and architect of the September 11th attacks, had been killed by U.S. military forces, the news does not come without concern about possible violence in the aftermath of the historic event.

Brocade fleshes out cloud strategy for battle with Cisco, others

Posted: 03 May 2011 07:56 AM PDT


Brocade today unveiled its plan for migrating customers to distributed, virtualized, cloud-based data centers, along with products supporting that plan.

Excerpt from IPv6 for Enterprise Networks

Posted: 02 May 2011 03:42 AM PDT


This chapter discusses the following: Internet evolution and the need for IPv6, IPv6 in the IETF, Enterprise IPv6 deployment status, and IPv4 Address Exhaustion and the Workaround Options.

0 comments:

Post a Comment