Wikipedia community has blacked out the English version of Wikipedia for 24 hours on January 18th to raise awareness about legislation being proposed by the U.S. Congress — the Stop Online Piracy Act (SOPA) in the U.S. House of Representatives, and the PROTECT IP Act (PIPA) in the U.S. Senate -- and to encourage readers to speak out against it. This legislation, if passed, will harm the free and open Internet. If you are in the United States, let your congressional representative know what you think of the proposed legislation by clicking below. Thanks.
http://en.wikipedia.org/wiki/Main_Page
Imagine a world without free knowledge
Moderators: Clemsy, Martin_Weyers, Cindy B.
and here's the situation in another part of the world;
http://www.itproportal.com/2012/01/07/i ... -intranet/
http://www.itproportal.com/2012/01/07/i ... -intranet/
Twitter Decides To Censor Locally, Rather Than Block Globally, In Response To Government Demands;
http://blog.twitter.com/2012/01/tweets- ... -flow.html
http://blog.twitter.com/2012/01/tweets- ... -flow.html
Tor Browser Bundle represents the most advanced technology designed so far to protect
and defend people's anonymity over Internet. Tor is free, open source and very user-friendly!
https://www.torproject.org/projects/torbrowser.html.en
without forgetting the following;
and defend people's anonymity over Internet. Tor is free, open source and very user-friendly!
https://www.torproject.org/projects/torbrowser.html.en
without forgetting the following;
Tor can't solve yet all anonymity problems. It focuses mainly on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use Torbutton while browsing the web to withhold some information about your computer's configuration.
Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit.