µMatrix: A point-and-click matrix-based firewall, with many privacy-enhancing tools. For advanced users.
µMatrix put you in full control of where your browser is allowed to connect, what type of data it is allowed to download, and what it is allowed to execute. Nobody else decides for you: You choose. You are in full control of your privacy.
Out of the box, µMatrix works in relax block-all/allow-exceptionally mode, meaning web sites which require 3rd-party scripts are likely to be “broken”. With two clicks, µMatrix can be set to work in allow-all/block-exceptionally mode, which generally will not break web sites.
Storj is a software project seeking to develop a next-generation cloud storage solution that improves upon existing cloud storage providers in four key areas of the service provided.
Less expensive for the same industry standard redundancy, uptime, and reliability;
Preferably client-side encryption and hashing automatically enforced prior to upload so all data on the Storj network is encrypted and anonymized;
Open source code released under the MIT license;
Decentralized, autonomous, and implements multiple blockchains thereby making it resistant to interruptions of service and security risks.
A key project development goal is for Storj to include a blockchain-based dual purpose token scheme that serves as:
1. An incentive payment mechanism within the Storj network between consumers and providers of storage space and bandwidth
2. An information storage mechanism to record the hash and location of files stored in the Storj network.
Storj won first place in the Texas Bitcoin Conference 2014 hackathon contest, by unanimous decision. The prize is a guaranteed $250,000 donation from the backers at BitAngels for their initial round of “kickstarter-style” crowdfunding soon to be announced. Storj team members Shawn Wilkinson and James Lowry made the final scheduled presentation of the contest, which included a working proof of concept software demo. The founding devs are now getting the alpha software ready for general testing release while putting the finishing touches on the whitepaper and crowdfunding model.
Storj is a proposed decentralized storage system that seeks to disrupt the cloud storage industry by dramatically lowering costs to cloud storage users. It would do this by paying incentives to storage providers in the form of a “blockchain-based dual purpose token” that would also store information about file integrity and storage locations. The Storj network would autonomously issue, collect, and distribute these tokens so that users could pay for storage and be paid for providing storage. All data would be encrypted, preferably client-side, before being uploaded to the network. We believe that Storj should simply be a mechanism for users to store their data, and the end user should have control over their data and privacy.
At the Texas Bitcoin Conference 2014 we debuted a proof of concept web node for Storj. We have since been refining that software. You may upload your files to these web nodes and after about 10 minutes your files become accessible network wide. This requires no central server. Any web node connects to the prototype blockchain and may upload and download files at very little cost. This software will be made available to early backers and supporters.
Most cryptocurrencies use their blockchain as a ledger for coin balances. We would also like to use the blockchain to store information about file integrity and storage locations using structured metadata. To this end we will be releasing details about a new cryptocurrency that allows us to accomplish this and get our network running immediately with the help of our web nodes. We will be including this new cryptocurrency as part of our crowdfunding model.
Many of you are hungry for the technical details. We have received great technical and conceptual feedback from Maidsafe and BitAngels. We are in the process of rewriting out initial whitepaper and finalizing crowdfunding details and timeline.
Earn money by sharing your hard drive space
Just download the Storj desktop application,and choose how much storage to share.
Expand shortened URLs (e.g. TinyURL) with LongURL
Expands links to any short URL, like TinyURL, bit.ly, etc. using the LongURL service (longurl.org). Operates in the background without altering the text or style of anchors — you won’t see it working, but it’s there!
The options page displays the current cache of URLs and services. If anything goes wrong, you can clear them, but you don’t need to worry about them otherwise.
Make the web faster, more private, and more secure.
Disconnect lets you visualize and block the invisible websites that track you. Load the pages you go to 44% faster. Stop tracking by thousands of third-party sites.
Disconnect was named the best privacy tool by the New York Times (2016), Innovation Award winner for Best Privacy and Security software at South by Southwest (2015), listed as one of the 100 best innovations of the year by Popular Science and one of the 20 best Chrome extensions by Lifehacker.
Break the barriers of space and time. Let your desktop travel the world. If you’re looking for the fastest remote desktop software to date, you’re in the right place. But that’s only part of the story. We want NoMachine to be a game changer. We want you to access all your files, display all your videos, play all your audio, edit your documents and move them around exactly as if all the computing power in the world was in your hands. We want NoMachine to let you do more, in ways that don’t place limits on your creativity.
The human-machine interface is everything. Like when you watch the TV, you care about the content, not the TV set. We want to give you an interface that lets you concentrate on what you do, rather than on our software, an interface that lets you do what you want, and gets out of your way.
How fast does fast have to be? With NoMachine’s NX protocol you can’t get any faster. We believe that a remote desktop must be fast enough that you don’t notice it’s there. Our mission is to make your experience exactly the same as that of being in front of your computer. Only then will we know that it’s sufficiently fast. Fortunately time is on our side. The more technology advances, the faster computers and networks get, the less this will be a problem.
TigerVNC is a high-performance, platform-neutral implementation of VNC (Virtual Network Computing), a client/server application that allows users to launch and interact with graphical applications on remote machines. TigerVNC provides the levels of performance necessary to run 3D and video applications, and it attempts to maintain a common look and feel and re-use components, where possible, across the various platforms that it supports. TigerVNC also provides extensions for advanced authentication methods and TLS encryption.
TeamViewer lets you establish a connection to any PC or server within just a few seconds. You can remote control the PC of your partner as if you were sitting right in front of it.
New features such as VoIP, webcam and application selection will give you an even better, easier and faster desktop sharing experience.
– TeamViewer enables you to do what you want without any hassle and without any worries.
Private data, private conversations, and private meetings stay that way.
– Support, assist, interact, and collaborate with people. Exchange information. Access and use technology. One tool makes it possible to work as if you were all in the same room without travel time and expenses.
– Solve issues remotely or bring customers and colleagues together without complex steps or onerous prep time.
Deluge is a full-featured BitTorrent client for Linux, Unix and Windows. It is written in python, uses libtorrent (rasterbar) at its core and GTK for the main user interface along with web and console interfaces for advanced client/server facility.
Deluge features a rich plugin collection; in fact, most of Deluge’s functionality is available in the form of plugins.
Deluge was created with the intention of being lightweight and unobtrusive. It is our belief that downloading shouldn’t be the primary task on your computer and therefore shouldn’t monopolize system resources.
Deluge will work just fine across many desktop environments such as GNOME, KDE, XFCE and others.
Codecademy is an education company. But not one in the way you might think. We’re committed to building the best learning experience inside and out, making Codecademy the best place for our team to learn, teach, and create the online learning experience of the future.
Education is old. The current public school system in the US dates back to the 19th century and wasn’t designed to scale the way it has. Lots of companies are working to “disrupt” education by changing the way things work in the classroom and by bringing the classroom online.
We’re not one of those companies. We are rethinking education from the bottom up. The web has rethought nearly everything – commerce, social networking, healthcare, and more. We are building the education the world needs – the first truly net native education. We take more cues from Facebook and Zynga in creating an engaging educational experience than we do from the classroom.
Education is broken. Come help us build the education the world deserves.
The original NUKEMAP was created in February 2012 by me, Alex Wellerstein, a historian of nuclear weapons. I have a B.A. in History from UC Berkeley, a Ph.D. in History of Science from Harvard University, and I am finishing a book on the history of nuclear secrecy in the United States from the Manhattan Project through the War on Terror. At the time I created the NUKEMAP, I was an Associate Historian at the American Institute of Physics in College Park, Maryland. In 2014, I began working as an Assistant Professor of Science and Technology Studies at the Stevens Institute of Technology, in Hoboken, New Jersey.
Note: I am a historian of physics, not a physicist — people seem to sometimes get confused on this because of the subject matter I study and where I have worked. You can read more about my research on my blog, Restricted Data: The Nuclear Secrecy Blog.
In July 2013, I unveiled NUKEMAP2 and NUKEMAP3D. NUKEMAP2 allows for many more effects visualization options, and the display of casualties and fallout information. NUKEMAP3D allows for the visualization of mushroom cloud sizes in a 3D environment. In December 2013, I upgraded the blast model of NUKEMAP2 to account for arbitrary-height detonations. In April 2015, I performed a major algorithm upgrade to the casualty model to give it much finer-grade calculation of people over small areas and to generally increase its speed of calculation. NUKEMAP3D’s development has been put on hold after Google announced its deprecation of the Google Earth Plugin API, on which NUKEMAP3D relies.
NUKEMAP3D uses the same models, but uses the Google Earth API to display these in a 3D environment. This allows the visualization of 3D mushroom clouds, for example, by importing cloud models and manipulating them within the browser environment.
Massive Exploiting Tool Revealed
An easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
When your computer is getting full, BleachBit quickly frees disk space. When your information is only your business, BleachBit guards your privacy. With BleachBit you can free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn’t know was there. Designed for Linux and Windows systems, it wipes clean thousands of applications including Firefox, Internet Explorer, Adobe Flash, Google Chrome, Opera, Safari,and more. Beyond simply deleting files, BleachBit includes advanced features such as shredding files to prevent recovery, wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster. Better than free, BleachBit is open source.
CCleaner is our system optimization, privacy and cleaning tool. It removes unused files from your system – allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it’s fast (normally taking less than a second to run) and contains NO Spyware or Adware!
Is your computer running slow? As it gets older it collects unused files and settings which take up hard drive space making it slower and slower. CCleaner cleans up these files and makes it faster instantly.
Advertisers and websites track your behavior online with cookies that stay on your computer. CCleaner erases your browser search history and cookies so any internet browsing you do stays confidential and your identity remains anonymous.
Fewer Errors & Crashes
Over time your registry can become cluttered with errors and broken settings which lead to crashes. CCleaner’s patented registry cleaner clears out this clutter to make your PC more stable.
Many programs run silently in the background when you start up your computer. CCleaner helps you get to work, or play faster by letting you disable unneeded programs.
System optimizer apps are quite the thing on platforms such as Windows and Android. Their usefulness, however, is debatable considering how notorious they are when it comes to using system resources. Stacer was created to better optimize your Linux PC in the sense that it packs quite the list of features you’d normally expect from an optimizer and more to give your system a refresh whenever you feel the need. The functionalities Stacer packs include real-time system resource monitor, the ability to clear app caches, start-up monitor, ability to start/stop system services, and even uninstall applications.
This app basically packs the features of Bleachbit and System monitor in one package with a much simpler user interface for a more fluid experience with the added advantage of being light on system resources considering that it was built using the Electron framework and yes, it’s open-source. While the developer of the app claims it was built specifically for Ubuntu, you should be able to run it just fine on just about any other Debian-based* platform.
The package manager for Windows
Chocolatey – Software Management Automation
The sane way to manage software on Windows
Chocolatey builds on technologies you know – unattended installation and PowerShell. Chocolatey works with all existing software installation technologies like MSI, NSIS, InnoSetup, etc, but also works with runtime binaries and zip archives. Go Pro/Business to dial that experience up to 11!
Easily manage all aspects of Windows software (installation, configuration, upgrade, and uninstallation). Chocolatey is the most reliable when software is included in the package, but can also easily download resources.
Take advantage of PowerShell to provide automated software management instructions and Chocolatey’s built-in module to turn complex tasks into one line function calls!
Chocolatey is a package manager for Windows (like apt-get or yum but for Windows). It was designed to be a decentralized framework for quickly installing applications and tools that you need. It is built on the NuGet infrastructure currently using PowerShell as its focus for delivering packages from the distros to your door, err computer.