What The Internet Knows About You




2) Search for "gears"
3) Check the box for "gears" - Browser extension that enables more powerful web applications
c4) Click apply.
Once gears has installed you will be able to drag and drop content from a website into a wave, for example a photo from a website into a wave without having to download it and then upload it to the wave.

4) Restart Amarok 2
You now have sound!





If you tried to log on to Windows and received an error message telling you that your user profile might be corrupted, you can try to repair it. You will need to create a new profile, and then copy the files from the existing profile to the new one.
To create a new user profile | |||||||||||
| |||||||||||
To copy files to the new user profile | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||


Project Honey Pot is the first and only distributed system for identifying spammers and the spambots they use to scrape addresses from your website. Using the Project Honey Pot system you can install addresses that are custom-tagged to the time and IP address of a visitor to your site. If one of these addresses begins receiving email we not only can tell that the messages are spam, but also the exact moment when the address was harvested and the IP address that gathered it.
To participate in Project Honey Pot, webmasters need only install the Project Honey Pot software somewhere on their website. We handle the rest — automatically distributing addresses and receiving the mail they generate. As a result, we anticipate installing Project Honey Pot should not increase the traffic or load to your website.
We collate, process, and share the data generated by your site with you. We also work with law enforcement authorities to track down and prosecute spammers. Harvesting email addresses from websites is illegal under several anti-spam laws, and the data resulting from Project Honey Pot is critical for finding those breaking the law.



Edit the squid configuration file with
sudo nano /etc/squid/squid.conf
setup who is allowed access to the proxy. Find the http_access section. Uncomment these 2 lines and add your network allocations.
acl our_networks src 192.168.1.0/24 192.168.2.0/24
http_access allow our_networks
Open /etc/resolvconf and make a note of the IP address.
You need to add a dns_nameservers entry to squid.conf from IP address /data found in /etc/resolvconf
Save & Exit
Great way of keeping an eye on software, hardware, licenses, etc across a network. Simple to install and use. Best of all its free.
From The Site:
"OpenAudIT is an application to tell you exactly what is on your network, how it is configured and when it changes. Open-AudIT will run on Windows and Linux systems. Essentially, Open-AudIT is a database of information, that can be queried via a web interface. Data about the network is inserted via a Bash Script (Linux) or VBScript (Windows). The entire application is written in php, bash and vbscript. These are all 'scripting' languages - no compiling with viewable source. Making changes and customisations is both quick and easy.
Windows PCs can be queried for hardware, software, operating system settings, security settings, IIS settings, services, users & groups and much more. Linux systems can be queried for a similar amount of information. Network devices (printers, switches, routers, etc) can have data recorded such as IP-Address, MAC Address, open ports, serial number, etc, etc. Output is available in PDF, CSV and webpages. There are export options for Dia and Inkscape.
Open-AudIT can be configured to scan your network and devices automatically. A daily scan is recommended for systems, with network scans every couple of hours. That way, you can be assured of being notified if something changes (day to day) on a PC, or even sooner, if something "new" appears on your network."
Packages updated as necessary.
Prevents you from sending a huge emails without realising.
This is a list of the companies that participate in VirusTotal with their antivirus engines.
AhnLab (V3)
Antiy Labs (Antiy-AVL)
Aladdin (eSafe)
ALWIL (Avast! Antivirus)
Authentium (Command Antivirus)
AVG Technologies (AVG)
Avira (AntiVir)
Cat Computer Services (Quick Heal)
ClamAV (ClamAV)
Comodo (Comodo)
CA Inc. (Vet)
Doctor Web, Ltd. (DrWeb)
Emsi Software GmbH (a-squared)
Eset Software (ESET NOD32)
Fortinet (Fortinet)
FRISK Software (F-Prot)
F-Secure (F-Secure)
G DATA Software (GData)
Hacksoft (The Hacker)
Hauri (ViRobot)
Ikarus Software (Ikarus)
INCA Internet (nProtect)
K7 Computing (K7AntiVirus)
Kaspersky Lab (AVP)
McAfee (VirusScan)
Microsoft (Malware Protection)
Norman (Norman Antivirus)
Panda Security (Panda Platinum)
PC Tools (PCTools)
Prevx (Prevx1)
Rising Antivirus (Rising)
Secure Computing (SecureWeb)
BitDefender GmbH (BitDefender)
Sophos (SAV)
Sunbelt Software (Antivirus)
Symantec (Norton Antivirus)
VirusBlokAda (VBA32)
Trend Micro (TrendMicro)
VirusBuster (VirusBuster)