User talk:Robert: Unterschied zwischen den Versionen

Aus Attraktor Wiki

Wechseln zu: Navigation, Suche
K
K (Hacker School)
Zeile 38: Zeile 38:
  
 
philosophy ... good evil
 
philosophy ... good evil
prefered good actor ... data protection, privacy, free speech
+
prefered good actor ... offensive + defensive ... defense is not dead, data protection, privacy, free speech, liberty
 +
 
 +
sic semper tyranis

Version vom 23. Mai 2013, 12:12 Uhr

Perfect Privacy is a work association composed of human rights activists and data protection advocates which operates a non-profit privacy service of excellent reputation and good-will. We have positioned ourselves since the beginning as a high-end "VPN" or "anonymization" service. We offer all L2TP/IPSec, OpenVPN and PPTP VPN, but are not merely a VPN provider. We also offer SSH2 tunnels as well as SOCKS5 and HTTP SQUID proxies, permitting our members to cascade as many servers as they choose. Our primary aims are to offer privacy servers in as many countries and jurisdictions as possible; to provide high transfer speeds by offering as much bandwidth as feasible and affordable; to make our services easy to use and to serve our clients with first-class support; and to protect our members' privacy more than just skin-deep: we collect no personal information upon signup; we retain neither connection data nor do we keep log files; and we offer even completely anonymous payment methods. Our services are amongst others compatible with Windows, Mac OS, Linux and iOS. We make your existing Internet connection secure, encrypted and anonymous — wherever you are.

http://www.perfect-privacy.com --

Inkscape tutorial: Vektorisieren http://inkscape.org/doc/tracing/tutorial-tracing.de.html

http://www.acrnm.com/

--

Hacker School

At Tulsa, students in Shenoi's "cyberninja" curriculum will be trained to dumpster-dive for evidence, reconstruct destroyed phones, and develop a Stuxnet-type worm. NPS students, meanwhile, participate in simulated war games played over 11 weeks.

http://www.fastcompany.com/3000879/nsa-wants-hackers-and-it-wants-them-its-side

--

At Attraktor students will be trained to dumpster-dive for evidence, reconstruct destroyed phones and develop a Stuxnet-type worm. Graduates participate in simulated war games played over 11 weeks.

  • Cyberpower and National Security -- Potomac Books, Inc.
  • The Basics of Hacking and Penetration Testing -- Syngress
  • The Code Book -- anchorbooks.com
  • Practical Malware Analysis -- no starch press

+

self defense http://www.ninja-sportclub-hamburg.de/

+

course / program / script

philosophy ... good evil prefered good actor ... offensive + defensive ... defense is not dead, data protection, privacy, free speech, liberty

sic semper tyranis