Tumgik
#safe browsing
Text
Internet PSA #1
For our first psa, I will start with the topic of location.
So what's the big deal with sharing your location? A lot actually.
So many of us have at least a friend or two that shares everything including where they are and where they're going. which seems harmless, right? Wrong!
To you, the close -or decently close- friend, it doesn't mean much. I mean what are you going to do with your friend's location? But what about the internet? That's where things can get not so safe.
Say, you post a picture of a route on a map you're going to take. You zoom it out and cross out the city names. seems good to you! but that location dot on screen is enough. Your city, and the part of it you live in can be found -and easily too!
Why's it important to keep your location secret? Because cyber stalking exists and is very hard to predict. And you don't want a cyber stalker to become an irl stalker.
What information tips people off? Well a lot of simple, little things so I would suggest you avoid posting:
Maps screenshots.
Street signs.
License plates.
Names of local businesses.
Landmarks.
Your town/city name if it's a small area.
Location data from photo geotagging.
and more.
You can protect yourself by refraining from posting personal information online, and to remove such data from images, preferably with an app for photo editing. I suggest ibis paint x if you're on a phone. Also make sure that you turn off geotagging.
That about wraps up our first ever PSA! Feel free to reblog and share.
See you next time, and remember:
Be safe while you browse!
1 note · View note
d0nutzgg · 1 year
Text
TorProxy, an MIT License Proxy Written in Python
Tumblr media
A simple Tor proxy that uses the stem library for routing traffic through Tor nodes.
The process of configuring your system to use a proxy will vary depending on the operating system you are using. Here are a few examples of how you can configure your system to use a SOCKS proxy on localhost port 1080 on different operating systems Start the proxy first before you use the rest of these steps by running the script in your terminal or Shell. It starts a server that connects to a Tor node then shows you the IP you are connected to. You can quit the proxy using the "q" key.
Windows:
Open Internet Options from the Control Panel or by typing "inetcpl.cpl" in the Run dialog. Go to the Connections tab and click the LAN settings button. Check the "Use a proxy server for your LAN" option and enter "127.0.0.1" for the address and "1080" for the port.
MacOS/Linux:
Open the terminal export all_proxy="socks5://127.0.0.1:1080" Firefox:
Open Firefox
Go to Preferences > Network Settings Select "Manual proxy configuration" Enter "127.0.0.1" for the SOCKS Host and "1080" for the Port. Chrome:
Open Chrome
Go to Settings > Advanced > System Click on "Open proxy settings" Go to the "Connection" tab and click on "LAN settings" Check the "Use a proxy server for your LAN" option and enter "127.0.0.1" for the address and "1080" for the port.
Under the MIT license. I claim no responsibility for any damages done by anyone who uses this project. Use at your own risk and please use it for something positive.
You can get the program off my Github.
3 notes · View notes
phone-expert · 2 months
Text
0 notes
ale-ringo · 5 months
Text
Is your phone truly listening to you? Truth behind Ultra sonic cross device
Have you ever noticed tour dog barking at the TV for no apparent reason. Well in reality there’s one: Ultra sounds. All of your tech devices communicate together with them. And why is that? ‘Cause in that way they can transfer 10-20 bits of information in a range of 65ft(20m). It doesn’t seem much but it’s enough to send ads data from, for example, TV and phone. The downside is that it can’t be…
View On WordPress
0 notes
tech91india · 1 year
Text
Keep Your Data Secure on Your Work/Play/Media Station
The internet has become an unavoidable part of our daily lives. With the surge in the online world, cybersecurity has become a crucial issue that cannot be ignored, especially when it comes to personal computers. Attackers are constantly evolving their malware and ransomware attacks, making it increasingly challenging to protect our computers from such threats. However, there are several…
Tumblr media
View On WordPress
1 note · View note
mimic-octopus98 · 2 years
Text
Never Search These 5 Things On Google
Today we are going to discuss 10 things, which you should not search on google. Because it may give you the fake result or the results which may affect your mental health. Even some of them lead to a police case. 1.Your Banks Website Address If you are a user of internet banking, do not search for your bank’s website address on google. For example “Which is the website of SBI Bank”. Because…
Tumblr media
View On WordPress
0 notes
thetechers · 2 years
Text
0 notes
mandyfem · 3 months
Text
Sometimes I get HS flashbacks from when I used to take the bus,there was a group of loud and nasty boys who could NEVER sit still and often humped seats/made moaning noises...
Sometimes they bullied me too(shocking I know),cuz I was an easy target: quiet and shy.
Young moids receive like zero discipline from the moment they are born,just the basics,and get a pass on their disruptive behaviours.
There should be mandatory community labor for all teen moids since they have a desperate need to blow off steam.
Sport is not enough and often causes the opposite effect: it turns them into competitive pricks.
Their bodies evolved to endure hard physical labor,but instead they rot by playing videogames and jerking off all day.
I'm not joking when I say that it would greatly reduce vandalism,littering and porn addiction (all mostly committed by males).
Men long for the mines.
Tumblr media
102 notes · View notes
radtoken · 1 month
Text
Hey. If members of your community regularly post violent murder or rape fantasies about women you disagree with, perhaps your community is worse than radical(ly aligned) feminists. One of us wants female-only spaces and the other encourages misogyny. Just something to think about.
69 notes · View notes
what-the-fuck-khr · 6 months
Text
I see people very often sharing tips on how to avoid being scammed and I just sit here like… I’ll share it but how many times must this be done? how many times must this era’s internet children be reminded of internet safety? why doesn’t it sink in? are they doing it on purpose or?????? “I pressed a random link and and and be careful!” like problem number one was you pressing a random link. huh? I feel like there’s a million ways for someone who’s that tech savvy to avoid getting fucking scammed. it’s so confusing it’s so baffling. you’ve been on the internet since you were five or some shit but you can’t read an email address to figure out if it’s incorrect or not and then get scammed. are you kidding?? do you not read???? emails entirely???? do you not double check phone numbers by typing them on Google?????? hello??????? it feels like I’m talking to a brick wall
19 notes · View notes
occatorcreator · 1 year
Note
Is there a post for the first part of the deleted radio au?
It looks really interesting but i have no idea where to start xD
Have a nice day :)
Cyn made a helpful Deleted Radio masterpost here to help you where to start. It just links to the essential information about our combined aus & the comics if that's all you need.
However, if you want to check out extra content we've made, you can find extra posts here (you need to scroll down to deleted au, but I def recommend checking her other aus too) or here. We also tag it under #deleted radio au and #auxiliary au
I hope this helps! Just keep in mind that Deleted Radio AU does deal with dark content involving death, grief, gore/violence, and even torture.
23 notes · View notes
lucaonthropy · 1 year
Text
Tumblr media
38 notes · View notes
artekai · 2 months
Link
Chapters: 1/1
Fandom: Original Work
Rating: Mature 
Warnings: No Archive Warnings Apply 
Relationships: Original Female Character(s) & Original Male Character(s)
Characters: Tess Meijer (Original Female Character), Original Female Character(s), Original Male Character(s) 
Additional Tags: Childhood Friends, Fluff, Pre-Canon 
Series: Part 1 of Holos Killed the Internet Star
Summary:
“Y’know, Tess,” Robert said, lying on the couch with a disinterested look in his eyes. “You don’t have to buy every single thingamajig that FAS farts out just ‘cause Lis works there now. It’s getting kinda… cult-ish.”
4 notes · View notes
ale-ringo · 5 months
Text
What's Fingerprint and how it's used to identify you
Concerns about how a website can identify you on more Websites. Well, I've got a solution to that!
When you browse the internet websites collects some data of your computer or mobile phone( your time zone, your screen size, canvas fingerprint, webgl…) and they use it to assign you a fingerprint. In this way they know who you are in more websites. You may be wondering:”How do I stop it?”. You’re here to find it out. I’ll do a version for Gecko browsers because they’re known for their security…
View On WordPress
0 notes
snzysensations · 8 months
Text
Tumblr media
Going on a 2 week trip with your friends as a sneeze fetishist be like…
11 notes · View notes
Note
question: what do yall do if someone searches illegal things on incognito? like, can u actually report that, or does you being incognito immediately cancel out any responsibility?
《Yea. Illegal things do notify someone at the top then it can be investigated i believe》
2 notes · View notes