Friday, April 25, 2014

MC2 Post 1845 How to Protect Your Secrets From Nosey Android Apps





Out in the Open: How to Protect Your Secrets 



From Nosey Android Apps





From:   http://www.wired.com


 


When you install an app on your phone, it often spreads its tentacles into other various parts of the device. Sometimes, it taps into the hardware that identifies your location. Others, it grabs data from your address book.



If you use an Android phone, the OS will tell you — explicitly — what the app is trying to access, and it will ask your permission to do so. But you can’t provide permission for one data grab and then reject another. It’s an all-or-nothing proposition. If you want the Twitter app but don’t want it accessing your text messages, you’re out of luck.




 



==========================================
==========================================






Reports: FCC Poised For Changes To Net Neutrality Policy



This post was updated at 12:10 a.m. ET on Thursday. See update below for details.
 
The Federal Communications Commission is getting ready to propose new rules when it comes to net neutrality, and are reporting based on unnamed sources.
 
Late Wednesday, FCC Chairman Tom Wheeler called the reports of a turnaround "."
 
According to the Times and the Journal, the FCC is planning to allow Internet service providers to sell a faster pipe into people's homes to content companies willing to pay for it. In other words, content providers could pay for preferential treatment into American homes.










=========================================
=========================================



 







Gnawing the Knoppix Bones of   kNowledge


 


From: Chapter 5 Putting Knoppix in Your  ToolBox


 


Hacks: 37-51



#37 Run Remote Desktops
#38 Run X Remotely with FreeNX
#39 Run Windows Shares
#40 Create an Emergency Router
#41 Create an Emergency File Server
#42 Create an Emergengy Web Server
#43 Run Other Emergency Services:  SSL, DHCP, DNS, MySQL, Inetd, NFS.
#44 WarDrive with Knoppix
#45 Audit Network Security
#46 Check For RootKits
#47 Collect Forensics Data
#48 Clone Hard Drives
#49 Wipe a Hard Drive
#50 Test Hardware Compatibility
#51 Copy Settings to Other Distributions


 


=========================================
=========================================


=============
=============
 
MC2 LOGO


=============
=============

No comments: