How to bypass Internet censorship in a repressive regime. A useful PDF file.

A very useful PDF file with information about bypassing Internet censorship in a repressive regime. Countries like China and Iran have restricted Internet and this necessitates a method of bypassing this restriction on free speech and enabling unrestricted Internet access to allow the user to upload photos and video of government abuses. Source: http://www.nartv.org/mirror/circ_guide.pdf.

A quick listing of the most common network ports used today.

The Internet makes use of many ports for connectivity, this is a necessary part of the networks that compose the global network and enables all kinds of network protocols to work together. Here are some of the most common ports in use. Echo: 7 – echo is used to test the communication between hosts. Any … Read more

Liberal government to bring out an Internet filter if elected.

A Liberal National government in Australia would adopt the opt-out UK approach to filtering for all Australians. The policy comes less than 41 hours before polls open for voting in the federal election where the Coalition is currently expected to win. It is also almost a year after the Labour government abandoned its plans for … Read more

Europe and Japan Aiming to Build 100Gbps Fibre Optic Internet.

The European Commission (EC) and Japan have announced the launch of six joint research projects, supported by £15.3m+ (€18m) in funding, that aim to build networks which are “5000 times faster than today’s average European broadband ISP speed (100Gbps compared to 19.7Mbps)“. Europe and Japan are both planning to deploy 100 Gigabit per second Internet … Read more

The government PRISM system monitoring all Internet traffic in America.

The Obama administration have been caught in the PRISM spying scandal. This involves the National Security Agency spying on Americans using their text messages and Internet access records. Considering that the Google Chrome browser is sending information about your browsing history to Google, and the Patriot Act allows the United States government to monitor and … Read more

Malcom Turnbull and his failure on the NBN.

Hack Tuesday April 9 2013: http://mpegmedia.abc.net.au/triplej/hack/daily/hack_tue_2013_4_9.mp3. Listen to this recording of the ABC TripleJ radio show Hack and hear what Malcom Turnbull is planning if the Liberals get into power in 2013. A broadband network using copper wires instead of the Labour proposed fibre to the node that would use a network capable of 100 … Read more

New exploit targeting Internet Explorer 9.0 and earlier. A good reason to apt-get install firefox instead.

Windows in a box where it belongs...

A new zero-day exploit in the wild that targets the Internet Explorer 9.0 and earlier releases is making the rounds. This is another reason to not depend on closed source software if you can help it. I have tried running Windows 8 and then Windows 7 exclusively the last few days and it was not … Read more

Cyber Intelligence Sharing and Protection Act to be a threat to freedom.

The CISPA Bill is a program that will enable more sharing of Internet user`s data to facilitate monitoring of the Internet use of civilians. This under the guise of protecting us from terrorists and keeping suicide bombers off planes. Of course there was the unencrypted data conveniently found in Osama Bin Laden`s hideout, that detailed … Read more

ASIO wanting more powers for surveillance of Internet users.

The ASIO spy agency is asking Australian ISPs to log all the data that travels to and fro from a users computer. This would require an astronomical amount of storage space if this is to be taken literally. But they are just interested in fighting terrorism by monitoring all Internet traffic that passes through Australian … Read more

Telstra, Optus to begin Internet Censorship next month.

The future of Internet freedom and freedom of speech in general is under threat after the announcement that Telstra & Optus unveiled plans to roll out Internet filtering systems. of course they say it is to stop child abuse material, but most of that is hidden in the deep web and not even accessible from … Read more