Privacy software

Results: 6129



#Item
531Internet privacy / Computer networking / Node / Tor / X Window System / Software / Computing / System software

GENI Desktop Tutorial (Summer Camp 2015 UConn) 1. Introduction This tutorial consists of three parts: Basic GENI Desktop Operations Brief Introduction to OpenFlow

Add to Reading List

Source URL: groups.geni.net

Language: English - Date: 2015-05-25 10:09:39
532Privacy law / Data privacy / Health Insurance Portability and Accountability Act / Cloud applications / Protected health information / Health informatics / Dropbox / Cloud computing / Software / Computing

HIPAA Compliance for Autism Therapy How unintended consequences may affect autism therapists ABPathfinder thWest 95 Street, Ste 150, Overland Park, KS 66212

Add to Reading List

Source URL: www.abpathfinder.com

Language: English - Date: 2013-12-30 12:27:46
533Economics / Credit cards / Accounting software / Data privacy / Payment Card Industry Data Security Standard / Payment / QuickBooks / Invoice / Intuit / Business / Payment systems / Electronic commerce

Intrix Technology Inc. Intrix Plug-in for QuickBooks Integration Made Simple With a PA-DSS Application The Intrix Plug-in for Quick Books Accounting software allows merchants to accept all forms of credit cards and ACH

Add to Reading List

Source URL: intrix.com

Language: English - Date: 2011-12-12 20:21:23
534Web 2.0 / Blog hosting services / Social information processing / Social media / Facebook / Photo sharing / Internet privacy / Privacy / Social networking service / World Wide Web / Computing / Software

Facebook Smart Card FB 121211_1800 Social Networks - Do’s and Don’ts  Only establish and maintain connections with people you know

Add to Reading List

Source URL: www.scottsbluffcounty.org

Language: English - Date: 2015-03-26 12:13:31
535Software / Information appliances / Technology / Android / Embedded Linux / IPhone / Internet privacy / BlackBerry / Windows Phone / Smartphones / Computing / Cloud clients

Securing Your Smartphone, Step By Step Follow these steps to protect your private information. Before You Set Up Secure your email, social media accounts and other subscription services. 1. Don’t share your accounts wi

Add to Reading List

Source URL: rebootpeterborough.ca

Language: English - Date: 2013-04-28 04:03:04
536Internet memes / Internet culture / Cryptographic software / Cybercrime / Internet vigilantism / Anonymity / Anonymous / Twitter / 4chan / Internet / Computing / Internet privacy

The Many Shades of Anonymity: Characterizing Anonymous Social Media Content Denzil Correa† , Leandro Araújo Silva‡ , Mainack Mondal† , Fabrício Benevenuto‡ , Krishna P. Gummadi† †

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2015-04-04 10:20:27
537Internet privacy / Wireless / Tracking / Radio-frequency identification / Location-based service / Roaming / W3C Geolocation API / Geolocation software / Technology / Geolocation / Navigation

Sponsored by White paper Of time and space Unleashing the potential of mobile networks’ real-time geolocation data

Add to Reading List

Source URL: cdn.datafloq.com

Language: English - Date: 2015-03-04 08:18:01
538Computing / Android software / Social information processing / Web 2.0 / Internet privacy / Facebook / Instagram / Childnet / Photo sharing / World Wide Web / Software

To report any abuse on social media or internet:  CEOP will accept reports from parents, teachers and carers. Also anonymous reports. ThinkUknow.co.uk/parents  www.iwf.org.uk  In hope – international hotline

Add to Reading List

Source URL: www.watfordgrammarschoolforgirls.org.uk

Language: English - Date: 2015-03-10 11:03:47
539Internet privacy / Cross-platform software / Online chat / File sharing networks / Distributed computing architecture / Freenet / I2P / Peer-to-peer / Internet Relay Chat / Computing / Software / Internet

Scalable Anonymous Group Communication in the Anytrust Model David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University {david.wolinsky, henry.corrigan-gibbs, bryan.ford}@yale.edu Aaron Johnson

Add to Reading List

Source URL: www.ohmygodel.com

Language: English - Date: 2012-05-12 17:14:46
540Internet Explorer / Windows 7 / HTTP / HTTP cookie / Menu bar / Google Chrome / Internet Explorer 8 / Features new to Windows Vista / Local shared object / Software / Computing / Internet privacy

How to Clear My Browser’s Cache, Cookies & History Internet Explorer 8 and Higher 1. From the Tools menu, select Delete browsing history. a. If the menu bar is hidden, press Alt to make it visible.

Add to Reading List

Source URL: www.ihacares.com

Language: English - Date: 2014-11-13 13:34:46
UPDATE