image_pdfimage_print

Boost the performance of your PC

Razer Game Booster is a free tool that will optimize your PCs performance.  Homepage for the app: http://www.razerzone.com/gamebooster Download Razer Game Booster When you install you will need to register, it’s free.  Registration will also allow keeping settings of your optimized PC. Getting the absolute best performance out of your system and games isn’t rocket […]

Which Apple Components Were Developed By The US Government

While the investing community this morning is focused squarely on the very disappointing iPhone 5 relaunch and the lack of a cemented China Mobile deal, which has resulted in a $20 billion loss in market cap in early trading for thesecond most widely held hedge fund stock, a thing that we find more curious in the […]

The new model of synthesis

The security scandal, financial crisis, and other world events are changing the way users engage the internet and changing the way we do business.  Global Intel Hub proposes a new model based on synthesis which incorporate your internet activity (workflow), security, privacy, and filter out spam and other unwanted distractions and risks. Structured Consulting will […]

NSA’s Greatest Weapon In Surveillance? Outright Ignorance In Tech Consumers

Submitted by Reggie Middleton on 09/09/2013 13:35 -0400 Should MSFT split up After reading an interesting article in the New Scientist, How NSA weakens encryption to access internet traffic, I was brought to mind a piece that I wrote to address the single most powerful tool in the NSA’s arsenal – the blatant ignorance of the common tech enduser. I […]

NSA’s (and GCHQ) Decryption Capabilities: Truth and Lies

Edward Snowden has revealed new information concerning the cryptographic capabilities of the NSA and GCHQ (TheGuardian, ProRepublica, leaking documents…). The CryptoGirl was bound to look into that topic 😉 Let’s go straight to the point and answer simple questions. Is cryptography unsecure? No, I don’t think so. Basically, cryptography is maths (prime numbers, finite fields, polynomials…), and […]

NSA Revelations Cast Doubt on the Entire Tech Industry

Six years ago, two Microsoft cryptography researchers discovered some weirdness in an obscure cryptography standard authored by the National Security Agency. There was a bug in a government-standard random number generator that could be used to encrypt data. The researchers, Dan Shumow and Niels Ferguson, found that the number generator appeared to have been built with […]

NSA Has Full “Back Door” Access To iPhone, BlackBerry And Android Smartphones, Documents Reveal

Two months ago, when we reported that the NSA has successfully inserted illegal access protocols into the Android OS, thus granting it back door access into nearly three quarters of all cell phones, the news was met with skepticism and resistance: how could an open-sourced architecture be so frail and open to penetration was the most common […]

UK censorwall bans VPNs

UK mobile providers, including O2 and its reseller GiffGaff, areblocking commercial VPN providers that help to secure sensitive communications from criminals, hackers and government spies. In particular, O2/GiffGaff block IPREDator, my favorite VPN service. The carriers claim that because these services could be use to bypass their Internet censorship tools — switched on by default, a regime […]

Boing Boing’s Guide to Defeating Censorware

(see story here) “The Internet interprets censorship as damage and routes around it.” — John Gilmore If your employer or corrupt, undemocratic, dictator-based government uses a filtering service such as Secure Computing’s SmartFilter to block access to BoingBoing.net — or anything else online — you can try the following workarounds: Distributed BoingBoing mirrors everything on BoingBoing.net at random […]

Nokia Deal Could Mark the Last Chapter for Microsoft

Nokia Deal Could Mark the Last Chapter for Microsoft Sep 06, 2013 – 12:37 PM GMT By: Vitaliy_Katsenelson As a value investor I used to spend a great deal of time in Microsoft hell – on one hand there was the company with enormous cash flows, an incredible return on capital, a huge moat, a cash-rich […]

Skype Contact Explorer

Member Exclusive!   $99 communication software package free for members Skype Contact Explorer The Skype Contact Explorer is a companion for Skype that installs in Windows 7, 8, XP, Server x. The companion is a powerful communication tool allowing you to maximize your Skype account when using as your primary means of communication. Send messages […]

Private Network

Global Intel Hub is building a global private network, or “private internet.” Members will first login to the VPN through a secure connection, and then the VPN will manage both inbound and outbound traffic (when going outside the network, to the public internet, traffic will first go through the VPN). What benefits will this have […]

The Hemisphere Project (Hudson Hawk): The Latest Spy Scandal Involving 4 Billion Recorded Phone Calls Per Day

It is convenient that in a recent post [9]covering the latest historic Verizon M&A deal we showed a spaghetti chart, created by the WSJ [10], of the US telecom space because it lays roughly how many current subscribers that other US telecom giant, AT&T, has.  [11] The reason for this is that according to the latest revelations from the […]

Securing your email

Internet communication has evolved drastically, yet email still remains the foundation of communication for business and personal use.  Based on the fact that it survived being overtaken by a number of other means, it looks like email will be the primary use for communications for the foreseeable future.  Recent revelations about the NSA Prism program […]

Secure your browsing with the Tor Browser Bundle

What is Tor? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are […]

Death of SEO

Is SEO (Search Engine Optimization) dead? SEO developed into a quasi-industry because of a few factors during the post .com boom, mostly supported by the domination of Google and the lack of technology understanding from users and businesses.  Businesses knew they needed to get ‘on the internets’  but few new what this meant.  So they […]

End of the World Wide Web

The internet promised to change the world, change business, how we live, how society functions. Used for a long time for military, academic, scientific, and specific corporate use, consumer use of the WWW exploded in the mid to late 90’s being further fueled by the .com boom.  While B2B and enterprise applications were being developed […]

PROTON, CLEARWATER and Lexis-Nexis

PROTON, CLEARWATER and LEXIS-NEXIS Given the use of constitutionally repulsive practices by the Department of Justice, the Internal Revenue Service and other federal agencies, this information is being made public to educate and inform so they might arm themselves against government intrusion and for attorneys as a backgrounder for future appeals. I suggest American guerillas […]

Google and the NSA: Who’s holding the ‘shit-bag’ now?

by Julian Assange August 24th, 2013 It has been revealed today, thanks to Edward Snowden, that Google and other US tech companies received millions of dollars from the NSA for their compliance with the PRISM mass surveillance system. So just how close is Google to the US securitocracy? Back in 2011 I had a meeting with Eric Schmidt, […]