This is my custom hosts lists for Ab-Solution. It includes Crazy Max‘s windows spying blocklists, which block a lot of Windows spying at router level, as well as various ad, spam, and malware lists. Ab-Solution will update these lists once a week and you can set it and forget it. This has been tested for […]
Two factor authentication is exceptionally effective at keeping your accounts, and your money, safe from cyber attacks. Symantec offers one solution for generating two-factor security – it is called the Symantec VIP Access Key. The purpose of this article is to provide ease of access for securing your PayPal account with such a key. At […]
Updates have been made to both the Firefox Pro Pack and the Thunderbird Pro Pack with those made to Firefox being more significant. Look below for the new additions or click through, above, for the full package. The update for Firefox’s pack now has the additions of: Muter – mutes all Firefox content. Adblock Plus […]
We’ve covered torrent privacy back in 2009, right before Windows 7 came out. At that time we helped you get peer guardian running on the release candidate and provided an alternative method by using utorrent’s ipfilter.dat. We’re back with an updated and superior alternative for both utorrent, peer guardian, and peerblock. You might need to […]
This document, obtained by the ACLU, details data retention policies of the five major US cellphone carriers. The table below is a copy of the original PDF with some info removed, you can see the original at this link. Verizon T-Mobile AT&T / Cingular Sprint Nextel Virgin Mobile Subscriber Information Post Paid 3-5 Yrs 5 […]
UPDATE: You can just use Root Explorer. So I recently obtained a G1 which I flashed to Cyanogen 6.0, a problem it runs in to is a lack of ram: background processes like facebook and twitter and DSP manager don’t leave much room to breathe… But, there’s a way to remove them… you need […]
Google’s web history tracks your usage data. It gives you a choice to delete certain searches, it also gives your mom, the police, and hackers an ability to explore this diary. Whether they use it for blackmail or prosecution, its not good for YOU.
Temporarily bypass Reduced Functionality to rescue your files and operating system capabilities and pave the way for a clean, genuine, windows install.
Whether you are looking for an alternative to PG2 because it fails to function properly, or simply looking to cut down the number of processes you are running – the information here is for you.
It is possible to block ip-ranges with utorrent’s built in ipfiltering system.
PG2 will not work out of the box, and the information provided on PG2’s instruction page is outdated. This is a step-by-step guide to get pg2 working with Win7 RC x64.