Framework language
Choose the country,language and framework settings
HTTPS + POST : An encrypted SSL(HTTPS) connection ensuring your privacy. The search variables like keywords, etc. are encrypted and masked.
HTTPS + GET : The data transfer is enrypted but search variables displayed in the URL.
HTTP + GET : Non encrypted datatransfer
SSL key exchange / Cipher
World Wide Web:
Count of search results per page
Content filter

Filter adult material

Parental lock: with setting a password you are activating the parental lock. You are able to reset it by typing in the correct password clicking reset and saving the settings. To use the child protection properly you need to create a separate system account for your child with no write access to cookies

Length of descriptions
Activate social platform plugins
With activating this option social plugins embed to this website will get loaded automatically. You will automatically accept all terms of used social plugin hosters by setting activated. Please reconsider our terms and links to related terms and datasecurity for more information
Color style
Save Settings
Close Settings


How To Protect Your Smartphones And Tablets Against Data Leaks

Big Data - gathering personal data in a large scale - anybody has heard of it - anybody was at least one time a victim of data gathering of this manner. Especially when using Smartphone Apps in connection with social networking and media.


Posted at ( updated at by $3b4sh )
in HowTo 

TOR Network: Modified Binaries While Downloading

Tor is originally supposed to aid journalists and activists to gain more anonymity on the net. But beeing more anonymous does not imply more security using the Tor Network for downloading binary data(executables like EXE,etc.) if you are using no encryption and transfer validation (MD5 Checksum, PGP Signature, etc.). The possibility of altering downloaded binaries was demonstrated by Leviathansecurity :


Posted at ( updated at by n4sh )
in Security 

Staying anonymous using Proxy/VPN Servers

If you want to use the internet anonymously you need to pay attention to a few simple rules to protect your identity and your system.


Posted at ( updated at by c4sh )
in HowTo