This blog was originally conceived as a personal reference. Later I added notes and my publications
Tuesday, April 19, 2011
Saturday, April 16, 2011
5.11 Tactical Twill TDU Pants, Tactical Kneepads
Designed with direct feedback from operators in the field, our Twill TDU™ Pants provide superior utility in a variety of harsh environments. Crafted from durable polyester/ cotton twill fabric, these pants feature a self- adjusting waistband, double- reinforced seat, and a Teflon® finish. Secure seat pockets, cargo pockets with internal magazine compartments, and TacTec System™ compatibility provide customizable storage options for your gear. Sometimes work calls for tactical twill.Style #74004. Product page
• Extra pockets sized for tactical use
• Polyester/cotton twill fabric
• Self- adjusting tunnel waistband
• Double- reinforced seat
• Bartacking at major seams and stress points
• Triple- stitching
• Cargo pockets with internal AR magazine compartments
• Secure seat pockets. TacTec System™ compatible
• Blousing straps. Teflon® finish
• YKK® zippers. Prym® snaps
• Short = 29.5" - Regular = 32.5" - Long = 35.5"
Herren Twill Hose
TDU® Hose- Strapazierfähige 65% Polyester/35% Baumwolle, 213g. Ripstop oder 206g.
- Neue Damengrößen ebenfalls lieferbar
- Dehnbarer Komfortbund
- Cargo-Taschen mit eingebautem Back-up Belt System® (S.27) für zusätzliche Ausrüstung
- Doppelt verstärktes Gesäß und Knie
- Teflon® beschichtet, fleck- und schmutzabweisend
Код Продукта: 511-74004-019
5:11 Tactical- самый популярный мировой бренд среди любителей активного отдыха. Тридцатилетний опыт работы позволил сделать брюки удобными, функциональными и прочными. Брюки можно носить как на работу, так и отдыхать в них.
• Прочная ткань саржа (65% полиэстер, 35% хлопок) плотностью 7,25 унций
• Удобный саморегулирующийся пояс без металлической пряжки
• Большие боковые карманы со встроенной системой Back-up Belt, позволяющие переносить дополнительные магазины или другое снаряжение
• Двухслойная ткань сзади и на коленях
• Тройная конструкция швов, 40 усиленных зон в местах повышенной нагрузки
• Пропитка Teflon, обеспечивающая защиту от пятен, жидкости и грязи
• Неопреновые наколенники были в подарок
Купила себе жена для туризма.
В комплекте шли - "5.11 Tactical Kneepads"
5.11 tactical Kneepads
Sized to fit 5.11® TDU® and Tactical pant lines, 6mm thick high performance neoprene knee pads feature a strong, flexible design and nylon backing for easy installation and removal.Style was #59008. Product page
• Integrated knee contour for mobility
• Fits 5.11® TDU®, Cotton tactical, Taclite, TDU, HRT, Stryke™ pants
• 6mm thick cushioned neoprene
• Nylon/polyester jersey backing for easy insertion
Neopren-Kniepolster
Für Taclite-, Tactical-, TDU-, EMS-Hosen und UnterzieherНаколенники в брюки от 5.11 tactical
Надежные неопреновые наколенники для тактических брюк 5.11.Наколенники вставляются в брюки следующих моделей: Cotton Tactical, Taclite, TDU, HRT, Stryke™.
6мм толщиной, покрыты тонким слоем из нейлона, для легкого размещения.
Себе взял вторую пару:
TDU - Tactical Duty Uniform.
5.11 Tactical Level 1 9" Socks
Level 1 9" Socks incorporate multiple compression zones that work in tandem with our Shock Mitigation System®, and are designed to be lightweight and utilize kinetic absorption to improve stamina, speed, and control.Style #59048. Product page
80% Coolmax®, 8% nylon, 8% spandex, 4% rubber
Enhanced elasticity. Multi-polymer fabric
Multiple compression zones for support
Heel and toe reinforcements. Enhanced sole padding
Part of the 5.11® Shock Mitigation System®
Moisture-wicking
Level 1-Socken
12 Bereiche für maximalen Komfort, Passform und Halt. Mit Coolmax-Faser. 80% Polyester/8% Nylon/8% Elasthan/4% Gummi.Код Продукта: 59048.
Носки Level I (23 см)- 12 анатомических зон, обеспечивающих максимальный комфорт, облегчение и поддержку стопы.
Состав: 80% шерсти Coolmax®, 8% нейлона, 8% спандекса, 4% резины
Параллельно пришла идея этой публикации
Куплено в Арсенале, в Минске, Беларусь
Thursday, April 14, 2011
Anonymous Blogging with WordPress & Tor
An early draft of this guide was written by Ethan Zuckerman on April 13, 2005 and updated on October 1, 2006. On August 8, 2007 Global Voices Advocacy published an updated and linkable, blogging-friendly, HTML version of the guide, along with a downloadable PDF file. On March 10th, 2009, the guide has been updated once again so that all the tips are also compatible with Tor's recent update.
By Ethan Zuckerman
Introduction
Disclaimer
I - Writing from shared computers
Zero Install Bundle for Windows (for any portable media drive)
a) Download Tor Browser Bundle
b) Extract the Tor Browser file in your USB key
II - Writing from your personal computer
Step 1: Disguise your IP
a) Install Firefox.
b) Install Tor.
c) Install Torbutton.
d) Turn on Tor in Firefox and test it out.
What if Tor never connects?
Step 2: Generate a new, hard to trace email account.
a) Choose a webmail provider.
b) Sign up for a new email account
c) Make sure you’re able to log onto the mail service.
Step 3: Register your new anonymous blog.
a) Turn Tor on in your browser.
b) WordPress activation link.
Log into your new blog.
Step 4: Post to your blog.
a) Write your blog post offline.
b) Log onto WordPress.com.
Edit Timestamp.
Step 5: Cover your tracks
a) Securely erase the rough drafts
b) Clear your browser history, cookies and passwords from Firefox.
Some parting thoughts.
A final thought on anonymity.
Show your support!
Introduction
One of the great joys of working on Global Voices has been having the chance to work with people who are expressing themselves despite powerful forces working to keep them silent. I’ve worked with a number of authors who’ve wanted to write about political or personal matters online, but who felt they couldn’t write online unless they could ensure that their writing couldn’t be traced to their identity. These authors include human rights activists in dozens of nations, aid workers in repressive countries as well as whistleblowers within companies and governments.
I wrote a technical guide to anonymous blogging some months back and posted it on Global Voices, outlining several different methods for blogging anonymously. Since then, I’ve led workshops in different corners of the world and have gotten comfortable teaching a particular set of tools - Tor, WordPress and various free email accounts - which used in combination can provide a very high level of anonymity. The guide that follows below doesn’t offer you any options - it just walks you through one particular solution in detail.
You can feel free to ignore the “why” sections of the guide if you want a quicker read and if you’re the sort of person who doesn’t need to know why to do something. I hope to format this more prettily at some point in the future, allowing the “why” sections to be expanded and compressed, making the whole document a lot shorter.
If I’ve been unclear somewhere in the document or got something wrong, please let me know in the comments - this is a draft which I hope to clean up before posting it on Global Voices. Should you find it useful and want to disseminate it further, feel free - like almost everything on this site, it’s licensed under a Creative Commons 2.5 Attribution license, which means you’re free to print it on coffee cups and sell them, if you think there’s a market and money to be made.
Disclaimer
If you follow these directions exactly, you’ll sharply reduce the chances that your identity will be linked to your online writing through technical means - i.e., through a government or law enforcement agency obtaining records from an Internet Service Provider. Unfortunately, I cannot guarantee that they work in all circumstances, including your circumstances, nor can I accept liability, criminal or civil, should use or misuse of these directions get you into legal, civil or personal trouble.
These directions do nothing to prevent you from being linked through other technical means, like keystroke logging (the installation of a program on your computer to record your keystrokes) or traditional surveillance (watching the screen of your computer using a camera or telescope). The truth is, most people get linked to their writing through non-technical means: they write something that leaves clues to their identity, or they share their identity with someone who turns out not to be trustworthy. I can’t help you on those fronts except to tell you to be careful and smart. For a better guide to the “careful and smart” side of things, I recommend EFF’s “How to Blog Safely” guide.
Onto the geekery:
I - Writing from shared computers
If you’re going to be writing primarily from shared computers (like cybercafe computers) or you’re unable to install software on a computer, please follow the steps below to run Tor Browser Bundle without needing to install any software.
In case you'll be blogging primarily from your personal computer, where you can install software, please refer to the chapter II.
Zero Install Bundle for Windows (for any portable media drive)
We recommend that you download the Zero Install Bundle for Windows, a great pre-configured Tor bundle with self contained Mozilla Firefox browser for USB drives or any portable media (SD Card, Hard Drives, Compact Flash Card). Tor Browser is an open source version of a portable browser developed by Tor Project. It is a highly customized version of the Firefox browser with Tor, Vidalia, caching http proxy called Polipo, Firefox, and Torbutton already installed. It’s designed to be placed on a USB key so that you can access Tor from shared computers that don’t permit you to install software.
a) Download Tor Browser Bundle. Download the package for your preferred language from the Tor project website onto a computer where you can save files. Insert your USB key and copy the Tor Browser Bundle onto the key. Using this USB key and any Windows computer where you can insert a USB key, you can access a Tor-protected browser. On this shared computer, quit the existing web browser. Insert the key, find the key’s filesystem on the Desktop, and double-click the Start Tor Browser.exe. The Vidalia window will shortly appear.
Remember that you can download Tor Browser Bundle from Tor project website or choose the package for your preferred language from Tor Browser Bundle download page.
b) Extract the file in your USB key, open the “Tor Browser” folder and click on the “Start Tor Browser”. After connecting to the Tor Network, Tor-enabled Firefox browser will start automatically by visiting the Tor Test page. Make sure you get a “ Congratulations. You are using Tor.” message.
Otherwise you will get this message telling you that “Sorry. You are not using Tor. If you are attempting to use a Tor client, please refer to the Tor website and specifically the instructions for configuring your Tor client.”
II - Writing from your personal computer
Now, if you will be blogging primarily from your personal computer, where you can install software, please follow the steps below.
Step 1: Disguise your IP.
Every computer on the internet has or shares an IP address. These addresses aren’t the same thing as a physical address, but they can lead a smart system administrator to your physical address. In particular, if you work for an ISP, you can often associate an IP address with the phone number that requested that IP at a specific time. So before we do anything anonymous on the Internet, we need to disguise our IP.
What to do if you want to blog from your home or work machine:
a) Install Firefox. Download it at the Mozilla site and install it on the main machine you blog from.
Why?
Internet Explorer has some egregious security holes that can compromise your online security. These holes tend to go unpatched for longer on IE than on other browsers. (Don’t believe me? Ask Bruce Schneier.) It’s the browser most vulnerable to spyware you might inadvertently download from a website. And many of the privacy tools being released are being written specifically to work with Firefox, including Torbutton, which we’ll be using in a future step.
b) Install Tor. Download the program from the Tor site. If access to Tor main website is blocked in your country, there are a few mirrors of it in other places where it can also be downloaded from. You can also go to googl cache for viewing the mirrors page by googling for “site:torproject.org mirrors“. Pick the “latest stable release” for your platform and download it onto your desktop. Follow the instructions that are linked to the right of the release you downloaded. You’ll install two software packages and need to make some changes to the settings within your new installation of Firefox.
In case your internet connection blocks access to the Tor website, you can request a bundle by sending an email to the “gettor” robot at gettor [AT] torproject [DOT] org. Remember that the emails to gettor@torproject.org has to come from Gmail, otherwise they won't get a response. Select one of the following package names and put the package name anywhere in the body of your email:
Shortly after sending your email, you will receive an email from “Gettor” robot with the requested software as a zip file. Unzip the package and verify the signature.
Why?
Tor is a very sophisticated network of proxy servers. Proxy servers request a web page on your behalf, which means that the web server doesn’t see the IP address of the computer requesting the webpage. When you access Tor, you’re using three different proxy servers to retrieve each webpage. The pages are encrypted in transit between servers, and even if one or two of the servers in the chain were compromised, it would be very difficult to see what webpage you were retrieving or posting to.
Tor installs another piece of software, Privoxy, which increases the security settings on your browser, blocking cookies and other pieces of tracking software. Conveniently, it also blocks many ads you encounter on webpages.
c) The bundle installs also the Torbutton Firefox plugin for you. It will simply ask you for permission to install itself from the downloaded package. Click “Install Now”, restart your Firefox, and you're all set:
Why?
Turning on Tor by hand means remembering to change your browser preferences to use a proxy server. This is a muiltistep process, which people sometimes forget to do. Torbutton makes the process a single mouse click and reminds you whether you’re using Tor or not, which can be very helpful.
You may find that Tor slows down your web use - this is a result of the fact that Tor requests are routed through three proxies before reaching the webserver. Some folks - me included - use Tor only in situations where it’s important to disguise identity and turn it off otherwise - Torbutton makes this very easy.
d) Turn on Tor in Firefox and test it out. With Tor turned on, visit this URL (https://check.torproject.org/). After clicking, if you get this message telling you, “Congratulations. You are using Tor. Please refer to the Tor website for further information about using Tor safely.”, then you’ve got everything installed correctly and you’re ready for the next step.
Otherwise you will get this message telling you “Sorry. You are not using Tor. If you are attempting to use a Tor client, please refer to the Tor website and specifically the instructions for configuring your Tor client.”
Why?
It’s always a good idea to see whether the software you’ve installed works, especially when it’s doing something as important as Tor is. The page you’re accessing is checking to see what IP address your request is coming from. If it’s from a known Tor node, Tor is working correctly and your IP is disguised - if not, something’s wrong and you should try to figure out why Tor isn’t working correctly.
What if Tor never connects? FAQ about problems with running Tor properly. In case your internet connection blocks access to the Tor network and in case the Vidalia onion icon in the system tray is always yellow, you may consider using bridge relays. This would be the next logical step to get you connected to the Tor network.
If you have problems connecting to the Tor network you should read the
Open Vidalia's conrol Panel, go to Settings > Network and click “My ISP blocks connections to the Tor network”. Add each bridge address one at a time by pasting it into the “Add a Bridge” window and then clicking the “+” sign.
Step 2: Generate a new, hard to trace email account.
Most web services - including blog hosting services - require an email address so that they communicate with their users. For our purposes, this email address can’t connect to any personally identifiable information, including the IP address we used to sign up for the service. This means we need a new account which we sign up for using Tor, and we need to ensure that none of the data we use - name, address, etc. - can be linked to us. You should NOT use an existing email account - it’s very likely that you signed up for the account from an undisguised IP, and most webmail providers store the IP address you signed up under.
By Ethan Zuckerman
Introduction
Disclaimer
I - Writing from shared computers
Zero Install Bundle for Windows (for any portable media drive)
a) Download Tor Browser Bundle
b) Extract the Tor Browser file in your USB key
II - Writing from your personal computer
Step 1: Disguise your IP
a) Install Firefox.
b) Install Tor.
c) Install Torbutton.
d) Turn on Tor in Firefox and test it out.
What if Tor never connects?
Step 2: Generate a new, hard to trace email account.
a) Choose a webmail provider.
b) Sign up for a new email account
c) Make sure you’re able to log onto the mail service.
Step 3: Register your new anonymous blog.
a) Turn Tor on in your browser.
b) WordPress activation link.
Log into your new blog.
Step 4: Post to your blog.
a) Write your blog post offline.
b) Log onto WordPress.com.
Edit Timestamp.
Step 5: Cover your tracks
a) Securely erase the rough drafts
b) Clear your browser history, cookies and passwords from Firefox.
Some parting thoughts.
A final thought on anonymity.
Show your support!
Introduction
One of the great joys of working on Global Voices has been having the chance to work with people who are expressing themselves despite powerful forces working to keep them silent. I’ve worked with a number of authors who’ve wanted to write about political or personal matters online, but who felt they couldn’t write online unless they could ensure that their writing couldn’t be traced to their identity. These authors include human rights activists in dozens of nations, aid workers in repressive countries as well as whistleblowers within companies and governments.
I wrote a technical guide to anonymous blogging some months back and posted it on Global Voices, outlining several different methods for blogging anonymously. Since then, I’ve led workshops in different corners of the world and have gotten comfortable teaching a particular set of tools - Tor, WordPress and various free email accounts - which used in combination can provide a very high level of anonymity. The guide that follows below doesn’t offer you any options - it just walks you through one particular solution in detail.
You can feel free to ignore the “why” sections of the guide if you want a quicker read and if you’re the sort of person who doesn’t need to know why to do something. I hope to format this more prettily at some point in the future, allowing the “why” sections to be expanded and compressed, making the whole document a lot shorter.
If I’ve been unclear somewhere in the document or got something wrong, please let me know in the comments - this is a draft which I hope to clean up before posting it on Global Voices. Should you find it useful and want to disseminate it further, feel free - like almost everything on this site, it’s licensed under a Creative Commons 2.5 Attribution license, which means you’re free to print it on coffee cups and sell them, if you think there’s a market and money to be made.
Disclaimer
If you follow these directions exactly, you’ll sharply reduce the chances that your identity will be linked to your online writing through technical means - i.e., through a government or law enforcement agency obtaining records from an Internet Service Provider. Unfortunately, I cannot guarantee that they work in all circumstances, including your circumstances, nor can I accept liability, criminal or civil, should use or misuse of these directions get you into legal, civil or personal trouble.
These directions do nothing to prevent you from being linked through other technical means, like keystroke logging (the installation of a program on your computer to record your keystrokes) or traditional surveillance (watching the screen of your computer using a camera or telescope). The truth is, most people get linked to their writing through non-technical means: they write something that leaves clues to their identity, or they share their identity with someone who turns out not to be trustworthy. I can’t help you on those fronts except to tell you to be careful and smart. For a better guide to the “careful and smart” side of things, I recommend EFF’s “How to Blog Safely” guide.
Onto the geekery:
I - Writing from shared computers
If you’re going to be writing primarily from shared computers (like cybercafe computers) or you’re unable to install software on a computer, please follow the steps below to run Tor Browser Bundle without needing to install any software.
In case you'll be blogging primarily from your personal computer, where you can install software, please refer to the chapter II.
Zero Install Bundle for Windows (for any portable media drive)
We recommend that you download the Zero Install Bundle for Windows, a great pre-configured Tor bundle with self contained Mozilla Firefox browser for USB drives or any portable media (SD Card, Hard Drives, Compact Flash Card). Tor Browser is an open source version of a portable browser developed by Tor Project. It is a highly customized version of the Firefox browser with Tor, Vidalia, caching http proxy called Polipo, Firefox, and Torbutton already installed. It’s designed to be placed on a USB key so that you can access Tor from shared computers that don’t permit you to install software.
a) Download Tor Browser Bundle. Download the package for your preferred language from the Tor project website onto a computer where you can save files. Insert your USB key and copy the Tor Browser Bundle onto the key. Using this USB key and any Windows computer where you can insert a USB key, you can access a Tor-protected browser. On this shared computer, quit the existing web browser. Insert the key, find the key’s filesystem on the Desktop, and double-click the Start Tor Browser.exe. The Vidalia window will shortly appear.
Remember that you can download Tor Browser Bundle from Tor project website or choose the package for your preferred language from Tor Browser Bundle download page.
b) Extract the file in your USB key, open the “Tor Browser” folder and click on the “Start Tor Browser”. After connecting to the Tor Network, Tor-enabled Firefox browser will start automatically by visiting the Tor Test page. Make sure you get a “ Congratulations. You are using Tor.” message.
Otherwise you will get this message telling you that “Sorry. You are not using Tor. If you are attempting to use a Tor client, please refer to the Tor website and specifically the instructions for configuring your Tor client.”
II - Writing from your personal computer
Now, if you will be blogging primarily from your personal computer, where you can install software, please follow the steps below.
Step 1: Disguise your IP.
Every computer on the internet has or shares an IP address. These addresses aren’t the same thing as a physical address, but they can lead a smart system administrator to your physical address. In particular, if you work for an ISP, you can often associate an IP address with the phone number that requested that IP at a specific time. So before we do anything anonymous on the Internet, we need to disguise our IP.
What to do if you want to blog from your home or work machine:
a) Install Firefox. Download it at the Mozilla site and install it on the main machine you blog from.
Why?
Internet Explorer has some egregious security holes that can compromise your online security. These holes tend to go unpatched for longer on IE than on other browsers. (Don’t believe me? Ask Bruce Schneier.) It’s the browser most vulnerable to spyware you might inadvertently download from a website. And many of the privacy tools being released are being written specifically to work with Firefox, including Torbutton, which we’ll be using in a future step.
b) Install Tor. Download the program from the Tor site. If access to Tor main website is blocked in your country, there are a few mirrors of it in other places where it can also be downloaded from. You can also go to googl cache for viewing the mirrors page by googling for “site:torproject.org mirrors“. Pick the “latest stable release” for your platform and download it onto your desktop. Follow the instructions that are linked to the right of the release you downloaded. You’ll install two software packages and need to make some changes to the settings within your new installation of Firefox.
In case your internet connection blocks access to the Tor website, you can request a bundle by sending an email to the “gettor” robot at gettor [AT] torproject [DOT] org. Remember that the emails to gettor@torproject.org has to come from Gmail, otherwise they won't get a response. Select one of the following package names and put the package name anywhere in the body of your email:
- tor-im-browser-bundle
- windows-bundle
- panther-bundle
- tor-browser-bundle
- source-bundle
- tiger-bundle
Shortly after sending your email, you will receive an email from “Gettor” robot with the requested software as a zip file. Unzip the package and verify the signature.
Why?
Tor is a very sophisticated network of proxy servers. Proxy servers request a web page on your behalf, which means that the web server doesn’t see the IP address of the computer requesting the webpage. When you access Tor, you’re using three different proxy servers to retrieve each webpage. The pages are encrypted in transit between servers, and even if one or two of the servers in the chain were compromised, it would be very difficult to see what webpage you were retrieving or posting to.
Tor installs another piece of software, Privoxy, which increases the security settings on your browser, blocking cookies and other pieces of tracking software. Conveniently, it also blocks many ads you encounter on webpages.
c) The bundle installs also the Torbutton Firefox plugin for you. It will simply ask you for permission to install itself from the downloaded package. Click “Install Now”, restart your Firefox, and you're all set:
Why?
Turning on Tor by hand means remembering to change your browser preferences to use a proxy server. This is a muiltistep process, which people sometimes forget to do. Torbutton makes the process a single mouse click and reminds you whether you’re using Tor or not, which can be very helpful.
You may find that Tor slows down your web use - this is a result of the fact that Tor requests are routed through three proxies before reaching the webserver. Some folks - me included - use Tor only in situations where it’s important to disguise identity and turn it off otherwise - Torbutton makes this very easy.
Otherwise you will get this message telling you “Sorry. You are not using Tor. If you are attempting to use a Tor client, please refer to the Tor website and specifically the instructions for configuring your Tor client.”
Why?
It’s always a good idea to see whether the software you’ve installed works, especially when it’s doing something as important as Tor is. The page you’re accessing is checking to see what IP address your request is coming from. If it’s from a known Tor node, Tor is working correctly and your IP is disguised - if not, something’s wrong and you should try to figure out why Tor isn’t working correctly.
What if Tor never connects? FAQ about problems with running Tor properly. In case your internet connection blocks access to the Tor network and in case the Vidalia onion icon in the system tray is always yellow, you may consider using bridge relays. This would be the next logical step to get you connected to the Tor network.
If you have problems connecting to the Tor network you should read the
Bridge relays (or “bridges” for short) are Tor relays that aren't listed in the main Tor directory. Since there is no complete public list of them, even if your ISP is filtering connections to all the known Tor relays, they probably won't be able to block all the bridges. If you suspect your access to the Tor network is being blocked, you may want to use the bridge feature of Tor.”You can get bridged by sending an email, from a gmail account, containing “get bridges” in the body of the email to the following email address bridges@torproject.org. Shortly after, you will receive an automatic message with the bridges. It is also possible to acquire bridges from the following url: https://bridges.torproject.org/
Open Vidalia's conrol Panel, go to Settings > Network and click “My ISP blocks connections to the Tor network”. Add each bridge address one at a time by pasting it into the “Add a Bridge” window and then clicking the “+” sign.
Most web services - including blog hosting services - require an email address so that they communicate with their users. For our purposes, this email address can’t connect to any personally identifiable information, including the IP address we used to sign up for the service. This means we need a new account which we sign up for using Tor, and we need to ensure that none of the data we use - name, address, etc. - can be linked to us. You should NOT use an existing email account - it’s very likely that you signed up for the account from an undisguised IP, and most webmail providers store the IP address you signed up under.
- a) Choose a webmail provider - we recommend Riseup.net and Gmail, but as long as you’re using Tor, you could use Yahoo or Hotmail as well. Also, you can easily register a free and quick webmail account with fastmail.fm. Why? Webmail is the best way to create a “disposeable” email address, one you can use to sign up for services and otherwise ignore. But a lot of users also use webmail as their main email as well. If you do this, it’s important to understand some of the strengths and weaknesses of different mail providers.Hotmail and Yahoo mail both have a “security feature” that makes privacy advocates very unhappy. Both include the IP address of the computer used to send any email. This isn’t relavent when you’re accessing those services through Tor, since the IP address will be a Tor IP address, rather than your IP address. Also, Hotmail and Yahoo don’t offer secure HTTP (https) interfaces to webmail - again, this doesn’t matter so long as you use Tor every time you use these mail services. But many users will want to check their mail in circumstances where they don’t have Tor installed - for your main webmail account, it’s worth choosing a provider that has an https interface to mail.Riseup.net provides webmail with a very high degree of security. They support PGP encryption (Pretty Good Privacy)- which is very useful if you correspond with people who also use PGP. You can sign up for a free account at https://mail.riseup.net/ and ask your correspondents (recipients) to register a free account as well.Gmail, while it doesn’t advertise itself as a secure mail service, has some nice security features built in. If you visit this special URL (https://mail.google.com/mail), your entire session with Gmail will be encrypted via https. You can also visit https://mail.google.com/mail/h/ a secure SSL Gmail webmail that automatically load into Basic HTML interface. (I recommend bookmarking that URL and using it for all your Gmail sessions.) Gmail doesn’t include the originating IP in mail headers, and you can add PGP support to Gmail by using the FireGPG, a Firefox extension that adds strong crypto to Gmail. FireGPG brings an interface to encrypt, decrypt, sign or verify the signature of text in any web page using GnuPG.
Wednesday, April 13, 2011
5.11 Taclite Pro Pants
Style# 74273. Product Page
Lightweight, durable Taclite® fabric. Gussetted construction for flexibility and strength.
Extra pockets sized for tactical use
Review: the cloth of pants is bitten through by mosquitoes and is penetrated by nettle
Цвет - ТДУ хаки (162).
Код Продукта: 74273. Страница у производителя
Брюки Taclite Pro предлагают ту же функциональность, долговечность, с таким же высоким качеством, что и классические 5.11 брюки. Брюки с Ripstop технологией из новой ткани намного тоньше и более дышащей, идеально подходят в жаркую погоду.
• Прочная легкая дышащая ткань Ripstop плотностью 6,14 унций: 65% полиэстер, 35% хлопок.
• Облегченная версия оригинальных брюк 5.11 Tactical
• Нелиняющий и немнущийся материал
• Запатентованная стропа над задним карманом и фирменные косые карманы
• Двухслойная ткань сзади и на коленях
• 48 усиленных зон в местах повышенной нагрузки
• Двойная и тройная конструкция швов
• Регулируемый пояс и особый покрой, обеспечивающий полную свободу движений
• Пропитка Teflon®, обеспечивающая защиту от пятен и жидкости
• Удобный универсальный карман
• Оригинальные молнии YKK® и кнопки Prym®
Отзыв: Ткань брюк прокусывают комары и пробивает крапива.
Куплено в Арсенале, в Минске, Беларусь
Lightweight, durable Taclite® fabric. Gussetted construction for flexibility and strength.
Extra pockets sized for tactical use
- 6.2 oz. poly/cotton Taclite® ripstop fabric (65%/35%)
- Action waistband
- 8 pockets including strap-and-slash seat pockets
- Double-reinforced seat and knees (kneepad ready)
- Bartacking at major seams and stress points
- Triple-stitching
- Hip-mounted D-ring
- Teflon® finish
- YKK® zippers and Prym® snaps
Review: the cloth of pants is bitten through by mosquitoes and is penetrated by nettle
Taclite™ Pro Hose
- Robust, leicht, atmungsaktiv (174 g, 65% Polyester/35% Baumwolle. Ripstop)
- Bleich- und knitterfest
- Markenrechtlich geschützter rückseitiger Riemen und Klappentaschen
- Doppelte Verstärkungen im Gesäß- und Kniebereich
- Teflon® beschichtet für Flüssigkeits- und Schmutzbeständigkeit
- Schnell erreichbare Mehrzwecktasche
- Original YKK® Reißverschlüsse und Prym® Druckknöpfe
Цвет - ТДУ хаки (162).
Код Продукта: 74273. Страница у производителя
Брюки Taclite Pro предлагают ту же функциональность, долговечность, с таким же высоким качеством, что и классические 5.11 брюки. Брюки с Ripstop технологией из новой ткани намного тоньше и более дышащей, идеально подходят в жаркую погоду.
• Прочная легкая дышащая ткань Ripstop плотностью 6,14 унций: 65% полиэстер, 35% хлопок.
• Облегченная версия оригинальных брюк 5.11 Tactical
• Нелиняющий и немнущийся материал
• Запатентованная стропа над задним карманом и фирменные косые карманы
• Двухслойная ткань сзади и на коленях
• 48 усиленных зон в местах повышенной нагрузки
• Двойная и тройная конструкция швов
• Регулируемый пояс и особый покрой, обеспечивающий полную свободу движений
• Пропитка Teflon®, обеспечивающая защиту от пятен и жидкости
• Удобный универсальный карман
• Оригинальные молнии YKK® и кнопки Prym®
Отзыв: Ткань брюк прокусывают комары и пробивает крапива.
Куплено в Арсенале, в Минске, Беларусь
Friday, April 8, 2011
5.11 tactical Level 1 6" Socks, туристическая подушка Kiutsi, Zamberlan Active Carbon Footbed
Туристическая подушка Kiutsi
Это уникальная, очень мягкая подушка, которая отлично снимает стресс и помогает расслабиться. Подушка Кютси заполнена пушистыми полистирольными микро-шариками, с помощью которых она принимает любую форму, идеально прижимается к голове, к лицу, к шее или к плечам, позволяет полностью расслабиться и обеспечивает хороший отдых. Она незаменима во время путешествия на самолёте, поезде, автобусе или автомобиле, когда хочется удобно устроиться и подремать.Отзыв:
К сожалению эта чудо-подушка недолговечна, внешняя резиноподобная оболочка растянулась буквально за два месяца и подушка стала мягкой.
Zamberlan Active Carbon Footbed
Plantari anatomici Zamberlan confezion
Anatomically slightly shaped for comfort, feature a 3mm memory foam padding, quick drying layer of fabric to wick away moisture, and a layer of active carbon for reduction of odor and small holes to aid breathability.Для обуви она производит широкий спектр аксессуаров, которые могут быть использованы, и в обуви других фирм.
Эти стельки с прослойкой активированного угля воспроизводят анатомическую форму стопы и создает максимальный контакт соприкосновения и нагрузка распределяется равномерно.
Стельки можно использовать в обуви различного плана, начиная от классической до спортивной.
Слой из активированного угля впитывает пот и устраняет неприятные запахи.
В стельках сделаны дышащие отверстия.
Quality of Zamberlan insoles
5.11 tactical Level 1 6" Socks
Style# 59047. Product Page
80% Coolmax®, 8% nylon, 8% spandex, 4% rubber
Enhanced elasticity. Multi-polymer fabric
Compression zones. Heel and toe reinforcements
Enhanced sole padding. Part of the 5.11® Shock Mitigation System®
Moisture-wicking
Level 1-Socken
12 Bereiche für maximalen Komfort, Passform und Halt. Mit Coolmax-Faser. 80% Polyester/8% Nylon/8% Elasthan/4% Gummi.Код Продукта: 59047. Страница продукта
Носки Level I (15см)- 12 анатомических зон, обеспечивающих максимальный комфорт, облегчение и поддержку стопы.
Состав: 80% шерсти Coolmax®, 8% нейлона, 8% спандекса, 4% резины
Взял одну пару.
Носить с кроссовками.
Куплено в Арсенале, в Минске, Беларусь
Subscribe to:
Posts (Atom)