Mozilla Leftovers: Thunderbird, Firefox, Tor Browser, and More


-
Thunderbird – Hotkeys Shortcuts Cheatsheet
-
Another Step in Automating the Pageload Recordings
In a previous article, Kimberly Sereduck told us about Updates to Warm Page Load Tests and how we are continuously working to make our tests more representative of real user behavior. Besides that, we are working on automating the process of recording the website’s page load.
-
Practicing lean data is a journey that can start anywhere - Open Policy & Advocacy
“It’s not about the destination, but about the journey.” I’m sure data and privacy are the furthest from your mind when you hear this popular saying. However, after a year of virtually sharing Mozilla’s Lean Data Practices (LDP), I’ve realized this quote perfectly describes privacy, LDP, and the process that stakeholders work through as they apply the principles to their projects, products, and policies.
[...]
There is an appetite to understand how we as consumers can hold companies accountable. One of the biggest surprises for me came when I would field questions at the end of a presentation, and people would ask about their rights as consumers and how they can hold companies accountable. For example, people wanted to understand their rights and recourse options if companies contacted them without permission, didn’t honor their unsubscribe requests, or did something else frustrating. I teach LDP for individuals to apply it in a business context, but we are all also consumers and customers. LDP can help us better understand how our own data should be handled and improve our understanding of what organizations are doing. We can then remember how we feel about certain situations and then ensure we are doing things in a more consumer-friendly way within our organizations.
Lean Data Practices is a journey. For many there won’t be an ultimate destination because it is an iterative process. If you try to apply all the principles across your entire organization at once, you will find yourself overwhelmed and likely unsuccessful. To maximize your chance of success, my advice — which is the same advice we give when we present — is to just start somewhere. Choose one aspect of your business and focus on that, one pillar at a time. Once you’ve successfully applied the principles, go to a different business unit and do the same. Remember to review and adapt as products and business needs (or data!) change as well. You may likely never reach your destination, but you will see your company improve in its practices along the way.
-
Tor vs. VPN: Is One Better than the Other?
Tor and VPN have unique ways to ensure user privacy on the Internet. They’re fundamentally very different yet have many similar aims. Due to the overlap in features, you may be weighing the pros and cons of using one over the other. Or maybe they can be treated equally but with separate purposes. This guide digs into everything you need to know about which software should be used for more Internet anonymity.
-
New Alpha Release: Tor Browser 11.5a2 (Windows, macOS, Linux)
Tor Browser 11.5a2 is now available from the Tor Browser download page and also from our distribution directory.
This version includes important security updates to Firefox.
-
- Login or register to post comments
Printer-friendly version
- 2466 reads
PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
Programming Leftovers
| Emulate the VIC-20 home computer with Linux
Emulation is the practice of using a program (called an emulator) on a PC to mimic the behaviour of a home computer or a video game console, in order to play (usually retro) games on a computer.
Home computers were a class of microcomputers that entered the market in 1977 and became common during the 1980s. They were marketed to consumers as affordable and accessible computers that, for the first time, were intended for the use of a single non-technical user.
Back in the 1980s, home computers came to the forefront of teenagers’ minds. Specifically, the Amiga, ZX Spectrum, and Atari ST were extremely popular. They were hugely popular home computers targeted heavily towards games, but they also ran other types of software.
The Commodore VIC-20 is an 8-bit home computer that was released in 1980/1. It featured a MOS Technology 6502 CPU, with 20KB ROM and 5KB RAM although 1.5K of the RAM was used for the video display and aspects of the BASIC and kernal.
It offered limited low-resolution graphics (176 x 184) with storage provided by cassette and floppy disk.
|
PostgreSQL Anonymizer 1.0: Privacy By Design For Postgres
PostgreSQL Anonymizer is an extension that hides or replaces personally identifiable information (PII) or commercially sensitive data from a PostgreSQL database.
The extension supports 3 different anonymization strategies: Dynamic Masking, Static Masking and Anonymous Dumps. It also offers a large choice of Masking Functions such as Substitution, Randomization, Faking, Pseudonymization, Partial Scrambling, Shuffling, Noise Addition and Generalization.
| today's howtos
|
Recent comments
2 hours 53 min ago
3 hours 17 min ago
6 hours 25 min ago
6 hours 36 min ago
6 hours 38 min ago
14 hours 21 min ago
16 hours 7 min ago
17 hours 49 min ago
20 hours 9 min ago
1 day 43 min ago