YouTube too slow to load with Freebox in France? Connect with VPN!

1:32 PM Add Comment
YouTube too slow to load with Freebox in France? Connect with VPN! -

If you are based in France and are subscribed to Free ADSL, it takes a lot of patience to watch a video on YouTube. YouTube is often too slow to load, even at very low resolution

The problem is recognized by Free Telecom for about a year now, and according to them. "The pipes between Google and Free full points at times, and each part of the responsibility of adding pipes to the other. This is a classic problem that happens everywhere, but most often with Google."

We also noticed that some Google sites are also very slow to load, such as Google Docs, for example.

According PCWorld.fr "For several months, consumers are turning to the UFC-Que Choisir to report problems connecting to certain Internet services from their free network. No Free Telecom Operator has never denied the dysfunction between the network and YouTube, accusing the latter of not wanting to pay for the bandwidth needed (...) It is important to settle the dispute away customers and better manage the market. Indeed consumers benefit from lower service without being informed beforehand and without being able to use this as a cause for termination. "

We tested the connection to YouTube and with Freebox without VPN, and had the following results:

with VPN you can watch Youtube videos without any problems with the resolution 1080 pixels , compared to a super long load times even in a resolution of 360p with low Freebox connection without VPN.

Why the connection is faster with VPN? We Priority Premium pipes for all VPN connections!

Pipes between Google / YouTube and Free Telecom are full at times, resulting in a very slow connection. When you connect to the Internet with Free, your connection goes the following steps:

from your computer -> Freebox -> occupied pipes is free -> Youtube

So without. VPN pass you by overloaded pipes between free and Youtube.

When you connect with the VPN, you avoid the overloaded channel between free and Youtube, even if free is your Internet provider. The VPN uses Premium pipes so that your connection VPN is always fast. With VPN, you connect as follows :.

Your PC -> Free Premium pipe -> The premium pipe VPN -> Youtube

Therefore, to avoid the pipe overloaded between free and Youtube / Google and faster to load YouTube videos, use the VPN for your connection. Try VPN today!

Critical security hole in Skype - !. Steps to protect yourself

12:31 PM Add Comment
Critical security hole in Skype - !. Steps to protect yourself -
Looks like there is a critical security hole in Skype

Russian hackers published the step by step instructions on how to turn on behalf of someone knowing the email only target. The vulnerability is confirmed by some security experts, but there is no official reaction from Skype. The temporary solution is to change your email address in a private, nobody knows

If you received the following messages from Skype, your account is probably serious risk :.
1) "Welcome to Skype"
2) "marker Password"
3) "change password"
If your account has been compromised, you should try to connect and change your email / password first, and if it does not work -.. contact Skype support team

We hope that this vulnerability will be fixed as soon as possible by Skype Meanwhile, please share this information with your friends!

the VPN information security team
www.le-vpn.com

Season greetings and happy holidays to the VPN!

10:29 PM Add Comment
Season greetings and happy holidays to the VPN! -
New Year fireworks in Hong Kong www.le-vpn.com All of us at The VPN wish you happy holidays and a happy new year 2013!
as a holiday gift for this holiday season, the team VPN is pleased to offer all our customers, subscribers and subscribers a special gift voucher of 1.95 value that can be applied as a discount at any VPN product, or contribute to a free trial.
Would you like to subscribe to VPN? Or maybe you want to show your friends and family to an online protection by VPN and invite them to test our products? Use this special holiday gift and subscribe to VPN to www.le-vpn.com
Initially enter the special coupon code :. HAPPY2013 , which will apply € 1.95 discount to your purchase. feel Please share this free gift code with your network, but remember that it will expire after the holidays.

The VPN is also running a special promotion on the ultimate holiday VPN .
Only this holiday season, you can get the ultimate VPN to 40% discount, or from 5.37 per month!

The ultimate VPN means access to VPN servers in 12 countries, unlimited traffic and unlimited switches between servers, and file sharing and downloading torrent allowed with Czech servers.
Click here to subscribe to The ultimate VPN -40%


World Conference on International Telecommunications Set To Run In Dubai Monday

11:30 AM Add Comment
World Conference on International Telecommunications Set To Run In Dubai Monday -
WCIT 2012 in Dubai

The World Conference on International Telecommunications will be running from Monday 14th December for twelve days in the city United Arab Emirates Dubai and is expected to be controversial in nature in that it could lead to censorship of the Internet and block access to it in certain countries.
Conference, known as the WCIT, will be attended by representatives of 10 countries, their agenda to discuss the regulations were first established in 1988 and vote on new proposals that have been submitted in confidence, but have led many to believe that they will hinder the freedom of accessing the internet.

According to the UN agency, the International Telecommunication Union, the organization sponsoring the meeting, the regulations are being revised during the meeting are designed to ensure that connectivity and operability between the nations of the world are maintained and that all nations accept the regulations. Vint Cerf, an Internet pioneer and now chief Internet evangelist and a vice president for Google, however, was concerned about the process. He and others feel the global regulation of the Internet can not be the domain of the United Nations and that by sponsoring this conference, it is trying to increase its authority in an area that is not appropriate.

WCIT 2012 in Dubai
M .. Cerf noted that some of the proposals could censor legitimate speech and go as far as to cut off Internet access in various countries and allow governments to do so. In response and the response to these proposals at the meeting, there were over a thousand groups representing 0 countries that have created a document so that freedom on the Internet can be maintained.
This includes more than 300 groups across Canada representing schools, universities, yoga studios, unions, high radio stations and Internet groups open as OpenMedia .it. Google has also created a website to host an online petition, and social media was also used when Mr. Cerf published a blog post in which over 1.7 million people have added their names.
M. Cerf stressed that some of the proposals it is supposed to be voted at the conference include the ability for governments to block access to Internet, censoring legitimate speech and impose tolls that cross borders so access to applications such as Skype, Facebook and YouTube would be made very difficult. He added, however, that it is not opposed to the International Telecommunication Union because it has contributed to the management in the world of wired telephone and wireless networks and the management of the radio spectrum that was important for investments in the countries of the third world. His opposition is based with his feeling that the agency, and the WCIT conference are not appropriate means to make decisions on the future of the Internet. These avenues are for the governments of the countries and allow these stakeholders that Internet companies, engineers and staff in technology, which are those that build and use the Internet.
Some others, such as the International Trade Union Confederation, fear that the conference will take away authority from ICANN (ICANN), which was responsible for the governance the Internet and is a nonprofit organization created by the US Department of Commerce's, which was responsible for regulating top level domains.
Hamadoun Touré, Secretary-General of ITU, responded to criticism of the conference by saying that the objective of the Conference is not to control the Internet or restrict freedom of expression or speech, but to ensure that global connectivity is achieved, and Internet technology is made more affordable for many in the world.

www.le-vpn.com

How to avoid phishing

9:28 PM Add Comment
How to avoid phishing -

How to fight against phishing on the Internet? Phishing refers to these emails you may have already received that invite you to renew or give your credit card number or access your bank account. According to the Anti-Phishing Working Group, phishers are able to convince up to 5% of recipients to respond. So please, be careful and refer to the following steps:

Do not respond to e-mails that refer to your financial profile or bank
just be logical: the banks or e-commerce companies generally personalize emails, and phishers do not. Phishers often include false but sensational messages as "urgent - your account details may have been used by someone else") to create an immediate reaction from the person receiving such a message, which is also usually full of errors or typing error syntax. Trustable companies do not ask their customers for passwords or account details in an email. Even if you think the email may be legitimate, do not respond - contact the company by phone or by visiting their website. Be careful when opening attachments and downloading files from emails, no matter who they come from.

Enter the URL of the banking website in the address bar
Phishers often use links within emails to direct their victims to a bogus site, usually to a similar address as mybankonline.com instead of mybank.com. When you click on the URL, it may be displayed in the address bar, it is true, but there are several ways it can be faked, taking you to the spoofed site. If you suspect an email from your bank or online company to be false, do not follow links embedded inside. Just call the implicit financial organization in the spam or report these phishing websites like http://www.antiphishing.org/ or http://www.google.com/safebrowsing/report_phish/.

make sure that the website you are visiting is secure
Before submitting your bank details or sensitive information, here are some things to do to make sure the site uses encryption to protect your personal data: check the web address in the address bar. A site beginning with "https: //" ( "s" for security) rather than the usual http: // is proof that it is based on an encryption mode. Refer to the lock icon on the browser's status bar. But consider the fact that if the site uses encryption, it does not necessarily mean that the website is legitimate.

Be cautious with emails and personal data
You have to keep private your PINS or passwords without writing them everywhere. Do not use the same password for all your online accounts. Use common sense when reading emails. If something seems implausible or too good to be true then it probably is.

Keep an eye on your accounts smart
regularly connect to your online accounts and check your statements. If you see any suspicious transactions, report them to your bank or credit card provider. Do not see these reports that phishers are smart and fast.

Make sure your computer is secure
Some phishing emails or other spam may contain software that can record information on your internet activities (spyware) or open a 'backdoor' to allow hackers to access your computer (Trojans). First install the anti-virus software on your computer. And if you want your Internet connection is secure and anonymous, choose a VPN. A VPN service encrypts your Internet connections and private preserves the sites you've visited and the information you have left on them. You protect all your Internet activities with a virtual secure VPN tunnel with a strong military encryption. This will ensure that sensitive data remains yours only.

Cyber ​​threat trends in 2013

8:27 PM Add Comment
Cyber ​​threat trends in 2013 -

According to McAfee Enterprise recent forecast report threats, cybercrime continue to grow in 2013. "Cybercriminals and hacktivists strengthen and develop techniques and tools they use to attack our personal information, bank accounts, mobile devices, companies, organizations and homes, "said Vincent Weafer, senior vice president of McAfee Labs. in fact, the report commented some trends for 2013:

the number of mobile threats will increase dramatically, as ransomware expanded in mobile devices attackers target to divert the ability of users to access. data, which makes the victims to be linked to either the loss of data or pay a ransom hoping to regain access to them. the attackers are also going to create mobile with extreme capabilities to steal money via the method "bump and infect" the most commonly used in areas with high population density such as airports and shopping malls.

Cybercriminals are known for the selection of public forums to do business deals with other criminals on software and services. The number of criminals invitation only requiring registration fee increases forums to make secure and anonymous forums. This offer will be even easier to find on the Internet in 2013.

Many Web sites, even those established and guaranteed, received strong and repeated attacks, showing that cybercriminals want to create as damage as possible. Such behavior is expected to grow in 2013. If cyber criminals manage to launch destructive malware on a greater number of computers or mobile phones, the result can be devastating.

To avoid being the next victim of these cyber threats lifting, start investigating about a VPN. When you use a VPN service, your IP address is hidden and can not be identified. When accessing the Internet and surf sites that are not secure, through the VPN, you will get a strong encryption that will not even allow your ISP to see what sites you visited.

Thus, access to your banking online, your transactions and easy online purchases are secure as online hackers can not access your IP address. They will not be able to trace anything and you can just surf via a virtual IP address with the location you want among the 12 countries offered by VPN. Your Internet connection is secure, no matter if you connect from a café or traveling. A special VPN service also allows you to protect your connections from your smartphone.

Ransonmware: a fake police gang dismantled by Europol

7:26 PM Add Comment
Ransonmware: a fake police gang dismantled by Europol -

Europol, the European police trade unions, announced the dismantling of a criminal gang. Its members are accused of having infected hundreds of thousands of computers via a ransonmware, that this type of malware that locks the user's files in exchange for payment of a ransom. For payment, criminals pose as police officers. On the infected computer displays a message informing the user that he / she was guilty of illegal activity and must pay a fine.

Indeed, in late 2011, French Internet users had their computers compromised by malicious advertising broadcast on streaming sites. Once the malicious code run, a warning appears on the screen with the logo flew to the French police and ask for the payment of a 0 euro fine.

Although it is difficult to assess the exact number of victims, Europol estimates that hundreds of thousands of Europeans have been affected by the activities of this criminal group. Considering a fine of 100 euros on average, these pirates have collected several million.

According to Reuters, the alleged leader of the gang is a Russian man of 27, who was arrested last December in the UAE. Ten other suspected members, all from Eastern Europe (six Russians, two Ukrainians and two Georgian people) of the organization were arrested last week by the Spanish authorities.

During the arrest of the gang, nearly 0 credit cards (used to withdraw money from victims through online payment services such as Ukash and MoneyPak) and about 26,000 euros cash were seized by Spanish police.

An information site on the subject of ransomware www.stopransomware.com recently opened. Still, the best advice is not to pay, but to protect your computer. First install a good anti-virus software. And if you want your Internet connection is secure and anonymous, choose a VPN. A VPN service encrypts your Internet connections and keeps secret the sites you've visited and the information you have left on these sites. This protects all your Internet activities with a secure VPN tunnel virtual, which includes an extremely strong military encryption. Indeed, all traffic through the VPN utilizes AES-256 to encrypt data. AES stands for "Advanced Coding Standards" - a symmetric encryption standard adopted by the US government. It has a fixed block size of 128 bits, with 256-bit key lengths. The AES cipher has been extensively tested and analyzed. It is now used worldwide

AES is the first figure the public approved by the NSA -. National Security Agency - for classified information

Therefore, any connection or pirate decrypting data through the VPN tunnel is strictly impossible "Top secret.".

The champions of Internet censorship announced by RSF

6:25 PM Add Comment
The champions of Internet censorship announced by RSF -

March 12 is the International Day against Cyber ​​Censorship. Reporters Without Borders (RSF) organization takes over this key date every year to update its "Report against Internet Enemies." The 2013 edition of this report presents the top 5 countries but also top 5 companies working with these countries to establish or expand cyber censorship

the five distinguished countries, which are indeed the worst are :. Bahrain, China, Iran, Syria and Vietnam. They violate human rights and . freedom of information in the maintenance of intrusive surveillance of people on the Internet to enhance their power they use two main types of technology: the audio equipment for mass interception and highly sophisticated spyware to target opponents in particular. These spyware programs are used to spy on the contents of hard drives, recover passwords, but also to access the e-mail content or spy voice communications. They can be installed directly on computers or via Internet through fake updates or attachments in e-mails, without the user noticing. Civilian use of these programs is limited. Some manufacturers offer their services directly to government entities, such as intelligence and security services. Other companies do not hesitate to promote their ability to monitor and track political opponents. Authoritarian regimes use them to spy on journalists and their sources to limit freedom of information

Some of these technologies can be used in two ways :. they can be used for the legitimate fight against cyber crime, but they can also be used as a tool of censorship and surveillance against those involved in human rights and information when used by authoritarian regimes.

this is how Fisher Technology International Gamma operates by installing spyware undetectable and has been used by countries such as Syria, Libya or Bahrain.

The lack of trade monitoring these digital weapons allows authoritarian governments to control citizens and journalists.

entities such as Citizen Lab, or media reports of media such as the Wall Street Journal and Bloomberg also has long denounced this type of trade. Some of these companies are already the subject of legal proceedings, as is the case with Gamma International and Trovicor, which are the subject of a complaint launched by several NGOs in the OECD.

The RSF report represents a state of alertness that makes these quite disturbing drift. RSF also soon update its report with new nations and pirates companies.

To avoid censorship, opt for a VPN. VPN - one of the best VPN providers in the market with a reliable VPN - offers VPN servers in 12 countries including the US, UK, Canada and Germany. You provide a virtual IP address, VPN masks your real location and allows you to connect to your websites selected without restriction. It allows you to stay virtually in a different country, changing your IP address in order to enjoy the sites blocked in your country of residence, a VPN encrypts your Internet traffic also all and makes your Internet browsing anonymous and secure. Installing VPN does not take more than 2 minutes. The VPN is also available for your mobile devices -. mobile phone or tablet -for free and unrestricted Internet

Cybercrime supports other crime

5:24 PM Add Comment
Cybercrime supports other crime -

As confimed by Europol, profits from cybercrime are used to fund and develop other criminal activities and the impact and spread of cyber crime is increasing.

The European Agency for the implementation of the recently published its assessment law (SOCTA) report Serious Threat and organized crime and cybercrime highlighted as one of the areas requiring shared action between Member States the EU.

The report said economic crimes and fraud have emerged as major criminal activities. Improvements in technology have been a key factor in the spread of serious and organized crime.

Internet will offer many opportunities for crime, allowing easy access to information, the targeting of victims, negotiation and implementation of criminal activities in addition to the bleaching criminal activities.

As the Internet is now an essential tool in our daily lives, whether on PC, mobile or tablet, criminals can target a larger number of victims. The boom in Internet access in regions such as Africa and Asia creates opportunities and additional room for organized crime groups targeting public and private parties in the European Union. "Cybercrime in the form of large-scale data breaches, online fraud and sexual exploitation of children is a threat increasingly in the EU, while cybercrime profit-driven becomes a catalyst for web other criminal activities, "said the report.

Europol warned Europeans that cybercriminals can access a large pool of potential victims through the social networks, spamming and phishing. stolen personal data may also been used to produce forged documents, enabling criminals to develop a range of organized crime in both online and offline, according to the report. This gives groups fight against organized cybercrime ways to generate revenue, but also to assume the identities of individuals or businesses authentic

At the other end, the identification and prosecution of those types of crime becomes more complex. "Criminals are able to exploit a variety of different tools and techniques to conceal their identity and obscuring their crimes," said Europol.

It is estimated that in Europe only 3,0 organized crime groups are in active progress. the increasing use of cloud computing also benefits cybercrime, Europol said. "He will see users and criminals storing less data on their devices, which will present a significant challenge to the criminal investigations and practice medico existing digital legal. "

Europol provides that the Internet will allow more developed market for illegal activities and products and plans still cybercrime to grow further.

Choose VPN, so your internet browsing remains safe from prying eyes. This will ensure that your web surfing, online banking and all your downloads take place in a secure mode and anonymous.

Just select a VPN server in one country available to protect all your activities on the Internet, through a secure VPN tunnel virtual including extremely strong encryption. Your IP address will be automatically replaced by an anonymous IP address in the country you selected. And even your ISP will not be able to identify which sites you connect.

The main advantages of using a VPN

4:23 PM Add Comment
The main advantages of using a VPN -

The benefits of using a VPN are numerous. Key 3:

- Security

The main function of a VPN is to secure your Internet connection. A VPN creates a secure tunnel is encrypted between your computer and the VPN. Then everything happens behind surfing tunnel VPN. So what happens between your PC / tablet and VPN is secure via an encrypted tunnel that compresses your traffic. If you have a connection of 10MB per second, downloading a 1000MB file, for example, take 70 seconds instead of 100 seconds without compression. De facto, your connection speed increases from 10 Mbps to 14.3 Mbps. The connection is faster, which is ideal in places where the Internet connection is underpowered.

You can also significantly reduce attacks by cyber criminals who want to directly address your ISP IP address, due to VPN provides you with anonymous IP address.

Finally, when using Wi-Fi or via a computer, smartphone or tablet, you surf safely through VPN. A wireless network is indeed very easy to hack: you can easily recover your data, see what you're doing online on a number of sites, through this type of connection open. With VPN, all your sensitive data, data exchanges are encrypted and protected

-. Privacy Enhanced

Another advantage of a VPN is to provide you with an anonymous IP address that replaces the one provided by your ISP. The IP address that you can choose to be located in the country of your choice makes you virtually invisible and can not be blocked.

The traces of Internet activity can directly or indirectly to identify individuals, even if they are protected by the right to privacy. A VPN limit these steps you have taken, through an anonymous IP address.

Also, your ISP can not limit your activities on the Internet. Some countries prohibit certain sites like Facebook or monitor connections via Skype or MSN. Expats like to have a VPN to stay in touch with loved ones. Finally, a VPN allows you to avoid targeting corporate ads making profit on your topics of interest. You will not be bothered by the offers of tour agents, after completing a Google search on Kenya for example

-. Free your Internet surfing and trade

The data exchanges are protected by IP VPN. You can download and share all the content you want and surf without restrictions. You can also bypass geographic restrictions practiced by media sites such as Hulu, the free video on the website of the application that the prohibition viewing videos for IP addresses that are not located in the United States or website M6 Replay that allow access to its content exclusively to french IPs.

Finally, you can bypass the restrictions of some ISPs that reduce your connection speed on sites like YouTube and streaming direct downloads sites.

Visit the website today to buy a VPN VPN Plan now or follow us on social networks for a free account, so you can enjoy all these benefits.

A double security system provided to connect to Twitter

3:22 PM Add Comment
A double security system provided to connect to Twitter -

Twitter decided to take drastic measures to improve safety and privacy of its users' accounts following acts of piracy Associated Press Twitter account that occurred on Tuesday, April 23. The social network is working on a new identification system in two stages.

to access the platform, the user must have a password and a terminal associated with that account. Thus, the connection to Twitter will soon require a double operation identification. Your password will be accompanied by a numerical code that will be sent via SMS to your mobile phone. Indeed, this system will not stop the criminals, but make their task more difficult.

The malicious intrusion authors who recently hacked the account of the Associated Press had issued a message to all of his followers by saying that two explosions erupted in the White House, one hit US President Barack Obama. After investigation, experts have said that the message was sent by the "Syrian Electronic Army".

This new security system with two factors must be made available by Twitter soon. It is already used in some countries, such as France for purchases on the Internet (the system is called 3D Secure). Facebook, Microsoft and Apple have also started using this dual operation of identification mode.

The best way to protect your Internet connection is to use a VPN service. The VPN reduces your online movements by replacing your routing information through an anonymous IP address. Secure DNS servers VPN keep secret requests that you make, so that nobody can see your browsing history. Your computer is hidden behind the VPN many servers :. When connected to the VPN, no one can access your computer or mobile device, without using the protected VPN servers

Finally, your Internet connection is encrypted with a very strong system that protects you against hackers and illegal ears trying to listen or obtain sensitive information about you.

The VPN Launches Third Protocol with technology L2TP / IPSEC

2:21 PM Add Comment
The VPN Launches Third Protocol with technology L2TP / IPSEC -
The VPN adds a third L2TP / IPSEC protocol to its two other protocols :. OpenVPN and PPTP
Like the other two protocols, L2TP / IPSEC protocol provides maximum security to clients while data transfer. It is designed for those looking for maximum protection during the conduct of operations. It is compatible with multiple operating systems and many Internet providers. L2TP / IPSec is easy to install and can be configured on a laptop, tablet or mobile device. It is also one of the best VPN protocols to bypass network restrictions and Internet service providers.
L2TP / IPSec provides optimal 128 bit AES encryption and the two protocols work together to ensure maximum protection and data security . The L2TP / IPSEC protocol is now available in many countries where the previous protocols were blocked before.
Users can opt for the security of one of the best VP N, as recently quoted by vpnmaps.com. In addition, this new protocol can integrate and protect other devices, including two other protocols would not work with before.
This new L2TP / IPSec VPN protocol is compatible with mobile phones, tablets and most operating systems. subscription Discover VPN for a monthly fee of € 4.95, which provides unlimited connection speed. With VPN L2TP / IPSEC new protocol, the security of sensitive data is optimized and you can surf the Internet freely, without worry.

First suspension of Internet access in France because of the Hadopi

1:20 PM Add Comment
First suspension of Internet access in France because of the Hadopi -

for the first time since the Hadopi law was passed, a French Internet user was sentenced by the court to a suspension of their Internet service, according to the website of PC INpact.

the Seine-Saint-Denis district court sentenced the Internet user to a fine of 0 euros and a suspension of its connection for a period of two weeks.
The Hadopi law has been in place since 06 and provides a graduated response system designed to function as a "reminder of educational law system that was established by the Commission for the Protection of Piracy in the fight against the illicit trade in works protected by copyright or related right. "
Internet users suspected of a" lack of security "of its Internet line will thus receive a first notified by e-mail and by registered mail, before being contacted by Hadopi and receive a penalty. But so far, despite several attempts, no user was sentenced to suspension from the Internet, which was felt as a measure controversial and created much debate before the law was passed.
in addition, it is not certain that the penalty may be applied :. when the law was passed, ISPs had explained that the suspension was technically complex, because the operator must still give the user access to his email account and phone line
Enable VPN service now and start download using your usual methods to protect your identity and your downloads. Using a VPN service, you will not connect directly to the Internet, but to a single VPN secured server. All data transmitted between you and our servers is encrypted using a complex algorithm AES-256 and our VPN servers will protect your identity from the external network. The VPN reduces your online tracks and protect your data against interception.
In addition, the VPN is independent of the software you use and protects all your traffic, regardless of whether you use uTorrent, eMule or any other software.

The VPN will not allow anyone, even your ISP to intercept what you download, but also to detect that something was downloaded. So you can download safely and without limits what you want.

EU tightens sanctions against cybercriminals

12:19 PM Add Comment
EU tightens sanctions against cybercriminals -

Cybercriminals will be subject to tougher European sanctions under a project Directive adopted by the European Parliament on 4 July.

For several years, cyber crime cases continued to grow, achieving more intense and diversified on a global scale. Cyberspace allows criminal or even terrorist actions to be carried thousands of kilometers of the victim.

The European Parliament adopted a draft Directive reinforcing the penalties for perpetrators of cyber attacks or cyber crime. To be fully implemented, this text must still be voted on by the European Council. It leaves Member States free to set their own prison sentences for perpetrators of cyber crime, which should be worth at least two years for the following cases:

• illegal access to systems information

• unlawful interference with these systems

• unlawful interference with the data

• illegal interception of communications

• production and intentional sales the tools used to commit these crimes

States also have to determine the shares 'minor' of cybercrime to exclude from the scope of the Directive, for example, report a security breach. A prison sentence of at least three years may be engaged when using botnets -. As part of an attack to take remote control of a large number of computers via spyware

Finally, the maximum sentence for attacks against critical infrastructure (nuclear power plants, transmission and government systems) could be a prison sentence of at least five years. The same is true in the case of an attack committed by a criminal organization which would create serious damage.

To make police cooperation between Member States to be more efficient, the EU is also developing a system warning among Member States, so that agents can respond to any urgent requests if cyber attacks within eight hours.

And companies are not left out, as they would also be liable for offenses committed for their benefit (eg, when they asked for a hacker to access a competitor's data). They will be held criminally responsible for this case.

This Directive is based on measures that are already in force since 05. Once this law is adopted, Member States will then have two years to transpose it into their national legislation law.

With a VPN, you can significantly increase your online security. Your Internet connection is encrypted with a secret level that protects you against hackers and those who try to access your sensitive information

Your computer is hidden behind VPN servers :. An external malicious actions, such as viruses and network attacks are rejected by the VPN server. And when connected to your VPN service, no one can access your computer without going through VPN secure servers.

The VPN helps you keep your hidden connection, surfing the Web. But it also means that all traffic is routed via the VPN security, protecting all your software and hardware running on your network.

How NSA ignored the laws relating to privacy

10:17 PM Add Comment
How NSA ignored the laws relating to privacy -

The Washington Post revealed that the US National Security Agency (NSA) has made "thousands" of violations of laws designed to protect the privacy, because it was given additional powers in 08. This information is based on the analysis of an internal audit and secret documents provided by Edward Snowden daily.

The audit of the NSA, as of May 2012 identified 2776 incidents "the collection, storage, access and disclosure of data protected by law without authorization" during the twelve months previous, only in the Fort Meade and Washington. Many of them were not even supposed to happen, but are the result of the failure or violation of normal procedures.

Another report published by the Washington Post revealed that the NSA has ordered his staff to falsify targeted reports to be submitted to the Ministry of Justice and the Director of National Intelligence, who were supposed to supervise their work - but many details have been omitted from these reports. Although the NSA denied, it would hide the existence of a case of unintended omission of several Americans.

Indeed, in 08, many phone calls to Washington were followed after a programming error that reverse area code phone in the US capital (202) with Egypt (20). But this false manipulation was not known by those who are supposed to monitor the NSA.

Large volumes of data through international fiber optic cables in the United States were also intercepted. This process, however, was ruled unconstitutional in 2011 by the Court of the Foreign Intelligence Surveillance (IFCS), which is the court to issue orders and to monitor US intelligence activities. But at the time of the judgment, the NSA used this method for several months without informing the IFCS

A senior official of the NSA said :. "We are an organization run by human beings operating in a complex environment with many different control methods. This is why we sometimes find ourselves on the wrong side of the fence."

After the sharp controversy over the distribution of thousands of documents for methods of intelligence of the United States, President Obama has promised measures for "greater transparency", but has always denied any abuse of the NSA surveillance program.

However, this approach is complicated by the supposedly transparent control was entrusted to James Clapper, who is the director of national intelligence, and was responsible for coordinating the various US intelligence agencies.

the best way to ensure that your personal data can not be stolen on the Internet is to use a VPN service. The VPN reduces your online movements by replacing your routing information by anonymous IP address. Secure DNS servers VPN keep secret requests that you make, so that nobody can see your browsing history. In addition, your Internet connection is encrypted with a very strong system that protects you against hackers and illegal ears trying to listen and obtain sensitive information about you. Your Internet connection is hidden behind many servers VPN :. When connected to the VPN, no one can access your computer or mobile device without using VPN protected servers

The Bettencourt scandal continues on Internet

11:18 AM Add Comment
The Bettencourt scandal continues on Internet -

"This article was censored." Mediapart and Le Point site effectively removed all articles and audio clips incorporating extracts records from billionaire Liliane Bettencourt. The sites and the respect the decision of the Court of Appeal of Versailles, which had ruled that the recordings violated the privacy of the famous owner of L'Oreal.

Last July 4, Justice ordered Mediapart and Le Point to withdraw their websites hackers transcription recordings Liliane Bettencourt by her butler, believing that their distribution was a violation of life private billionaire owner.

the Court of Appeal of Versailles also condemned the two sites to pay € 20,000 each as compensation to Mrs Bettencourt and 1000 € to its former wealth manager, Patrice de Maistre.

"public information (...), even through summaries, can justify dissemination of documents obtained in violation of law and respect for other people's privacy," said the court

This is clearly an act of judicial censure because he has not been seen in France for several years

Internet media - .. Rue89 and freeze frame - immediately reported they were ready to receive the transcripts of these bootlegs. Freeze posted them in free access: http://videos.arretsurimages.net/telecharger/mediapart_bettencourt_clean_pack.tar.gz

Edwy Plenel, a famous journalist who is also the director of Mediapart said that it has established a call and commented about the decision to be "draconian and stupid, it is an act of censorship and calling for death to Mediapart, given the severity of punishment. "

In June 2010, the billionaire and Mr. de Maistre had assigned Le Point and Mediapart to remove the written transcripts and audio recordings revealed a few days before. On 1 July 2010, the Tribunal de Grande Instance of Paris and the appeals court had authorized the publication of these intercepted documents referring to the fact that this information was published on a "democratic debate". But the French Court of Cassation decided to break the judgment of the Court Appeals of Paris and sent the case to Versailles in October 2011.

Thirty media signed the appeal "We have a right to know" to denounce the decision, which actually appears a little naive to a time of web 2.0: the entire file that Mediapart published about Bettencourt was duplicated and is still everywhere on the web, including sites such as BitTorrent or download the site Reflets.info

.

to avoid censorship on the Internet, use a VPN service that lets you choose your country connection. Whether you live in France or elsewhere, you can choose to base your connection in one of 20 countries where access is not restricted. You can then access the sites you want anonymously, without incurring censure or its retaliation. Choose a VPN service today and enjoy Premium offer VPN to surf safely.