Housing Watch Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. List of Japanese spies, 1930–1945 - Wikipedia

    en.wikipedia.org/wiki/List_of_Japanese_spies...

    This is a list of Japanese spies including leaders and commanders of the Japanese Secret Intelligence Services ( Kempeitai) in the period 1930 to 1945. Yakichiro Suma es – Japan's Ambassador in Spain, chief of the Japanese spy network code named "TO". Friend of Foreign Ministers Ramón Serrano Suñer ( General Franco 's brother-in-law) and ...

  3. Ultrasurf - Wikipedia

    en.wikipedia.org/wiki/Ultrasurf

    UltraSurf is a closed-source freeware Internet censorship circumvention product [ 2] created by UltraReach Internet Corporation. The software bypasses Internet censorship and firewalls using an HTTP proxy server, and employs encryption protocols for privacy. The software was developed by two different groups of Falun Gong practitioners at the ...

  4. Public Security Intelligence Agency - Wikipedia

    en.wikipedia.org/wiki/Public_Security...

    The Public Security Intelligence Agency (公安調査庁, kōanchōsa-chō) is the domestic intelligence agency of Japan.It is administered by the Ministry of Justice and is tasked with internal security and espionage against threats to Japanese national security based on the Subversive Activities Prevention Act and the Act Regarding the Control of Organizations Which Committed Indiscriminate ...

  5. Takeo Yoshikawa - Wikipedia

    en.wikipedia.org/wiki/Takeo_Yoshikawa

    Years of service. 1933–1936 (Naval) 1937–1945 (Intelligence) Rank. Ensign. Battles/wars. World War II. Attack on Pearl Harbor (as spy) Takeo Yoshikawa (吉川 猛夫, Yoshikawa Takeo, March 7, 1912 – February 20, 1993) was a Japanese spy in Hawaii before the attack on Pearl Harbor on December 7, 1941.

  6. List of proxy wars - Wikipedia

    en.wikipedia.org/wiki/List_of_proxy_wars

    This is a list of proxy wars. Major powers have been highlighted in bold. Major powers have been highlighted in bold. A proxy war is defined as "a war fought between groups of smaller countries that each represent the interests of other larger powers, and may have help and support from these".

  7. eDonkey network - Wikipedia

    en.wikipedia.org/wiki/EDonkey_network

    File sharing. The eDonkey Network (also known as the eDonkey2000 network or eD2k) is a decentralized, mostly server-based, peer-to-peer file sharing network created in 2000 by US developers Jed McCaleb and Sam Yagan [ 1][ 2][ 3] that is best suited to share big files among users, and to provide long term availability of files.

  8. Tor (network) - Wikipedia

    en.wikipedia.org/wiki/Tor_(network)

    Tor can also provide anonymity to websites and other servers. Servers configured to receive inbound connections only through Tor are called onion services (formerly, hidden services). [59] Rather than revealing a server's IP address (and thus its network location), an onion service is accessed through its onion address, usually via the Tor Browser.

  9. Proxy list - Wikipedia

    en.wikipedia.org/wiki/Proxy_list

    Proxy list. A proxy list is a list of open HTTP / HTTPS / SOCKS proxy servers all on one website. Proxies allow users to make indirect network connections to other computer network services. [1] Proxy lists include the IP addresses of computers hosting open proxy servers, meaning that these proxy servers are available to anyone on the internet.