BDNtv: ASP.NET forms validation and encryption   
none
          CyberSecurity Engineer - Black Box Network Services - Lawrence, PA   
Configuration and monitoring of detection technologies:. Experience in configuration of Symantec Endpoint Protection and Endpoint Encryption....
From Black Box Network Services - Wed, 07 Jun 2017 20:18:04 GMT - View all Lawrence, PA jobs
          OTRS Group is launching a new version of its service management suite   
OTRS 5s supports service management with integrated scheduling and deployment planning, encryption, and video communication at the click of a mouse Oberursel, NOV 1, 2016 – OTRS Group, the vendor and world’s leading provider of the open source service management suite “OTRS”, is launching the new version of its software today: OTRS 5s. OTRS 5s
          Staying Ahead of the Curve   
Tenable.io Malicious Code Prevention Report

As malware attacks continue to make headlines, many organizations struggle to stay ahead of the complex, evolving threat landscape. Attackers use both old and new ways to deliver malware through exploiting existing vulnerabilities, evading security solutions, and using social engineering to deliver malicious payloads. Millions of unique pieces of malware are discovered every year, and even with the best security controls in place, monitoring the thousands of endpoints within your network for malware can be nearly impossible.

Use Tenable.io to quickly address systems that are at risk

Once inside your network, malware can disable security controls, gain access to privileged accounts, replicate to other systems, or maintain persistence for long periods of time. If these risks are not addressed quickly, they can result in long term, devastating consequences for any organization. Using the Malicious Code Prevention Report from Tenable.io™ provides you with the visibility needed to quickly address systems that are at risk.

Malicious Code Prevention Report

Malware scanning

Tenable.io includes a customizable malware scan template where you can incorporate both good and bad known MD5 hashes, along with a hosts file whitelist. On Windows systems, hosts files contain commented lines of text that consist of two localhost address entries. Most systems will query local DNS servers to resolve domain names to IP addresses. Some organizations will add entries into hosts files for dedicated systems within their environment or to block unauthorized websites. Once a hosts file is modified, the local system will use the entries within the hosts file first and bypass records within your DNS server.

Malware also targets the hosts file to insert redirects to malicious sites or block security solutions from obtaining patches and security updates. For organizations utilizing the hosts file, the Malware Scan template provides you with the ability to add whitelist entries that would otherwise be flagged as abnormal by existing security solutions within your environment.

Malware Scan template

Enabling the File System Scanning option enables you to scan specific directories within your Windows environment such as the C:\Windows, C:\Program Files, and User Profile directories that are frequently used to install malware. You can also scan malware within directories such as C:\ProgramData that are hidden by default on Windows systems.

Scanning files

Organizations can have any number of mapped drives and devices connected to a system. Most anti-virus solutions only scan default directories such as the C:\ drive, and without additional rules in place, malware could easily bypass this security control via flash drive or external USB drive.

The Malware Scan template provides an additional layer of security to scan network drives and attached devices that may not be targeted by your anti-virus solution

The Malware Scan template provides an additional layer of security to scan network drives and attached devices that may not be targeted by your anti-virus solution. Using the Custom File Directories option, you can include a list of directories within your scan to target mapped drives and attached devices.

Yara rules can also be incorporated into your Tenable.io malware scan. Using a combination of regular expressions, text strings, and other values, Yara will examine systems for specific files that match values within the rules file.

Vulnerabilities

The Malicious Code Prevention report provides a comprehensive overview of systems infected with malicious backdoors, hosts communicating with botnets, and vulnerabilities that can be exploited by malware just to name a few.

Along with malware and malicious processes, this report also highlights systems with vulnerabilities that are exploitable by malware. Exploitable vulnerabilities can provide attackers with a backdoor into your network to enable privilege escalation or launch malicious code.

Hosts with vulnerabilities that are exploitable by malware

Tenable.io uses both active and passive methods to detect malicious content

Tenable.io uses both active and passive methods to detect malicious content, including web traffic analysis, md5sum matching, public malware databases, and links pointing to known malware operators. Web servers hosting malicious content are also included within this report. Malicious code can be injected into website due to a cross-site scripting (XSS) or SQL injection vulnerability.

Attackers often target websites to deliver malicious payloads to a larger audience through message boards or blog posts. Malicious code often remains hidden within iframes, JavaScript code, and other embedded tags that link to third-party websites. This data can help you target and remediate issues on web servers before critical assets or services are impacted.

Botnets often use the HTTP protocol as well as encryption to evade detection by modern security solutions. Information reported by Nessus® and Nessus Network Monitor highlights active inbound and outbound communications with command and control (C&C) servers.

Hosts interacting with known botnets

Keeping your anti-virus clients updated helps to ensure your systems remain protected from malware. This report provides valuable information on the status of your anti-virus and anti-malware solutions, ensuring that they are installed and up to date. The Malware Protection chapter provides a summary of hosts running up-to-date anti-virus clients per operating system.

Anti-virus status

Tenable.io will analyze hosts with outdated anti-virus clients and provide targeted information you can use to remediate issues with anti-virus clients. Data is collected from Nessus that checks the status of various anti-virus clients across Windows, Linux, and Unix-based platforms. Using this information can also help you determine if your anti-virus client has been disabled.

Outdated anti-virus details

No organization is immune from vulnerabilities and attacks

No organization is immune from vulnerabilities and attacks. Knowing how systems are compromised can help target response efforts and minimize future damage. Tenable.io provides you with critical insight needed to measure the effectiveness of your security program, and to gain insight into your current risk posture. Using the Malicious Code Prevention report by Tenable.io provides you with targeted information to prioritize remediation efforts, close malicious entry points, and stay one step ahead of attackers and other persistent threats.

Start with Tenable.io

To learn more about Tenable.io, visit the Tenable.io area of our website. You can also sign up for a free trial of Tenable.io Vulnerability Management.


          Comment on What The Tech Ep. 297 – FBI vs Apple; A Game of Unbreakable Encryption by Top 5 Picks for the Best Technology Podcasts | Elarm   
[…] In this episode, Andrew and Paul discuss the case of Apple vs. FBI. Listen here. […]
          Senior Systems Engineer - Open iT Inc. - Houston, TX   
Shell scripts, batch/PowerShell, Perl, Ruby, Python), and encryption. Senior Systems Engineer will oversee the successful installation, configuration and...
From Indeed - Thu, 22 Jun 2017 15:10:51 GMT - View all Houston, TX jobs
          Olympus Dictation App for Android   
Olympus Dictation App for Andriod
Olympus

Olympus's Professional dictation, encryption and delivery system for your Google Android Smart Phones!

The New Olympus Dictation for Andr..

Price: $99.99


          Philips LFH0747 SpeechExec Dictation Recorder for Android Smart Phone   
Philips LFH0747 SpeechExec Enterprise Dictation Recorder for Android Smart Phone
Philips

Professional quality dictation, encryption and delivery on your Google™ Android™ Smart Phone!

The Philips dictation recorder for the G..

Price: $120.00


          Philips LFH7455 Mobile Recorder for BlackBerry   
Philips LFH7455 Mobile Recorder for BlackBerry.
Banner image fo LFH7455 BlackBerry

Professional quality dictation, encryption and delivery on your BlackBerry®

The ..

Price: $129.00


          Philips LFH7430 SpeechExec Mobile Dictation Recorder for iPhone and iPad   
Philips LFH7430-LITE Mobile Recorder iPhone and iPad.
Philips LFH7430 Banner

Professional quality dictation, encryption and delivery on your iPhone and iPad!

The Philips Recorder for iPh..

Price: $120.00


          Новое видео Dr.Web поможет настроить Защиту от потери данных   

30 марта 2017 года

Среди обучающих видеоинструкций компании «Доктор Веб» появился ролик о настройке компонента «Защита от потери данных» в Dr.Web Security Space версии 11. Приглашаем пользователей посмотреть видео и настроить свой Dr.Web для резервного копирования данных.

От заражения троянцем-вымогателем не застрахован никто, это по-прежнему одна из самых опасных угроз для пользователей. Но ущерб от заражения можно минимизировать с помощью использования «Защиты от потери данных» — полезного компонента в Dr.Web Security Space версии 11, настройка которого в свете угрозы заражения троянцами семейства Trojan.Encoder является критически важной.

Приглашаем пользователей ознакомиться с новым обучающим видео с пошаговыми инструкциями о том, как включить «Защиту от потери данных» и обезопасить свои файлы от повреждения. Если вы еще не используете этот полезный функционал — пожалуйста, посмотрите ролик и настройте «Защиту от потери данных» прямо сейчас.

Все обучающие видео Dr.Web


          Новое в политике «Доктор Веб» относительно восстановления файлов, зашифрованных троянцами-вымогателями   

28 марта 2017 года

Компания «Доктор Веб», российский производитель антивирусных средств защиты информации под маркой Dr.Web, сообщает об изменениях в политике относительно восстановления файлов, зашифрованных троянцами-вымогателями. Согласно новым правилам услуга бесплатной расшифровки предоставляется только тем коммерческим пользователям Dr.Web, на чьих компьютерах на момент повреждения файлов были включены и корректно настроены те компоненты Dr.Web, которые позволяют максимально снизить риск заражения троянцами семейства Trojan.Encoder.

В настоящее время троянцы-шифровальщики продолжают оставаться одной из самых опасных угроз в сети, и число обращений пострадавших от них пользователей в службу поддержки Dr.Web неуклонно растет. Несмотря на то, что в некоторые антивирусные продукты Dr.Web включены компоненты, функционал которых позволяет не только лучше защищаться от троянцев-вымогателей, но и восстанавливать зашифрованные файлы, далеко не все владельцы лицензий пользуются этими возможностями и, таким образом, снижают вероятность успешного восстановления файлов — это становится очевидно инженерам поддержки после анализа логов Dr.Web обратившихся за услугой восстановления.

В связи с этим в политику компании «Доктор Веб» относительно восстановления зашифрованных файлов, согласно которой заявки на бесплатную расшифровку принимались от всех коммерческих пользователей Dr.Web, внесены изменения. В соответствии с новыми правилами услуга бесплатной расшифровки предоставляется только тем коммерческим пользователям Dr.Web, на чьих компьютерах на момент повреждения файлов были включены и корректно настроены все компоненты Dr.Web, позволяющие максимально снизить риск заражения энкодером.

На специальной странице сайта «Доктор Веб», посвященной расшифровке файлов, поврежденных троянцами-вымогателями, добавлен список причин, по которым владельцам коммерческих лицензий на Антивирус Dr.Web и Dr.Web Security Space может быть отказано в услуге бесплатного восстановления файлов и предложено приобрести пакет Dr.Web Rescue Pack, в состав которого входит утилита расшифровки.

Условия отказа в бесплатной расшифровке

Уважаемые пользователи Dr.Web! В нынешних условиях одного только антивируса недостаточно для защиты от троянцев-вымогателей. Необходимо использовать продукты комплексной антивирусной защиты: Dr.Web Security Space с технологиями Превентивной защиты и компонентом «Защита от потери данных», Dr.Web Desktop Security Suite с лицензией Комплексная защита или тарифный пакет Dr.Web Премиум. Если по каким-то причинам вы приобрели лицензию только на антивирус, вы можете расширить ее до комплексной защиты.

Расширить для дома — бесплатно до 5 ПК или по цене продления Расширить для бизнеса — со скидкой на продление


          Full Stack Developer   
CA-Milpitas, Title: Full Stack Developer Location: San Jose, CA Contract: 6+months (renewed quarterly) Required Skills: Minimum 5+ years of experience in Core Java and J2EE application development. Experience in designing and developing complex licensing systems using proprietary licensing schemes as well as industry standard technologies like Flex, Safenet etc. Understanding of security and encryption related
          New global encoder attack described by Doctor Web   

June 28, 2017

Doctor Web specialists examine Trojan.Encoder.12544, a new ransomware Trojan, also know as Petya, Petya.A, ExPetya or WannaCry-2 in some media sources. Based on the preliminary analysis of the malicious program, Doctor Web presents recommendations on how to avoid the infection, advises what to do if the infection has already happened and provides technical details on this attack.

Trojan.Encoder.12544 poses a serious threat to the Windows-running computers. Various sources call it a modification of the Trojan known as Petya (Trojan.Ransom.369), however, Trojan.Encoder.12544 only slightly resembles the mentioned Trojan. This malicious program has infected the information systems of government institutions, banks, and commercial organizations. It has also infected user computers in several countries.

At the moment, it is known that the Trojan infected computers using the same vulnerabilities that were previously used by cybercriminals during the WannaCry attack. The spread of Trojan.Encoder.12544 started in the morning of June 27. Once launched on an attacked computer, the Trojan looks for available computers in the local network using several methods. Then, the Trojan starts scanning 445 and 139 ports. Once the machines with open ports are found, Trojan.Encoder.12544 attempts to infect them via a widely known SMB protocol vulnerability (MS17-10).

In its body, the Trojan contains four compressed resources. Two of these resources are 32-bit and 64-bit versions of the Mimikatz tool, which is designed for interception of passwords of open Windows sessions. Depending on the operating system capacity, the Trojan unpacks the necessary version of the Mimikatz tool, saves it to the temporary folder and runs the Mimikatz tool. Trojan.Encoder.12544 gets the list of local and domain users authorized on an infected computer using Mimikatz and some other methods. Then, the Trojan looks for the network folders available for writing, attempts to open them using the received data and saved its copy in these folders. To infect computers to which it has received an access, Trojan.Encoder.12544 uses the PsExec tool designed for remote computer management or standard console tool to call the Wmic.exe objects.

The encoder checks its second launch using the file that it has saved to the C:\Windows\ folder. The file name matches the Trojan’s name without the extension. Since the worm sample spreading at the moment is named perfc.dat, the file preventing its launch is C:\Windows\perfc. However, if cybercriminals change the original Trojan’s name, creating the file C:\Windows\perfc (as many anti-virus developers advise) will not save the computer from the infection. In addition, the Trojan checks the existence of the file only if it has enough privileges to do that.

Once launched, the Trojan set its privileges, loads its copy to the memory, and grants control to the copy. Then, the encoder overwrites its own file with the trash data and removes the file. Firstly, Trojan.Encoder.12544 damages VBR (Volume Boot Record) of the C drive, and the first drive sector is filled with the trash data. Then, the encoder copies the original Windows boot record encrypted with the XOR algorithm to another drive part and overwrites the original record with its own boot record. Then it creates a task to reboot the computer and starts encrypting all files with the following extensions: .3ds, .7z, .accdb, .ai, .asp, .aspx, .avhd, .back, .bak, .c, .cfg, .conf, .cpp, .cs, .ctl, .dbf, .disk, .djvu, .doc, .docx, .dwg, .eml, .fdb, .gz, .h, .hdd, .kdbx, .mail, .mdb, .msg, .nrg, .ora, .ost, .ova, .ovf, .pdf, .php, .pmf, .ppt, .pptx, .pst, .pvi, .py, .pyc, .rar, .rtf, .sln, .sql, .tar, .vbox, .vbs, .vcb, .vdi, .vfd, .vmc, .vmdk, .vmsd, .vmx, .vsdx, .vsv, .work, .xls, .xlsx, .xvd, .zip.

The Trojan encrypts files only on the fixed drives. The data on each drive is encrypted in a separate thread. The files are encrypted using the AES-128-CBC algorithm; a separate key is created for each drive (a characteristic feature of the Trojan that has not been noted by other specialists). This key is encrypted with the RSA-2048 algorithm (other researchers say that the 800-bit key is used) and is saved to the file named README.TXT to the root folder of the system drive. An additional extension is not added to the encrypted files.

After the computer is rebooted according to the created task, the control is granted to the Trojan boot record. It shows the text similar to the text of the CHDISK standard tool on the screen of the infected computer.

screenshot Trojan.Encoder.12544 #drweb

Meanwhile, Trojan.Encoder.12544 encrypts MFT (Master File Table). Once Trojan.Encoder.12544 completes the encryption, it displays a ransom demand on the screen.

screenshot Trojan.Encoder.12544 #drweb

Power down the computer without any delay if you see the CHDISK text on the system startup. In this case, the boot records will be damaged, but it can be repaired using the Windows recovery tool or Recovery Console if you boot the computer using the distribution disc. Normally, the recovery of the boot record is possible in Windows 7 and the later operating systems if the hidden part with the critical data backup copy is present on the drive. You can also use Dr.Web LiveDisk; create a boot disc or a boot USB, start the operating system from this boot removable media, run the Dr.Web scanner, check the infected drive, and choose the Neutralize action for the detected threats.

According to some resources, the only email address used by Trojan.Encoder.12544 cybercriminals is blocked. That’s why cybercriminals cannot communicate with their victims (for example, to offer the decryption of the files).

To avoid the infection by Trojan.Encoder.12544, Doctor Web recommends to create backup copies for all critical data on the independent removable media and use the Data loss prevention function of Dr.Web Security Space. In addition, it is recommended to install all security updates for your operating system. Meanwhile, Doctor Web specialists continue examining the Trojan.Encoder.12544 encoder.

Instruction for victims of Trojan.Encoder.12544.


          A new encryption ransomware attacking Russian and Ukrainian companies   

June 27, 2017

Information about a new outbreak of an encryption ransomware appeared. The Trojan affected oil, telecommunication and financial companies in Russia and Ukraine. Doctor Web informs users that the new encoder is detected by Dr.Web products.

According to data of our information security specialists, the Trojan is distributed independently, just as infamous WannaCry. Yet there is no precise data if it uses the same distribution mechanism. At present, our security researchers examine the new Trojan; we will give the details later on. Some mass media sources draw parallels with the ransomware Petya (in particular, Dr.Web detects it as Trojan.Ransom.369) due to the external side of the ransomware operation. However, a distribution method of the new threat is different from the standard pattern of Petya.

Today, on June 27 at 4.30 p.m., this encryption ransomware has been added to Dr.Web virus databases as Trojan.Encoder.12544.

Doctor Web advises all users to be vigilant and refrain from opening suspicious emails (this measure is required but is not fully sufficient). It is necessary to make backup copies of critically important data and to install all software security updates. Availability of an installed anti-virus is also crucial.


          Global Database Encryption Market Report 2017-2022: Analysis By Database Operational Model, Deployment Type & Database Encryption Type   
...DUBLIN , June 28, 2017 /PRNewswire/ -- Research and Markets has announced the addition of the "Global Database Encryption Market Analysis 2017 - Forecast to 2022" report to their offering. Logo The report contains up to date financial data derived from varied research sources ...


          Windows Vista: Kernel Changes - BitLocker, Code Integrity   

Originally posted on: http://geekswithblogs.net/sdorman/archive/2006/06/18/82252.aspx

BitLockerTM Drive Encryption

BitLocker allows the entire OS volume to be encrypted as well as any other volumes. In order to do this, a 1.5 GB unencrypted system volume is required.

BitLocker requires Trusted Platform Module (TPM) v1.2 or a USB device and USB-capable BIOS and is implemented as a file filter driver that sits just above the volume manager drivers.

There are several supported modes for storing the decryption key:

  • TPM locked with signature of boot files
  • TPM locked with user-specified PIN
  • external USB flash device

Code Integrity Verification

The operating system loader and the kernel now perform code signature checks. On 64-bit x64 platforms, all kernel mode code must be signed and the identity of all kernel mode binaries is verified. The system also audits events for integrity check failures.

On 32-bit platforms, the administrator is prompted to install unsigned code. Load-time checks are done on all kernel mode binaries, but if unsigned code is allowed to load you won't be able to play protected high-definition multimedia content.


          Sennheiser 505856 AVX Lavalier Set PRO   
Sennheiser 505856 AVX Lavalier Set PRO

Sennheiser 505856 AVX Lavalier Set PRO

Sennheiser 505856 AVX Lavalier Set PRO  AVX-ME2 SET-3-UK AVX-MKE2 Wireless Microphone set including MKE 2 Lavalier Microphone, Body-pack Transmitter and Plug-on Receiver The AVX-ME2 SET is the perfect digital wireless microphone for film projects. The system fully self configures and is ready to film within seconds. Its ultra compact receiver fits directly into the XLR audio input of your camera or recording device. The bodypack transmitter and lavalier microphone is ideal for hands-free interview and documentary situations. The AVX-ME2 SET includes a bodypack transmitter with lavalier microphone, the plug on receiver and all accesories to operate out of the box with camcorders as well as DSLR cameras. It features self configuring digital transmission which eliminates time-consuming radio frequency setup. The ultra compact receiver rotates around the XLR connector to avoid collision with other devices mounted on your camera. It switches on and off automatically with your camera - saving battery power. The AVX matches perfectly to your camera's input sensitivity without having to adjust the audio level on the microphone. From professional wedding video to documentaries, from street interviews to corporate videos, the AVX just works allowing you to concentrate on creativity.   Features: Very fast setup Plugs directly into XLR audio input Ultra compact receiver Switches on/off by P48 Phantom power Optimized dynamic range Auto frequency management AES 256 encryption License free Accessories included for DSLR use Metal housing Made in Germany Includes: Plug-on receiver Energy pack USB charger USB charging cable Bodypack transmitter ME 2 lavalier microphone Microphone clip Hot shoe mount Beltclip XLR to mini jack cable   Pouch  


          Sennheiser 505855 AVX Lavalier Set   
Sennheiser 505855 AVX Lavalier Set

Sennheiser 505855 AVX Lavalier Set

Sennheiser 505855 AVX Lavalier Set AVX-ME2 SET-3-UK AVX-ME2 Wireless Microphone set including ME 2 Lavalier Microphone, Body-pack Transmitter and Plug-on Receiver The AVX-ME2 SET is the perfect digital wireless microphone for film projects. The system fully self configures and is ready to film within seconds. Its ultra compact receiver fits directly into the XLR audio input of your camera or recording device. The bodypack transmitter and lavalier microphone is ideal for hands-free interview and documentary situations. The AVX-ME2 SET includes a bodypack transmitter with lavalier microphone, the plug on receiver and all accesories to operate out of the box with camcorders as well as DSLR cameras. It features self configuring digital transmission which eliminates time-consuming radio frequency setup. The ultra compact receiver rotates around the XLR connector to avoid collision with other devices mounted on your camera. It switches on and off automatically with your camera - saving battery power. The AVX matches perfectly to your camera's input sensitivity without having to adjust the audio level on the microphone. From professional wedding video to documentaries, from street interviews to corporate videos, the AVX just works allowing you to concentrate on creativity.   Features: Very fast setup Plugs directly into XLR audio input Ultra compact receiver Switches on/off by P48 Phantom power Optimized dynamic range Auto frequency management AES 256 encryption License free Accessories included for DSLR use Metal housing Made in Germany Includes: Plug-on receiver Energy pack USB charger USB charging cable Bodypack transmitter ME 2 lavalier microphone Microphone clip Hot shoe mount Beltclip XLR to mini jack cable Pouch


          Storage Efficient Substring Searchable Symmetric Encryption, by Iraklis Leontiadis and Ming Li   
We address the problem of substring searchable encryption. A single user produces a big stream of data and later on wants to learn the positions in the string that some patterns occur. Although current techniques exploit auxiliary data structures to achieve efficient substring search on the server side, the cost at the user side may be prohibitive. We revisit the work of substring searchable encryption in order to reduce the storage cost of auxiliary data structures. Our solution entails a suffix array based index design, which allows optimal storage cost $O(n)$ with small hidden factor at the size of the string $n$. We analyze the security of the protocol in the real ideal framework. Moreover, we implemented our scheme and the state of the art protocol \cite{Chase} to demonstrate the performance advantage of our solution with precise benchmark results. We improved the storage overhead of the encrypted index by a factor of $\mathbf{1.7}$ and the computation time thereof $\mathbf{4x}$ on $10^6$ character data stream.
          Sony DWZ-B70HL//CEK UK Power Supply Digital Presenter Pack   
Sony DWZ-B70HL//CEK UK Power Supply Digital Presenter Pack

Sony DWZ-B70HL//CEK UK Power Supply Digital Presenter Pack

Sony DWZ-B70HL//CEK (DWZB70HLCEK, DWZ B70HL CEK, DWZ/B70HL/CEK) UK power supply Digital Wireless headset and lavalier microphone presenter pack, 2,4GHz, 24Bit/50kHz linear PCM, includes ZRX-HR70 half rack receiver, ZTX-B02RC rechargeable Bodypack transmitter with lavalier mic and Head-Set mic, AES encryption, feedback  DWZ Series digital wireless microphone set for vocal/speech with lavalier / headset microphones Package features ZRX-HR70 digital wireless half-rack receiver, ZTX-B02RC digital wireless body-pack transmitter and uni-directional electret condenser lavalier and headset microphones The lavalier / headset set version of the DWZ digital wireless microphone system offers high quality 24-bit / 48KHz linear PCM digital transmission and is optimised for applications such as congress centres, universities, schools, community halls, hotels, board rooms and small theatres. The system is supplied with the ECM-LZ1UBMP digital wireless uni-directional electret condenser lavalier microphone and the ECM-HZ1UBMP digital wireless uni-directional electret condenser lightweight headset microphone. Superb digital sound with intelligent feedback reducer With 24-bit linear PCM digital, you get high sound quality with reliable RF transmission, utilising unique transmission technology developed by Sony.  Superb digital sound quality High-quality 24-bit linear PCM digital transmission offers pristine audio and a wide frequency range of 10 Hz to 22 kHz. Audio performance degradation that’s typical of conventional analogue wireless systems is avoided, as these packages are designed without the need for a compander. Wide Band Hopping mode This mode reduces interference to other wireless equipment used in the same environment such as WiFi. There’s no need for advanced technical knowledge about radio frequency. Wide Band Hopping mode also supports additional error correction for more secure transmission*1.    Intelligent Feedback Reducer function Up to 1024-band suppression filters are continuously tuned automatically in real time, eliminating feedback and avoiding deteriorating the original signal; this delivers the highest quality sound that can be enjoyed by presenters, vocalists and audiences. Interruptions in reception (signal dropout) can be a problem with wireless microphone transmission systems. With the DWZ Series, however, dropouts are reduced to a minimum. Utilizing a space diversity reception system, stable reception is achieved by using dual-antenna inputs / reception circuits. These receive signals over two different paths and automatically select the stronger RF signal for output. Highly secure transmission The ZTX-HR70 offers AES 128-bit standard encryption technology to secure transmitted signals and avoid being intercepted by others. Large colour LCD The ZRX-HR70 half-rack size receiver includes a large colour LCD display to provide detailed visual status of your selected channel, signal, and five-band digital equalizer, along with audio level, and transmitter battery life. Fast and easy setup With its Clear Channel Scan and Best Channel Selection features, the half-rack ZRX-HR70 detects unoccupied channels and selects the most appropriate channel automatically, for fast and easy system setup. Wired / wireless seamless operation The ZRX-HR70 is equipped with a Cable Tone Generator feature to simulate a wired tone when using wireless. There’s no need to adjust the equalizer setting on your amplifier when switching between wired and wireless. Five-band equaliser With the five-band digital equalizer in the half- rack ZRX-HR70 receiver, you’ll find it’s easy to adjust the sound character of your handheld microphone as desired. Tuner out interface Tuner output is available for tuning. The ZRX-HR70 also has a transmitter-muting selector, which provides a choice of connectors that can be muted. The ZRX-HR70 is mountable with optional RMM-HRD1 rack mount kit. Headset and lavalier microphones The DWZ-B70HL package includes two types of microphones. The ECM-HZ1UBMP is a uni-directional electret condenser lightweight headset that keeps you comfortable and stress-free even when wearing it for long periods of time. Its ear-clip-style design allows you to wear it on either your left or right ear. The ECM-LZ1UBMP is a uni-directional electret condenser lavalier microphone, ideal for commercial sound applications such as presentations, lectures and conferences. Robust metal body The ZTX-B02RCis made of strong durable metal construction that supports reliable use in rough operating conditions. Easy-to-use operation The ZTX-B02RC features a momentary switch for muting or talk-back application. The ZTX-B02RC is powered by AA batteries with a contactless rechargeable function (with optional BC-DWZ1 battery charger).  


          Sony DWZ-B70HL//EU EU Power Supply Digital Presenter Pack   
Sony DWZ-B70HL//EU EU Power Supply Digital Presenter Pack

Sony DWZ-B70HL//EU EU Power Supply Digital Presenter Pack

ensure highly secure transmission. Superb digital sound with intelligent feedback reducer With 24-bit linear PCM digital, you get high sound quality with reliable RF transmission, utilising unique transmission technology developed by Sony. Also, with support for two RF modes, your experiences can be shared over WiFi. Features: Superb digital sound quality High-quality 24-bit linear PCM digital transmission offers pristine audio and a wide frequency range of 10 Hz to 22 kHz. Two RF modes for reliable transmission The DWZ Series provides two selectable RF modes. Intelligent Feedback Reducer function The Sony Intelligent Feedback Reducer can suppress unwanted feedback (howling) with high-performance DSP and Sony’s unique algorithms designed to eliminate feedback before it becomes unbearable. Up to 1024-band suppression filters are continuously tuned automatically in real time, eliminating feedback and avoiding deteriorating the original signal; this delivers the highest quality sound that can be enjoyed by presenters, vocalists and audiences. Stable transmission Interruptions in reception (signal dropout) can be a problem with wireless microphone transmission systems. With the DWZ Series, however, dropouts are reduced to a minimum. Utilizing a space diversity reception system, stable reception is achieved by using dual-antenna inputs / reception circuits. Highly secure transmission The ZTX-HR70 offers AES 128-bit standard encryption technology to secure transmitted signals and avoid being intercepted by others. Large colour LCD The ZRX-HR70 half-rack size receiver includes a large colour LCD display to provide detailed visual status of your selected channel, signal, and five-band digital equalizer, along with audio level, and transmitter battery life. Wired / wireless seamless operation The ZRX-HR70 is equipped with a Cable Tone Generator feature to simulate a wired tone when using wireless. There’s no need to adjust the equalizer setting on your amplifier when switching between wired and wireless. Five-band equaliser With the five-band digital equalizer in the half- rack ZRX-HR70 receiver, you’ll find it’s easy to adjust the sound character of your handheld microphone as desired. Tuner out interface Tuner output is available for tuning. The ZRX-HR70 also has a transmitter-muting selector, which provides a choice of connectors that can be muted. Rack-mountable 1U half-rack size with detachable whip antenna The ZRX-HR70 is mountable with optional RMM-HRD1 rack mount kit. The ZRX-HR70 features 3-way parallel audio output, ¼Ã¢â‚¬ TS phone (x2), and balanced XLR (x1). Headset and lavalier microphones The DWZ-B70HL package includes two types of microphones. The ECM-HZ1UBMP is a uni-directional electret condenser lightweight headset that keeps you comfortable and stress-free even when wearing it for long periods of time. Its ear-clip-style design allows you to wear it on either your left or right ear. The ECM-LZ1UBMP is a uni-directional electret condenser lavalier microphone, ideal for commercial sound applications such as presentations, lectures and conferences. Robust metal body The ZTX-B02RCis made of strong durable metal. Metal construction supports reliable use in rough operating conditions. Easy-to-use operation The ZTX-B02RC features a momentary switch for muting or talk-back application.The ZTX-B02RC is powered by AA batteries with a contactless rechargeable function (with optional BC-DWZ1 battery charger).  


          Sony DWZ-M70//CEK UK Power Supply Digital Presenter Pack   
Sony DWZ-M70//CEK UK Power Supply Digital Presenter Pack

Sony DWZ-M70//CEK UK Power Supply Digital Presenter Pack

Sony DWZ-M70//CEK (DWZM70CEK, DWZ M70 CEK, DWZ/M70/CEK) UK power Supply Digital Wireless microphone presenter pack, 2,4GHz, 24Bit/48kHz linear PCM, ZRX-HR70 half rack receiver, ZTX-M02RC rechargeable Handheld transmitter with uni-directional dynamic capsule (interchangeable head mechanism), AES encryption, 5-B  DWZ Series digital wireless microphone set for vocal/speech with handheld transmitter Package features ZRX-HR70 digital wireless half-rack receiver and ZTX-M02RC digital wireless handheld transmitter The vocal/speech set version of the DWZ digital wireless microphone system offers high quality 24-bit / 48KHz linear PCM digital transmission and is optimised for applications such as congress centres, universities, schools, community halls, hotels, board rooms and small theatres. The microphone’s interchangeable capsule design supports a choice of capsules, including Sony’s CU-C31, CU-F31 and CU-F32. The system also includes AES 128-bit encryption technology to ensure highly secure transmission. Superb digital sound with intelligent feedback reducer With 24-bit linear PCM digital, you get high sound quality with reliable RF transmission, utilising unique transmission technology developed by Sony. Also, with support for two RF modes, your experiences can be shared over WiFi.  Superb digital sound quality High-quality 24-bit linear PCM digital transmission offers pristine audio and a wide frequency range of 10 Hz to 22 kHz. Audio performance degradation that’s typical of conventional analogue wireless systems is avoided, as these packages are designed without the need for a compander. Intelligent Feedback Reducer function The Sony Intelligent Feedback Reducer can suppress unwanted feedback (howling) with high-performance DSP and Sony’s unique algorithms designed to eliminate feedback before it becomes unbearable. Up to 1024-band suppression filters are continuously tuned automatically in real time, eliminating feedback and avoiding deteriorating the original signal; this delivers the highest quality sound that can be enjoyed by presenters, vocalists and audiences.  Stable transmission Interruptions in reception (signal dropout) can be a problem with wireless microphone transmission systems. With the DWZ Series, however, dropouts are reduced to a minimum. Utilizing a space diversity reception system, stable reception is achieved by using dual-antenna inputs / reception circuits. These receive signals over two different paths and automatically select the stronger RF signal for output. Highly secure transmission The ZTX-HR70 offers AES 128-bit standard encryption technology to secure transmitted signals and avoid being intercepted by others. By using this encryption feature, users can reduce the worry that confidential information could be intercepted. Large colour LCD The ZRX-HR70 half-rack size receiver includes a large colour LCD display to provide detailed visual status of your selected channel, signal, and five-band digital equalizer, along with audio level, and transmitter battery life. Fast and easy setup With its Clear Channel Scan and Best Channel Selection features, the half-rack ZRX-HR70 detects unoccupied channels and selects the most appropriate channel automatically, for fast and easy system setup. Wired / wireless seamless operation The ZRX-HR70 is equipped with a Cable Tone Generator feature to simulate a wired tone when using wireless. There’s no need to adjust the equalizer setting on your amplifier when switching between wired and wireless. Simply set the Cable Tone Generator menu on the ZRX-HR70 display to match the desired wired tone. Five-band equaliser With the five-band digital equalizer in the half- rack ZRX-HR70 receiver, you’ll find it’s easy to adjust the sound character of your handheld microphone as desired. Tuner out interface Tuner output is available for tuning. The ZRX-HR70 also has a transmitter-muting selector, which provides a choice of connectors that can be muted. Rack-mountable 1U half-rack size with detachable whip antenna The ZRX-HR70 is mountable with optional RMM-HRD1 rack mount kit. Variety of interfaces The ZRX-HR70 features 3-way parallel audio output, ¼Ã¢â‚¬ TS phone (x2), and balanced XLR (x1). Interchangeable capsule design, with a flexible choice of capsules, including CU-C31, CU-F31 and CU-F32 With the handheld transmitter, you can use the supplied high-quality dynamic cardioid microphone capsule. Alternatively, you can select any of Sony’s DWX Series capsules (the thread pitch is 1.25”/28 (31.3 mm/pitch 1.0 mm threading))*. *Use of third-party capsules may cause RFI or EMF noise. Robust metal body The ZTX-M02RC is made of strong durable metal. Metal construction supports reliable use in rough operating conditions. The ZTX-M02RC features a latch switch for power on/off for conventional operation. The ZTX-M02RC is powered by AA batteries with a contactless rechargeable function (with optional BC-DWZ1 battery charger).


          Sony DWZ-M70//EU EU Power Supply Digital Presenter Pack   
Sony DWZ-M70//EU EU Power Supply Digital Presenter Pack

Sony DWZ-M70//EU EU Power Supply Digital Presenter Pack

Sony DWZ-M70//EU (DWZM70EU, DWZ M70 EU, DWZ/M70/EU) EU power Supply Digital Wireless microphone presenter pack, 2,4GHz, 24Bit/48kHz linear PCM, ZRX-HR70 half rack receiver, ZTX-M02RC rechargeable Handheld transmitter with uni-directional dynamic capsule (interchangeable head mechanism), AES encryption, 5-B  DWZ Series digital wireless microphone set for vocal/speech with handheld transmitter Package features ZRX-HR70 digital wireless half-rack receiver and ZTX-M02RC digital wireless handheld transmitter The vocal/speech set version of the DWZ digital wireless microphone system offers high quality 24-bit / 48KHz linear PCM digital transmission and is optimised for applications such as congress centres, universities, schools, community halls, hotels, board rooms and small theatres. The microphone’s interchangeable capsule design supports a choice of capsules, including Sony’s CU-C31, CU-F31 and CU-F32. The system also includes AES 128-bit encryption technology to ensure highly secure transmission. Superb digital sound with intelligent feedback reducer With 24-bit linear PCM digital, you get high sound quality with reliable RF transmission, utilising unique transmission technology developed by Sony. Also, with support for two RF modes, your experiences can be shared over WiFi. Superb digital sound quality High-quality 24-bit linear PCM digital transmission offers pristine audio and a wide frequency range of 10 Hz to 22 kHz. Audio performance degradation that’s typical of conventional analogue wireless systems is avoided, as these packages are designed without the need for a compander. Two RF modes for reliable transmission The DWZ Series provides two selectable RF modes. Simply choose the one that makes best use of your actual 2.4 GHz RF environment: Intelligent Feedback Reducer function The Sony Intelligent Feedback Reducer can suppress unwanted feedback (howling) with high-performance DSP and Sony’s unique algorithms designed to eliminate feedback before it becomes unbearable. Up to 1024-band suppression filters are continuously tuned automatically in real time, eliminating feedback and avoiding deteriorating the original signal; this delivers the highest quality sound that can be enjoyed by presenters, vocalists and audiences. Stable transmission Interruptions in reception (signal dropout) can be a problem with wireless microphone transmission systems. With the DWZ Series, however, dropouts are reduced to a minimum. Utilizing a space diversity reception system, stable reception is achieved by using dual-antenna inputs / reception circuits. These receive signals over two different paths and automatically select the stronger RF signal for output. Highly secure transmission The ZTX-HR70 offers AES 128-bit standard encryption technology to secure transmitted signals and avoid being intercepted by others. By using this encryption feature, users can reduce the worry that confidential information could be intercepted. Large colour LCD The ZRX-HR70 half-rack size receiver includes a large colour LCD display to provide detailed visual status of your selected channel, signal, and five-band digital equalizer, along with audio level, and transmitter battery life. Fast and easy setup With its Clear Channel Scan and Best Channel Selection features, the half-rack ZRX-HR70 detects unoccupied channels and selects the most appropriate channel automatically, for fast and easy system setup. Wired / wireless seamless operation The ZRX-HR70 is equipped with a Cable Tone Generator feature to simulate a wired tone when using wireless. There’s no need to adjust the equalizer setting on your amplifier when switching between wired and wireless. Simply set the Cable Tone Generator menu on the ZRX-HR70 display to match the desired wired tone. Five-band equaliser With the five-band digital equalizer in the half- rack ZRX-HR70 receiver, you’ll find it’s easy to adjust the sound character of your handheld microphone as desired. Tuner out interface Tuner output is available for tuning. The ZRX-HR70 also has a transmitter-muting selector, which provides a choice of connectors that can be muted. Rack-mountable 1U half-rack size with detachable whip antenna The ZRX-HR70 is mountable with optional RMM-HRD1 rack mount kit. The ZTX-M02RC is made of strong durable metal. Metal construction supports reliable use in rough operating conditions. The ZTX-M02RC features a latch switch for power on/off for conventional operation. The ZTX-M02RC is powered by AA batteries with a contactless rechargeable function (with optional BC-DWZ1 battery charger).


          Sony ZTX-M02RC digital wireless handheld microphone   
Sony ZTX-M02RC digital wireless handheld microphone

Sony ZTX-M02RC digital wireless handheld microphone

Sony ZTX-M02RC Digital Wireless Handheld Microphone, 2,4GHz, 24Bit/50kHz linear PCM used in DWZ Series  DWZ Series digital wireless handheld transmitter All-metal handheld microphone The ZTX-M02RC is Sony’s original high-quality handheld microphone supplied with the DWZ-M70 2.4GHz digital wireless microphone set for vocal/speech. The interchangeable capsule design supports a choice of capsules, including Sony’s CU-C31, CU-F31 and CU-F32. The system also includes AES 128-bit encryption technology to ensure highly secure transmission. FEATURES: Highly secure transmission The ZTXM02RC offers AES 128-bit standard encryption technology to secure transmitted signals and avoid being intercepted by others. By using this encryption feature, users can reduce the worry that confidential information could be intercepted. Interchangeable capsule design, with a flexible choice of capsules, including CU-C31, CU-F31 and CU-F32 With the handheld transmitter, you can use the supplied high-quality dynamic cardioid microphone capsule. Alternatively, you can select any of Sony’s DWX Series capsules (the thread pitch is 1.25”/28 (31.3 mm/pitch 1.0 mm threading))*. *Use of third-party capsules may cause RFI or EMF noise. Robust metal body The ZTX M02RC is made of strong durable metal. Metal construction supports reliable use in rough operating conditions. Easy-to-use operation The ZTX/M02RC features a latch switch for power on/off for conventional operation. Two AA battery operation and contactless rechargeable function The ZTX-M02RC is powered by AA batteries with a contactless rechargeable function (with optional BC-DWZ1 battery charger).


          Safe Computing   

Why Should I Keep My Computer Secure?

The purpose of many security threats today is to allow a hacker to gain access to your computer. The hacker can then:

  • Gather your personal and business information such as passwords for accessing your bank account on-line, credit card details (when you enter them into a web page), business accounts, etc.
  • Use your Internet connection to spread spam.
  • Use your computer for other malicious purposes.

Many computers today have been compromised in this way and their owners are not even aware of it. The problem is so widespread that hackers, aided by the proliferation of Broadband, even hire out "networks" of compromised computers for relaying spam!
 

How Can I Tell If My Computer Has Been Infected?

If you have an Internet Security program suite, such as Norton Internet Security installed on your computer, you should make sure that it is working and up-to-date. Have the program scan your computer for viruses and spyware on a scheduled basis. If you have separate anti-virus and anti-spyware software you should do the same with both these programs.

If you don’t have any up-to-date, working security software installed on your computer but you do have Internet access, you can use an on-line virus scanner. You can try the on-line scanner provided by Symantec (the makers of Norton software) by going to securityresponse.symantec.com/avcenter/ and clicking the Check For Security Risks link. You may also try using Trend Micro's Housecall located at: http://housecall.trendmicro.com/

If you don’t have any up-to-date, working security software and you don’t have reliable Internet access, one or more of these symptoms may indicate that your computer has been infected or compromised:

  • Your computer generates one or more errors when it starts up.
  • Your computer is very sluggish.
  • You can’t update your security software or access certain web sites.
  • Your Internet connection is very active when you are not doing anything on the Internet.
  • Strange pictures have appeared on your computer desktop.
  • When you are browsing the Internet you are continually directed to pages you have not chosen to go to.
  • You experience a large amount of pop ups.

In our experience, around 75% of computer problems are caused by virus infections or other computer security issues.

What Should I Do If I Think My Computer Has Been Infected?

If you think your computer may have been infected or compromised, or if you try to remove viruses or other threats from your computer but it is continually getting re-infected:

  • Do not use your computer to access bank accounts on-line, to buy anything on-line or to access any on-line accounts that contain your bank account details, credit card details, or any other personal information.
  • Disconnect your computer from the Internet or network.
  • Shut your computer down.
  • Seek professional help (you can contact us for advice).

Basic Computer Security Advice

There are 3 basic steps to keeping your computer safe:

  • Install an Internet Security program suite, e.g. Norton Internet Security, that contains anti-virus, Spyware and firewall protection. (See our Useful Links page for details of where to buy Internet Security suites.)
  • Check for updates for your Internet Security suite every day before you surf the Internet or download email. (To see how to do this view our tutorial.)
  • Check for Microsoft Windows critical updates manually if you have turned off Windows Automatic Updates or if you don’t have broadband. (To check for Windows updates open Internet Explorer, click the Tools menu and then click Windows Update.) You should do this manual check at least once a month.

General Tips

  • Use your anti-virus software to scan your computer for viruses weekly. Most anti-virus software will allow you to schedule weekly scans that will run automatically. (If your computer misses its weekly scan, do a manual scan yourself as soon as possible thereafter.)
  • If you have separate spyware and adware protection software scan weekly with these programs as well.
  • Take regular backups of your important files. As a general rule of thumb, the more important the information is and the more frequently it changes or is added to, the more frequent should be the backups.
  • Never use a computer to access any web site that has your credit card or bank account details unless you know for sure that the computer you intend to use is completely virus free.
  • Regularly review your credit card and bank statements.

Email

  • Never open any email attachment unless you are expecting it and you know what it contains. If you are unsure, contact the sender by e-mail, text, phone or some other method to confirm that what they sent was not a virus.
  • Never click on a link in an email message unless you are expecting it and you are 100% sure of its authenticity. If you are unsure, contact the sender by e-mail, text, phone or some other method to confirm that they sent it to you. Clicking on a link to a web site, amusing video clip, etc can install a Trojan Horse on your computer.
  • Never run any program that is emailed to you, no matter who has sent it to you. "Free" screen savers and games are used to infect computers with viruses, Trojan Horses, Spyware, etc. These screen savers and games can work perfectly well and the infection that they carry may not become obvious for months.

Beware of email scams and hoaxes - they come in many forms but you should never respond to any of them. Some pretend to be from your bank or other organization and ask you to click on the link in the email and re-enter your account information, including your PIN or credit card details. Clicking the link takes you to a web site that will look like your bank or other organizations web site but is designed to capture your account details. These details are then used to empty your bank account or charge items to your credit card.

Other hoaxes purport to be from Microsoft and request that you click a link in the email to update your security protection. When the link is clicked a Trojan Horse is downloaded on to your computer and installs itself. Remember, reputable organizations like banks, Internet service providers, Ebay, etc who hold details of your bank account or credit card will never email you to ask you to re-enter your account details. Microsoft also never send emails about security updates.

Instant Messaging

  • Be careful downloading files in Instant Messaging (IM) programs such as MSN Messenger and Yahoo! Messenger. Never open, accept, or download a file in IM from someone you don’t know. If the file comes from someone you do know, don’t open it unless you know what the file is and you were expecting it. Contact the sender by e-mail, text, phone or some other method to confirm that what they sent was not a virus.
  • Block messages from anyone not already in your contact/buddy list to prevent spim, the IM equivalent of spam, which is increasingly being used to propagate phishing scams.
  • Never click on a link in IM unless you are expecting it and you are 100% sure of its authenticity. If you are unsure, contact the sender by e-mail, text, phone or some other method to confirm that they sent it to you. Clicking on a link to a web site, amusing video clip, etc can install a Trojan Horse on your computer.
  • Links in away messages can be used by IM worms so it is advisable not to click them.
  • Make sure that you use the most up-to-date version of your IM program so that your computer is better protected.

Internet

  • Be suspicious of every web site that isn’t well known to you. Does the web site address or web site name seem suspicious? Does the site look right? Does it feel right? Things to look out for include predominantly black or very dark colored web sites, text styles that don’t seem right, information that seems to serve no particular purpose or that doesn’t tie in with the purpose of the site, and so on. If you feel at all uneasy about a web site, leave it immediately by clicking the Back button on your web browser or by closing your web browser.
  • Don’t click on any link that you feel uneasy about or that seems to have no plausible purpose.
  • If you are asked to download and install any Applet, ActiveX Control or anything else, don’t do it! Click the Cancel button or go to another web page immediately.

The 3 Internet related activities that are almost guaranteed to get your computer infected are music downloading, file sharing, and playing on-line games. Here are our tips:

Music Downloading and File Sharing – Use well known sites such as iTunes, MSN Music, etc for your music downloads. Don’t download any music software or player that is not from a well-known company. If you see a site advertising unlimited free music beware! The only way to get an unlimited supply of free music is to file share and every computer we have examined that has been used for file sharing has been so riddled with viruses, Trojan Horses, etc that it has greatly degraded the performance of the machine.

On-Line Games – We have seen a lot of cases of computers that have been infected by downloading and installing ActiveX Controls, Java Applets or other software for playing on-line games. We therefore urge extreme caution when downloading anything to play on-line games. Is it worth the risk?

Mobile Devices (including Mobile Telephones, Smartphones and PDAs)

Currently, smartphones using the Symbian operating environment and PDAs with the Windows CE or Palm operating systems are the main targets for these viruses. They spread by messages sent via Bluetooth or MMS, within programs and games downloaded via MMS or from the Internet, and by infected emails.

Don’t make the mistake of ignoring the existence of these viruses and forgetting about basic security guidelines. They can cause significant damage and inconvenience, e.g. one virus, called Commwarrior, can run up your telephone bill as it attempts to spread by MMS.

Preventative measures that can be taken include:

  • Don’t open suspicious or unsolicited messages.
  • Only download programs and games from the official websites.
  • Use anti-virus software that has been specifically designed for mobile phones or PDAs.
  • Review the Bluetooth section below for Bluetooth security measures.

Bluetooth

  • Consider disabling Bluetooth if you don’t use it.
  • Turn off your Bluetooth enabled device when it is not with you. Thieves are now using Bluetooth technology to scan parked cars for mobile phones, laptops, etc.
  • Consider setting your Bluetooth device to undiscoverable mode which will still allow you to keep your headset connection while not broadcasting your presence. This helps protect against virus transmission and will also protect you from Bluesnarfing.

Wireless Networking

Security problems can arise with wireless enabled devices when they are configured to seek out and connect automatically to any wireless base station, leaving them open to attack and infection.

To help secure a wireless enabled device:

  • Consider disabling your wireless card if you don’t use it.
  • Ensure that your wireless card is not configured to seek out and connect automatically to unknown wireless base stations.

Security problems can also arise when home or small business wireless networks are installed but not secured. If the precautions listed below are not taken, anyone with a wireless device within range of an unsecured wireless base station or wireless Router could connect to the wireless base station/Router and access the other computers connected to it, use the Broadband Internet bandwidth and even re-configure the wireless base station/Router. Additionally, if wireless network traffic is not encrypted the base station/Router can be subject to eavesdropping.

To help secure a wireless base station or Router:

Change the manufacturer’s standard login information and Wireless Network Name (SSID). Set up a Wireless Access List restricting the list of computers able to connect to the network to your own computers. Encrypt the network traffic with at least WEP (Wired Equivalent Privacy) encryption and preferably WPA-PSK (Wi-Fi Protected Access Pre-Shared Key) encryption to ensure a better level of protection.

Hard Drive Disposal

In its 14th August 2006 episode the BBC's Real Story highlighted the fact that the bank account details of thousands of Britons are being sold in Africa for less than $20. Old computers taken to local council waste disposal sites are often sent to Africa where the hard drive can be removed and sold. The people who purchase these hard drives can then access the information on them, even if they have been wiped.

Real Story bought 17 hard drives from Nigeria at $15 each and, using a computer expert, found the owners' addresses, bank account numbers, sort codes, passwords and other highly confidential information.

To dispose of your old computer hard drive securely you can use one of these alternative methods:

  • Use commercial erasing software to completely erase your hard drive. The best hard drive erasing software is based on Peter Gutmann's algorithm and/or the U.S. DoD's method.
  • Pay a computer professional to securely erase your hard drive.
  • Sign-up for a recycling service run by your hard drive or PC manufacturer.
Description: 
A learning tool with information and advice
Audience: 

          Science Fiction Monopoly   

This week:

Gotham City Impostors
Encryption Is Not A Defense
Downloading Physical Items
iBooks

Continue the discussion in our forums!
Music for the show provided by Reed Love.


          Enigma: Why the Fight to Break Nazi Encryption Still Matters   

It was night when three British sailors and a 16-year-old canteen assistant boarded a sinking U-boat off the coast of Egypt.


          Cryptomator   

Cryptomator is a great client-side encryption that comes without any costs and many super features. You don’t need registration, money or knowledge, you can just

The post Cryptomator appeared first on AlternativePedia.


          Initial Public Release of Rilke CMS 0.8!   

I am happy to announce the initial public (open source) release of Rilke CMS 0.8!

Rilke CMS is a PHP / MySQL based content management system. It can be used to publish a variety of different websites, including personal and collaborative weblogs. While many open source content management systems are difficult for the average non-geek to use, this one strives to be easily usable by anyone who has used a word processor.

A live demo is available at:
http://www.rilkecms.com/rilkecms/

The sourceforge page is available at:
http://rilkecms.sourceforge.net

It features:

* An easy to use WYSIWYG publishing screen. Anyone who has used a word processor before will be able to use Rilke CMS
* Easy look-and-feel adaptability, due its reliance on CSS based layouts
* A PHP-MySQL based core, made available under the PHP license
* Integrated commenting system
* Encryption of visitor submitted email addresses (in comments) to prevent their harvesting by SPAMbots
* Approval system for visitor submitted posts
* Easy editing and/or deactivation of posts and comments
* Easy organization of posts through categories
* Easy syndication through XML based RSS feeds
* Extended funtionality through plugins

A request for help:
If you fit any of the following profiles, the Rilke CMS project could use your help:

* Programmer : PHP / MySQL / JavaScript
* Designer: HTML / CSS
* Graphic Designer: Adobe Photoshop / Gimp / Flash
* Documentor: Technical Writing Skills (and familiarity with content management systems)

Please contact Jay Sheth (jayeshsh [at] ceruleansky.com ] if you are interested in helping out with Rilke CMS, or if you have suggestions for its improvement.


          Starting iPhone Development – What you should know…   

Where to start

  1. What is iPhone? How it is different from other devices and what is the hype all about
  2. How iPhone works – OS architecture, Hardware specs, capabilities and limitations
  3. Different variants of iPhone and the differences among them (3G, 3GS, iOS4).
  4. iPad, similarities and differences from iPhone
  5. What is MAC? Brief introduction to MAC.
  6. What is COCOA ?

Preparing for Development

1.       Brief Introduction to OOPs concepts.
2.       iPhone/iPad (iOS) development platform.
3.       Why objective C? Why not using standard C or C++?
a)      What is the difference between objective C and standard C
b)      ? Why Apple introduced the new programming language?
c)       Why it is required?
4.       Brief introduction to xCode.
5.       UI controls in iPhone
a)      Functional aspects of different controls
b)      What control should be used in which scenario
c)       Differences and similarities
d)      Customization possibilities for various controls
e)      How to change appearance of different controls
6.       Binding controls with methods.
7.       Events of  UI controls.
8.       Data type conversion/ type casting, for example, string to date, string to numbers and others and vice versa.
9.       Memory allocation, deallocation, instances, memory leakage and how to avoid that?
10.   Difference types of application for Ex- view based, navigation based and what is the difference between these.
11.   Difference methods of show, add the next view.
12.   Starting the development for iphone.
13.    Show hide keyboard, pickers etc.
14.   Animations, view animations

Advance programming

1.       Storage
a)      Database
b)      Preferences
2.       What is GPS? How it works?
3.       GPRS/EDGE/3G/WiFi  – Brief introduction and how to use these connections
4.       Graphics, custom control drawing.
5.       Encryption/Decryption
6.       Push notification
a)      Concept
b)      How it works and why it is so important
c)       Third party services to implement push notifications
7.       Identifier to install iphone application
8.       What is provisioning profile and where it is used? Various types of provisioning profiles. Creating provisioning profile and so on
9.       Installing application in device and how to create a build for distribution
10.   Sign iOS application
11.   Creating an IPA for iphone.
12.   HIG (Human interface guidelines), significance of HIG and how to make best use of these.

Others

1.       What is Web service ? Different type of web services like (SOAP, REST, JSON)
2.       Parsing XML, JSON
3.       Integration with Face book, Twitter and various other third party services like Picassa, Yahoo API and so on
4.       Getting familiar with iTunes and app store



          idoo USB Encryption - Update   
password protect external hard drive software lock private documents on usb stick encryption security area -- idoo usb encryption software, creat password protect external hard drive
          idoo cd dvd data encryption - Update   
idoo Secute Disc Creator, your can burn password-protected and encrypted discs. It supports most of CD DVD, if you have a recorder and you want to burn an portable encrypted disc.
          idoo File Encryption Pro - Update   
idoo file encryption pro is the best folder security software, useful folder security tool can help you quickly and safely lock and hide folder ,keep your docments safe by password protect
          Secure call and SMS - Update   
Secure Call and SMS application is advanced Voice and SMS encryption solution meant for Law Enforcement, related agencies and people to wish to secure their communications using a Mobile Phone with software only.
          'BradCast' 11/23/2015 (LA Governor's election; Trevor Timm on encryption 'debate' post-Paris attacks; GOP delusion)   
Independent investigative journalism, broadcasting, trouble-making and muckraking with Brad Friedman of BradBlog.com
          Hide My IP 6.0.501 Full Key Free Download   
Hide.My_.IP_.6.0.501.Full_.4realtorrentz.png
Hide My IP 6.0.501 Full Key Free Download

Conceal your online identity with the click of a button. Surf anonymously, encrypt your Internet traffic, hide your IP while surfing the Internet, using forums, sending E-mails, instant messaging, playing games, and more. Compatible with all web browsers and Internet applications.
Hiding your IP address is as simple as clicking the "Hide My IP" button, which automatically configures your web browser or other application to use a proxy server from our private proxy network. Change your IP address automatically every few minutes and cloak your browser's User Agent and Referrer headers. Unblock sites like Netflix, Pandora, BBC, and Hulu based on your IP location. Select from hundreds of our secure private network IPs from all over the world.

Hide My IP 6.0 support 256-bit SSL total traffic encryption for the most secure Internet usage. Select from thousand of fast IPs based in the United States, Canada, the United Kingdom, Europe, Australia, and Asia. Supports browsers such as Internet Explorer, Firefox, Google Chrome, Opera, Safari, Netscape, and applications including Windows Mail, Skype, Windows Messenger, ICQ, and over 1000 other programs! Download the free trial of Hide My IP now and protect your right to online privacy.

Key Benefits and Features:

- Anonymous Web Surfing
- Protect Your Identity
- Encrypt Your Internet Connection
- Prevent the Government from Spying on You
- Send Anonymous E-mails

What's new in this version:

- Version 6.0: More IP locations in 20 countries, faster IP search times, SSL encryption for all websites and Internet traffic, encrypted API, improved interface, expanded OS compatibility.

4realtorrentz.com-2016-09-15-13-51-42-143.jpg

Instructions:

1. Unpack and install
2. Use given license to register
3. Done.


Download

Hide My IP 6.0.501 Full  |  Mirror 1  |  Mirror 2  (5.1 MB)








Hide My IP, Hide My IP crack, Hide My IP patch, Hide My IP keygen, Hide My IP serial keys, Hide My IP free full download, Hide My IP patched, Hide My IP activated, Hide My IP pro setup, Hide My IP full download, Hide My IP activated, Hide My IP keys, Hide My IP serials, Hide My IP  registration keys, Hide My IP full version setup, Hide My IP full setup, Hide My IP activator, Hide My IP product keys, Hide My IP preactivated, Hide My IP activated, Hide My IP cracked, Hide My IP patched, Hide My IP precracked, Hide My IP pin, Hide My IP codes, Hide My IP full, Hide My IP premium, Hide My IP pro, Hide My IP free download, Hide My IP free, New, Latest, Latest Crack, New Patch, Working Serial Keys, serial key new, applicationname full version with crack, Hide My IP full version with crack, Hide My IP full version, Hide My IP full version crack, Hide My IP full version patch, Hide My IP full version serial keys, Hide My IP preactivated, activator, Hide My IP activator, 2014, trick, best trick, tweak , latest crack of Hide My IP, patch for Hide My IP, crack for Hide My IP, serial keys for Hide My IP, cracks, new version crack for Hide My IP, keygen for Hide My IP, new keygen, Hide My IP full version with crack and keygen, Hide My IP with keygen, Hide My IP with crack, Hide My IP with serial keys, registered, registered Hide My IP, Hide My IP registered, new Hide My IP registered, latest Hide My IP registered, reg keys for Hide My IP, Hide My IP reg keys, Hide My IP registeration keys, full version free, full free, free full version of Hide My IP, Hide My IP full version free, Hide My IP premium, pro, Hide My IP professional, Hide My IP 6.0.501, Hide My IP 6.0.501 crack, Hide My IP 6.0.501 patch, Hide My IP 6.0.501 keygen, Hide My IP 6.0.501 serial keys, Hide My IP 6.0.501 free full download, Hide My IP 6.0.501 patched, Hide My IP 6.0.501 activated, Hide My IP 6.0.501 pro setup, Hide My IP 6.0.501 full download, Hide My IP 6.0.501 activated, Hide My IP 6.0.501 keys, Hide My IP 6.0.501 serials, Hide My IP 6.0.501  registration keys, Hide My IP 6.0.501 full version setup, Hide My IP 6.0.501 full setup, Hide My IP 6.0.501 activator


          Storing User Passwords Securely: hashing, salting, and Bcrypt   

In this article, I'll explain the theory for how to store user passwords securely, as well as some example code in Python using a Bcrypt library.

Bad Solution #1: plain text password

It would be very insecure to store each user's "plain text" password in your database:
user account plain text password
john@hotmail.com password
betty@gmail.com password123
......

This is insecure because if a hacker gains access to your database, they'll be able to use that password to login as that user on your system. Or even worse, if that user uses the same password for other sites on the internet, the hacker can now login there as well. Your users will be very unhappy.

(Oh, and if you think no one would ever store passwords this way, Sony did just this in 2011.)

Bad Solution #2: sha1(password)

A better solution is to store a "one-way hash" of the password, typically using a function like md5() or sha1():
user account sha1(password)
john@hotmail.com 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8
betty@gmail.com cbfdac6008f9cab4083784cbd1874f76618d2a97
......
Even though the server doesn't store the plain text password anywhere, it can still authenticate the user:
{% filter force_escape %}def is_password_correct(user, password_attempt):
    return sha1(password_attempt) == user["sha1_password"]
{% endfilter %}

This solution is more secure than storing the plain text password, because in theory it should be impossible to "undo" a one-way hash function and find an input string that outputs the same hash value. Unfortunately, hackers have found ways around this.

One problem is that many hash functions (including md5() and sha1()) aren't so "one-way" afterall, and security experts suggest that these functions not be used anymore for security applications. (Instead, you should use better hash functions like sha256() which don't have any known vulnerabilities so far.)

But there's a bigger problem: hackers don't need to "undo" the hash function at all; they can just keep guessing input passwords until they find a match. This is similar to trying all the combinations of a combination lock. Here's what the code would look like:

{% filter force_escape %}database_table = {
  "5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8": "john@hotmail.com",
  "cbfdac6008f9cab4083784cbd1874f76618d2a97": "betty@gmail.com",
  ...}

for password in LIST_OF_COMMON_PASSWORDS:
    if sha1(password) in database_table:
        print "Hacker wins! I guessed a password!"
{% endfilter %}

You might think that there are too many possible passwords for this technique to be feasible. But there are far fewer common passwords than you'd think. Most people use passwords that are based on dictionary words (possibly with a few extra numbers or letters thrown in). And most hash functions like sha1() can be executed very quickly -- one computer can literally try billions of combinations each second. That means most passwords can be figured out in under 1 cpu-hour. Programs like John The Ripper are able to do just this.

Aside: years ago, computers weren't this fast, so the hacker community created rainbow tables that have pre-computed a large set of these hashes ahead of time. Today, nobody uses rainbow tables anymore because computers are fast enough without them.

So the bad news is that any user with a simple password like "password" or "password123" or any of the billion most-likely passwords will have their password guessed. If you have an extremely complicated password (over 16 random numbers and letters) you were probably safe.

Also notice that the code above is effectively attacking all of the passwords at the same time. It doesn't matter if there are 10 users in your database, or 10 million, it doesn't take the hacker any longer to guess a matching password. All that matters is how fast the hacker can iterate through potential passwords. (And in fact, having lots of users actually helps the hacker, because it's more likely that someone in the system was using the password "password123".)

sha1(password) is what LinkedIn used to store its passwords. And in 2012, a large set of those password hashes were leaked. Over time, hackers were able to figure out the plain text password to most of these hashes.

Summary: storing a simple hash (with no salt) is not secure -- if a hacker gains access to your database, they'll be able to figure out the majority of the passwords of the users.

Bad Solution #3: sha1(FIXED_SALT + password)

One attempt to make things more secure is to "salt" the password before hashing it:
user account sha1("salt123456789" + password)
john@hotmail.com b467b644150eb350bbc1c8b44b21b08af99268aa
betty@gmail.com 31aa70fd38fee6f1f8b3142942ba9613920dfea0
......

The salt is supposed to be a long random string of bytes. If the hacker gains access to these new password hashes (but not the salt), it will make it much more difficult for the hacker to guess the passwords because they would also need to know the salt. However, if the hacker has broken into your server, they probably also have access to your source code as well, so they'll learn the salt too. That's why security designers just assume the worst, and don't rely on the salt being secret.

But even if the salt is not a secret, it still makes it harder to use those old-school rainbow tables I mentioned before. (Those rainbow tables are built assuming there is no salt, so salted hashes stop them.) However, since no-one uses rainbow tables anymore, adding a fixed salt doesn't help much. The hacker can still execute the same basic for-loop from above:

{% filter force_escape %}for password in LIST_OF_COMMON_PASSWORDS:
    if sha1(SALT + password) in database_table:
        print "Hacker wins! I guessed a password!", password
{% endfilter %}
Summary: adding a fixed salt still isn't secure enough.

Bad Solution #4: sha1(PER_USER_SALT + password)

The next step up in security is to create a new column in the database and store a different salt for each user. The salt is randomly created when the user account is first created (or when the user changes their password).
user account salt sha1(salt + password)
john@hotmail.com 2dc7fcc... 1a74404cb136dd60041dbf694e5c2ec0e7d15b42
betty@gmail.com afadb2f... e33ab75f29a9cf3f70d3fd14a7f47cd752e9c550
.........
Authenticating the user isn't much harder than before:
{% filter force_escape %}def is_password_correct(user, password_attempt):
    return sha1(user["salt"] + password_attempt) == user["password_hash"]
{% endfilter %}
By having a per-user-salt, we get one huge benefit: the hacker can't attack all of your user's passwords at the same time. Instead, his attack code has to try each user one by one:
{% filter force_escape %}for user in users:
    PER_USER_SALT = user["salt"]

    for password in LIST_OF_COMMON_PASSWORDS:
        if sha1(PER_USER_SALT + password) in database_table:
            print "Hacker wins! I guessed a password!", password
{% endfilter %}

So basically, if you have 1 million users, having a per-user-salt makes it 1 million times harder to figure out the passwords of all your users. But this still isn't impossible for a hacker to do. Instead of 1 cpu-hour, now they need 1 million cpu-hours, which can easily be rented from Amazon for about $40,000.

The real problem with all the systems we've discussed so far is that hash functions like sha1() (or even sha256()) can be executed on passwords at a rate of 100M+/second (or even faster, by using the GPU). Even though these hash functions were designed with security in mind, they were also designed so they would be fast when executed on longer inputs like entire files. Bottom line: these hash functions were not designed to be used for password storage.

Good Solution: bcrypt(password)

Instead, there are a set of hash functions that were specifically designed for passwords. In addition to being secure "one-way" hash functions, they were also designed to be slow.

One example is Bcrypt. bcrypt() takes about 100ms to compute, which is about 10,000x slower than sha1(). 100ms is fast enough that the user won't notice when they log in, but slow enough that it becomes less feasible to execute against a long list of likely passwords. For instance, if a hacker wants to compute bcrypt() against a list of a billion likely passwords, it will take about 30,000 cpu-hours (about $1200) -- and that's for a single password. Certainly not impossible, but way more work than most hackers are willing to do.

If you're wondering how Bcrypt works, here's the paper. Basically the "trick" is that it executes an internal encryption/hash function many times in a loop. (There are other alternatives to Bcrypt, such as PBKDF2 that use the same trick.)

Also, Bcrypt is configurable, with a log_rounds parameter that tells it how many times to execute that internal hash function. If all of a sudden, Intel comes out with a new computer that is 1000 times faster than the state of the art today, you can reconfigure your system to use a log_rounds that is 10 more than before (log_rounds is logarithmic), which will cancel out the 1000x faster computer.

Because bcrypt() is so slow, it makes the idea of rainbow tables attractive again, so a per-user-salt is built into the Bcrypt system. In fact, libraries like bcrypt on pypi store the salt in the same string as the password hash, so you won't even have to create a separate database column for the salt.

Let's see the code in action. First, let's install it:

{% filter force_escape %}sudo apt-get install libffi-dev libssl-dev
sudo pip install bcrypt
python -c "import bcrypt"   # did it work?
{% endfilter %}
Now that it's installed, here's the Python code you'd run when creating a new user account (or resetting their password):
{% filter force_escape %}from bcrypt import hashpw, gensalt
hashed = hashpw(plaintext_password, gensalt())
print hashed    # save this value to the database for this user
'$2a$12$8vxYfAWCXe0Hm4gNX8nzwuqWNukOkcMJ1a9G2tD71ipotEZ9f80Vu'
{% endfilter %}

Let's dissect that output string a little:

As you can see, it stores both the salt, and the hashed output in the string. It also stores the log_rounds parameter that was used to generate the password, which controls how much work (i.e. how slow) it is to compute. If you want the hash to be slower, you pass a larger value to gensalt():

{% filter force_escape %}hashed = hashpw(plaintext_password, gensalt(log_rounds=13))
print hashed
'$2a$13$ZyprE5MRw2Q3WpNOGZWGbeG7ADUre1Q8QO.uUUtcbqloU0yvzavOm'
{% endfilter %}

Notice that there is now a 13 where there was a 12 before. In any case, you store this string in the database, and when that same user attempts to log in, you retrieve that same hashed value and do this:

{% filter force_escape %}if hashpw(password_attempt, hashed) == hashed:
    print "It matches"
else:
    print "It does not match"
{% endfilter %}

You might be wondering why you pass in hashed as the salt argument to hashpw(). The reason this works is that the hashpw() function is smart, and can extract the salt from that $2a$12$... string. This is great, because it means you never have to store, parse, or handle any salt values yourself -- the only value you need to deal with is that single hashed string which contains everything you need.

Final Thoughts: choosing a good password

If your user has the password "password", then no amount of hashing/salting/bcrypt/etc. is going to protect that user. The hacker will always try simpler passwords first, so if your password is toward the top of the list of likely passwords, the hacker will probably guess it.

The best way to prevent your password from being guessed is to create a password that is as far down the list of likely passwords as possible. Any password based on a dictionary word (even if it has simple mutations like a letter/number at the end) is going to be on the list of the first few million password guesses.

Unfortunately, difficult-to-guess passwords are also difficult-to-remember. If that wasn't an issue, I would suggest picking a password that is a 16-character random sequence of numbers and letters. Other people have suggested using passphrases instead, like "billy was a turtle for halloween". If your system allows long passwords with spaces, then this is definitely better than a password like "billy123". (But I actually suspect the entropy of most user's pass phrases will end up being about the same as a password of 8 random alphanumeric characters.)


          Identity Management Security Consultant (Job #6409)   
The individual will be responsible for assisting the Federal Lead Information Systems Security Officer (ISSO) on a variety of tasks, projects, and initiatives. A well-qualified security professional will have minimum 2-3 years of hands-on experience administering, designing, and/or implementing Oracle?s Identity, Credential and Access management (ICAM) product or equivalent identity management product. As a PAISSO, the candidate will be responsible for overseeing end-to-end architecture, design, and implementation of ICAM and identity lifecycle. The candidate will also perform all tasks related to perform the Certification and Accreditation and assuring that the system is compliant with all required security controls. It is very important for this position to understand end-to-end architecture, design, and implementation of ICAM or equivalent identity product.

Key Responsibilities:

Oversee Customer?s ICAM implementation into the enterprise
Perform all tasks related to Certification and Accreditation of ICAM implementation
Coordinates all monthly scans with the SOC and others
Review monthly vulnerability scan reports and track weaknesses in POAMs as needed
Work with C3E admins to resolve weaknesses such as configurations, patches, etc.
Work closely with customers regarding the closure and / or transfer of POAMs / vulnerabilities
Review System Configurations to ensure they are in accordance with DHS hardening guidelines
Receive and approve access requests to ensure user privileges are commensurate with required duties
Develops and maintains security authorization documentation (e.g. Security Plan, Contingency Plan, Configuration management Plan, Encryption Plan, Incident Response Plan, Waivers / Exceptions, Policies and procedures Manual etc..)
Review System Configurations to ensure they are in accordance with DHS hardening guidelines
Review all proposed change requests related to system design / configuration and perform security impact analysis

Job Qualifications

Review all proposed change requests related to system design / configuration and perform security impact analysis
Minimum 3-5 years specific experience with information assurance, information security policies/procedures/standards, and compliance assessment
Must demonstrate solid technical understanding of Identity Management
5-7 years of Oracle Linux, Redhat Linux, and Oracle Cloud Technologies experience a plus
2-3 years of architecture, design, implementation and/or administration of Oracle ICAM suite or equivalent identity product experience highly desired
Experience reviewing vulnerability scans such as Nessus and AppDetective
Ability to communicate effectively, both written and oral, with senior officials and also with both technical and non-technical audiences
Ability to organize and plan effectively, prioritize taskings with management, and use time effectively
Must possess excellent customer service attitude and demonstrate strong problem solving and troubleshooting skills on a daily basis
Ability to work additional hours as required, respond well under pressure, and be a team player with a "can do" attitude at all times
Familiarity with NIST 800-53 standardsBachelor's degree from an accredited university. Degree in Information Systems, Computer Science, Computer Engineering, Information Security, or Information Assurance strongly preferred, but not required if work experience reflects a career in this field
CISSP certification (or willing to attain a CISSP within 6 months of employment)
          Mobility Security Engineer (Job #6410)   
A well-qualified security professional will have minimum 2-3 years of hands-on experience administering, designing, and/or implementing Mobile Device Management systems.

Key Responsibilities:

Oversee Customer?s MDM design, implementation and integration into the enterprise continuous integration environment
Review all proposed change requests related to system design / configuration and perform security impact analysis
Perform all tasks related to Certification and Accreditation of MDM and App Store implementation
Coordinates all monthly scans with the SOC and others
Review monthly vulnerability scan reports and track weaknesses in POAMs as needed
Work with System Administrators to resolve weaknesses such as configurations, patches, etc.
Work closely with customers regarding the closure and / or transfer of POAMs / vulnerabilities
Review System Configurations to ensure they are in accordance with DHS hardening guidelines
Receive and approve access requests to ensure user privileges are commensurate with required duties
Develops and maintains security authorization documentation (e.g. Security Plan, Contingency Plan, Configuration management Plan, Encryption Plan, Incident Response Plan, Waivers / Exceptions, Policies and procedures Manual etc..)
Help define baselines for penetration testing.
Review System Configurations to ensure they are in accordance with DHS hardening guidelines
Review all proposed change requests related to system design / configuration and perform security impact analysis

Job Qualifications

Minimum 2-4 years specific experience with information assurance, information security policies/procedures/standards, and compliance assessment
Must demonstrate solid technical understanding of iOS and/or Android mobile application development
3-5 years of Oracle Linux, Redhat Linux, and Oracle Cloud Technologies experience a plus
2-3 years of supporting architecture, design, implementation and/or administration of MDM product such as AirWatch or GOOD Dynamics or equivalent product is highly desired
2-3 years of supporting architecture, design, implementation of Mobile App Store for Android and / or iOS highly desired
Experience reviewing vulnerability scans such as Nessus and AppDetective
Ability to communicate effectively, both written and oral, with senior officials and also with both technical and non-technical audiences
Ability to organize and plan effectively, prioritize taskings with management, and use time effectively
must possess excellent customer service attitude and demonstrate strong problem solving and troubleshooting skills on a daily basis
Ability to work additional hours as required, respond well under pressure, and be a team player with a "can do" attitude at all times
Familiarity with NIST 800-53 standards
Bachelor's degree from an accredited university. Degree in Information Systems, Computer Science, Computer Engineering, Information Security, or Information Assurance strongly preferred, but not required if work experience reflects a career in this field
CISSP or ability to successfully attain it within 6 months of employment
          Mobility Security Engineer (Job #6410)   
A well-qualified security professional will have minimum 2-3 years of hands-on experience administering, designing, and/or implementing Mobile Device Management systems.

Key Responsibilities:

Oversee Customer?s MDM design, implementation and integration into the enterprise continuous integration environment
Review all proposed change requests related to system design / configuration and perform security impact analysis
Perform all tasks related to Certification and Accreditation of MDM and App Store implementation
Coordinates all monthly scans with the SOC and others
Review monthly vulnerability scan reports and track weaknesses in POAMs as needed
Work with System Administrators to resolve weaknesses such as configurations, patches, etc.
Work closely with customers regarding the closure and / or transfer of POAMs / vulnerabilities
Review System Configurations to ensure they are in accordance with DHS hardening guidelines
Receive and approve access requests to ensure user privileges are commensurate with required duties
Develops and maintains security authorization documentation (e.g. Security Plan, Contingency Plan, Configuration management Plan, Encryption Plan, Incident Response Plan, Waivers / Exceptions, Policies and procedures Manual etc..)
Help define baselines for penetration testing.
Review System Configurations to ensure they are in accordance with DHS hardening guidelines
Review all proposed change requests related to system design / configuration and perform security impact analysis

Job Qualifications

Minimum 2-4 years specific experience with information assurance, information security policies/procedures/standards, and compliance assessment
Must demonstrate solid technical understanding of iOS and/or Android mobile application development
3-5 years of Oracle Linux, Redhat Linux, and Oracle Cloud Technologies experience a plus
2-3 years of supporting architecture, design, implementation and/or administration of MDM product such as AirWatch or GOOD Dynamics or equivalent product is highly desired
2-3 years of supporting architecture, design, implementation of Mobile App Store for Android and / or iOS highly desired
Experience reviewing vulnerability scans such as Nessus and AppDetective
Ability to communicate effectively, both written and oral, with senior officials and also with both technical and non-technical audiences
Ability to organize and plan effectively, prioritize taskings with management, and use time effectively
must possess excellent customer service attitude and demonstrate strong problem solving and troubleshooting skills on a daily basis
Ability to work additional hours as required, respond well under pressure, and be a team player with a "can do" attitude at all times
Familiarity with NIST 800-53 standards
Bachelor's degree from an accredited university. Degree in Information Systems, Computer Science, Computer Engineering, Information Security, or Information Assurance strongly preferred, but not required if work experience reflects a career in this field
CISSP or ability to successfully attain it within 6 months of employment
          PURE Oasis Flow Waterproof DAB Radio   
PURE are one of the biggest digital radio manufacturers in the world. Technically the Pure Oasis Flow isn’t a shower radio but many use it for this very purpose. It’s rechargeable and weatherproof, incorporates great DAB reception and the added bonuses of FM and Internet radio stations as well. As we’ve said previously there isn’t a huge array of portable dab radios due to the fact DAB drains batteries like water. However this device you can plug in when you are using it around the house. Oasis Flow radio is available for a price around £150. So you can really use this radio anywhere, if you enjoy the great outdoors, load up the car, toss in your pure portable radio then enjoy music and programs from your favourite stations. This device has Wi-Fi connectivity that allows you to preset up to 30 digital radios, 10 FM and unlimited Internet radio. The controls of this internet radio are touch-sensitive with 3 context-sensitive keys.  The wireless connection is supported with WEP and WPA/WPA2 encryption meaning the information system is protected from unauthorized access, which may cause unwanted disruption. Some reviews have suggested users are annoyed by the length of time needed to [...]
          IT Systems Admin 3 Security (Job #5745)   
SLAIT Consulting is currently seeking an IT Systems Admin 3 Security for a client in the Virginia Beach, VA area.

Maintains smooth operation of multi-user computer systems, including coordination with network administrators. Duties may include setting up administrator and service accounts, maintaining system documentation, tuning system performance, installing system wide software and allocate mass storage space. Interacts with users and evaluates vendor products. Makes recommendations to purchase hardware and software, coordinates installation and provides backup recovery. Develops and monitors policies and standards for allocation related to the use of computing resources.

6 Years with Bachelors; 4 Years with Masters

Primary Duties:

Will serve on the NNS IT Service Applications Operations team, which is responsible for administering and managing multiple Security based applications and supporting infrastructure. Success in this position requires technical knowledge of the application life cycle model, the ability to work as part of a team, and exceptional communications and collaborative skills.

Typical Responsibilities

• Monitor and manage application availability and performance.
• Resolve technical issues involving application configuration. This may include working directly with end-users.
• Deploy applications and services related to password updates, application and operating system provisioning, encryption and monitoring.
• Work with developer to deploy and troubleshoot custom solution packages.
• Migrate contents from development to test to production farm.
• Patch servers with hotfixes, cumulative updates and service packs.
• Share best practices with other team members.
• Provide suggestions to improve quality of the enterprise services.

Required Skills

• Minimum of 1.5 years of experience administering and supporting Security based deployments, preferably in a larger network supporting more than 50 users. At least 4 years of overall IT experience.
• Minimum of 2 years of experience in Windows Server 2003/2008/2012 administration, preferably in a larger network supporting more than 50 users.
• Familiarity with Active Directory, DNS, Kerberos, Claims Authentication, and VMWare virtualization technologies.
• Familiarity with Microsoft SQL Server 2008/2012. Hands-on DBA experience is a plus.
• Familiarity with PowerShell and Java scripts.
• Familiarity with application development and customization.
• Strong written and verbal communication skills, along with customer services, troubleshooting, and problem solving skills.

Why SLAIT?
We have been growing since 1990 with offices in Virginia, Gaithersburg, MD., New York, Raleigh, NC, and Austin TX. For over twenty three years, we have delivered customized, creative IT solutions for customers in the commercial, and state and local government sectors.
*Staff Augmentation *Managed Services *IT Outsourcing *IT Consulting

Thank you for your consideration, please submit your resume today! Visit us at www.slaitconsulting.com

**Must be able to work for any employer in the United States. No Visa sponsorship.**

SLAIT Consulting is an Equal Opportunity Employer
          .Net Developer   
SLAIT Consulting is currently seeking a .Net Developer for our client in the Virginia Beach, VA area.

This position will operate in an agile team responsible for the ownership of customized, off-the-shelf applications and custom applications. Candidate will participate in all aspects of the software development lifecycle, demonstrate the ability to challenge the status quo, influence others to embrace new technologies and processes, and motivate others toward continual improvement in the performance of the organization.

The successful candidate will possess the following qualifications:
* At least 5 years? experience in application development.

Software development language skills in the following areas:
* ASP.NET (all versions)
* C# (2.0 and up)
* JavaScript, AJAX
* ANSI SQL 92, TSQL (8.0)
* HTML, XHTM L, CSS, DHTML, XML, XSL, XSLT, XPATH, XSD (any of them)

Working knowledge in one of the following protocols and styles:
* HTTP, HTTPS (SSL encryption), SOAP, REST
* SMTP
* DNS, TCP/IP, Firewalls

Platform skills in three of the following areas:
* Microsoft Dynamics CRM (3.0)
* Windows Server (including Active Directory, IIS, and MSMQ)
* Microsoft SQL Server (including Reporting Services and Integration Services)
* Microsoft BizTalk Server
* Microsoft Visual Studio (2010 and up)
* VMWare Workstation, ESX, Lab Manager or equivalent virtual technology
* SCM software (TFS, Cruise Control.net, Subversion, NAnt, NUnit, NDoc, etc.)

Methodology experience in:
* Agile
* Extreme Programming
* Scrum
* Or equivalent development methodologies


Why SLAIT?
We have been growing since 1990 with offices in Virginia, Gaithersburg, MD., New York, Raleigh, NC, and Austin TX. For over twenty three years, we have delivered customized, creative IT solutions for customers in the commercial, and state and local government sectors.
*Staff Augmentation *Managed Services *IT Outsourcing *IT Consulting

Thank you for your consideration, please submit your resume today! Visit us at www.slaitconsulting.com

**Must be able to work for any employer in the United States. No Visa sponsorship.**

SLAIT Consulting is an Equal Opportunity Employer
          Europefx - Europefx.trade   
IPB Image

I'm not admin here!
QUOTE
EUROPE FX is a legal investment company ,it was founded in 2017 by a group of Forex and Internet experts who earn money everyday for your profit. we aimed at the investors who are interested in the reliable and profitable investments.
We have achieved high results in our business. Now we offer you an opportunity to make money with us. We apply different methods of trading on Forex market to generate the highest profit that is why most of our investors are satisfied
Company is managed by highly experienced investment brokers specializing in foreign currency exchange markets. Everybody actively working and trying to save money for use in the future, or even for that extra vacation, often come to a realization that traditional saving methods, such as low yield bank deposits just barely making it to only offset the natural currency inflation rates.
Logically, people are willing to take diversified risks and are seeking additional earning opportunities to generate extra income via not-insured traditional investment options, such as various mutual funds and bonds.


IPB Image

5.3 HOURLY - 20 HOURS
Plan Spent Amount ($) Hourly Profit (%)
Plan 1 $0.00 - $50.00 5.30

6.4 DAILY - 30 DAYS
Plan Spent Amount ($) Daily Profit (%)
Plan 1 $50.00 - $25000.00 6.40

7.5% DAILY - 30 DAYS
Plan Spent Amount ($) Profit (%)
Plan 1 $100.00 - $2500.00 7.50

120% - AFTER 3 DAYS
Plan Spent Amount ($) Profit (%)
Plan 1 $500.00 - $25000.00 120.00

160% - AFTER 7 DAYS
Plan Spent Amount ($) Profit (%)
Plan 1 $1000.00 - $25000.00 160.00

200%
Plan Spent Amount ($) Hourly Profit (%)
Plan 1 $10.00 - $1000.00 0.01
Plan 2 $1001.00 - $10000.00 0.10
Plan 3 $10001.00 and more 1.00

QUOTE
SSL Encryption
DDos Protection
Registrar: NameCheap, Inc.
Create 2017-06-27
Expire 2018-06-27
Update 2017-06-27
ns ns9.eramedia.net ns10.eramedia.net
ns9.eramedia.net ns10.eramedia.net


Accept: PM, Payeer, Bitcoin

Join here: https://europefx.trade/

Reduced Size Image

          Fine-china - Fine-china.biz   
Fine China performs the brokerage services, investing in China's industry and trading on the stock market. Profits from these investments are used to enhance our program and increase its stability for the long term.
Fine China is a long term, stable and profitable investment program for people willing to achieve their financial freedom.

Up To 17% Weekly, for 777 days
Plan Spent Amount ($) Weekly Profit (%)
2% Weekly $30.00 - $29999.00 2.00
6% Weekly $30000.00 - $34999.00 6.00
7% Weekly $35000.00 - $39999.00 7.00
10% Weekly $40000.00 - $49999.00 10.00
17% Weekly $50000.00 and more 17.00

0.8% Daily, for 280 trading days
Plan Spent Amount ($) Daily Profit (%)
0.8% Daily $20000.00 and more 0.80

1% Daily, for 260 trading days
Plan Spent Amount ($) Daily Profit (%)
1% Daily $30000.00 and more 1.00

2.5% Daily, for 85 trading days
Plan Spent Amount ($) Daily Profit (%)
2.5% Daily $40000.00 and more 2.50

3% Daily, for 60 trading days
Plan Spent Amount ($) Daily Profit (%)
3% Daily $50000.00 and more 3.00

3.5% daily, for 100 trading days, Reinvestment available!
Plan Spent Amount ($) Daily Profit (%)
3.5% daily $20000.00 and more 3.50

5% daily, for 72 trading days, Reinvestment available!
Plan Spent Amount ($) Daily Profit (%)
5% daily $30000.00 and more 5.00

6% daily, for 58 trading days, Reinvestment available!
Plan Spent Amount ($) Daily Profit (%)
6% daily $40000.00 and more 6.00

8% daily, for 44 trading days, Reinvestment available!
Plan Spent Amount ($) Daily Profit (%)
8% daily $50000.00 and more 8.00

10% daily, for 22 trading days, Reinvestment available!
Plan Spent Amount ($) Daily Profit (%)
10% daily $75000.00 and more 10.00

200% After 20 Calendar Days
Plan Spent Amount ($) Profit (%)
200% $50000.00 and more 200.00

400% After 40 Calendar Days
Plan Spent Amount ($) Profit (%)
400% $40000.00 and more 400.00

600% After 60 Calendar Days
Plan Spent Amount ($) Profit (%)
600% $30000.00 and more 600.00

800% After 80 Calendar Days
Plan Spent Amount ($) Profit (%)
800% $20000.00 and more 800.00

1000% After 100 Calendar Days
Plan Spent Amount ($) Profit (%)
1000% $10000.00 and more 1000.00

QUOTE
SSL Encryption
DDos Protection
Licensed Script
Registrar TLD REGISTRAR SOLUTIONS LTD.
Updated 2015-09-20
Expire 2025-09-11
NS NS1.HAWKHOST.COM NS2.HAWKHOST.COM
NS1.HAWKHOST.COM NS2.HAWKHOST.COM


Accept: PM

Join here: https://fine-china.biz/
          The Backing Fund - Ksakep.com   
IPB Image

<div align="CENTER">The backing fund – www.ksakep.com</div>
IPB Image


The site experienced a massive update
Dear current and potential investors, please, visit our website to have more information about the project.


A brief description of the site:
    Unique design
    SSL-encryption
    Reliable Web Hosting
About the project.
Hello. My name is Vladislav and I'm an admin of this project.
Initially, the project was created for Ukrainian and Russian markets, but now we are going to enter the international market.
Today the project deals only with investments in poker players. More information about the project activities you can find in the relevant sections.
Nowadays our project is one of the most reliable projects in the sector of low-percentage and profitable projects.
From the classical HYIPs we have a lot of differences: manager’s openness and identification of his personality, confirmation about the type of activity (investors can check all the information about the project and all the project’s deals), execution of obligations to the investors during 10 month.

About the manager’s reputation, safety guarantees of your money and their repayment.
The manager’s personality during the life of the project was confirmed with meetings in real life, online verification at the MMGP forum, good financial reputation (for a period of 2-10 years) at the different financial forums, scanned copies of documents and identification in Skype.
Personal Webmoney certificate
The project received more than $ 47,000; during the first 7 month of the project were prematurely returned deposits in the amount of $ 20,000 and all the interests.
More information about the risks and guarantees you can read in certain sections of the website.

IPB Image

Types of deposits

In connection with the PokerStars SCOOP tournament series and the need to increase working capital in the period from 10 to 30 May on all deposits under the plan "Asset management" the bonus of 10%. The bonus is charged immediately after the deposit and is involved in the further accrual of interest.


Reduced Size Image


The plan "Asset management"
    The guaranteed yields: 5% per month
    The average fund’s yield: 12,33% per month
    Projected yields: up to 400% per annum considering capitalization
    Minimum deposit amount: $250
    Minimum term of the deposit: 6 months
    Recommended term of the deposit: 12 months
    Cash profit: each 1st day of the month trading period are paid 5% guaranteed. After 90 days trading period closes, summarizes and payments are made based on the results of the trading period.
    Banks and payment systems: any for which there is an exchange with the popular EPS.
    Capitalization of profits: possible
    Early withdrawal of the deposit: impossible
    Referral program: available to participants who have made a minimum deposit. For attracting new members is charged one-time remuneration of 3% of the amount of the member’s deposit.
Distribution of profit:
Net profit is distributed in the ratio of 45/45 in accordance with the shares of each participant. 10% of monthly net income is transferred to the stabilization fund in case of elimination of possible subsidence. In order to make a contribution in a manner that does not provide automatic renewal, you must contact the administrator of the project on the available contacts, or using the forms of support. In the message, specify the contribution program, the deposit amount, time and way of replenishment available from the list. The details of the transaction you'll get in a letter of response.

The plan "Stable"
    The guaranteed yields: 6% per month
    Minimum deposit amount: $30
    Minimum term of the deposit: 6 months
    Cash profit: monthly
    Banks and payment systems: Perfect Money
    Capitalization of profits: possible
    Early withdrawal of the deposit: impossible
    Referral program: available to participants who have made a minimum deposit. For attracting new members is charged one-time remuneration of 3% of the amount of the member’s deposit.
    Features of the plan: the plan is charged only guaranteed 6% / month
The plan "Stable +"
    The guaranteed yields: 7% per month
    Minimum deposit amount: $250
    Minimum term of the deposit: 6 months
    Cash profit: monthly
    Banks and payment systems: any for which there is an exchange with the popular EPS.
    Capitalization of profits: possible
    Early withdrawal of the deposit: impossible
    Referral program: available to participants who have made a minimum deposit. For attracting new members is charged one-time remuneration of 3% of the amount of the member’s deposit.
    Features of the plan: the plan is charged only guaranteed 7% / month
Referral system
Available only for active investors who have made the minimum deposit. For attracting new members is charged one-time 3% fee of the amount of deposit.

Dear owners of HYIP-monitors! The project is not cooperating with any monitors. Thank you for understanding.


IPB Image


Reports


Any investor can check all transactions

November-December:
Reduced Size Image
The total profit of the fund: 42,24%
Investors’ profit: 18,9%

December-January:
Reduced Size Image
The total profit of the fund: 26,52%
Investors’ profit: 11,93%

January feral:
Reduced Size Image
The total profit of the fund: 47,81%
Investors’ profit: 21,51%

February-April:
Reduced Size Image
The total profit of the fund: 6,7%
Investors’ profit: 10%*
________________________________________________________________
The average fund’s yield for 5 months: 24,65%/мес
The average investors‘ yield for 5 months 12,33%/мес

          SECURITY OPS ENGINEER -   
SECURITY OPS ENGINEER

Location - ARLINGTON, VA, 22202


Term: 3 months contract-hire

Hourly pay rate: $60/hr

Conversion salary: 120K

Responsibilities:

Include procurement, implementation, administration, monitoring and examination of security management tools needed to discover vulnerabilities and correlate incidents.

Responsible for incident detection, investigation, mitigation, documentation, logging, and reporting..

Management of Security Products, including:

Data Loss Prevention Program

Application Firewalls,

Encryption Program,

Enterprise Antivirus,

security patches,

Information Security Vulnerability Monitoring

Perform scans on computer systems and then perform analysis of the results to determine all information security vulnerabilities and then initiate appropriate remediation steps

Review the results of security testing of systems and provide implementation recommendations

Monitoring and testing compliance of security controls

Monitor and respond to network threats and vulnerabilities across the network

Respond to and lead investigations and document all suspected information security events and provide recommendations for corrective actions


Provide 24x7 support

Implement and manage intrusion detection\prevention systems for proactive monitoring of security threats

Assist in external audits\assessments, specifically VISA CISP and MasterCard SDP requirements

Implement security tools for Windows AD, Microsoft Exchange, Sun Solaris and Unix

Product and Compliance Responsibilities:

This work includes but is not limited to, ensuring compliance with ARC Policies and procedures, PCI, ISO27001;

assessing LAN, WAN.


Participate in incident response and CSIRT activities

Design, develop and implement computer security solutions; conduct security testing and evaluation of computer and networks

Project Responsibilities:

Coordinate with IT and Business groups to assess, implement, and monitor it related security risk and hazards

Bachelors in Computer Science or related field or equivalent experience.

At least 7 years overall information security experience

5 - 7 years experience managing Data Loss Prevention (DLP) tools

5 - 7 years experience managing Application Firewalls

5 - 7 years experience managing an encryption program

Detailed understanding of proxy and stateful firewalls, web application firewalls, file level encryption, DLP, RSA, LDAP, Email Gateways, IDS, and IDM.

One of the following certifications required - CCNA, MCSE, Cisco Security Specialist or CISSP.

Hands on experience in multiple security areas such as: Intrusion Detection\Prevention, Enterprise Anti-Virus, threat management, vulnerability management

Unix and Windows Server experience

Ability to write reports including recommendations, root cause analysis, security summary analysis, and project roadmaps.


We are an equal employment opportunity employer and will consider all qualified candidates without regard to disability or protected veteran status.
          SECURITY OPS ENGINEER -   
SECURITY OPS ENGINEER

Location - ARLINGTON, VA, 22202


Term: 3 months contract-hire

Hourly pay rate: $60/hr

Conversion salary: 120K

Responsibilities:

Include procurement, implementation, administration, monitoring and examination of security management tools needed to discover vulnerabilities and correlate incidents.

Responsible for incident detection, investigation, mitigation, documentation, logging, and reporting..

Management of Security Products, including:

Data Loss Prevention Program

Application Firewalls,

Encryption Program,

Enterprise Antivirus,

security patches,

Information Security Vulnerability Monitoring

Perform scans on computer systems and then perform analysis of the results to determine all information security vulnerabilities and then initiate appropriate remediation steps

Review the results of security testing of systems and provide implementation recommendations

Monitoring and testing compliance of security controls

Monitor and respond to network threats and vulnerabilities across the network

Respond to and lead investigations and document all suspected information security events and provide recommendations for corrective actions


Provide 24x7 support

Implement and manage intrusion detection\prevention systems for proactive monitoring of security threats

Assist in external audits\assessments, specifically VISA CISP and MasterCard SDP requirements

Implement security tools for Windows AD, Microsoft Exchange, Sun Solaris and Unix

Product and Compliance Responsibilities:

This work includes but is not limited to, ensuring compliance with ARC Policies and procedures, PCI, ISO27001;

assessing LAN, WAN.


Participate in incident response and CSIRT activities

Design, develop and implement computer security solutions; conduct security testing and evaluation of computer and networks

Project Responsibilities:

Coordinate with IT and Business groups to assess, implement, and monitor it related security risk and hazards

Bachelors in Computer Science or related field or equivalent experience.

At least 7 years overall information security experience

5 - 7 years experience managing Data Loss Prevention (DLP) tools

5 - 7 years experience managing Application Firewalls

5 - 7 years experience managing an encryption program

Detailed understanding of proxy and stateful firewalls, web application firewalls, file level encryption, DLP, RSA, LDAP, Email Gateways, IDS, and IDM.

One of the following certifications required - CCNA, MCSE, Cisco Security Specialist or CISSP.

Hands on experience in multiple security areas such as: Intrusion Detection\Prevention, Enterprise Anti-Virus, threat management, vulnerability management

Unix and Windows Server experience

Ability to write reports including recommendations, root cause analysis, security summary analysis, and project roadmaps.


We are an equal employment opportunity employer and will consider all qualified candidates without regard to disability or protected veteran status.
          Ukpme - Ukpme.com   
I'm not admin here!
QUOTE
UKPME was fully incorporated in the United Kingdom as "UK Precious Metals Exploration & Mining, Ltd." We are involved in the exploration of potential properties for mining operations around the world, as well as the further development of existing operations. Our primary focus is on the mining of metals such as gold, silver, and copper.
We have opened our company to private investment for the purposes of allowing us to purchase additional equipment and explore new locations for the acquiring, mining, and marketing of resources. We have several plans to allow you a generous return on your deposit regardless of your investment amount.
You are invited to join this exclusive opportunity to benefit from the precious metals mining industry, where it is possible to reap enourmous profits and is expected to grow in the near future.


UKPME - ukpme.com

1.8% Daily for 60 Days (Principal Included)
Plan Spent Amount ($) Daily Profit (%)
Plan 1 $10.00 - $500.00 1.80

QUOTE
SSL EV Encryption
DDos Protection
Licensed Script
Registrar NAMECHEAP INC
Created 2017-02-03
Updated 2017-02-17
Expire 2018-02-03
NS NS1.DDOS-GUARD.NET NS2.DDOS-GUARD.NET
NS3.DDOS-GUARD.NET NS4.DDOS-GUARD.NET
NS5.DDOS-GUARD.NET NS6.DDOS-GUARD.NET


Accept: PM, Payeer, Bitcoin, Advcash


Join here: https://ukpme.com/
          Extra - E40 - Codebreakers’ Legacy – Jack Copeland   
September 2014 Professor Jack Copeland talks about ‘one of his greatest heroes’ Tommy Flowers, from his early life & career leading to working with the Bletchley Park Codebreakers. Jack explains the task faced when in mid-1942 the German High Command started to use a new encryption device, the Lorenz SZ40/42. The attack on Tunny, as it was dubbed by GC&CS, would involve some of the greatest codebreakers we had, Alan Turing, Bill Tutte & Max Newman. It would culminate in Tommy’s greatest achievement, the invention of Colossus, the world's first programmable electronic digital computer. The world would never be the same again. This talk was recorded at last year’s sell-out day of talks, Codebreakers’ Legacy. If you would like to attend a similar event in the Bletchley Park Presents series, then please go to http://www.bletchleypark.org.uk/ & look in the What’s On section. A rebuild of Colossus can be seen at The National Museum of Computing, a separate site on the grounds of Bletchley Park. Picture: ©shaunarmstrong/mubsta.com #BPark, #BletchleyPark, #Enigma, #Tunny, #WW2, #codebreaker, #mcfontaine, #TNMOC
          IDCard   
Version 1.01 (20 Aug 2004) for RISC OS and Windows.
This is an example ID card implementation using AES (Rijndael) encryption, SHA hashing and discrete logarithmic asymmetric signing. Its important features are that cards cannot be forged, and personal data can only be verified using the card, it cannot be directly read from it. See the thoughts page for more details. Executables are included for RISC OS and Windows, and the code should compile for others, but requires the excellent MIRACL library. More info...
Download: source, screenshot.
          #394 - vSAN Native Encryption w/Sumit Lahiri   
none
          IIS Media Services 4 released    

Last week my team delivered another amazing update to IIS Media Services with the announcement of general availability of our 4th major release. 

IIS Media Services is a free and completely modern way to deliver streaming video on the Web.  It is so popular that some of the biggest video events on the Web choose IIS Media Services to deliver their content, including the Vancouver olympics earlier this year as well as Sunday Night Football here in the United States.

IIS Media Services delivers amazing HD content that plays back smooth on Mac OSX, Windows and with the new release also on the iPhone and iPad.  New advanced capabilities are also available for iOS devices, including:

  • Live DVR – Pause, Rewind, Seek
  • Archiving – saves the live content for DVR use or later on-demand playback
  • Archive Segmentation – breaks a long broadcast archive into shorter clips for storage purposes
  • AES Encryption – keeps your content safe while streaming
  • B-frame support – provides better picture quality
  • Compatibility mode for iOS3 devices

IIS Media Services can stream on-demand content as well as Live video with incredibly low latency with updates pushed from origin to endpoint in as low as 2 seconds! 

The experience is so incredible that our partner CTV, who delivered the on-demand content for the Olympics, just won a Gemini Award for their work (for those not familiar with this award, it is the equivalent of the Emmy's here in the United States).  Here is what the judges said:   

To do so, the team created an immersive, HD-quality live streaming player which enabled Canadians to pause, replay and rewind the live broadcast while being guided to key moments in time through an interactive and data-embedded video player. This live video player was key to the website’s overwhelming success. In the period from February 12th to 28th, the website delivered record results for interactive and online viewing in Canada: 215 million page views to 12.3 million unique visitors, with 28.5 million videos viewed.

 You can download IIS Media Services for free on the http://iis.net/media web site. 


          How To: VPN Between RV082 (or RV042) and WRT54GL (or WRT54G)   
This story has moved to NerdBoys.com. Please read this story at its new location.

          February 14, 2006 – ACCESS has been concerned for months that the State Department’s plan to include RFID chips in passports has not been well thought out. The original plan would have placed an RFID chip in every passport which would have contained unencrypted data about the passport holder. After a storm of protest, the State Department revised the standard to include some encryption. Now, a Dutch television news program has along and broken that encryption in less than two hours. The rami   
February 14, 2006 – ACCESS has been concerned for months that the State Department’s plan to include RFID chips in passports has not been well thought out. The original plan would have placed an RFID chip in every passport which would have contained unencrypted data about the passport holder. After a storm of protest, the State Department revised the standard to include some encryption. Now, a Dutch television news program has along and broken that encryption in less than two hours. The ramifications of this to passport holders are anything but positive.
          EMAIL: Is your email shielded from snooping?   
From our friends at Google. 

Last week, thousands of Take Action members joined us and many other groups in pressing for real surveillance reform in the USA FREEDOM Act. But whether or not Congress pulls through, there are things you should know about keeping your emails safe and secure.

An email actually goes through a lot of steps between when you hit "Send" and when it lands in the recipient's inbox. Your message is secure only if both the sender's and recipient's email providers encrypt them in transit. We've put together a page that details how this kind of encryption works, and which email providers support it.

Take a look, and see how your provider, and those of your friends, performs.

Educate your friends about email security. Share this:

          Gratis Folder Lock 7.0.6 Plus Serial Number   
Seperti postingan yang pernah aqu terbitkan sebelumnya,kini Folder Lock 7.0.6 hadir denga versi update dan terbarunya...ada apa saja sich fitur2 terbaru dari Folder Lock 7.0.6..lets cekidot kita lihat langsung yukkk...



Folder Lock is fast file-security software that can password-protect, lock, hide, and encrypt any number of files, folders, drives, pictures, and documents in seconds. Locked files are undeletable, unrenamable, unmovable, hidden, and inaccessible. You can lock, scramble, or encrypt depending on speed and security. Folder Lock is fully portable, so you can protect your files on USB flash drives, disks, CD-RWs, notebooks, and hard disks, and it doesn't require installation on another PC. Folder Lock protects files in Windows, DOS, and Safe modes, even when you change your OS or boot from a disk. Folder Lock doesn't let you delete its own program folder, and it can't be uninstalled without the correct password. Additional options include Stealth Mode, Hacker Attempt Monitoring, Shred files, AutoLock, Auto Shutdown PC, Lock your PC, Erase PC tracks, 256-bit Blowfish Encryption and Context Menu in Explorer.

Features:
• Users have an option whether to Encrypt or Lock, choices useful for both power users and casual users. Those who want ultimate security, can choose encrypiton. those who want ultimate speed, can choose locking.
• There’s no longer the hassle of encrypting each and every file on different locations. Think how much time you will save simply by putting all your files and folders in one location. Convenient encryption and decryption happens on-the-fly.
• Both Encryption and Locking are exceptionally fast. No competitor is offering this speed while offering 100% secure 256-bit AES Encryption.
• The Lockers can’t be deleted on the computer where Folder Lock is installed and Folder Lock can\t be uninstalled without the correct password.
• Users who want to password protect folders on multiple locations on their hard disk, not just on the C: drive, can easily protect their files on another partition by copying the \Lockers\ from one place to another or by simply using the \Lock\ feature.
• Secure and very strong Encryption. A strong industry standard 256-bit AES Encryption is used to encrypt your files for maximum protection. It is one of the most trusted encryption algorithms used in United States Military.
• Folder Lock offers fully portability and it can even protect CD/DVD-RW, not just USB Flash Drive, Memory Stick and floppy disks. To protect data on these drives, you can simply copy or burn your Locker to that drive.
• Lockers can also be emailed to someone over the internet. They won\t be able to see your encrypted files without your password / permission. Even if someone breaks through and checks your email attachment in between, he won\t be able to decrypt or use this information without the correct password.
• Folder Lock works flawlessly on all Next Technology Windows, i.e. Windows Vista / 2003 / XP / 2000 / NT. It is also fully compatible on all disk drives types including FAT16, FAT32, NTFS and EFS.
• You can increase the size of your Locker by simply adding more files and folders into your Locker. Even if you are left with little space in your Locker, you can always increase its size.
• Brute force cracking is not possible, since the program delays for some time once a password is entered. This will prevent hackers who may try many different combinations of passwords to get through your files. The program also produces a load beep when an incorrect password is entered, to alert the administrator of possible hack attempt.
• Password Strength meter shows you the strength of the password as you type, while you\re setting a new password. Basic rule of thumb is to use a password that is easy to remember but hard one to guess.
• Folder Lock doesn\t save the password in the registry or the disk, preventing hackers and crackers.
• Folder Lock also offers Auto Protect and Auto Shutdown features, this setting automatically locks or shutdown if more than five incorrect passwords are entered to try to decrypt the files.
• Folder Lock erases tracks of users when they click the lock button. It deletes recent document history, find file and folder history and the data in clipboard when you close the Locker.
• Protects important files from viruses, hackers, crackers, trojans, malware, spyware, worms, malicious programs and scripts. Protects files from network computers if you do not want to share files on network. Also protects files from hacker tools when you connect to the internet.
• While using the Lock feature, users can choose to lock and hide their files simultaneously. Locked and Hidden files are unrenameble, undeletable, unmovable and totally inaccessible. There is no limit to the size of data or the type of files you can protect.
• With its reduced file size and compact design, Folder Lock takes only 3.5 MB of hard disk space - small, portable and easy to keep. Thanks to the latest compression techniques. The GUI and interface is so well designed, it looks like an integral part of Windows XP.
• Folder Lock isn\t required to run at all times. Moreover, it doesn\t save anything to the registry/run so that users do not have any memory problems or stability problems with the program.


Download Folder Lock 7.0.6 Beserta serial numberr nya agar 
full version Disini

          Download Gratis WinZip Pro v16.0.9715 Final x86/x64   


WinZip is the world’s most popular file compression software with over 20 years experience as the leader in the industry. No other file compression utility offers such an innovative and easy-to-use feature set! Save time, conserve space, and share more with WinZip!

Compress Files:
· With WinZip, you can instantly compress files to conserve storage space, send swifter emails, and decrease file upload/download times. Zip documents, spreadsheets, PDFs, presentations, you name it!
· WinZip introduces a versatile new architecture to support significant performance enhancements, giving additional power and agility to your file compression tasks!
· With easy tools and drag-and-drop functionality, WinZip helps you create compressed files in the following formats: Zip, LHA, and Zipx (our smallest Zip file to date). Not sure which format to use? Let WinZip select the best compression method to maximize efficiency! You can even create self-extracting Zip files, which are ideal for distribution to recipients who may not own WinZip.
· WinZip also provides advanced photo and image compression. With a single click, you can compress your digital photographs and graphic images by 20-25% with no loss of quality or data integrity. This lets you send files faster and fit more on your flash drive, CD/DVD, or hard disk.

Decompress Files:
· In addition to compressing files, WinZip instantly opens and extracts content from the industry's widest selection of compressed file types, including Zip, Zipx, RAR, 7Z, BZ2, LHA, CAB, IMG, ISO, and most other file archive formats.

Encrypt Files:
· Along with state-of-the-art file compression and decompression, WinZip also offers strong AES encryption to help you secure sensitive data from unauthorized access. Encrypt and password-protect your files as you zip them, all in one easy step! You can even define your own password policies that WinZip will enforce for each file you encrypt.
· As an added security measure, WinZip also auto-wipes or "shreds" temporarily extracted copies of encrypted files using the U.S. Department of Defense standard (DoD 5220.22-M). This automatic action prevents protected files from being recovered and misused.

Share Files:
· Use WinZip to organize and compress your data into convenient, logical groups that are perfect for sharing! Smaller file sizes translate to faster uploading/downloading times and hassle-free email attachments that don't clog email servers. Using WinZip's powerful encryption capabilities, you can also password-protect compressed files to prevent third parties from gaining unwanted access to your data, making them ideal for sharing!
· WinZip includes convenient Zip and E-mail tools so that you can zip, encrypt, and email a file directly from the WinZip window without having to open any other applications. This allows you to work without interruption and share files swiftly, safely, and seamlessly! WinZip 15 provides extensive support for most email and webmail applications—once configured, you can zip and email files from virtually any email address! In addition, WinZip 15's Zip and Email function includes an image resizer that allows you to resize, zip, and email a set of images in one easy step!

Back Up Files:
· WinZip takes full advantage of its file compression technology with an automated data backup facility that helps you prevent data loss. Backup your desktop, documents, pictures, email, etc. using pre-defined jobs or by creating custom backup jobs using WinZip's simple wizard. You can set WinZip to backup selected data files, and you can schedule those backups to run automatically and unattended. You can also backup data to a CD/DVD or network drive, email your backups off site from virtually any email address, or upload your backups to an off-site server using the built-in WinZip FTP client. WinZip will even send you automated email notifications upon job completion!

DOWNLOAD FILE BESERTA KEYGEN NYA DISINI

          Gratis BitDefender Internet Security 2012 Build 15.0.35.1486 Final (x86/x64)   
 Pertahan terbaik dari sgala serangan virus mematikan..yupss,BitDefender Internet Security 2012 memang sangat bisa di andalkan..terlebih bagi kamu kamu yang sering berselancar di dunia maya,tentunya sangat di anjurkan memiliki antivirus BitDefender Internet Security 2012,selain vitur yang lengkap seperti viruses and spyware, spam,dan masih banyak lagi yang bisa di berikan dari antivirus yang satu ini...mau lihat fitur2 lengkap nya lets..cekidott...download disini san tentunya gratis full version...hee..he...

BitDefender Internet Security 2012 - complete protection against Internet threats: anti-virus and anti-spyware, firewall, protection of personal data and parental controls. BitDefender Internet Security makes use of the Internet in a safe, without slowing down your computer. Program blocks viruses, hackers and spam, providing parental control and network security firewall.
BitDefender Internet Security 2012 protects against viruses and other malicious programs with leading antivirus technology scans all web traffic, email and instant messaging traffic in real time, blocks spyware that track your Internet activities. BitDefender Internet Security 2011 provides excellent detection of new threats, two different proactive technologies.

Features:
Confidently download, share and open files from friends, family, co-workers - and even total strangers
Protects against viruses and other malware using industry-leading technology
Scans all Web, e-mail and instant messaging traffic in real-time
Provides an unmatched detection rate of new threats based on two different proactive technologies
Blocks spyware programs that track your online activities
Protect your identity: shop, bank, listen and watch, privately and securely
Blocks web pages that attempt to steal your credit card data
Prevents personal information from leaking via e-mail, Web or instant messaging
Guard your files and conversations with top-of-the line encryption
Instant Messaging Encryption keeps your conversations private on Yahoo! and MSN Messenger
File Vault securely stores personal information or sensitive files
Connect securely to any network at home, at the office, or away
The two-way firewall automatically secures your Internet connection wherever you are
Wi-Fi monitor helps prevent unauthorized access to your Wi-Fi network
Reduces the system load and avoids requesting user interaction during game play
Get fine-tuned performance from your computer
Optimized scanning technology skips safe files for better scan speed and lower system load
Antispam stops unwanted e-mail from reaching your Inbox
Laptop Mode prolongs battery life
Let professionals solve any security issues
Assistance with common issues built directly into the product
Free technical support for the entire duration of the product license

Stops viruses and spyware
Proactive protection stops new and unknown viruses and malicious programs that overlook the other products

Selecting Display Interface
Choose the interface that is most convenient for you: Basic, Intermediate or Expert. Also quickly create shortcuts to frequently used controls.

Privacy Policy
Prevent leakage of your personal information through email, Facebook, instant messaging IM, or through web sites that track your activity on the Internet.

Manage your home network
Control of security across the network from a single center

Firewall - Firewall
Easily customizable two-way firewall to monitor Internet connections and prevent unauthorized access, even through Wi-Fi network.

Parental Control
With parental controls you will receive reports in a Web browser, e-mail or mobile phone for the latest online computer activity of your child in a home network

Fighting spam
Antispam to BitDefender Internet Security 2011 email-sending unwanted messages (spam) and malicious attachments in the shopping cart, so they never get to the mailbox.

Game and work without interruption
Switch-mode Game, Laptop or Silent Mode, to minimize interruptions to extend the battery life of laptop, or reduce the load on the system for continuous and safe play

Video Library
A new collection of videos, step by step, helping to address major security challenges

Download Gratis BitDefender Internet Security 2012 Build 15.0.35.1486 Final (x86/x64) plus serial number

          Gratis Software USB Secure 1.6.6 plus Crack   


Memang benar penyebaran virus paling efektif dan paling cepat..selain melalui media internet Flash disc/usb...juga sangat rentan Apa lagi jatuh ketngan orang orang yang tak bertanggung jawab yang dengan senak jidat nya utak atik isi falsh disc kita tanpa Perlindungan Password,Oleh karna itu kita mesti super hati 2 dan jangan asal colok usb ke komputer tanpa perlindungan yang memadai..kali ini aqu ingin share sebuah Software untuk melindungi USB kita dari berbagai ancaman virus juga Password protectiff..yaitu USB Secure 1.6.6 semoga dengan adanya perlindungan terhadap flash disc kita ,semua data yang tersimpan di dalam nya terselamat kan dari berbagai serangan Virus..yang menyebalkan...ok Kita lihat fitur fitur nya yuukk...:


Features and Benefits:
- Password Protection: USB Secure is a powerful tool to password protect USB drive and all other external portable media. No matter what type of external storage device you use, USB Secure password protects it within seconds.
- No Administrator Rights Required: USB Secure doesn’t install any kernel or filter drivers, and therefore doesn’t require any administrator rights to password protect USB drive and other portable media.
- Compatible Everywhere: The program works on all flavors of Windows i.e. Windows 2000/ Windows XP / Windows Vista / Windows 7.0. USB Secure works perfectly well on all external portable media like USB flash drives, Thumb Drives, Memory Sticks, Memory Cards, Pen Drives and Jump Drives.
- Autoplay Feature: Full plug and play is supported that lets you automatically protect USB drive and all such external storage devices currently plugged into your PC.
- Complete USB Security:Whatever information, files, folders and documents you put in your USB drive, USB Secure keeps them completely secured.
- Reliable and Independent: USB Secure lets you protect USB drive’s data by using several layers of patent pending protection methods. This makes its protection, PC and hardware independent.
- Peace of Mind: Total peace of mind from security leaks and privacy breaches. Never again fear of what’s happening to your device while it is lost.
- User Friendly Interface: USB Secure is easy to install, run and use. It doesn’t complicate its users with technical jargon common in other encryption programs.
- Ease of Use: A very easy to use program with user-friendly interface.
- Affordable Software: USB Secure is a new addition to our robust collection of affordable and reliable security applications. You need not to shed hundreds of dollars to protect USB drive!

What's New in This Release:
This version update of USB Secure resolves compatibility issue with external drives on non-administrative users. A recommended update.

 DOWNLOAD Gratis Software USB Secure 1.6.6 plus Crack
          Download Private notes for Android    

Download Private notes for Android.

Today i'll introduce to you application private notes has important with you.
notes private

The advantage.
- Privacy support information when you remember, or archive.
- Secure with a pin or password when you installed.
- Display the note with a beautiful and friendly interface.
- Data encryption.
- You can send the information note to friends by email, sms, or the information on the society.
- Please look to the private application notes now to notes for you.
private note

private notes

I wish you success in your work.
Download app at link this. Private notes
Tags: Private notes, private notes pro,private note, note private,safe notes,private notepad, private notebook,password notes,

          Current list of MSMQ Hotfixes   

I think it is always a good idea to keep on top of any changes to the products you are using and this includes knowing what hotfixes have been released since the latest service pack. To this end I've produced a table of the hotfixes available for MSMQ. Hotfixes are cumulative so you only need to install the hotfix with the highest version number.

 

Of course, ONLY install the hotfixes that resolve problems you are seeing or expect to see.

 

Windows 7

 

 

Version

Date

Hotfix

 

 

6.1.7600.20716

 

21-May-2010

2028997 FIX: Message Queuing may become unresponsive

6.1.7600.20775 09-Aug-2010 2294419 A Message Queuing trigger stops processing messages after the Message Queuing service is restarted on the computer that hosts the message queue
6.1.7600.20880
6.1.7601.21641
14-Jan-2011 2491890 Message Queuing may become unresponsive when you enable message encryption
6.1.7600.20881
6.1.7601.21642
15-Jan-2011 2495655 The contents of some Message Queuing messages may become corrupted when you enable message encryption

6.1.7600.21000
6.1.7601.21762

02-Jul-2011 2566230 High memory usage by the Message Queuing service when you perform a remote transactional read

6.1.7600.21004
6.1.7601.21766

10-Aug-2011 2554746 MSMQ service might not send or receive messages after you restart a computer

 

 

 

 

Windows 2008 R2

 

Version

Date

Hotfix

 

 

6.1.7600.20716

 

21-May-2010

2028997 FIX: Message Queuing may become unresponsive

6.1.7600.20775 09-Aug-2010 2294419 A Message Queuing trigger stops processing messages after the Message Queuing service is restarted on the computer that hosts the message queue
6.1.7600.20880
6.1.7601.21641
14-Jan-2011 2491890 Message Queuing may become unresponsive when you enable message encryption
6.1.7600.20881
6.1.7601.21642
15-Jan-2011 2495655 The contents of some Message Queuing messages may become corrupted when you enable message encryption

6.1.7600.21000
6.1.7601.21762

02-Jul-2011 2566230 High memory usage by the Message Queuing service when you perform a remote transactional read

6.1.7600.21004
6.1.7601.21766

10-Aug-2011 2554746 MSMQ service might not send or receive messages after you restart a computer

 

 

 

Windows 2008 "R1"

 

 

Version

Date

Hotfix

 

 

6.0.6002.22247

 

19-Oct-2009

976438 FIX: Error "0xc00e0003" is returned when you send messages between instances of Message Queuing

974813 FIX: You cannot send or receive messages by using Message Queuing 4.0 after you configure the BindInterfaceIP registry entry

6.0.6002.22431 24-Jun-2010 2260618 FIX: Message Queuing may stop responding

 

 

Windows Vista

 

 

Version

Date

Hotfix

 

6.0.6002.22247

 

19-Oct-2009

976438 FIX: Error "0xc00e0003" is returned when you send messages between instances of Message Queuing

974813 FIX: You cannot send or receive messages by using Message Queuing 4.0 after you configure the BindInterfaceIP registry entry

6.0.6002.22431 24-Jun-2010 2260618 FIX: Message Queuing may stop responding

 

 

Windows 2003 - post-sp2 hotfixes

 

Version

Date

Hotfix

 

5.2.2004.4107

 

28-Jun-2007

934318  FIX: The Lsass.exe process may use a high percentage of CPU resources when you run Message Queuing on a domain controller with global catalog

 

5.2.2005.4137

 

24-Aug-2007

941560  FIX: A general protection fault (GP fault) error occurs when you restart an outgoing queue

 

5.2.2007.4530

 

 

 

16-Jun-2009

971032 MS09-040: Vulnerability in Message Queuing could allow elevation of privilege

5.2.2008.4709 13-May-2010 2028919 FIX: A message is rejected by the receiver when you send the message by using an external certificate
5.2.2008.4819 17-Jan-2011 2494629 A "0x0000008E" Stop error occurs when you set the message storage limit for a Message Queuing queue to be larger than 4 GB in a 32-bit version of Windows Server 2003

 

 

Windows XP - post-sp3 hotfixes

 

Version

Date

Hotfix

5.1.0.1109

06-Jul-2007

937894 MS07-065: Vulnerability in Message Queuing Service could allow remote code execution

5.1.0.1111

20-Nov-2008

959682 FIX: A message is rejected on the receiver when you send the message by using an external certificate

 

 

Windows 2000 - post-sp4 hotfixes

          Medical records supporting San Francisco’s universal care add millions to official cost   

Clinics scramble for money to switch to electronic health records

The San Francisco Department of Public Health says it is ahead of the curve in rolling out databases that keep tabs on tens of thousands of patients across a citywide network of clinics and hospitals. The rollout is needed not just to make a local form of “universal health care” work, but also to meet a 2014 deadline under national health reform.

And the city says it spent just $3.4 million on new patient-tracking technology. Not bad for an unprecedented charity care initiative whose total budget has grown to $177 million just this past year.

But while clinics and hospitals across the city are now linked up to a common intake tool that eliminates overbilling and duplicated medical appointments, that is only the first step in making the Healthy San Francisco program successful, directors of local health centers and technology experts say.

A separate and much more complex piece of technology — electronic health records — is proving difficult and expensive. Knitting together incompatible computer systems across the 35 medical sites so they can easily share detailed patient medical records could costs the city millions beyond what is included in the official price tag.

An incomplete survey of technology costs borne by the clinics themselves this year reveals spending of at least $15 million in addition to what was budgeted for the whole program, adding at least 8.5 percent to the total cost. But that sum is likely millions higher, since eight clinics could not or would not say how much they spent or were planning to spend integrating their patient records.

The Department of Public Health claims that Healthy San Francisco costs just $276 per patient per year — a real bargain compared with the average for private insurance — at $402. But building something that looks like insurance on top of an established public-private safety net can mask the technology requirements and other hidden costs of reform.

The current patchwork of at least 11 different computer systems across the network do not easily talk with one another. As of the fall of 2011, at least 23 clinics were stuck in the 20th century, relying on large storerooms of paper records not easily shared with specialists or emergency room doctors.

This incompatibility of recordkeeping sometimes causes delays, repeated tests, unnecessary procedures and gaps in care as patients move from doctor to doctor. Ideally, say technology planners, there ought to be just one system citywide. But that is unlikely to happen soon.

The 16 health centers in the network that are operated by the health department, plus San Francisco General Hospital, will get the most comprehensive database upgrades. The process started last January and will continue through the end of 2013. The system, called eClinicalWorks, will cost $11.1 million for software, computers, office equipment, training and extra staff to manage all the data, and roughly $5 million a year thereafter to maintain.

But among the 17 other clinics, private health providers and hospitals currently developing their own transition to electronic health records, many are fundraising on their own to stay ahead of the curve.

Medical directors from the Sunset to the Mission to Chinatown have reported steep costs for upgrading technology, purchasing equipment and staffing the rollout of these systems.

“It’s rather urgent that things start moving toward electronic-based medical recordkeeping,” said Jonathan Howell, the information systems manager for the Community Clinic Consortium, which includes about half of the safety-net clinics citywide. “It could save untold millions, and huge amounts of staff time.”

Money is not the only impediment. Some medical staff are reluctant to change entrenched work habits. And many clinics have already invested in obsolete systems and are waiting until they need to upgrade.

They can’t wait too long. Health care providers across the country are facing a 2014 federal health care reform deadline for moving patient records online.

Experts say electronic records, a key to President Obama’s Affordable Care Act, could reduce medical errors by improving the accuracy and clarity of medical information. The initiative promises to give doctors the ability to improve care, cut costs and target preventive care to specific populations such as diabetics or AIDS patients.

Cutting-edge software and infrastructure is expensive. The 14 nonprofit clinics in the Community Care Consortium network are struggling and competing for federal funding to catch up.

One already financially stressed clinic, Lyon-Martin Health Services in Hayes Valley, which caters to the gay, lesbian and transgender communities, said buying a new electronic records system might break the bank.

PREVENTION NEEDS INFORMATION

One of the first things Healthy San Francisco accomplished in 2007 was to deploy a citywide patient enrollment system, One-e-App. For the first time, patients knew they would not have to sit through interviews to re-enroll in each clinic. Also for the first time, the city knew how many people were using the system, when and where.

Healthy San Francisco’s director, Tangerine Brigham, said before deploying One-e-App, the enrollment system was “confusing” and resulted in wasted time for staff and people seeking care.

“It has been invaluable for us,” she said. “It has allowed us to have one system of records for our population in terms of their enrollment, their disenrollment, demographics, and our hospitals now have access to find out who is eligible for other charity care programs.”

But One-e-App contains no medical data. And in fall 2011, at least 23 clinics still relied on paper records. When doctors want to refer a patient to a specialist elsewhere, their charts must be scanned, faxed, mailed or retyped. Eliminating this clerical work could save the network millions of dollars each year and reduce chances for error.

Brigham said the city is far ahead of others in the ramp-up to nationally mandated health reform.

The medical records system the city chose, eClinicalWorks, was deployed at the first city-run clinic in August. It also is coming to San Francisco General and will allow some online records-sharing. Still, there are speed bumps. While the clinics can see General’s medical files, they cannot currently add to them.

While Brigham said improving electronic health records is not strictly necessary for cheaper, coordinated and more efficient care, she acknowledged that improved recordkeeping could help Healthy San Francisco achieve those goals.

A medical error can add up to millions of dollars in extra expenses, both for the city and the sick.

One patient living on $100 a month was sent to the emergency room because of a cardiac arrest, said J.P. Perino, administrative manager at Glide Health Services in the Tenderloin. The patient was charged $2,200 for the ambulance ride, plus the cost of the expensive emergency room visit. She didn’t know precisely how much the emergency room visit cost, but according to standard rates treating a heart attack can cost between $13,000 and $18,000. Perino said the debt went to collection, until the clinic redirected the bill back to the city.

“This was a Healthy San Francisco patient,” she said. “These costs weren’t billed correctly, largely as a result of the inability to share patient records.”

Electronic information sharing is not the only way to make Healthy San Francisco more efficient. The program also gives each patient a “medical home” — one clinic or hospital that is the first place for patients to go with a health problem.

Brigham said the medical homes model creates a stable enrollment base. More than 73 percent of participants in Healthy San Francisco are continuously enrolled, “which is pretty good for an uninsured population who didn’t before have that kind of access to care.”

That shifts the burden from emergency to preventive care, which is far less expensive. Providers can call a patient when she is due for a mammogram or a flu shot, for example. It also reduces unnecessary cost by allowing providers to track a patient’s health over time.

Brigham said medical homes dramatically reduce the per-patient cost of care. But the total burden on the General Fund has increased because there are more patients using the services.

NONPROFIT CLINICS SCRAPE BY

Some non-city run clinics still operate with old-fashioned paper medical charts kept in gargantuan filing cabinets or rooms of shelves filled with rainbow-colored tabs. Clinics across the country are now competing for limited federal grant money to purchase new electronic health record platforms. Many are taking on much of the startup costs themselves by scraping together money from other federal and state funding and from philanthropy.

“These systems are incredibly expensive,” Howell said. “You could pay up to $10,000 for up-front costs, but then there’s ongoing costs — the initial software purchase, training and licensing and technological refreshes. Those costs can easily outpace the purchase price.”

He compared it to a cell phone: “You buy your fancy new phone, for say $700, and that sounds expensive, but then you look at the ongoing bills: $100 a month, $120 a month. It adds up.”

As a result, San Francisco clinics are operating on a variety of technology systems, most of which don’t talk to each other. That causes problems when a patient moves from one medical home to the other. The end result is more expensive care.

“Interoperability is a big problem in terms of setting the same standards system-wide, while keeping patient confidentiality through encryption,” said Stephen Shortell, dean of the School of Public Health at the University California-Berkeley. “But these are big challenges that are mounting nationally — they’re not unique to Healthy San Francisco.”

According to the school’s research, last year 18 percent of Medicare patients nationwide were re-admitted to the hospital because of miscommunication, wasting $12 billion.

“These are tools that are supposed to improve patient care and coordination and reduce repeat procedures,” he said. “This shows us the cost for preventable re-hospitalization — meaning if they were properly treated on an outpatient basis, they wouldn’t have been readmitted.”

DUPLICATED PROCEDURES

Doctors at some clinics have significant problems in taking on new patients because they cannot easily absorb electronic files patients bring from other medical centers.

On a recent day outside the Lyon-Martin offices on Market Street and Octavia Boulevard, Dawn Harbatkin, the center’s medical director, described a persistent problem: “Often, I’ll send a patient to a specialty clinic, and I’ll have important lab results and imaging that was done elsewhere but the specialist doesn’t have access to any of that care because they can’t retrieve it from our system. What happens is repeat tests and duplication of expensive procedures, because they can’t get ahold of our information.”

In interviews with the Public Press, a dozen clinic medical directors underscored the same problem. They agreed that the advent of medical homes makes care cheaper in the long term. But as clinics adopt incompatible records systems, appointments can get duplicated and some services can go unbilled because staff cannot figure out the proper medical codes.

“We, as a city, are far from being able to share data between clinics,” said Albert Yu, the medical director at Chinatown Public Health Center. “That’s a problem, because say I have a patient, and they were transferred to California Pacific Medical Center for chest pain, but their medical home is here. Those providers don’t track contextual elements in terms of this patient’s past. Patient history, medications, lab data, diagnostic workup data, allergies, and that’s not even mentioning if they don’t speak English.”

The resulting miscommunication could lead to unnecessary or even harmful treatments or tests, if the patient has, for example, an unrecorded allergy to a medicine.

“There are real problems,” Perino said. “Duplicated procedures, extra labs ordered or X-rays possibly. And because people can’t exchange information quickly, the insult is to the taxpayer.”

CENTERS FUND OWN UPGRADES

Kenneth Tai is the medical director for North East Medical Services, one of eight nonprofit medical homes in the city. His clinic, also in Chinatown, sees about 50,000 patients annually, 60 percent of whom are uninsured.

Anticipating the federal move toward electronic health records, Tai got together in 2007 with Mission Neighborhood Health Center and South of Market Health Center to apply for a grant to build one computer system for all three.

The $2.5 million system, called NextGen, was fired up at North East Medical Services two years ago. The Mission clinic planned to roll it out by December, followed by South of Market in 2012.

Tai said the most useful part of the new system is the ability to audit the patient population to improve services to those needing similar care.

“Instead of before, pulling 100 charts at random to get patient data, now we can just check a box and it generates a list of, say, all of my patients with high blood pressure, or patients with diabetes, or women who are due for a pap smear,” Tai said. “It allows us to reach out to more patients and be more proactive in targeting care.”

However the process hasn’t been easy. Tai has seen training problems with the shift from paper to digital. Patient privacy is more easily compromised by hackers or human error.

Howell said keeping records secure when sharing information is something a citywide information technology committee is currently grappling with.

“We take this very seriously,” he said. “But there are vulnerabilities.”

Tai couldn’t estimate how much the clinic had paid beyond the $2.5 million grant, but he did know that it was “a lot.” The clinic needed at least 300 new computers, to implement NextGen, adding hundreds of thousands of dollars in cost.

Ricardo Alvarez, the medical director at Mission Neighborhood Health Center, said his clinic needs 30 new computers which, coupled with staff training and other software, could cost an additional $500,000. The clinic sees about 13,000 patients annually, only about one-quarter of whom are Healthy San Francisco enrollees.

Across the network, that means the cost of upgrading all the clinics could run in the millions.

“This is going to be fundamental for medical homes in the future,” Alvarez said.

STILL USING FAX

Ocean Park Health Center, a health department-run clinic, launched eClinicalWorks in August. The clinic is small — just six medical personnel and 3,400 patients. It used to be smaller, but uninsured patients there have tripled since Healthy San Francisco began. The clinic needed a laundry list of additional equipment, which it paid for itself, said medical director Lisa Golden.

Golden said she purchased six computers, five printers, two webcams, two keyboards and a fax machine. A half-dozen people were hired for testing, training and troubleshooting. Doctors, nurses, assistants and technicians who worked part time were bumped up to 40-hour workweeks.

When all health department clinics are finally up and using the system, providers will be able to look at records simultaneously. But Golden is already seeing efficiencies emerge: a reduction in simple handwriting mistakes and more coordinated care.

Before digital records, she said, “medication refills would come in as a fax. That required pulling of paper charts and sorting through information, then reviewing the prescription and faxing it back. But now refills are electronically transmitted. They come in and get sent back immediately.”

And yet in other ways, Golden said the move away from paper charts has actually slowed productivity. Before eClinicalWorks, a patient visit averaged about an hour of work for clinic staff. Now it is 15 to 30 minutes longer because the workflow of medical staff has not caught up with the technology.

“It takes time to transfer information from the paper record into the electronic format,” Golden said. “We’re reviewing charts longer and deciding what to scan and what to type in as a summary. And it’s also just understanding where to click. It’s not second nature yet.”


          Resolving issues with Android and Comodo SSL on IIS server   

This is a technical post for developers who have issues with Comodo SSL certificates on IIS webservers are sometimes showing "non-secure" warnings in mobile Chrome browser on Android devices (and sometimes on Macs), while everything works perfectly on desktop computers and iOS. We've had this issue in the past - some of the customers who use the hosted helpdesk app were complaining about similar issues

We use IIS web-server from Microsoft (see "my startup is Microsoft-based, here's why") and a little bit of googling shows I was not the only one with this problem. Many people are experiencing weird stuff with IIS certificates working fine on PCs and (most) Macs, but not on Android devices.

I fought with this problem for a while and finally figured a solution that I'd like to share.

But first...

How SSL certificates work and what is a "chain"?

See, a certificate "confirms" that your server is legit. The organization that gave you this certificate, in turn has been certified by another "higher level" organization. And again, and again, (these organizations are called "certification authorities - CAs"), until it all goes up to the "root" certificate authority. So a certificate is never just the certificate that holds your server's public-key for encryption, it's also a "chain" that looks like this:

Root CA -> Intermediate CA -> Intermediate CA2 -> Server Certificate

The "Root CA" here basically means, it is known by all computers, browsers and operating systems.

Ideally, a web-server should serve the whole chain, just in case your computer is not "familiar" with some of the intermediate CAs in it. But sometimes a web-server serves an incomplete, or alternative chain, that might look like this:

Root CA -> Intermediate CA2 -> Server Certificate

See, one element is missing... This can happen, for example, if an intermediate certificate was signed by several Root authorities, and the web-server has picked the wrong one.

Which is still OK cause the majority of browsers and operating systems are usually "familiar" with the missing CA. But some are not. That's why we see warnings in some browsers.

IIS is not serving the full certificate chain

If an IIS server sees multiple "root" certificate in the "trusted root store"" (a special place where Windows operating system keeps the certificates) - it might serve an alternative chain. Because it assumes, that if the certificate is in the "trusted store" - it means, everyone should "know" this certificate. Which is still OK for most modern browsers and operating systems, but not for others.

Strangely, the solution would be to remove some root certificates from the "trusted roots" store on Windows, and put them into "intermediate" store instead (yes, I know, removing something sounds scary, but you can always add this back via Windows Update).

So in my case, with "COMODO" certificates, you should download all intermediate certificates from here, install them into the "intermedaite" store. Then remove ALL the certifictes that have "COMODO" in their name from the "trusted root" store. Like "COMODO RSA Certification Authority " etc. Again - everything that has "Comodo" in the name. Then restart IIS. Also, make sure you have disabled the automatic certificate updates on Windows, so it won't restore it.

Comodo has published an article on this by the way: here but its kinda incomplete - you should remove ALL Comodo certs from the trusted store, not just the one mentioned in the article.

To add/remove certificates on Windows run "mmc", the click "File" - "Add/remove snap-in" - "Certificates" - "Computer account" - "Local machine". The "trusted" and "intermediate" stores are on the left.


          دانلود فیلم آموزش MikroTik MTCNA به زبان فارسی (قسمت چهارده) پیکربندی IPSEC در میکروتیک   

دانلود فیلم آموزش MikroTik MTCNA به زبان فارسی (قسمت چهارده) پیکربندی IPSEC در میکروتیک

در این قسمت به آموزش تانل IpSec در میکروتیک خواهیم پرداخت

IP sec از قدرتمند ترین تانل ها (vpn ها) می باشد

این پروتکل با ایجاد تانل رمزنگاری شده در دو مرحله ارتباط ایمنی در بستر اینترنت به وجود می آورد و یکی از محاسن آن متن باز بودن تانل است

و در برند های مختلف دیده می شود

به عنوان مثال اگر یک سر تانل میکروتیک و سر دیگر سیسکو یا ماکروسافت یا هر برند دیگری باشد امکان ایجاد تانل ipsec وجود دارد

نحوه کار IPSEC به چه صورت است ؟

IPSEC برای ایجاد تانل به صورت رمزنگاری شده دو مرحله را پشت سر می گذارد

مرحله اول : برای ایجاد تانل IPSEC بین دو نقطه , ابتدا آن دو نقطه (دو روتر) باید یگدیگر را ببینند و PEER یکدیگر باشند

دلیل این موضوع آن است که باید با یکدیگر بر سر ایجاد تانل توافقاتی انجام دهند برای همین به مرحله اول Security Association که به زبان فارسی به معنای گفتگو بر سر شرایط امنیتی ارتباط است

 

پس در این مرحله ابتدا بین دو طرف با استفاده از یک الگوریتم و یک کلید که در فواصل زمانی تغییر می کند یک تانل درست می شود و توافقات امنیتی یا همان Security Association بین دو طرف صورت می گیرد

Security Association بر سر چه مواردی توافق می کند

 

1- نوع AUTHENTICATION که می تواند موارد زیر باشد :

- Per shared key 

- Rsa Key

- Rsa Signature 

 

2 - نوع HASH که می تواند موارد زیر باشد

- Md5 

- Sha1 

- Sha256

 

3 - استفاده از پروتکل AH یا ESP که برای هدر زدن به پکت هایی که در تانل رد و بدل می شود استفاده می شوند

4 - نوع Encryption که مهم ترین آنها شامل موارد زیر می شود

- Des

- 3Des

- Aes

- BlowFish

- Camellia

 

5 - انتخاب متد Diffie Hellman Groups برای VPN

 برای رد و بدل کردن این توافقات ابتدا یک تانل بین دو نقطه زده می شود سپس تانل قطع شده و با شرایط جدید تانل اصلی IPSEC برای انتقال اطلاعات ایجاد می شود

این پروتکل برای انتقال اطلاعات یک تانل امن ایجاد می کند که شرایط آن در بالا بررسی شد

برای این منظور باید از یکی از پروتکل های AH یا ESP استفاده کند

تفاوت این دو پروتکل در آن است که پروتکل AH اطلاعات پکت و آدرس ها را رمز کرده و خروجی آن را در هدر بسته جای می دهد و

ESP خروجی را در تریلر قرار می دهد

البته موارد دیگری نیز در این تانل بررسی می شود و صحبت های ما در این پست بسیار مختصر بود

انشاالله در دوره CISCO CCNP SECURITY VPN به این تانل بیشتر خواهیم پرداخت


          What is a digital signature?   
A digital signature is a way to authenticate electronic documents. Find out what 'authentic' means in this context -- and how encryption is involved in the authentication process -- in this episode.
          Comment on vPro: Encryption at the Hardware Level by Ray Zed Blog » Encryption at the Hardware Level - Danbury   
[...] Steve Grobman talks with Jason Lopez about Danbury. Your browser does not support JavaScript. This media can be viewed at http://www.podtech.net/home/4797/vpro-encryption-at-the-hardware-level. [...]
          FreedomWorks Key Vote YES on Amendments to the House Commerce/Justice/Science Spending Bill   

As one of our more than 6.9 million FreedomWorks members nationwide, I urge you to contact your representative and ask him or her to support the following amendments to the Commerce, Justice, Science, and Related Agencies Appropriations bill, H.R. 2578.

This list may be updated with further amendments as necessary:

  • Blackburn Amendment to reduce all spending in the bill (excepting FBI and other selected funding) by 1%.
  • Polis Amendment to prevent Department of Justice Agencies from collecting telephone records without a specific warrant under the Controlled Substances Act. This would stop agencies from conducting the sort of warrantless bulk collection of records that the Drug Enforcement Agency was recently revealed to have been conducting for over a decade before suspending their program in 2013.
  • Poe/Lofgren Amendment to prohibit the government from mandating or requesting that a private company build security vulnerabilities into their products to allow the government to more easily exploit them for surveillance.
  • Massie Amendment to prevent the National Security Agency (NSA) from consulting with the National Institute of Standards and Technology (NIST) to reduce encryption standards in order to accommodate NSA surveillance programs.
  • Issa/Farenthold Amendment to prohibit federal funds for the use of "Stingray" devices without a specific individual warrant. These devices simulate cell phone towers and can take in large quantities of texts, emails, and call data at a time. Currently, the FBI and other agencies are deploying dozens of these devices with very little oversight.

FreedomWorks may count votes on any of these amendments as Key Votes when calculating our Congressional Scorecard for 2015. The scorecard is used to determine eligibility for the FreedomFighter Award, which recognizes Members of Congress who consistently vote to support economic freedom.

Sincerely,

Matt Kibbe

President and Founder

FreedomWorks


          Senior Systems Engineer - Open iT Inc. - Houston, TX   
Shell scripts, batch/PowerShell, Perl, Ruby, Python), and encryption. Senior Systems Engineer will oversee the successful installation, configuration and...
From Indeed - Thu, 22 Jun 2017 15:10:51 GMT - View all Houston, TX jobs
          Technology Helps The Lawless Find Digital Safe Spaces    

from STRATFOR

-- this post is authored by Scott Stewart

Advancements in digital encryption will soon put the communications of terrorists and other criminals beyond the reach of law enforcement. And in the wake of the London Bridge attack on June 3, United Kingdom Prime Minister Theresa May pledged to work with democratic governments on cyberspace regulations to prevent the spread of extremism and terrorist planning.

Read more ...


          Online Reporting   
KDL Online Report Access: Hypercharts Access requires a unique user name and password Reports available in real time No software to purchase or install Internet access to pathology reports from any computer Easy search and sort options (view, print, download reports) 100% HIPAA compliant, with built-in data security (SSL at 128-bit encryption)
          Dadding 101: Give Your Kids A Trail of Codes To Break   

This is one of those classic parental games that's fun and educational.

My youngest kidlet was home sick last week, and she happened to find a strange note that was composed of just numbers.

Where did this note come from? What did it mean? It was most puzzling.

She's only just learning to read, and getting her to do her reading writing tasks is pretty challenging. But she's read enough Billie B Brown Secret Mystery Club books to know that a note composed of just numbers is always the start of an exciting adventure.

She went with the assumption that "A=1", drew up a translation chart, and she was away!

IMG 2489 th.jpg

IMG 2490 th.jpg

When decoded the message told her to look on the printer. When she went to the printer there was a fresh note that required decoding. That one led her to under the stairs.

And so on, all day long, she chased a linked-list of notes, and practiced de-referencing a pointer, like a good little program.

The final clue told her to ask her mother for the next clue. Mum produced a clue, which when decoded, said "It's ice-cream time!" and everyone was happy with that. I was particularly pleased because I had no idea of how it should end, and sent it to mum as an easy exit.

All up, I strongly recommend trying this kind of puzzle on your own kids, or any kids you find in the neighborhood.

The simple "A=1" puzzle was good for a 6 year old, but you can progress to harder encryption techniques for older and more wizened children, or have the puzzles increase in difficulty as they go. My eldest would've lost interest if she'd been given the same material.

A good "next step" would be a Caesar Cipher, where the "shift" amount is provided. A good step up from that is a Caesar Cipher where the shift amount is not given. That leads into the topic of frequency analysis (though other approaches will work fine too). A nice code to demonstrate is the 'pigpen cipher' (also known as the Freemason cipher), particularly because of it's cool alien-looking characters.

My good buddy and aussie-bush-walker Dr Richard Mason says the EJ12 series of books have some great codes and puzzles aimed at kids (girls in particular). The "39 Clues" is another series I've heard of but haven't seen.

Have you ever tried getting kids into code-making or code-breaking? What happened?


          How to remove Petya ransomware and restore files   
Petya is a newest and the most notorious ransomware, similar to WannaCry ransomware. It's a malicious application that can encrypt all the personal files on the computer, so that you are not able to open or access your files anymore because of encryption. Petya ransomware is a harmful virus that is making the data unreadable. First Petya infiltrates your system, then starts encrypting procedure with currently unknown encryption algorithm. You can learn how to remove Petya ransomware and recover files in this article.
          Master Voyager   
Master Voyager has been specially designed to create protected DVD/CD discs and USB memory sticks. It creates protected areas on media and requires a password to see the protected contents. Protected discs/USB sticks are fully autonomous and do not need any special software to be installed. The program uses strong encryption to protect your data. The 256-bit Advanced Encryption Standard (AES) is the new Federal Information Processing Standard (FIPS), used even by the U.S. government (and others) to protect sensitive information. Embedded CD/DVD burning module. CDR/CDRW/DVD+-R/DVD+-RW disc types are supported. You do not need to buy special CD burning software. No need to have Master Voyager software on a computer to read protected media. Each protected disc/USB stick contains an AutoPlay module. Just insert the disc into a CD drive (or connect your flash stick to a USB port) and it will ask for the password to continue. The only requirement is to have Windows Vista/XP/2000 (32- or 64-bit) and a CD-ROM/USB port. Protected media do NOT install any software to the target computer. They are fully autonomous. Download and try out a 30-day evaluation version free of charge! Tag:dvd cd rw usb protect password encrypt encryption aes strong mobile
          ROT-13 Encryption/Decryption   
This is a ROT-13 Encryption/Decryption Program made by me. It uses the ROT-13 algorithm to encrypt messages;which is very basic. You can use this app to send encrypted messages to your friends and decode them too. Features: •ROT-13 Encryption •ROT-13 Decryption •Copy to Clipboard •Full Gui •Capital Alphabets support Tag:corel draw 13 spss 13.0 spss 13 dvd encryption dvd encryption software folder encryption rc4 encryption algorithm b bios 1.13 decryption tool
          Passware Kit Enterprise   
Reduce time spent on recovering passwords and get more control over corporate security. Key Features: * All 30+ password recovery modules and Encryption Analyzer now combined in an all-in-one user interface * Includes 5 Decryptum Credits for instant online decryption of MS Word and Excel files (up to version 2003) * Multiple-core CPUs are now efficiently used to speed up the password recovery process * 8 different attack types (and any combination of them) could be set up using a wizard or drag & drop attacks editor * Multiple nVidia GPUs (where available) can be used to accelerate MS Office 2007 password recovery speed by 3500% *Tableau TACC hardware accelerators are used to speed up the password recovery process by up to 25 times New! * All recovered passwords are saved and ready to be reused on other files * 30-day money-back guarantee Benefits for IT Professionals * This complete password recovery solution provides corporate security administrators with the full control over employees’ computers and files. System administrators, IT professionals and help desk personnel can now get access to any business file whenever required. Many types of passwords are recovered or reset instantly, while advanced acceleration methods are used to recover difficult passwords. Tag:office 2007 ms office deep freeze enterprise swift kit
          The Sysadmin's Guide to Securing Your SaaS Apps   

As an admin, app security should be a top priority - but SaaS apps represent a difficult challenge in that regard. How can you protect your business from their risks, while enjoying all their rewards?

Within the average enterprise, there are 508 unique cloud applications in use. That number's overwhelming enough on its own without considering that 88% of those applications aren't enterprise ready, or the fact that one in five cloud applications has data sharing as a core functionality. Allowing your employees to use these apps freely is like installing a screen door on the side of a boat - sure, it might not sink your organization, but it's still a huge risk.

Of course, the challenge is that where SaaS apps are concerned, you as an administrator have very little control. People are going to rely on the functionality these apps offer in an effort to get their jobs done. That's inevitable.

The only thing you can control is whether or not your data is protected as they do so. At its core, that's tied to whether or not your users look upon you as a productivity enabler or just another obstruction. Let's talk about how you can be the former.

Talk To Your Users

If your users are employing third-party, consumer-grade SaaS apps in the workplace, then it's blindingly clear that they've some productivity need your business's standard tools aren't meeting for them. You have to find out what that need is - determine the functionality your users require in order to effectively do their jobs. I guarantee that for every single unsecure app your users employ, there's an enterprise-ready alternative just waiting to be implemented. And it's up to you to find them.

But that's only the tip of the iceberg.

Improve Your Authentication Process

There's a simple term I'd like you to familiarize yourself with: Single Sign On. Your end goal here is to make your entire SaaS application suite part of one platform, in a sense - to allow your users to access every single application they need to get their job done while only requiring them to authenticate once. On the surface, that may sound like a huge security breach waiting to happen.

Improperly-implemented, it most assuredly is. But here's the thing - single sign on can actually be incredibly secure if you make use of multi-factor authentication. Consider the following authentication process, which makes use of several 'security barricades,' but nevertheless remains secure:

  • An employee wishes to access their business's SharePoint repository via smartphone. When they attempt to access the system, it immediately recognizes the device they're using - it's been registered as 'trusted.'
  • Said employee is then prompted for their fingerprint. They use the fingerprint scanner on their smartphone.
  • Finally, they're prompted to enter a four-digit PIN or username/password.
  • Once they've done all this, they can access not only the SharePoint repository, but every other SaaS app employed by their organization until the authentication period expires (something which can be controlled by IT).

That's actually a pretty barebones process - you can makes things even more complex by introducing features such as access time and access location into the mix. But from the employee's perspective, it's pretty seamless. They simply log-in, swipe their fingerprint, enter their PIN, and they're done.

Better yet, the multiple checks and balances ensures that if someone does try to crack your system, they need to not only possess the employee's physical device (which can easily be reported as lost or stolen), but also their fingerprint and their login info.

Sure beats using RSA Tokens and Smartcard Readers, doesn't it?

Rethink Your Protocols

According to Search Cloud Computing, insecure access protocols are one of the most significant security risks facing SaaS applications in enterprise. With that in mind...what are you doing to protect your remote employees? Are you using Telnet or FTP? Have you neglected to set up a secure tunnel or VPN?

You'd best answer those questions before going further — because even if your applications are secure, they can still leak data over an unsecured connection.

Containerize Critical Applications

Given how many employees want to use their personal devices in the workplace, I'd strongly advise that you look into some form of containerization solution - some way to lock off business applications and accounts from personal ones on a user's smartphone. App-based containerization's actually come a long way in recent years, and there are several solutions on the market that are completely managed by IT, and rely solely on centralized security controls.

That means no on-device encryption for hackers to break through, and no need for you to worry about a consumer app leaking critical data from an enterprise app (though admittedly, this risk is relatively minor with SaaS applications compared to traditional mobility).

Keep Your Head Out Of The Clouds Where Security's Concerned

SaaS applications have become central to the workplace. As an administrator, it's your job to ensure that they don't represent a security risk. Because your employees are going to use them no matter what you do.

Written by Tim Mullahy, General Manager of Liberty Center One


          Unable to compress file with password (7z encryption)   
Hello Internet, When I used Ubuntu, I was able to right click a folder, select compress, and turn a folder into a compressed archive with a password. I'm liking Fedora so far, but I cannot encrypt files with a password. I am running Fedora 26 workstation (GNOME) and I have p7zip and p7zip-plugins installed. This is what I see: [Document Name] .zip .tar.xz .7z These are no options to add a password, and no options to select additional file extensions. Thanks for your help, I will try installing Cinnamon tomorrow in the hopes that a more feature-rich desktop environment will have this ability built in.
          How to Make a Printer Wireless?   
Having the freedom to use your home desktop or laptop anywhere in your house and then printing without the worry of connecting to a device is a reality today with the right equipment and setup. There are many ways to configure your device to print wirelessly. Each has its own pros and cons and the costs vary accordingly.

* Obtain a wireless print server that is compatible with both your wireless network and your printer. While the printer’s documentation may not explicitly say that it is compatible with a print sever, many are compatible, and this can be verified by checking the website of the print server’s manufacturer. If you have a multifunction printer, only the print function will work with most wireless print servers, though a few have recently added support for scanning and the printer’s other functions.

* Read all of the documentation that came with the wireless print server. The manual will detail the specifics of the installation routine.

* Connect the printer to the wireless print server via the USB cable. Connect the print server’s AC adapter and turn the unit on.

* Connect an Ethernet cable between the wireless print server and your computer. This will be used for the initial setup only.

* Insert the CD supplied with the print server into your CD-Rom drive. Start the software if it does not start automatically. The application will walk you through the installation process, which includes setting the unit’s IP address, setting an access password, configuring it to connect to the wireless network, installing the drivers that allow the print server to use the printer and installing the print drivers on your computers.

* Choose how your print server will be addressed. Most units are set up to use dynamic addressing by default, which means that your wireless router will assign an IP address to it. This allows the server to be easily installed on the network, but it also means that the IP address of the printer may change over time. The other option is to assign a static IP address to your print server. This option is more reliable, because the print server will always use the same IP address, making it easier for the computers to find the printer and easier to access the print server’s online configuration application. If your router has the IP address of 192.168.0.1, for instance, set the print server to something like 192.168.0.2 or 192.168.0.3, as long as another device does not use that address.

* Set a password to be used to access the unit’s online configuration application.

* Configure the print server to access your wireless network. Give it the same SSID network name as your router and set it to use the same wireless channel. If encryption is used on the router, enable encryption on the print server, and enter the encryption key or password.

* Follow the instructions given by the print server’s software for installing printer drivers on the unit.

* Disconnect the Ethernet cable and allow the unit to connect via the wireless network.

* Install the printing drivers on each computer that will use the printer.

* Access the print server’s online configuration application to verify all settings by entering the IP address of the unit into a web browser, using the “http://192.168.0.2” format. Enter the administrator name and password.

Source: ehow.com
          Radio Netwatcher vom 19.5.2017 – Holger Krekel: Wie geht automatische Emailverschlüsselung?   
Wie geht Emailverschlüsselung? Holger Krekel: Towards automatic end to end mail encryption Towards automatic end to end mail encryption mail encryption overview and hands-on Autocrypt sessions Email has been declared dead but refuses to die. And there are good reasons to re-inforce efforts to improve it. Or do you want to have everything tied to […]
          Comment on RSA Encryption in Pure PHP by sathis   
i need hai text in rsa encrypted code
          Comment on RSA Encryption in Pure PHP by John FENDER   
Not working on php 4.4
          Configuring the JDK for Rights Management Encryption Using AES 256-bit Keys   
Follow The default length of the Advanced Encryption Standard (AES) key used to encrypt the contents of a document to which a Rights Management policy is applied is 128 bits. To use a key that is 256 bits, you have … Continue reading
          Think your email's private? Think again | Andy Yen   
Sending an email message is like sending a postcard, says scientist Andy Yen in this thought-provoking talk: Anyone can read it. Yet encryption, the technology that protects the privacy of email communication, does exist. It's just that until now it has been difficult to install and a hassle to use. Showing a demo of an email program he designed with colleagues at CERN, Yen argues that encryption can be made simple to the point of becoming the default option, providing true email privacy to all.
          Jungle Disk   
Jungle Disk floats below the visual radar while keeping your data safe. While it lacks some of the native business application backup features that other offerings have, it maintains a high level of encryption, which keeps it compatible with HIPAA and SOX regulations.

          Just Say "No" to Electronic Passports   

The State Department of the United States plans to start issuing Passports with embedded RFID tags later this year.  The tags will store all information that is printed on a Passport and also a digital facial scan of the Passport holder.  The information will not be encrypted.

 

This scheme compromises the Passport holder’s privacy because the unencrypted information can be read by a rogue reader without the holder’s knowledge or approval.  The State Department claims that RFID will increase security and also make border crossing faster and more efficient.  It’s not clear that RFID accomplishes either goal.

 

Placing a sophisticated RFID tag in a Passport might make the Passport somewhat more difficult to counterfeit.  In the long run, it will probably just force the counterfeiters to become somewhat more sophisticated.  Storing the information without encryption does not improve security and puts the Passport holder at risk.  Allowing Passports to be scanned with RFID is not inherently faster than Bar Codes that are used today at border crossings.

 

Various organizations have weighed in on this issue, including the Electronic Privacy Information Center (EPIC) and Privacilla.org


          News Wrap: Former Trump campaign chairman registers as foreign agent for pro-Russian consulting   
Watch Video | Listen to the Audio JUDY WOODRUFF: Senate Republican leaders have spent this day behind closed doors trying to win over more of their own members in the health care reform fight. Majority Leader Mitch McConnell has delayed any action until after the Fourth of July recess, but a spokesman says he hopes to have a revised bill as soon as Friday. At the White House, President Trump suggested the effort is working along very well, despite the obstacles. PRESIDENT DONALD TRUMP: It’s very tough. Every state is different. Every senator is different. But I have to tell you, the Republican senators had a really impressive meeting yesterday at the White House. I think we’re going to get at least very close, and I think we’re going to get it over the line. JUDY WOODRUFF: Later, the president told reporters — quote — “We’re going to have a big surprise on health care.” He didn’t say what that meant. We will hear about all of this from Republican Senator John Thune after the news summary. The president’s former campaign chairman has registered, retroactively, as a foreign agent. Paul Manafort filed papers Tuesday that show his firm was paid more than $17 million by a pro-Russian political party in Ukraine. He resigned from the Trump campaign last August, when word of his consulting work leaked. In March of this year, Michael Flynn, who had been fired as the president’s national security adviser, also registered as a foreign agent. Businesses and governments around the globe spent a second day battling a cyber-attack. The so-called ransomware assault eased some today, but in the U.S., a subsidiary of FedEx was disrupted, and a Cadbury chocolate factory in Australia had to shut down. In London, British Defense Secretary Michael Fallon said it is verging on an act of war. MICHAEL FALLON, Defense Secretary, United Kingdom: State or nonstate entities, lurking behind a veil of encryption, targeting our national infrastructure, as we saw with the recent cyber-strike on Parliament itself, that isn’t a cold war. That’s a gray war, permanently teetering on the edge of outright hostility. JUDY WOODRUFF: The outbreak began in Ukraine, where it has done the most damage so far. We will take a closer look later in the program. The months-long unrest in Venezuela took a dramatic turn overnight. The government says that a police helicopter opened fire on the nation’s Supreme Court and Interior Ministry. Amateur video captured images of the helicopter, before it disappeared. Officials charged the mastermind of the plot was a rogue police pilot and actor. Opponents of socialist President Nicolas Maduro suggested that the raid could be a government ploy to justify increased repression. Former members of Colombia’s largest rebel group now face the challenge of reintegrating into society. The one-time fighters of the FARC surrendered their weapons at a disarmament camp on Tuesday. U.N. inspectors supervised the ceremony. The rebels staged a peace agreement last year, after decades of fighting. In Liverpool, England, six people, most of them police officials, were charged today in a 1989 soccer stadium disaster. They are accused of offenses ranging from negligence to manslaughter in the deaths of 96 people. The victims were crushed when thousands of people rushed into a crowded section of a stadium. Police blamed rowdy fans, but the families finally won a new investigation. TREVOR HICKS, Father of Victims: I mean, there are no winners in this. It doesn’t bring anybody back from the disaster. But what it does do, it sends a message out of accountability, as we keep saying, that nobody, but nobody is above the law, be it the police or anybody else. JUDY WOODRUFF: The accused include the man who was leading police operations at the stadium that day. Back in this country, the Homeland Security Department announced that it’s stepping up security measures for flights coming into the U.S. They include enhanced screening of electronic de...
          Public Key   

Do you want the NSA (or Google, or your ISP) reading your email? Of course not! Do you want to simultaneously frustrate David Cameron? Hells, yes! Fortunately, you can encrypt your mail, using a tool that's a wee faff to set up, but very easy once you get going! Mailvelope lets you encrypt or sign your email, even if you use a web interface. Those of you using hotmail or gmail, this is the encryption tool for you.

You're going to have to click through to the howto page, as the route to the configuration menu is somewhat non-idiomatic for firefox. However, once you get going, encrypting is dead easy.

Once you get started, we'll need to exchange public keys. What's that, you ask? EFF answers all your questions about this. This kind of encryption is the kind that Edward Snowden swears by, so it really does work and EFF's description is very readable.

UPDATE (7 Feb 2015): If you have trouble decrypting, make sure your version is up to date.

Ok, now that we're clear on that, allow me to present to you my public key:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: Mailvelope 0.11.0
Comment: Email security by Mailvelope - https://www.mailvelope.com
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=JaW9
-----END PGP PUBLIC KEY BLOCK-----


          Quantum Encryption Market to Reach $2.5 Billion Revenues by 2022: Mobile Systems Will Ultimately Dominate   
New CIR Report States QKD Markets to Reach $2.5 billion Revenues by 2022
          ip camera viewer lite for smartphone android   
Description View and Control IP camera, DVR, NVR, webcam. SSL, H.264, Audio, Widget, cctv.
Awarded Best Software Award 2011 in Utilities category.
Remotely view and control your IP Camera, DVR, Network Video Recorder, traffic cameras, CCTV or WebCam using this Android app for mobile and honeycomb tablet.
Has in-app upgrade for 2-way audio support on some cameras for use as baby monitor (axis, panasonic, foscam, more).
Has in-app upgrade for Record Mode which turns any spare Android device into a solid state, battery backed network recorder for your standalone IP cameras. Allows playback, search, and export to video clip.
Supports
- SSL encryption for privacy
- H.264 and two way audio (after upgrade)
- pan tilt and zoom (PTZ)
- preset recall
- relay to control things like lights and garage doors
- custom controls like patrol (varies with various models)
- home screen widgets
- matrix view, gallery view, and auto sequence mode
- double tap for digital zoom using pinch to zoom
- grouping of cameras to organize and for quick recall.
- Export / Import and sharing of cameras
- browser integration
- app password to protect access from others
- 24/7 recording of cameras
- scan camera capability
- auto sequencing of cameras and groups
Over 700+ different makes/models supported (more than any other app).
Major brands include Axis, Airlink, Apexis, Aviosys, Brickcom, Cisco, EasySE, EasyN, Edimax, Canon, Dlink, Flexwatch, Hunt, Instar, Linksys, Foscam, Goscam, Heden, Panasonic, Toshiba, Trendnet, Hootoo, Geovision, JVC, Cisco, Milestone, Marmitek, Mobotix, Pelco, PROCCTV, Rimax, Q-See, Zmodo, Sony, Sparklan, TP-Link, LevelOne, Night Owl, Samsung, Sanyo, Shixin, Security Spy, SVAT, Tenvis, Wansview, Zavio, ABUS, Alinking, Blue Iris, CCTVHotDeals, Vivotek, Zoneminder.









Ip camera panasonic

IP camera panasonic

Download for software!!! !!!!!


          Palladium Trust - Palladium-trust.com   
I'm not admin here!
QUOTE
Our program is intended for people willing to achieve their financial freedom but unable to do so because they're not financial experts.
palladium-trust.com is a long term high yield private loan program, backed up by Forex market trading and investing in various funds and activities. Profits from these investments are used to enhance our program and increase its stability for the long term.


Palladium trust - palladium-trust.com

4% daily for 30 days
Plan Spent Amount ($) Daily Profit (%)
Plan 1 $10.00 - $100.00 4.00

QUOTE
SSL Encryption
DDos Protection
Licensed Script
Registrar NAMECHEAP INC.
Create 2017-06-25
Expire 2018-06-25
Update 2017-06-25
NS NS1.PALLADIUM-TRUST.COM
NS2.PALLADIUM-TRUST.COM


Accept: PM, Payeer, Bitcoin, Advcash

Join here: https://palladium-trust.com/
          5 Most Secure VPN Services 2017   
Although the subjects are often confused (and are related), internet privacy and internet security are different issues. This article focuses on secure Virtual Private Network (VPN) services that offer very high levels of technical security. In practice this means: They use strong OpenVPN encryption. They use software that prevents any and all forms of IP … Continued
          Copyright Office Proposes Modest Fixes to DMCA 1201, Leaves Fundamental Flaws Untouched   

The U.S. Copyright Office just released a long-awaited report about Section 1201, the law that bans circumventing digital restrictions on copyrighted works. Despite years of evidence that the social costs of the law far outweigh any benefits, the Copyright Office is mostly happy with the law as it is. The Office does recommend that Congress enact some narrow reforms aimed at protecting security research, repair activities, and access for people with disabilities.

We’re sorry the Office didn’t take a stronger stance. Section 1201, part of the Digital Millennium Copyright Act, makes it illegal to circumvent any “technological protection measure” (often called DRM) that controls access to copyrighted works. It also bans the manufacture and sale of tools to circumvent those digital locks. Although it was pitched as a new legal protection for copyright holders to prevent infringement, the law has given major entertainment companies and other copyright owners lots of control over non-infringing uses of technology, allowing them to lock out competition in repair and re-sale businesses, and to threaten and silence security researchers. The law has some exceptions, but they are far too narrow and complicated.

Those flaws are one reason EFF is challenging Section 1201 in court on behalf of researcher Matthew Green and technologist Andrew “bunnie” Huang. In the lawsuit, filed last year, we explain why Section 1201 is an unlawful restraint on speech and ask the court to strike the law down. Congress has also considered several fixes to the law over the last few years, ranging from comprehensive fixes to smaller corrections.

Meanwhile, after the last rulemaking, the Copyright Office asked for public comments and held hearings about Section 1201, leading to the report released on Thursday. In the report, the Copyright Office announces its belief that “the statute’s overall structure and scope . . . remains sound.” The Office also believes that bypassing access controls can violate Section 1201 even when the purpose of the circumvention has nothing to do with copyright infringement. Federal appeals courts are sharply divided on this question, and the Copyright Office seems to be putting its thumb on the scales in favor of rightsholder control and against freedom of expression and innovation.

If a Section 1201 violation can happen without any connection to copyright infringement, then Section 1201 gives copyright holders (and DRM vendors) vast control over technology users, beyond what copyright law already gave them. According to the Copyright Office’s interpretation, Section 1201 gives copyright holders “control over the terms of access to their works online.” That means that by wrapping software, music, games, video, or text in a layer of DRM, copyright holders gain the ability to dictate when, where, and how we can use those things, and the technology we can use to interact with them. And it means that copyright holders can nullify the public’s fair use rights. The Copyright Office’s approach here is the wrong approach, and it deepens the law’s constitutional problems.

The report is also notable for what it doesn’t contain: any evidence that we need a ban on circumventing digital locks in the first place. The report points out that “explosive growth in legitimate digital content delivery services” happened “after the enactment of Section 1201,” but it doesn’t attempt to show that the law was what caused that growth. It also mentions a statement by a Senate committee in 1998, that “copyright owners will hesitate to make their works readily available on the Internet without reasonable assurance that they will be protected against massive piracy.” Today, of course, the Internet contains many lifetimes worth of amazing creative work of all kinds, made available by creatives without any DRM, so that prediction did not come true.

The report doesn’t cite any studies or data showing that Section 1201 has been beneficial to creativity or the digital economy. And the only experts it cites to are entertainment companies with an interest in keeping the control that 1201 provides them, and the same members of Congress who requested the report in the first place—hardly a convincing case.

The report does make some recommendations for fixing the law, including new and expanded exceptions to the ban on circumvention. The Copyright Office recommends that Congress expand the permanent exemptions for security testing and encryption research, by removing or mitigating restrictions in those exemptions that have made those exemptions too uncertain for many in the computer security community to rely on.

The report also recommends a new permanent exemption for assistive technologies for people with disabilities. That change is overdue, as advocates for print-disabled people have had to request exemptions for screen-reading and other assistive technologies every three years for nearly two decades.

In the last rulemaking cycle, EFF and other organizations requested exemptions covering maintenance, repair, and modification of software. One of the unfortunate effects of Section 1201 in recent years has been to cast a cloud of legal uncertainty over repair businesses ranging from cars to smartphones, and to block the re-use of devices like phone handsets and printer cartridges. The Copyright Office report recommends a new permanent exemption covering “diagnosis, maintenance, repair, and obsolescence” activities, not limited to any specific technologies. That would be a positive step. But the report rejects an exemption for modifying software for other reasons, such as to improve or customize the software. That’s a problem, because those activities are largely legal and beneficial, aside from the legal risk created by Section 1201.

Finally, the report offers some fixes to the rulemaking process for temporary exemptions that happens every three years. Notably, the Copyright Office will offer a way to renew exemptions from previous cycles with what they claim will be minimal time and expense. We’re expecting the Copyright Office to begin a new rulemaking cycle soon, so we’ll get to see how well this works in practice and whether they are able to make the process less expensive. In several places in the report, the Copyright Office offers to try to make temporary exemptions broader and more useful to the populations they affect. We’ll be holding them to that.

However, the Copyright Office still insists that it should be unlawful for anyone to distribute tools to allow beneficiaries of rulemaking exemptions to take advantage of the exemption, because “it would be impossible to control” subsequent uses of such tools. The real, proven need for circumvention has to take a back seat to the hypothetical scenario where the beneficiary then decides to infringe.

It’s too bad the Copyright Office won’t address the fundamental flaws of Section 1201, especially given the multitude of problems that the report acknowledges. A simple, comprehensive fix like the Unlocking Technology Act introduced by Rep. Zoe Lofgren would solve many of the problems that Section 1201 causes for security professionals, tinkerers, people with disabilities, repair and resale businesses, teachers, students, libraries, and many others. A piecemeal approach will solve just a few of the current problems, at the cost of ever more complexity and a continuing demand for massive public interest resources to make the exemption process work. Congress, or the courts, should do more.


          Enable BitLocker Drive Encryption without a TPM   
Procedures to change your computer’s Group Policy settings so that you can enable BitLocker Drive Encryption without a TPM. This use a startup key to authenticate yourself and it is located on a USB flash drive inserted into the computer before the computer is turned on. In such a scenario, your computer must have a … Continue reading
          Remote Access   
It's February 2010; a couple of days after what President Obama referred to as Snowmageddon. At least if your office is in this region, right now, you've probably been thinking about Remote Access to your computer systems. If you have it, you've been very glad of it. If you don't, you may have been wishing you did. And you wouldn't be alone: According to a CNNMoney article, LogMeIn's remote access service usage surged nearly 40% during the recent storms.

Bad weather is but one of the reasons many businesses need some form of remote access, or even remote office solution. It can be a critical component of your overall Disaster Preparedness Plan. If your computers don't shut down because of some environmental disaster, why does your business have to?

Remote access to your systems can also enable you and your staff to be a bit more time-flexible, or provide for remote technical support. (Yes, I use it all the time.) It can enable sales staff to access critical data while on the road, even from a SmartPhone.

Sounds great! What do we need to do? Well, slow down a moment. Like most things, you do need to put in a little bit of forethought and planning for this. So here are some things to think about:
  • How many people are going to need to use it? Concurrently?
  • Do we need application access, or just data access?
  • How important is remote printing?
  • Do we need remote access even during the workday, without affecting others' work?
  • How concerned are we about security?
These, and other factors can determine which is the most appropriate / cost-effective way of providing remote access services. These are some of the major categories used:

Remote Control
This type of solution has been around for a very long time. Typical examples of this type of solution include GoToMyPC and LogMeIn. A small client application is installed on the user's PC(s), which connects out to the provider's Internet servers. On the remote side, the user logs into the provider's website, and makes a connection to the provider's website. To make the actual remote-access connection, these two separate sessions are connected through the provider's site. Both connections typically use strong encryption, making this type of remote access pretty secure.

As the name describes, this type of connection literally has the remote user taking over control of the host PC. This means that, typically, someone at the office could actually be watching whatever the remote user does, and the remote user will have no way of knowing it. If the user is accessing confidential data, this could be a concern.

Also, because the user is actually taking over the entire computer, the computer cannot be used by anyone else at the same time. If the access is needed during the regular business day, it has to be on a computer that no one else uses.

Terminal Services
This type of solution has many of the same benefits as the Remote Control solutions. The user gets a virtual desktop and runs applications at the remote site. When using a Terminal Server, you can have multiple users on the same machine simultaneously, each with their own virtual desktop. Since users are not actually taking over the remote machine, passersby at the office cannot watch a session taking place. And since a Terminal Server is generally a dedicated machine, it doesn't affect other users ability to work.

There are some things to be aware of, though. For example, remote printing can be tricky - especially if you're trying to print to a printer on a remote network. Also, security can be a concern. The encryption used by RDP (Remote Desktop Protocol) is not as strong as some other solutions - at least not by default. And, of course, there is the cost of the Terminal Server itself. A Terminal Server is a Server, requiring a Microsoft Server operating system, and typically, server hardware.

Virtual Private Networks (VPN)
VPN is a term I've often heard misused to mean all sorts of remote access services. So let me explain what it is: A VPN uses encryption to form a "tunnel" through an untrusted network (i.e. the Internet). So if you have two offices, you can use a VPN to connect them through the Internet, enabling machines to communicate securely between the two sites. You can also create a VPN from a computer to the network, allowing that computer to communicate as if it were directly connected to the network.

Typically, the encryption used is strong. But people often complain that performance is slower than they expected. The issues are usually due to applications that are not particularly well-suited for this type of connection.


The important thing is that you know your options, and understand both the costs and the benefits each can provide for your business.
          ZW3D 2013 Soft Encryption   
none
          ZW3D 2013 Soft Encryption   
none
          ZW3D 2013 Soft Encryption   
none
          ZW3D 2013 Soft Encryption   
none
          ZW3D 2013 Soft Encryption   
none
          ZW3D 2013 Soft Encryption   
none
          ZW3D 2013 Soft Encryption   
none
          ZW3D 2013 Soft Encryption   
none
          CyberSecurity Engineer - Black Box Network Services - Lawrence, PA   
Configuration and monitoring of detection technologies:. Experience in configuration of Symantec Endpoint Protection and Endpoint Encryption....
From Black Box Network Services - Wed, 07 Jun 2017 20:18:04 GMT - View all Lawrence, PA jobs
          Spartancoin - Spartancoin.ltd   
I am NOT the Admin or owner of the program!

Spartancoin.ltd


QUOTE
welcome to spartancoin.ltd

spartancoin.ltd is a company which was legally registered in UK in 2016. spartancoin.ltd Limited offers investors from around the world favorable conditions to earn in the market of private crypto currency exchange and trading. Our professional team of traders is ready around the clock to provide you a steady income with your only effort to register and invest in our plans. Our company offers a highly profitable investment for everyone. Years of trading experience in the crypto-currency markets provide a stable income not only for company but also for numerous clients around the world. Today our automated platform allows anyone to become an investor and earn on a daily basis with different investment plans. Our investment portfolios are designed in such a way that each participant, regardless of the income level, can fully participate and earn money. Regardless of the type of investment strategy the company also guarantees the full return on investment after the end of accruals period. spartancoin.ltd employs a team of highly effective financial experts who know for sure when a currency is to rise or fall. They track the market continuously and start trading at best times. The Company has had very good results in both trading and start-up financing. However, what we are having now is a tiny part of what we could have if we had enough funds to use every earning opportunity in our sphere. For the purpose of increasing our current assets, we have decided to attract funds from private and corporate investors through our website platform and make profit from many more earning opportunities which we currently have to decline or ignore due to limited assets. Our Mission is to ensure maximal profit to each of our investors and keep possible risks to their investments at the lowest levels. Spartancoin's members can benefit from our lucrative affiliate program with  2% - 25% instant commission - 25% (10th level) for all their referrals deposits -. Grab the opportunity to work from home & earn money online, by inviting your friends & family or by sending us web traffic. Start generating a long-term passive income of  $0.2  - $250,000 per deposit today. It's free.



Investment Plan:
QUOTE
2.00 % daily for 100 days + Principal returned
Plan Amount Spent ($) Daily Profit (%)
Plan 1 $10.00 - $10000.00 2.00

2.5 % daily for 120 days + Principal returned
Plan Amount Spent ($) Daily Profit (%)
Plan 1 $100.00 - $10000.00 2.50

400% After 60 days
Plan Amount Spent ($) Profit (%)
Plan 1 $10.00 - $250.00 250.00
Plan 2 $251.00 - $1000.00 300.00
Plan 3 $1001.00 - $1000000.00 400.00

VIP PLAN
1000% After 90 days
Plan Amount Spent ($) Profit (%)
Plan 1 $10.00 - $250.00 500.00
Plan 2 $251.00 - $1000.00 700.00
Plan 3 $1001.00 - $10000.00 800.00
Plan 4 $10001.00 - $1000000.00 1000.00



Payment Processor : PerfectMoney , Payeer , Bitcoin

QUOTE
why choose us?

Genuine Investment Platform
Real Registered Company
100% Insurance for Principal
Fast Withdrawals
Strong DDoS protection
High level of security
Comodo PositiveSSL encryption
Professional Management Team
Realiable Support Staff
10 commission levels



Join Here

          Gemalto releases findings of first half 2016 Breach Level Index   
Gemalto releases findings of first half 2016 Breach Level Index

Data breaches up 15% and compromised data records up 31% compared to previous six months

Identity and personal data theft account for 64% of all data breaches Healthcare organizations account for nearly one-third of all data breaches


Singapore– September 20, 2016 – Gemalto (Euronext NL0000400653 GTO), the world leader in digital security, today released the findings of the Breach Level Index revealing that data breaches increased 15% in the first six months of 2016 compared to the last six months of 2015. Worldwide, there were 974 reported data breaches and more than 554 million compromised data records in the first half of 2016, compared to 844 data breaches and

424 million compromised data records in the previous six months. In addition, 52% percent of the data breaches in the first half of this year did not disclose the number of compromised records at the time they were reported.

The Breach Level Index is a global database that tracks data breaches and measures their severity based on multiple dimensions, including the number of records compromised, the type of data, the source of the breach, how the data was used, and whether or not the data was encrypted. By assigning a severity score to each breach, the Breach Level Index provides a comparative list of breaches, distinguishing data breaches that are a not serious versus those that are truly impactful.

According to the Breach Level Index, more than 4.8 billion data records have been exposed since 2013 when the index began benchmarking publicly disclosed data breaches. For the first six months of 2016, identity theft was the leading type of data breach, accounting for 64% of all data breaches, up from 53% in the previous six months. Malicious outsiders were the leading source of data breaches, accounting for 69% of breaches, up from 56% in the previous six months.

"Over the past twelve months hack ers have continued to go after both low hanging fruit and unprotected sensitive personal data that can be used to steal identities," Jason Hart, Vice President and Chief Technology Officer for Data Protection at Gemalto. "The theft of user names and account affiliation may be irritating for consumers, but the failure of organizations to protect sensitive personal information and identities is a growing problem that will have implications for consumer confidence in the digital services and companies they entrust with their personal data."

Across industries, the healthcare industry accounted for 27% of data breaches and saw its number of data breaches increase 25% compared to the previous six months. However, healthcare represented just 5% of compromised data records versus 12% in the previous six months. Government accounted for 14% of all data breaches, which was the same as the previous six months, but represented 57% of compromised records. Financial services companies accounted for 12% of all data breaches, a 4% decline compared to previous six months, but accounted for just 2% of compromised data records. Retail accounted for 11% of data breaches, and declined 6% versus the previous six months, and accounted for 3% of compromised data records. Education

accounted for 11% of data breaches and represented less than one percent of all compromised records. All other industries represented 16% of data breaches and 16% of compromised data records.


In terms of top three geographic regions for reported data breaches, 79% were in North America, 9% were in Europe, and 8% were in Asia-Pacific.

Breach Level Index: Understanding That Not All Data Breaches Are Equal in Severity

As data breaches continue to grow in frequency and size, it is becoming more difficult for consumers, government regulatory agencies and companies to distinguish between nuisance data breaches and truly impactful mega breaches," said Jason Hart, Vice President and Chief Technology Officer for Data Protection at Gemalto. "News reports fail to make these distinctions, but they are important to understand because each have different consequences. A breach involving 100 million user names is not as severe as a breach of one million accounts with social security numbers and other personally identifiable information that are used for financial gain."

"In this increasingly digital world, companies, organizations and governments are storing greater and greater amounts of data that has varying levels of sensitivity. At the same time, it is clear that data breaches are going to happen and that companies need to shift from a total reliance on breach prevention to strategies that help them secure the breach. That is why more focus needs to be understanding what really constitutes sensitive data, where it is stored, and using the best means to defend it. At the end of the day, the best way to protect data is to k ill it. That means ensuring user credentials are secured with strong authentication and sensitive data is protected with encryption so it is useless to the thieves."

For a full summary of data breach incidents by industry, source, type and geographic region, download the H1 2016 Breach Level Index Report.

Related Resources

·      Infographic:  H1 2016 Breach Level Index

·      Web Site: Breach Level Index

·      Blog Post: 2016 Data Breach Statistics

·      White Paper: Secure the Breach Manifesto


·      Web Site: Secure the Breach

For the LATEST tech updates,
FOLLOW us on our Twitter
LIKE us on our FaceBook
SUBSCRIBE to us on our YouTube Channel!

          Comment on Facebook offers to send you encrypted emails. This won’t help you. by Jakob   
I'm inclined to agree with the other commentators. While I personally don't use Facebook and don't really know much about the exact content of the e-mail messages they're sending out or what information is present in the header vs. body of the mail, encrypting this information on the way from the Facebook mail server to my computer still protects the information from at least my own e-mail server provider (in case I don't opt for self-hosting). Also you'd have to worry less about encryption between mail servers and between your computer and your mail server (especially the first one is still usually unauthenticated and therefore easily MITMed).
          Comment on Facebook offers to send you encrypted emails. This won’t help you. by Markus   
This article wields the classical straw-man argument: Facebook makes money out of user data and exposes them to government surveillance, and because encryption does not put away with that, it has no real value. What is interesting about this is that Facebook itself never claimed such a thing. The central reason behind PGP encryption is clearly stated in their roll-out message: "whilst Facebook seeks to secure connections to your email provider ... the stored content of those messages may be accessible ... to anyone who accesses your email provider or email account." That *is* a valid concern -- there is no mention of user tracking or government surveillance. You are acknowledging as much, saying that "this will somewhat reduce the risk of identity theft via Facebook, though of course it won’t prevent it from happening." So in essence you're saying any security measure that is not 100% foolproof is not worth doing at all? Congratulations to a black-and-white philosophy that in IT security will get you exactly nowhere. I would rather think PGP-encrypted password recovery e-mails are a very strong measure against identity theft. But the important point is that a platform with a user base of some *one* *billion* people now publicly advertises the use of strong end-to-end cryptography. So many people will hear the word PGP for the first time, and all those people who want to get encrypted notifications will then get all the tools to send encrypted e-mails themselves -- no further hurdle. I can't think of another evangelist programme with such an outreach. Ironically, this outreach indeed *does* hinder government surveillance! Invoking Godwin's law: just because Adolph Hitler built highways, he wasn't a better guy. But that does not make highways less useful. Facebook (which is BTW of course not akin to Hitler) isn't a better company, but that is completely beside the point: the internet community is indeed "better off" by the roll-out of PGP encryption. Reality often cannot be separated into a white and a black bin. That is a lesson I'm not sure you've learned.
             

Finding a cell phone under 5 floors of concrete. Put your cell phone in your car.  Park 4 or 5 floors down.  Go somewhere else and ask your PC where your phone is. When you get to this site click E911 & E211 for some useful E911 resources; click "In Action" to select a cool 5 min video.  This is exciting stuff  -- and the guy running Global Locate is obviously having fun!

Also from Global Locate, a 2001 paper entitled: "Global Locate Indoor GPS Chipset & Services" by Frank van Diggelen (on ION members site).

ABSTRACT: Indoor GPS, or more precisely High-sensitivity GPS, is a combination of Assisted-GPS (A-GPS) and massive parallel correlation. This paper describes a worldwide reference network that provides assistance data for AGPS receivers, and a GPS chipset that uses a massively parallel architecture, along with the assistance data, to provide unprecedented GPS performance. Both the network and the GPS receiver demonstrate performance improvements of 10× or greater over previous state-of-the-art. The worldwide reference network predicts GPS orbits ten days into the future. The GPS receiver achieves time-to-first-fix of 100 milliseconds, when outdoors, and 2 to 5 seconds when indoors. The receiver can power up, acquire satellites, and get an accurate fix when in the closed trunk of a car, inside office buildings, deep urban canyons, parking garages, or shopping malls. The paper also describes the chipset architecture, and shows how it is unlike any previous GPS receiver. By having enough correlators to observe all possible code delays simultaneously, the receiver removes the old distinction between acquisition and tracking. This makes it possible to integrate weak signals for hundreds of milliseconds, and thus acquire signals hundreds of times weaker than a standard GPS receiver.

GPRS: How important a role?  Although GPS is the key enabler of the Location revolution that is beginning to unfold, there are many ancillary and equally critical technologies that will make many applications possible. Companies like DigitalAngel are betting on GPRS as the telecomm component.

What it takes to filter out signal errors.  Professor Stefano Panzieri and his colleagues, while studying robot navigation in a parking lot, show what kinds of errors you deal with while a robot is stationary.  If you wanted to use GPS to steer a vehicle, you'd have a challange.  But this article also reveals a lot about what you need to know to pinpoint a stationary vehicle within a couple of cm.  The original source is: S. Panzieri, F. Pascucci, G. Ulivi, “An Outdoor Navigation System Using GPS and Inertial Platform,” IEEE/ASME Trans. on Mechatronics, vol. 7, n. 2, pp. 134-142, 2002, IEEE, USA.

GPS World - Great source site. I rely on this site for information about the entire spectrum of location technologies.  Although GPSWorld covers space, ground and user segments, its coverage of space segment news is the strongest I have found.  Good place to track (no pun) what is happening to funding and maintenance of GPS or other sister systems in Europe, Russia, Japan.

Very clever application of location to security, here.

[Dorothy] Denning is pioneering a new type of copyright protection, called geo-encryption. It's a big deal in the information security arena, earning her the moniker of "America's cyberwarrior" from Time magazine and stoking the imaginations of everyone from Hollywood movie executives seeking ways to scare off Napster copycats to hospital administrators looking for a safe way to transport patient data across the Internet without fear of privacy breaches.


          Sinister, in a state of hope   

Well, that was interesting.

It was an unnecessary election, called by a brittle authoritarian Prime Minister, hoping to take advantage of an unpopular and discombobulated opposition to get a sweeping mandate to remake the country. Aware of the near certainty of victory, they packed their manifesto with far-reaching ambit claims: force the NHS to sell off its land; replace Britain's segment of the internet with an Iranian-style censored, filtered national intranet and ban strong encryption; replace local election voting systems with first-past-the-post, killing off minor parties, abolish the Serious Fraud Office (which had an unfortunate habit of picking on Tory MPs); they even included ending a ban on the ivory trade, because, why not. And it looked like it would win; all the polls showed commanding leads. Britain would vote Conservative, because it believed it deserved to be punished. Or perhaps, however unpalatable the Tories' programme was, the alternative was unthinkable, so bitter medicine it would have to be.

Things tightened during the election. (It didn't help that Theresa May didn't cope all that well when things weren't under her control, and tended to freeze up like a broken Dalek when confronted with questions from members of the public; empty warehouses and squads of pre-vetted party volunteers were soon found to mitigate this.) Things, however, could be expected to tighten. It's all part of the pantomime of the great carnival that is a general election: the old order is temporarily inverted and those who govern are briefly at the mercy of their subjects. Still, the vast majority of polls pointed to an increased Tory majority, if not quite the epic landslide promised, but still a healthy mandate.

It didn't work out that way. As soon as the polls closed, the exit poll (which has a much higher sample size and resolution) indicated a hung parliament. As the night went on, this bore out in results: Tory seats falling to a Labour party buoyed by an unusually high turnout, especially of young people traditionally written off as apathetic. (Somehow enough millennials took a break from Snapchatting selfies or eating avocado toast in pastel-coloured onesies or whatever it is the snake people reportedly spend all their time doing and got out to vote, swinging entire seats. One can probably add neoliberalism to the list of things millennials are ruining.) By the morning, a hung parliament was confirmed.

May didn't waste any time, and secured a minority-government deal with the Democratic Unionist Party, a far-right religious-fundamentalist party from Northern Ireland with shadowy links to Protestant paramilitary groups; together, they have a working majority of one or two seats. Things get interesting when one considers that the DUP are opposed to the restoration of a hard border in Ireland (making leaving the customs union much more complicated), but also opposed to Northern Ireland having any special status within the EU (as that'd be caving in to the papists south of the border). They get even more interesting factoring in the fact that a significant number of the Tories' MPs are in Scotland (where the SNP had a very bad night), and thus prohibited by the English Votes for English Laws convention from voting on purely England-and-Wales matters (such as anything to do with the NHS or education). If this holds (and, in the ad hoc world of Westminster, especially under the reality distortion field of a right-wing press, nothing is certain), it means that the government will not have a majority to pass much of its programme; and even that which isn't covered could fall prey to dissent within the party. A further question is that of Theresa May's career. She may have reasserted her authority over her party for the time being, but she did gamble on an unnecessary election, and the Conservatives' losses are at least partly due to her performance. History's judgment of May will not be favourable; as Charlie Brooker put it, “the history books will say Theresa May poured her legacy into an upturned crash helmet and shat in it.”) Meanwhile, Boris Johnson (the classically eloquent yet buffoonish Bullingdonian partly responsible for the whole Brexit omnishambles thast led us here) is said to be preparing for a challenge. Which could mean that, soon, both sides of the pond will be ruled by the hosts of a species of hirsute parasitic brain slug.

If there is a winner of the night, it is the Labour leader Jeremy Corbyn. Previously written off as unelectable, Corbyn has galvanised the party base and the voting public, and achieved the highest vote count for Labour since Tony Blair swept to power 20 years ago. And it's Blair's legacy—a focus-grouped managerialism, bedded on the certainty of Margaret Thatcher's neoliberal axiom, “there is no alternative”—that Corbyn has put to rest. It will be a long time until we see a bland, well-scrubbed Labour politician announcing that the party has the value of “having strong values” or some similarly content-free pabulum. And given the Tory minority government's tiny working minority, and the certainty of byelections, Corbyn may yet be Prime Minister sooner rather than later.

In summary: strap in. This ride's just beginning.

jeremy corbyn politics thatcherism-blairism tories uk 0


          Free Tool Kaspersky Anti Ransomware   
image source: Kaspersky

Ransomware is indeed a very dangerous threat in cyberspace. Especially for those who have any important data. Ransomware also commonly used by hackers as a means for ransom to the owner of the data. Moreover ransomware has the ability to lock your important data with encrypted state. And to unlock the encryption, the data owner was usually asked to pay a sum of money to the owner of ransomware.

Looking at how the dangers and harm a ransomware, do not be surprised if the owners of critical data also need tools that can provide protection. And Kaspersky also now provides a tool that can be used as a means of protection from the dangers of ransomware attacks. Interestingly, Kaspersky also provides protection tool free anti ransomware.

The launch of this tool is specifically anti ransomware is provided by Kaspersky to be used for small and medium scale businesses. Moreover, companies in both segments usually do not have enough funds to be able to recruit security personnel who can overcome ransomware attacks. Moreover, the funds to make up the critical data hostage.

Tool called by the name of Kaspersky Anti-Ransomare Tool for Business can be used in conjunction with antivirus software from third parties. Moreover, this tool provides extra protection against ransomware attacks. For those who are interested in using these anti-ransomware, can download it directly on the official website of Kaspersky.

          There Pokemon Go Compromised Ransomware and Backdoor   
VIRUSBAHAYA.KHZ-NOTES

Existence game made Niantic Labs, Pokemon Go, is not in doubt. Since the initial release in mid-July and then the game is widely played. Not only that, this game also managed to lift Nintendo stock value and make Niantic Labs earned income of up to 2.6 trillion rupiah.
But the success of this game was also widely used by people who are not responsible. This is as reported by Softpedia, Monday (08/15/2016), said that there are programs Pokemon Go on the computer, but it has been inserted by a malicious ransomware.
Pokemon-go-ransomware With Pikachu display application icons, when the program opens the files on a victim's computer are encrypted directly. Then the program will create an admin account with the name "Hack3r" and then hidden through the registry are made.
In addition, to ensure this ransomware remains active on the victim's computer, this ransomware will reproduce itself on the system and all of the existing drive, and then create an autorun file to run automatically. What's worse, if the infected computer is connected to the ransomware flash disk or external hard disk, it will automatically copy itself on the device.
The researchers say that this ransomware using Hidden Tear Project, which is an open-source ransomware which was released in 2015 and then, and equipped with an encryption backdoor. Reportedly ransomware is still in the development stage, but researchers believe that if this ransomware spread, will cause severe paralysis rate.

          Comment on History…signed with Adobe products: US District Court Judge issues first digitally signed judicial order by verisign ssl encryption   
This is a really interesting post and it symbolises a big difference to judicial orders as long as there are no hiccups further down the line. Using digital signatures, it means that things can be done a lot quicker and just this month, a news report has suggested judges at Kane County are issuing court orders faster than ever because of it.
          Washington, DC App Con Trip April 17-19, 2016   

Originally posted on: http://geekswithblogs.net/dnoderer/archive/2016/04/13/washington-dc-app-con-trip-april-17-19-2016.aspx

We spend most of our time developing custom software solutions for companies.

As Washington policymakers consider action around critical issues including data security and encryption, government access to digital information, and the expansion of computer science education, they must understand the perspective of small software companies. In all of these cases, federal laws could change how we approach software projects.

For the past 6 years I’ve been privileged to travel to Washington, D.C. and participate first hand. This year I will be attending ACT | The App Association’s App Economy Conference from April 17-19 2016. There, I’ll join tech executives from across the country to network, learn, and engage elected officials on the most pressing issues facing the internet economy today.

This is a unique opportunity to learn how our government works (better than you might think!) and help educate our government officials and staff about the complex and ever changing technical world we live in.

I know from past experience that people in the house, senate and various government agencies appreciate a ground level view of these issues from small businesses.

You can stay up-to-date with the group’s activities in D.C. on Twitter by following #AppCon16.


          ACT Flyin Washington DC - 3/22-24/2015   

Originally posted on: http://geekswithblogs.net/dnoderer/archive/2015/03/26/act-flyin-washington-dc---322-242015.aspx

This past week I visited Washington, DC to take part in the annual ActOnline.org "flyin". Each year this organization of ~ 5000 software companies hosts 50 software and app developers to visit Washington and give briefings to capitol hill staffers and members on a number of subjects.

This year we discussed patent reform, access to cloud data here and abroad, child safety and privacy, internet domain name policy, device encryption and net neutrality.

On Monday we had briefings and discussions on the current status and issues on these and some other topics. The briefings last all day and are led by the ACTOnline staff but are very interactive.

This was my 5th fly in so I'm almost an old pro at it. Approximately 25% of the people are new each year with 75% alumni. For various reasons some people skip years or stop coming but there were a lot of familiar faces, many of whom I knew from other software conferences and organizations. There is a wide variety of age, gender and actual working skill sets but all are entrepreneurs and do or cause software and apps to be developed.

Patent reform has moved along recently with house bill HR.9 (aka "The Innovation Act") introduced last year and re-introduced this year in the house. It does have a lot of bi-partisan support with some sticking points. The purpose of this bill is to try and control "Patent" trolls. These are shadow companies (layers of corporations) that prey on small companies trying to extort money.

While we all believe in a strong patent system and of protecting intellectual property there are some bad patents and people exploiting the process. What happens is that a patent owner creates a list of target companies, most likely thousands, who MIGHT be violating the patent and send demand letters, not to sue but to try and get the company to send say $10,000 to settle. The letters are very vague because the company sending the letter has no idea if the target company is using the technology or violating the patent.

It is estimated that it costs $650,000 to fight a patent claim for under $1,000,000. Especially for a small business, it is cheaper to just pay the money which many do. Those a bit more savvy just ignore it to wait and see what happens.

The major points of the bill are forcing the claim letters to have clear and specific indication of what the patent violation is, transparency in patent ownership and it can cost a lot to find any details. Finally there is a fee shifting provision to force the party losing a frivolous challenge to pay the winners legal fees. This is under control of the judge so is not automatic. We want to keep a strong patent system!

Another aspect of the patent system where we asked that congress support the patent office making sure that the patent fees are used to train existing and hire more patent examiners. Having clear patents in the system will make enforcement easier and clearer.

A second area we discussed was the LEADS (Law Enforcement Access to Data) Act. From our standpoint the cloud is essential for our business and government actions threaten the cloud. The Department of Justice claims they have the authority to access the data of ant US country no matter where in the world it is stored.

Our concern is that we will be put in a situation where we have a choice of breaking a US law or breaking a law in another country. One of our members is based in the US with a partner and servers in Sweden. This Act will clarify that US law enforcement must comply with the law of the country where the data resides. The Act also provides technical updates that will greatly improve the speed and efficiency of information exchange. There is long standing precedent for cooperation between countries in the case of criminal search requests, we just ask that electronic data be given similar treatment as physical property.

One example given is say a foreign national has committed a crime and US law enforcement wants to search the hotel room at a Marriot in Germany. We would not expect that Marriot, a US company would allow that unless German laws were followed.

Internet governance is another area we discussed. Startups, small businesses and in fact the entire internet economy relies on a free and open internet and the Domain Name System (DNS) to allow business to be conducted. We are in the process of transitioning the oversight of ICANN (Internet Corporation for Assigned Names) from the Department of Commerce to a consensus driven, multi stakeholder structure. We want to make sure that procedures are in place to handle potential meddling or blocking by bad actor countries. Our request is that congress keeps a close eye on this transition to make sure the new process is robust, we only get to let go of it once. During our meetings, ActOnline President Jonathan Zuk was in Istanbul working on this process.

Another important area is online privacy for children. There is a FTC rule called COPPA (Children's Online Privacy Protection Act) that anyone collecting information from children needs to follow. Our organization and Moms With Apps has established a branding of "Know What's Inside" that members pledge to follow a set of requirements that actually go beyond COPPA. Unfortunately the FTC has not been enforcing this act and a number of large companies are getting away with violations of COPPA. We are asking congress to compel the FTC to start enforcing the laws already on the books not come up with new restrictions.

There are a few other areas but these are the main topics we discussed…

Visit http://www.ActOnline.org for more information.


          Adam Williamson: Gadget update   

Well, I promised, so time for a gadget update!

The keyboard is working out great. So great in fact I haven’t bothered switching back to the Model M since I got it, and I just took the M back down to the basement. It’s noisier than a rubber dome – especially the way I type, I bottom out a lot of the time – but still a lot quieter than the M. Zero problems to report, consider the Leopold keyboards to have the highly sought-after HA Seal of Approval.

The tablet showed up too. It turns out to be a demonstration of my reading comprehension issues, as apparently I ordered an Ainol Venus (also referred to as the ‘Flame II’), not a Flame. So it doesn’t have the SoC I was hoping for, which is a shame, but my own silly fault. It has an Atmel quad-core processor, apparently, which is about as fast as but completely different from the dual-core in the Flame II.

As an Android tablet, it seems to be fine. The stock firmware is a bit slow, but there’s an update which makes things a lot smoother. The firmware update process is somewhat hairy (and entirely Windows-dependent, unfortunately) – reminds me of upgrading the firmware on old Windows phones five years ago, nothing at all like the typical and fairly smooth process for third-party ROMs with a third-party recovery – but if you follow the instructions someone posted in the thread, it’s easy enough. I expect a CM build will show up at some point, but the updated stock firmware actually seems fine; it’s rooted out of the box, not loaded up with crapware, pretty recent (4.1) and doesn’t seem buggy. The only thing that worries me somewhat is the encryption option is missing from Settings…on a tablet from a random Chinese vendor…hmm. Well, I like living dangerously! If this blog suddenly starts hosting enthusiastic posts about road building operations in Guangzhou, you’ll know why.

The hardware’s fine, much more polished than the early generation of craplets – it could pass fine as something from HTC or Samsung or Acer or any other typical brand if you filed the logos off. The touchscreen is responsive, the display is nice (if a tad glossy), the sound works, there’s really nothing to complain about. It does the job.

Unfortunately I decided to use Angry Birds: Star Wars to ‘test the gaming capabilities’. I have been testing the gaming capabilities religiously and to the exclusion of sleep and food for about the last two days (I exaggerate…but only slightly). Now I remember why I took that solemn vow not to play addictive puzzle games; my ability to resist addiction is so low it’s comic and tragic at the same time. Must…get…three…stars…

Footnote – if anyone wondered what my take on this whole Canonical Mir kerfuffle was:

No. Just no.


          An Ounce of Precaution   


Bid Farewell to Another Year


So, here we are ticking away the last few days of yet another year. Boy, time sure goes by fast, as i am sure you will agree. Just as time goes fast, so do hackers who are out to steal your identity.

Even though some of you may think that identity theft could never happen to, just wait...it will. On the other hand, for those of you how believe in “a pound of prevention is better than cure” can adopt these New Year’s Resolutions.

A Small Amount of Prevention


First, make a valiant effort to keep your passwords secure. If you don’t you may wind up in the pack of those folks who accounts get hacked in the coming year.

The most commonly hacked accounts are those with dictionary term or common name passwords. Yeah, I know blah, blah,blah. Over and over again we keep hearing that we need to use stronger passwords and it is so true.

According to a recent study by CBTNuggets, the top 10 common words found in passwords of hacked accounts were:

  • Love
  • Star
  • Girl
  • Angel
  • Rock
  • Miss
  • Hell
  • Mike
  • John



The study also states that passwords with elements of account usernames and first names such as Lisa, Amy, Mark and Scott were also high on the list of hackers.

Don’t Become One of Them


If you don't want to become part to next year's possibly 500 million account hack, try using a random password generator to create a strong password. There are several generators on the Internet that allow you to customize the elements of a random password.



Okay, Okay… I can tell that many of you are scowling at me right now...


Yes, I know...random passwords are harder to remember, but think about this, the easier you make your password, the easier it is for the hackers to get to your personal information.

For example, if you keep using easy passwords and you tell all of your friends on social media that you just got lucky and won &10,000 from a lottery ticket and that social media post was public and not private...you just told the whole world!

And that whole world includes criminals that are monitoring social posts just like that and now they have your name and maybe your brother's name and the race is on…

It only takes 2 or 3 small pieces of information to be able to find other pieces of your identity and then WHAM! -- all of a sudden you can’t buy that fancy new car...motorcycle...pay for that long awaited vacation to the Caribbean because a thief opened credit accounts in your name and now your credit rating is in the toilet...YES IT CAN HAPPEN that fast.


A Password Solution


There are many companies that offer password storage and encryption services for free or a very nominal fee. Here are links to a few for you to check out.




          Communications Field Engineer - Arcata Associates, Inc - Tonopah, NV   
Experience with microwave communication links, transmitters, receivers, Ethernet and IP data networks, encryption equipment, video transport systems (analog and...
From Arcata Associates, Inc - Thu, 25 May 2017 16:33:22 GMT - View all Tonopah, NV jobs
          Raritan PDUs & KVMs   
 Raritan are a worldwide distributor of:   Power Distribution Units DCIM Software KVM Switches Audio Visual Equipment Rack mount Console Drawers and much more…..   This article will concentrate on their 2 Lead Products   PDUs (Power Distribution Units) KVMs (Keyboard, Video and Mouse Switch)   Smart Rack PDU     Raritan have over 25 Years experience working with PDUs,  in which time they have adapted their own style with such unique selling points as the use of different colours to identify incoming feeds.  Alongside this they use Secure Lock outlets and power cords, which cannot be accidentally unplugged or vibrate loose.   Their integrated “Magical USB” Ports allow for increased connection possibilities such as USB Wifi, Faster Setup through USB Sticks, Cascading multiple PDUs, improved security with USB cameras, plus connections to many universal devices such as iPad   All Raritan PDUs are protected with levels of encryption which meet government, military and IT Security standards, ensuring the highest security on all your data, user logins and connections   Alongside all of this, their DCIMs configurable dashboard can be used to track all power loads, trends, capacity and even temperature in real-time.     KVMs     Also having over 20 Years experience in KVM, serial and remote-access solutions,  Raritan encompasses 5 generations of products in over 50,000 worldwide locations. With advances in Cloud Based Technology, their KVMs now allow BIOS-level access to PCs and Servers remotely, giving you the freedom to re-boot, re-image, monitor or troubleshoot your machine from anywhere   Audio and Video streaming over IP can now be available in much higher quality, HD resolution (1920 x 1080) and even BLU RAY Quality up to 30 Frames Per Second utilising Raritans new KXIII Usr Station   Rairtans KVMs support the broadest array of Video Formats available on the market.  With VGA, HDMI, DVI and Display Port being the most popular / common   As with the PDUs, the security encompassed by Raritans KVMs meets government and military grade standards, encryptions and authentifications and, again as with their PDUs, they are accessible remotely through BIOS-level access on iPhone and iPad   Other Raritan KVM features include:   Dual Power Supplies Dual Gigabit LAN with automatic failover Remote Power Control Connection Secure Remote Management     For more information on PDUs, KVMs or any of the products from the Raritan range:   Call: 0800 652 1649 Email: sales@servercase.co.uk Live Chat with us on our Homepage www.servercase.co.uk   We look forward to hearing from you
          Gigabyte Presents Its Latest Dual Socket Workstation Motherboard   
Supporting 3-Way Graphics & SAS 12Gb/s Storage Today we are happy to present today the MW70-3S0, our latest dual socket workstation motherboard based on the Intel C612 chipset. It joins the single socket MW50-SV0 to complement GIGABYTE's line of 2011-3 socket based workstation motherboards, and offers workstation builders a high end product featuring the latest technologies and the most reliable components. The MW70-3S0 has been designed with flexibility in mind, through large memory, storage and PCI-Express platforms that will satisfy the most demanding performance requirements of professional workstation users.     Click here for the complete MW70-3S0 specifications 3-Way Graphics With the support of 3-way NVIDIA SLI & AMD CrossFireX technologies, this board can support up to 3 GPU cards running at full PCI-Express Gen3 x16 bandwidth. It is therefore targeting workstation applications where a 4th GPU card doesn't bring any significant marginal output improvement. This product is an ideal motherboard to build workstations dedicated to computing and graphics intensive applications, such as: 3D modeling, rendering, animation, etc. Audio & video production Small scale scientific analysis & simulation  SAS 12Gb/s Storage With an onboard LSI SAS 3008 controller, the MW70-3S0 supports up to 8 SAS drives running at 12Gb/s via two mini-SAS HD connectors. In addition to its ultra fast transfer rates, this controller is also capable of aggregating any SATA and SAS drives into a single 12Gb/s data stream thanks to the LSI DataBolt technology. Users can therefore enjoy a 12Gb/s speed while using lower grade 3Gb/s or 6Gb/s drives. This can bring a significant upgrade to a system without having to invest in new and expensive 12Gb/s SAS drives.      DDR4 Memory Performance Edge On Intel's previous server platforms, by design the maximum supported memory frequency has always been automatically downgraded the more DIMMs were being added on a server motherboard. As this trade-off between performance and capacity represents a dilemma to many memory-hungry server applications, GIGABYTE offers a unique solution. All the GIGABYTE boards based on the LGA 2011-3 socket support by default a maximum frequency of 2133 MHz in any memory configuration :     Easy BIOS Update Because updating the version of a BIOS can be a troublesome experience, GIGABYTE has developed an integrated function (no utility to install) that lets you update the BIOS of your motherboard(s) : Without having to install CPU(s), memory, drives, operating system, etc. Without having to power on the system (but a power supply must be connected) One board at a time via our standard IPMI 2.0 web interface Multiple boards simultaneously via command line   Intel Xeon Processors E5-2600 V3 Based on the Haswell microarchitecture, this Intel processor family features a whole new set of performance enhancing features over the previous generation. In addition to the usual boost in frequencies and core numbers, the Intel Xeon E5-2600 V3 family is the first in the server industry to support the brand new DDR4 memory technology.  Moreover, these processors include encryption performance overhead reduction features, and technologies improving run time and migration VM integrity.     DDR4 Server Memory Support  The Intel Xeon E5-2600 V3 family is the first generation of server processors to support exclusively the new DDR4 technology on the market. Still built on a quad channel architecture, these new memory modules feature a increased stock frequency of up to 2133MHz and a lower voltage of 1.2V per module. Together, these two main improvements can not only deliver a large bandwidth performance boost to memory intensive applications, but also considerable energy savings to large scale server deployments.To read more infromation on the Gigabyte Server MW70-3S0 and to buy online, click here. To discuss your Gigabyte server requirements please contact us.
          New Supermicro X10 Motherboards In Stock!   
Server Case UK is delighted to announce the availability of the latest generation Supermicro X10 motherboards, compatible with the Intel Haswell and E3-1200 V3 Series CPU’s. With energy and expansion costs rising worldwide, Data Centres and Cloud service providers need server and storage solutions that offer greater savings in operating efficiency and capacity. To achieve these goals Supermicro leverages its deep expertise in server technology to bring customers its newest, X10 series of server solutions and motherboards. This latest generation of Supermicro motherboard supports loads of new features, such as the Intel® Xeon® E3-1200 v3 CPUs and up to 4 DIMMs operating at 1600MHz, with enhanced I/O performance provided by USB 3.0, PCI-E 3.0, SAS 2.0 or SATA 3.0 (6Gbps) HDDs, and quad Gigabit Ethernet LAN technologies. Power efficiency is improved with DDR3L (1.5v) support, LV CPU SKUs, Gold Level high-efficiency power supplies, and application optimized cooling. Supermicro on-board IPMI 2.0 provides cost-effective remote management for latest generation, high-performance SuperServer® solutions.There’s various reasons to choose the new X10 motherboards over existing X8/X9 series Supermicro boards; E3-1200v3 22nm Tock Haswell E5 V2 Tick 22nm Ivy Bridge End Of Qtr Tick 18% Energy Efficiency Increase 38% Increase In Performance Graphics Improved Io Transfer Speeds Low-Voltage Memory Option AVX 2.0 Enhanced Compute Performance Enhanced Encryption Intel OS Guard Protect From Malware Software Raid Performance Increase OS Guard BIOS Has Protected And Non Protected Areas Encryption On PCH Chip OS Guard On Die Win And Linux Data Protect Tech With Secure Key Key Generation On Chip H/W cannot be hacked - FIPS 2 Cert Graphic Improvement HD Graphics For Entry-Level CAD SAS or SATA Supported Raid Level Migration Online Cap Expansion We have the full range of Supermicro X10 motherboards available on our site to view and purchase. Click here to view full range of Supermicro X10 motherboards.
          Why should I get a guest Wi-Fi network? Three reasons it makes sense   
There’s no beating the convenience of wireless networks, from your local corner coffee shop to your local supermarket. Wi-Fi is so popular and effective that some new small businesses’ have scrapped wired networking all together in favour of the fast 802.11n and 802.11ac Standards making the travelling desk a new concept for business users.  But, should small business owners also consider creating a separate Wi-Fi guest network. A guest network allows users a different SSID from the wireless network that employee’s access. It’s designed specifically to provide visitors with internet access whilst maintaining the security of your own business network removing the possibility of viruses being spread from third party computers into your network. Reason number one then is security. As well as being a great way of stopping viruses from spreading easily into your businesses system it also controls who has access to the companies many resources, be they shared drives, servers, NAS boxes or even printers. This is of course of high importance due to their being several clever Trojans and malware which can use a visitors laptop or mobile device as a launch pad to probe or attack machines on your network and allow access to the above mentioned resources. Moreover, setting up a guest Wi-Fi network fir visiting clients, customers and vendors lets you keep your primary networks security password secret. This is an important thing to consider given that many small businesses likely rely on a static passphrase for its internal users. An alternative however is to change the password after each group of visitors, which although a solution is not a practical strategy and can cause you more problems. Reason number two, increased convenience. Whilst the security of a wireless transmission is primarily related to the type of encryption used the length and complexity of the password is another thing which can influence you. As you can imagine, attempting to key in a 25/30 character passphrase correctly can be an error prone and frustrating experience for everyone. However, an eight to ten character code is far easier, though more susceptible to a brute force attack.  Due to the segregation of a guest network this keeps your risks to a minimum. For better security, change the passphrase for the guest network regularly, print the latest code on slips of paper and then hand them out to your authorized guests as needed, alternatively control access to your guest network via computer names and user accounts for regular guests. Last but not least; control of network usage. A guest Wi-Fi network also lets you limit the internet resourced available to your visitors. Instead of allocating guests the same priority of your bandwidth, you can restrict the guest network to a speed that offers your guests reasonable access without slowing down all other users on the network. Though it should be noted that not all Wi-Fi access points support the capability to deploy more than one network, though this shouldn’t be a problem in business grade Wi-Fi systems. Even virgin media’s ‘Super Hub’ now supports guest Wi-Fi networking for a business on a budget. If your company doesn’t yet have business grade Wi-Fi and you’re not keen on changing your existing Wi-Fi infrastructure, you could always deploy a parallel network for guests.
          Top ten reasons to say no to virtualisation   
Cesare Garlati, VP of mobile security at Trend Micro, agrees. At the recent RSA Conference 2012 in London, he suggested ten different situations when the right thing to do is turn your back on your hypervisors and run applications as nature intended — on good old-fashioned physical server iron:1. If going wrong is not an option. In other words, if you have something that works and needs to keep working, then what's the point in introducing the complexity and unknowns of server virtualization – and thereby risking downtime?2. When licenses don't allow it. Some applications' licenses simply don't allow them to be run in virtual machines. You don't want to be doing anything that contravenes the licenses your company agreed to (you did read the license before opening the packaging, didn't you?), so that means server virtualization is out of the question in these cases.3. with high I/O apps, specialist hardware or dongles. Some applications with high I/O characteristics like databases (or anything that requires tuning to work with the underlying server hardware), grid or distributed SMP applications that need high speed interconnects, graphics intensive apps, or applications that require hardware cards or dongles are a no-no when it comes to virtualization. Don't even think about it.4. When time synchronization is critical. Virtual machines run their own clocks, and that means the time they keep will diverge from the host server's clock over time. If very small divergences are critical — as may be the case with financial real-time trading or some industrial control systems — then stick to physical systems.5. When you don't have the budget to do it right. Server virtualization may save money, but to do it properly takes some money, too. That means there's no point going in to a virtualization project half-cocked: if you can't pay for the tools and management systems required to support virtualization technology then you are better off leaving it alone.6. When capacity is limited. Despite the improvements made in recent months and years, there's no denying that a VM running on top of a hypervisor is not going to perform as fast as a physical machine running the same OS and applications directly.So if your servers are currently running at pretty much full capacity then there's certainly little point in adding a hypervisor to the equation. You could always buy more servers to run hypervisors on — but virtualization is meant to enable you to cut down on your physical servers, not force you to buy more.7. When you need to manage encryption keys. Key management is easy on physical servers, but the same systems won't work with virtual workloads that move from physical machine to physical machine. There are solutions and workarounds, but you'll have to investigate them before you can carry out secure key management on VMs.8. When high availability is baked in to the application. Virtualization platforms like VMware's offer high availability services of one kind or another for VMs. So far so good. But older mission-critical apps may have HA (High Availability) built in, and that may not work when virtualized.For example, Microsoft Cluster Service with a shared disk will break in environments that allow VMs to move around automatically. The upshot, concludes Garlati, is that if your VM platform provides HA then you better make sure that your apps don't — and vice versa.9. To save money on VDI. This is a simple one really. Garlati insists that despite the fact that there are plenty of benefits to VDI – better security, for example – you shouldn't expect it to save you money. If that's your primary objective, don't virtualize your desktop.10. When there's a risk of a virtualization loop. If you try to virtualize the components of your virtualization platform, you could end up in trouble. For example, if your virtualization platform and hypervisors rely on AD (Active Directory) and DNS, and your AD and DNS servers are virtualized, then your hypervisors won't start as they are its waiting for AD, and AD won't start as it's waiting for the hypervisor. It's a viscous circle you should avoid at all costs.
          Encryption, security and liberties: position of the "Observatoire des Libertés et du Numérique"   

Paris, 14 june 2017 — For some time, political authorities are trying to question the technical and legal protections guaranteed by encryption tools. To oppose these dangerous proposals, the Observatoire des Libertés et du Numérique (Freedoms and Digital Observatory)1 publishes its position on the defence of the right to encryption, a tool indispensable to protect freedoms in the digital age.

Press release by the Observatoire des libertés et du numérique (OLN)

Right click here to download the full position (PDF)

Position summary

In the digital age, legal and technical surveillance capabilities of States have become so advanced that fundamental right to privacy, cornerstone of freedoms of expression, opinion and information, has been challenged lately in France as well as throughout the world.

As such, the capability of encrypting digital communication and data is mandatory in order to preserve fundamental rights and liberties. Encryption remains one of the last barrier against arbitrary and illegal intrusions, either from States, the private sector or criminals.

However, encryption goes far beyond human’s right concerns: since digital technologies are now a part of all human activities, weakening encryption, no matter the technique used, would weaken the economy as a whole, as well as our collective public safety.

It is worth repeating that no technique of systemic weakening of encryption could only targets criminal activities: every citizen could also be a potential target. There is no encryption-weakening technique which would only benefit to “well-meaning actors”. If a backdoor is created for State activities (police, justice, intelligence services…), any other actor (other States, criminal organisations, hackers...) could potentially use it as well.

Is encryption used by criminals? Yes, because of their inner illegal nature, criminals try to hide their activities. But encryption is also used on a daily basis by every citizen, for almost every digital activity. Criminals can plan their activities in a closed car. Nobody would even think about banning cars, or systematically put a wire inside recording information directly accessible by State authorities.

However, this is the logic defended by those in favour of the criminalization or weakening of encryption. In the same way, technical capabilities for recording places (such as a car) where criminal activities may occur exists, and should be regulated by law, the technical and legal frameworks surrounding State capabilities for interception and decryption have been largely expanded in the last years, giving State agencies many opportunities to gather evidence against suspected criminal organisations.

Benefits provided by further weakening of encryption to fight criminality seem very low, if not uncertain. What is certain though, are the devastating consequences for citizens’ rights and liberties, for the country's economy and safety, and for society as a whole.

Proposals of the Observatoire des libertés et du numérique

Both technical and legal capabilities for surveillance in today’s digital age are such that the fundamental right to privacy that guarantees freedom of expression, opinion and information in a democratic society has been severely challenged for the past few years, both in France and the rest of the world.
In these circumstances, the capacity to encrypt one's digital communication and data is an essential condition for collective security and the proper functioning of the economy, on one hand, and for the preservation of fundamental rights and liberties on the other, as it prevents arbitrary and illegal intrusion of numerous actors, be they state actors, private companies, or criminals.

The “Observatoire des libertés et du numérique” calls on public and private actors in the digital sector to:

  • abstain from all initiatives, be they technological or legal, that would weaken encryption tools;
  • consult relevant civil society stakeholders and institutions sufficiently in advance of any project that would have consequences on encryption;
  • guarantee all individuals access to strong encryption, an essential tool for the respect of privacy in the digital sphere;
  • promote the importance of data and communication encryption to the public, and facilitate the use and development thereof.

The full position is available here (PDF)

Members of the OLN : Amnesty International France, Le CECIL, Creis-Terminal, La Ligue des Droits de l'Homme (LDH), La Quadrature du Net (LQDN), Le Syndicat des Avocats de France (SAF), Le Syndicat de la Magistrature (SM).

AttachmentSize
201701.oln_.encryptionsecurityandliberties.trad_.pdf388.66 KB

          ePrivacy : no time for weakness   

Paris, 13 June 2017 — June will be a decisive month for the future of our privacy and the confidentiality of our electronic communications. The future "ePrivacy" Regulation now being debated in the European Parliament is divisive, brings back unpleasant memories from when the General Data Protection Regulation was negotiated. Since the publication for opinion of two utterly opposing reports, all eyes are now turned toward the main rapporteur, Marju Lauristin, who is supposed to present her text on June 21. Will we see courage or weakness in the face of the lobbies? Civil liberty and innovative models, or exploitation and surveillance capitalism? La Quadrature du Net has made its choice, and will certainly continue to defend it over the long months of negotiation ahead.

For the past year, the question of privacy and confidentiality of electronic communications has been on the agenda of European institutions.
By means of a revision an old 2002 "ePrivacy" directive, the EU wants to review the rules surrounding the confidenciality of our communications and devices (phones, computers, etc.). This is a very sensitive topic, because it aims to protect our personal privacy at a time when it's being seriously endangered by state surveillance and the constant tracking by private actors, mostly for commercial purposes.

After the European Commission presented its draft proposal in January, the file was sent to Parliament, which is now working on it. La Quadrature du Net -- along with other fundamental rights organizations -- has worked within the Parliament since the beginning of the year to assert the importance of strong, ambitious rules to break from the status quo and provide real protection for European citizens. Unfortunately is comes up against industry's furious lobbying and the ever-present argument over the "balance" we're supposed to find between fundamental rights and business.

This rhetoric of "balance" is intolerable, because it seeks to make us believe that today's "balance" currently leans in favor of protecting our rights and liberties, and that we have to re-balance things in favor of industry and business. That's a lie. Individuals have no power compared to service providers. Their personal information is wrenched from them without their free, informed consent, when it isn't simply ignored. This creation of wealth, created in the ignorance of users, also feeds the enormous databases that governments love to use for surveillance, and companies for social control, profiling, and advertising.

MEPs have a grave responsibility, because with the ePrivacy rule they have the chance to create a framework that truly protects our rights and liberties, which will lead European digital actors to invest in better models, and in that way to stand out from their competitors.

The rapporteur designated by Parliament to write the draft regulation is the Estonian Social Democrate Marju Lauristin. Her report, which should be presented to the Commission on Civil Liberties (LIBE) on June 21, is eagerly awaited. Familiar with these subjects, the rapporteur has a good understanding of the issues around ePrivacy, but she must remain firm and resist the power of industry lobbies, which will be many and diverse (telecoms operators, American net giants, the online advertising industry, the press, etc.).

Two other committees want to have a hand in the dossier: the committee for industry, research, and energy (ITRE), and the committee for the internal market and consumer protection (IMCO).

Within ITRE, the liberal Kaja Kallas has issued a half-hearted advisory. She actually improves the Commission's initial proposal on certain points:

  • Consent should be given freely and thus should not be a required compensation to access a service -- in other words, you can't be denied access to a service whose economic model is based exclusively on targeted advertising, only because you refuse to let your personal data be exploited;
  • Offline tracking of our devices should be subject to consent;
  • Member states derogations should be limited;;
  • End-to-end encryption should be encouraged and back doors forbidden.

Unfortunately Ms Kallas's report fails to limit the blank check given to service providers to exploit the data of electronic communications. Contrary to what La Quadrature recommended, consent from only one participant in a communication would be enough, according to her, to permit communications data (metadata or content) to be exploited. Moreover, Kaja Kallas didn't want to include in her report the possibility of really effective class actions for users, and hasn't increased the sanctions for enterprises which violate the rules on confidentiality for end devices.

Within IMCO, Eva Maydell (PPE) makes her business orientation quite clear, and nothing is worth keeping from her report. We won't bother listing here all the points that would have to be amended, but to sum up, Ms Maydell's report:

  • refuses to consider that the electronic communications sector requires specific reinforced protection, and instead adds exceptions to turn user consent on its head, framed as 'further purposes';
  • opposes requiring all users in a communication to consent to metadata or content collection;
  • shamelessly suppresses the entirety of Article 7, which requires service providers to delete or render anonymous the content of communications they handle, as well as metadata no longer needed to assure the communication and its billing.

Just these few examples -- if they were adopted by the IMCO committee, or worse, later picked up by the LIBE committee -- would considerably weaken the already-unambitious European commission proposal. La Quadrature calls on the European deputies of the IMCO committee to reject massively Eva Maydell's unacceptable and dangerous report.

Following on these two reports for opinion, rapporteur Marju Lauristin's proposal will be decisive, because it will be the one to guide how future debates and amendments will be organized. Should we continue to defend the few gains from the 2016 General Regulation on Data Protection (such as that consenting to the processing of personal data cannot be required for access to a service) and fight to not lower the standards set in the former 2002 ePrivacy directive (e.g., saying that consent is the sole legal basis for processing personal data)? Or should we finally abandon this defensive posture, turn to the future, and become a force in putting forward a truly innovative ePrivacy regulation? Right now the lobbying offensive, the positions of some member states, and IMCO's advisory report would tend to make us lean towards the former, but rapporteur Lauristin's proposal might -- with a bit of courage -- reverse that balance.

See also:

  • La Quadrature's reaction to the European Comission's project for a report (January 2017);
  • the recommendations for Eurodeputies on ePrivacy (March 2017). More up-to-date recommendations are being prepared;
  • LQDN's wiki on the project for the ePrivacy regulation.

          Under the hood: Vote for a decentralised telecom infrastructure!    

Paris, 7 June 2017 — The future of the decentralised nature of the Internet is at stake with the negotiations on the European Electronic Communications Code. La Quadrature du Net publishes its first voting lists on amendments that have been tabled in committees1 and refers to the factsheets (pdf) drafted by netCommons. As anticipated, the lobbying of the telcos has been very useful with many amendments - especially from the right wing - that aim to protect oligopolistic positions of major telcos, undermining any attempt of openess for new actors and rights of users.

As part of the overhaul of the Telecom Package, the European Commission has decided to create a European Code of Electronic Telecommunications. This very complex and massive bill sets the rules for co-investment, radio frequencies, access of small actors to the networks of incumbents, encryption, connectivity country planning, etc. We already wrote about this text in our piece about the main rapporteur's, Mrs Pilar Del Castillo, report.

The list of amendments to be voted on 22 June in the IMCO committee and on 11 July on ITRE committee are tabled and negotiations on so-called "compromise amendments" are ongoing. The compromise amendments reflect a very opaque and undemocratic process where, through backroom deals, Members of the EU Parliament try to shorten and simplify the vote by "mixing" their different stances on the text according to the respective weight of political groups.

Despite the fact that all compromise amendments are not published yet2, La Quadrature du Net offers an appraisal of the tabled amendments in IMCO and ITRE committees. These "voting lists" were drafted with the goal of safeguarding rights in the Code for telecommunications, and making sure that the telecom sector can open up to smaller actors, and in particular Community Networks (note that this voting list does not consider the bad amendments tabled by Pilar del Castillo that should all to be rejected).

What is at stake:

Spectrum - Radio frequencies licenses

Mrs del Castillo along with oligopolistic operators wants to extend the length of those licenses to an unreasonable amount of time: 25 to 30 years! While the bigger actors will sit on their pile of licenses and their so-called "market certainty", other actors such as smaller telecom companies and non-profit actors, will be excluded from accessing the spectrum commons. The on-going negotiations for compromise amendments should promote shared and unlicenced access spectrum, which would favor smaller operators and boost diversity in the telecom sector. To avoid the privatisation and deplation of the public radio ressource, compromise amendments should also ensure that national regulatory authorities (NRAs) will deprive an operator from their exclusive licenses if they fail to deliver on its commitments to make an effective and relevant use of the allocated band.

Access to network

To encourage local control adapted to local needs ("granularity"), and the diversity of ISPs in telecom markets, it is necessary to get both active and passive wholesale access. All actors must be able to connect themselves to the network either through reasonable passive offers (at the individual line level for example) or through active access if the size of the operator does not enable it to get passive access. The current inequality of offering for smaller actors leads to an inequality in access of the market especially for smaller localities, with significant consequences on competition, innovation, concentration of knowledge and territorial cohesion and development.

The compromise amendments must not give a priority on passive access over the active access. On the contrary, offering both wholesale reasonable passive and active access would ensure the development of small and local actors and thus enhance competition, especially on the market for private companies.3

Co-investment and competition

The major challenge for co-investment policies is to allow smaller actors to contribute and participate in the development and establishment of new infrastructures, as a way to foster innovation and economic development. Current provisions for co-investment practices do not allow non-profit or local ISPs to take part to investments, restricting this opportunity only to larger and incumbent actors. Although Community Networks and local SMEs have proven successful in connecting underprivileged communities both in urban and rural areas, it would be only normal to consider them as equal members of the telecoms ecosystem, thus giving them fair and equal access to co-investment opportunities.
Moreover, co-investment in a certain area must be considered an oligopoly of a few powerful actors (on the local level), as the FDN Federation showed in their analysis of the fixed market written for a consultation of the ARCEP in 2016. These oligopolies work as a cartel. The co-investors, in a given area, should be regarded as having the position of the incumbent in that area. Such symmetric regulation would allow welcoming all actors into the market.

Open Wifi

Several national laws seek to prevent the sharing of Internet connections amongst several users by making people liable for all communication made through their Wi-Fi connection. In 2017, two German courts have found individuals sharing their Wi-Fi connection liable for copyright infringements committed by their users, which contravene the important principles for intermediary liability set out in the Directive 2000/31/EC (Information Society Directive, also known as the "eCommerce directive"). They were found liable because, despite having been warned by rights-holders about such infringements, they did not take measures to prevent them. Such liability is a major threat for small wireless community network and a clear distortion of competition since 'traditional' Internet access providers cannot be liable for infringements committed by their users, even if they are aware of them, as provided by article 12 of Information Society Directive.

Encryption and privacy

Encrypting communications content from end to end by default is the only way to effectively minimise the impact of security incidents. Any other measure would barely have any effect. Furthermore, encryption is the main technical means by which to implement the ePrivacy Directive 2002/58/EC, article 5(1), which prohibits any “kinds of interception or surveillance of communications (...) by persons other than users, without the consent of the users concerned”. It is also an efficient way for users to implement their right to the art 7 of the EU Charter of fundamental rights that protects communications. The EECC should thus include provisions ensuring that electronic communications are encrypted from end-to-end.

Besides, the Code must comply with the CJEU ruling from 21 December 2016 (cases C-203/15 and C-698/15, “Tele2”), and include a provision that prohibits blanket data retention of traffic and location data for all subscribers and registered users.

Free software on terminals

Article 3.3(i) of Directive 2014/53/EU of the European Parliament and of the Council provides that device manufacturers have to check every software which can be loaded on the device regarding its compliance with applicable radio regulations (e.g. signal frequency and strength). Such a provision is not only a severe burden for manufacturers but also violating the customers' rights of free choice. They will be locked in to software of the manufacturers because they cannot choose the software and hardware independently anymore. This aspect is crucial because alternative, especially Free Software, often satisfies special requirements regarding security, technical features and standards.

It may severely hinder the development of radio local area networks by Community Networks, which are often managed by individual volunteers using custom Free Software adapted to such networks. Since Free Software may be freely studied and improved by anyone, they should not be subject to the restriction imposed by article 3.3(i) and the adoption of the Code is the opportunity to remove such restrictions.

Universal Service

Today and tomorrow, an Internet connection is at the centre of everyone's life. Being connected to the Internet cannot be restricted to a slow and uneven connection. Considering the importance of a public service, especially in allowing less privileged people to participate in society, the USO mechanism should be enhanced in order to enable the beneficiaries to get a broadband access. We support the draft compromise amendments from IMCO4 that seek to ensure an equality between consumer benefiting from USO and other consumers.

The European Electronic Communication Code is the only opportunity before many years to break the oligopolistic disaster in telecommunications in most Member States. We must look at the positive consequences on competition, on local socio-economic fabric and users' civil rights that the funding and development of sustainable networks will have. The threat is big and the main rapporteur, known for her close interests with corporate telcos, takes advantage of this recast to reinforce the status quo. Members of European Parliament must refuse corporate lobbies' blackmail and support initiatives that have already been successful to develop those local and sustainable networks.

Read more:


          ePrivacy at the European Parliament : La Quadrature publishes its analysis    

Paris, 6 March 2017 — The nomination of Marju Lauristin last Tuesday, MEP of the "Socialists&Democrats" group, as a rapporteur of the ePrivacy regulation on "the respect of privacy and personal data protection in electronic communications" kicks off negotiations at the European Parliament. It is an opportunity for La Quadrature du Net to publish its arguments and recommendations, which it will promote loud and strong during the upcoming months with MEPs of all political sides.

Click here to directly access the recommendations

The five years of negotiations which have been needed to adopt the General Data Protection Regulation (GDPR)1 resumed with greater intensity with the ePrivacy proposal. Given the shortcomings in the GDPR, there is still a long way to go to ensure that Europeans' privacy is respected and that trust between service providers and individuals is restored. The wind is turning and the digital lobbies are beginning to sense that it's not favorable to them: the European Commission has not yielded to their calls for the suppression of the text, and studies on this matter are multipltying to show that Europeans are increasingly concerned about protecting their privacy on the Internet. But a natural adaptation of service providers to the changes in society, so dear to the laissez-faire enthusiasts, does not seem to be under way. On the contrary, new techniques and tracking tools are constantly being developed, and electronic communications service providers increasingly seek to collect and process our metadata and analyze our content.

The future ePrivacy regulation on the respect for privacy and personal data protection in electronic communications is therefore essential to counter those harmful developments and to restore power to the users.

Yet the battle is far from won. As we said in early January, the Commission's proposal turns out to be far below what the speeches say, and the attacks from some conservative Members of European Parliament (MEP) against even the usefulness of the text are extremely disquieting.

The arguments published today are a summary of our recommendations and the points that La Quadrature du Net will promote in the coming months with MEPs and the member states. La Quadrature recommends that MEPs should:

  • cut back new opportunities for service providers to deal with electronic communications metadata;
  • force data to be processed anonymously whenever possible;
  • block third-party cookies by default in browsers (and any other access to the device by third parties);
  • rebuke the Commission's proposal allowing devices to be tracked in certain physical locations (whether private, such as in a shop, or public, such as a square or a park) and formally prohibit such highly intrusive practices;
  • limit as much as possible derogations granted to member states for national security reasons. It is on the basis of these regulations that the member states have been able to introduce data retention measures in the past, or may introduce measures which weaken encryption tools and electronic communications confidentiality in the future;
  • declare that infringing on the protection of terminal device (illegally accessing a device, or tracking a device) is a very serious violation that should be subject to the highest penalties provided for in the General Regulations on Data Protection;

These recommendations - somewhat technical - will soon be supplemented by more political explanations, that is to say arguments that everybody will be able to use, and by a calendar so that together, we can fight this battle for the defense of our privacy and to regain control of our data.

--> Link to the full analysis <--


          ePrivacy: Commission's weak proposal forecasts harsh debates   

Paris, 11 January 2017 — On Tuesday 10 January, the European Commission put forward a series of new texts on personal data protection in the EU. It includes the upcoming ePrivacy Regulation which will frame the confidendiality and security of our electronic communications, as well as the famous internet cookies, among other things. Before the legislative process had even started, lobbies from the digital industry and telecom operators collaborated closely to water down as much as possible the reform that was supposed to not only provide better security and confidentiality to electronic communications, but also to give users control of their data back. Nonetheless, civil society has not had its last word just yet. In the coming months, we are set to engage in a harsh legislative battle to make the ePrivacy a really ambitious Regulation that protects our rights and freedoms.

When the first version of ePrivacy regulation was leaked in last December1, few of us welcomed the relatively courageous direction taken by the European Commission. When telecoms and the digital industry were simply requesting the removal of the text, the Commission took, as we recommended it, the opportunity of this revision to make of ePrivacy a modern and protective text, finally in phase with EU citizens' expectations on privacy. Those expectations were revealed one by one through a consultation of the stakeholders on ePrivacy in Spring 2016 and a Eurobarometer (EU wide survey) which results were published not long ago, in December. 2

In the old version, there were still some of the recommendations made by La Quadrature and other civil liberties organisations during the last months:

  • Reaffirmation of the confidentiality principle as key to electronic communications, meaning that the content and data used to transmit our communication through email, texts or chats should not be listened to, tapped, stored, or monitored (article 5)3;
  • Regulation of new tracking methods, such as collecting the data that is automatically issued by our computers or cellphones when connecting to other devices or networks, e.g. device fingerprints (article 8.2)4 ;
  • The end-user has to give consent to the use of metadata (i.e. traffic data and location data) for purposes other than the provision of specific services (article 6.2)5;
  • Reaffirmation of the importance of encryption tools for the protection of security and confidentiality of communications. La Quadrature du Net considers that the ePrivacy Regulation is a perfect opportunity to put forward encryption tools and technologies as key to ensuring the Regulation's stated objective: confidentiality. Although the actual Commission proposal was modest, it deserves credit for being there at all (recital 37)6

This document was leaked in November and has in all likelihood provoked the anger of telecom operator and actors of the digital industry who have intensified their lobbying campaigns until the very end of December, in other words, during the last days of the redaction of the proposal by the European Commission. The latter did end up yielding on a central point and deleted from its draft the default configuration of our tools preventing third parties to store or to access data stored in our devices7. This measure, as La Quadrature was advocating for months, would mean that in practice, third-party cookies that are tracking us to sell our data to advertising companies would be deactivated by default on our devices (article 10). In the current version, it is not the case anymore, so only informed users may opt-out.

But other unfortunate surprises appeared in the regulation proposal, including some very negative points that were kept, and will be the subject of our forecoming battles:

  • the provisions on collective legal action were deleted. Collective legal action (the equivalent of US class actions) allows an individual to mandate an association or a non-profit organisation so it can file a complaint on his or her behalf (article 21);
  • localisation data generated outside the context of electronic communications are not, in the version of the proposal of the Commission, considered as metadata and thus can be used without the user's consent (recital 17);
  • the Commission didn't dare to go further and facing pressure from the adverstising industry, maintained the possibility for a website to refuse the access to a service or to the website if the user doesn't give its consent to be tracked. La Quadrature will keep reaching in the coming months to MEPs and Member States so users are not forced to accept to be tracked to access services, and more generally for the development of other economic models that don't force users to sell off their personal data.

These few points are merely the biggest loopholes that we found after a first reading, but we will complete this list if necessary following a deeper analysis of the text. This regulation proposal does have some interesting elements but it doesn't challenge the economic model of the digital industry based on the exploitation of personal data. So, last minute concessions given to advertisers and telecoms are already too big considering there are still months left of negotiations where lobbies of the industry will have all the time to undermine the text. At this time, the proposal doesn't address the concern of EU citizens on the protection of their electronic communications.

Nonetheless, civil society - including La Quadrature du Net - is not ready to give up, and will continue to reach to the EU institutions and the general public in order to make ePrivacy an ambitious text, that properly addresses security and privacy challenges raised by the development of electronic communications.

This Regulation proposal will be discussed and amended in the coming months at the European Parliament and by member states at the EU Council. To be continued...

  • 1. See the leaked version of December 2016: https://www.laquadrature.net/files/Leak-projet-r%C3%A8glement-ePrivacy%28d%C3%A9cembre%29.pdf
  • 2. "More than nine in ten respondents say it is important that personal information (such as their pictures, contact lists, etc.) on their computer, smartphone or tablet can only be accessed with their permission, and that it is important that the confidentiality of their e-mails and online instant messaging is guaranteed (both 92%). In fact, more than seven in ten think both of these aspects are very important. More than eight in ten (82%) also say it is important that tools for monitoring their activities online (such as cookies) can only be used with their permission (82%), with 56% of the opinion this is very important." See the results of the Eurobarometer: https://www.laquadrature.net/files/eurobarometer-privacy-2016-EN.pdf
  • 3. Article 5: "Electronic communications data shall be confidential. Any interference with electronic communications data, such as by listening, tapping, storing, monitoring, scanning or other kinds of interception, surveillance or processing of electronic communications data, by persons other than the end-users, shall be prohibited, except when permitted by this Regulation"
  • 4. Article 8.2 : "The collection of information emitted by terminal equipment to enable it to connect to another device and, or to network equipment shall be prohibited, except if: (a) it is done exclusively in order to, for the time necessary for, and for the purpose of establishing a connection; or (b) a clear and prominent notice is displayed informing of, at least, the modalities of the collection, its purpose, the person responsible for it and the other information required under Article 13 of Regulation (EU) 2016/679 where personal data are collected, as well as any measure the end-user of the terminal equipment can take to stop or minimise the collection"
  • 5. Article 6.2 : "Providers of electronic communications services may process electronic communications metadata if: [...] (c) the end-user concerned has given his or her consent to the processing of his or her communications metadata for one or more specified purposes, including for the provision of specific services to such end-users, provided that the purpose or purposes concerned could not be fulfilled by processing information that is made anonymous"
  • 6. Recital 37 : "Service providers who offer electronic communications services should inform end-users of measures they can take to protect the security of their communications for instance by using specific types of software or encryption technologies [...]."
  • 7. See the final version of the proposal of the European Commission: https://www.laquadrature.net/files/Leak-projet-r%C3%A8glement-ePrivacy%28d%C3%A9cembre%29.pdf

          #272 Iphone voice encryption security app - Stephen Carnes   
Worried about someone ease dropping on your cell phone calls? Then try out a new mobile application called Kryptos. "It enables you to have conversations that are free from being intercepted by anybody," Google Me Talk Radio Interviews, Stephen Carnes President of Kryptos Communications - Check it out - http://www.kryptoscomm.com
          STENOGRAFI   
      Setelah lumayan cukup lama saya menganalisa kata kunci / keyword yang masuk ke dalam blog saya yang jelek ini saya menemukan banyak yang mencari artikel tentang stenografi. Stenografi itu sendiri adalah cara menulis ringkas dan cepat biasanya digunakan untuk percakapan rahasia. Saya menemukan artikel penjelasan stenografi di wikipedia sangat buruk dan tidak jelas, mungkin perlu disunting ulang hehehe :P silahkan baca disini.
melins-stenografi
       Stenografi umumnya menggunakan enskripsi rahasia, karena bersifat pribadi teknik ini biasanya digunakan oleh para teroris internasional yang berhubungan melalui media internet, mungkin belum banyak yang tau kalau FBI berhasil membongkar percakapan para teroris ini melalui teknik stenografi gambar, lucunya gambar berisi pesan rahasia ini di selipkan di  antara gambar dalam website porno/adult sehingga memang unik dan inovatif sekali cara para teroris internasional berhubungan.
          Sebenarnya saya pernah menulis dengan menggunakan stenografi gambar beberapa waktu lalu namun karena tidak ada yang mampu membaca pesan rahasia itu maka hadiah saya buat yang mampu membaca itu saya cabut kembali. Untuk membaca stenografi banyak ragam dan caranya dan karena menggunakan “Personal alogarithm encryption” umumnya akan sulit untuk mengenkripsi balik yang sudah di enkript.
Berikut ini salah satu program yang dapat digunakan dalam encrypt/decrypt pesan dalam gambar, ini program lokal dan sudah lama dibuat oleh anak bangsa sendiri namun yang mengetahui mungkin masih minimal.

       Aplikasi ini sebenarnya menggunakan enkripsi bebas, dalam penggunaanya pesan dapat di selipkan dalam gambar namun gambar itu akan berwarna putih saja. Perlu di ingat dalam teknik stenografi ini ada beragam enkripsi yang dilakukan oleh para pembuat pesan rahasia ini. Jadi semakin teknik enkripsi itu tidak diketahui orang banyak maka akan semakin susah pesan rahasia itu terbongkar.

A. PENGERTIAN STENOGRAFI
            Sering kita mendengar orang menyebut tulisan steno berarti tulisan cepat. Hal ini timbul karena sebagian orang hanya melihat dari hasil yang dicapai seorang stenografer yang mempu menulis steno dengan cepat, seperti pada saat mencatat suatu percakapan dengan menggunakan tulisan steno. Stenografer mampu mencatat suatu percakapan dengan lengkap karena memakai stenografi, hal ini tidak akan dapat dilakukan apabila memakai tulisan latin biasa.
Stenografi berasal dari bahasa Yunani, yang terdiri dari 2 (dua) kata yaitu
“STENOS” yang berarti singkatan atau pendek
“GRAPHEIN” yang berarti tulisan.
Jadi stenografi ( stenography ) berarti tulisan singkat atau tulisan pendek. Tulisan steno dibuat dan disusun sedemikian rupa pendek dan singkat sehingga mengakibatkan cepat dalam menulisnya. Stenografi menggunakan tanda-tanda khusus yang lebih singkat daripada tulisan panjangnya ( latin), dan kemudian disempurnakan dengan menambah beberapa singkatan ( sudah singkat disingkat lagi ), sehingga waktu yang digunakan untuk menulis stenogramnya lebih cepat dibanding waku untuk mengucapkan kata yang dimaksud.
Misalnya orang yang menulis huruf latin t diperlukan 4 gerakan, sedangkan untuk menulis huruf t dengan menggunakan huruf steno hanya diperlukan satu gerakan saja. Karena hampir setiap lambang atau symbol huruf steno hanya memerlukan satu gerakan saja.
Maka karena pendeknya gerakan atau sedikitnya gerak yang dibutuhkan dalam menulis steno, stenografi jauh lebih cepat dibandingkan dengan menulis huruf latin
          Salutis Systems Announces ASYRIC – New Encryption App for Mobile Communication   

Revolutionary mobile communication app by Salutis Systems ensures users‘ ultimate privacy.

(PRWeb February 02, 2016)

Read the full story at http://www.prweb.com/releases/2016/2/prweb13183068.htm


          Device for evaluating side-channel attack resistance, method for evaluating side-channel attack resistance, and program for evaluating side-channel attack   
A side channel attack resistance evaluation apparatus includes: a measurement section that measures side channel information leaking from an encryption device to be evaluated; a noise removal section that removes noise from the measured side channel information using a band-pass filter (BPF); a passband determination section that determines the passband of the band-pass filter; and a DSCA (Differential Side-Channel Analysis) evaluation section that evaluates resistance against the differential side channel analysis. The passband determination section preferably has a DFT processing section and a power spectrum analysis section, or has a DFT processing and a DFA processing section.
          Dinosaur Comics   
Yesterday I was catching up on some blog reading and came across the 12 funniest people on the Internet. I started reading Dinosaur Comics and became instantly hooked. The comic features the exact same panels for every strip. There are three dinosaurs and they talk about everything from grammar to puns to encryption to a […]
          IT Services Specialist II - Electronic Arts - Redwood City, CA   
MS Offce Suite, MS Visual Studio, Skype for Business, Oracle, OKTA, Adobe Suite, Cisco VPN, Virtual Machines, Data Encryption, Python, Tableau, Slack, Box, Maya...
From Electronic Arts - Tue, 13 Jun 2017 05:11:07 GMT - View all Redwood City, CA jobs
          The Debate on Syria (Politics)   
I am dismayed, nay, shocked at the irrelevant drivel the mainstream media puts out about the civil war raging in Syria. The verbal diarrhea has reached epic proportions, a discourse devoid of facts, historical context and factual evidence.

There are three critically important questions which must be asked and answered before any military engagement:

  1. Who is the enemy?
  2. What is the objective, or what does "victory" look like?
  3. What are the long-term consequences?

These questions are not being asked, much less answered. Yes, there was sarin gas used in Syria, this much we know. The verifiable evidence (see the video below) points to the rebels (freedom fighters or terrorists, depending on your perspective) having used them. The "intelligence" briefing issued forth by the US government contains only opinions, conjecture and innuendo but no verifiable facts.

How does a bunch of lunatics, who have been killing each other for centuries in the Middle East, threaten the national security of the United States? If some nefarious characters have the (however slight) capability to cause us harm justifies strong military response, then all male members of Congress should be arrested for rape and all female members should be detained for prostitution — they have the capability!

For further contemplation, I suggest you read this short essay on the topic: "Is The US Going To War With Syria Over A Natural Gas Pipeline?".

To gain additional perspective and to put the matter into the proper context, please watch this short video:

Thanks for reading my rant, I had to get this off my chest. I value your comments and feedback, I learn a lot from my readers. By the way, if you have an interest in protecting your privacy, I highly recommend an unbreakable data encryption program for Windows called Cryptogra.ph — check it out.


          GD New Sectera vIPer Secure Phone Now Available   
General Dynamics Mission Systems' Sectera(r) vIPer(tm) Universal Secure Phone can now connect directly into fiber optic networks eliminating the need for converters. Users simply plug into the fiber network and use the phone immediately. The vIPer has integrated security for end-to-end encryption and is the only Voice over IP (VoIP) phone certified to protect information classified Top Secret/SCI and below when used with commercial wired networks. "Our vIPer phone is flexible. Customers use i...
          IAM Consultant - The Herjavec Group - Canada   
Experience with J2EE technologies, scripting, directories, certificates (PKI), and encryption are highly desirable....
From The Herjavec Group - Wed, 17 May 2017 15:13:43 GMT - View all Canada jobs
          Lenovo Unveils TAB3 Mobile Devices TAB3 10 Business   
Today unveiled the TAB3 10 Business, an Android tablet engineered for business use, and the TAB3 7 and TAB3 8, Lenovo’s first series of family-friendly tablets. The TAB3 10 Business is designed as the smart company-ready, employee-friendly choice, pairing the power and versatility of Android 6.0 with the optimization and services that matters most to business professionals. Offering full support for Android For Work™, the tablet also boasts an array of security and encryption options to help users keep these devices and the work-related data on them safe and secure. The TAB3 10 Business is optimized for business mobility, supporting […]
          Eliax explica y opina: Apple vs el FBI, el caso legal más importante de tiempos recientes   
Fuente: eliax.com

AppleFBI#eliaxHola amig@s lectores,

En estos días pasados ha llegado a los medios populares la noticia de la lucha legal del FBI contra Apple, un caso que he seguido de cerca desde sus inicios y que en mi opinión es el caso legal de mayor importancia y repercusión de los últimos tiempos a escala global, y hoy planeo explicarles por qué...

Pero primero, permítanme ponerlos al tanto muy brevemente: El pasado 2 de diciembre del 2015 ocurrió una masacre en los EEUU, en la localidad de San Bernardino, California, donde 14 personas fueron asesinadas, y 22 terminaron seriamente heridas. Los asesinos fueron la pareja de casados Syed Rizwan Farook y Tashfeen Malik, los cuales fueron subsiguientemente matados en un enfrentamiento contra las autoridades mientras huían.

¿Dónde entra Apple en todo esto? Pues uno de los asesinos utilizaba un iPhone, el cual estaba protegido con una clave de acceso, y a diferencia de otras plataformas el modelo de seguridad de iOS es extremadamente rígido (tanto así que ni el mismo FBI ha podido romperlo), y el FBI persuadió a un juez federal de que le ordenara a Apple romper su propio mecanismo de seguridad para ellos poder entrar al celular e investigar por pistas que aclaren más el caso.

Hasta aquí todo suena aparentemente razonable. Hasta que lo pensamos mejor y entramos en detalle, pues aquí (y como dicen en inglés) existe un gorilla de 500 kilos de peso en la habitación que todos parecen ignorar...

Para empezar, la realidad es que ni siquiera Apple mismo puede romper su propio sistema de cifrado de datos, ya que utilizan una tecnología llamada"Cifrado de datos con llaves públicas/privadas - de lo cual quizás en un futuro escriba un artículo en eliax explicando qué es eso), cosa que el mismo FBI sabe, razón por la cual el FBI pidió específicamente que Apple sencillamente rompiera la medida que bloquea el celular si una persona escribe mal su clave varias. De esta forma, el FBI podría sencillamente probar todas las combinaciones de clave hasta que diera con la clave de la persona, sin riesgo de que el celular se bloqueara definitivamente.

El gerente general de Apple (Tim Cook), sin embargo, digo que no va a acatar la orden judicial, e incluso acaba de hacer una carta pública a ser leída por todo el Internet, explicando sus motivos.

Este tema ha explotado tanto que incluso Sundar Pichai, el Gerente General de Google, ha expresado su apoyo a Apple.

Pero, ¿cuál es el problema? ¿no estaría Apple "protegiendo" a un terrorista al negarse a ayudar a las autoridades? Pues esta última pregunta es la que el Senador republicano estadounidense Tom Cotton contesta, alegando que Apple es una empresa traidora a la patria, que ayuda a los terroristas, y que además ayuda a los traficantes de drogas y violadores de menores, ya que no permite que las autoridades tengan acceso a los datos de los celulares que vende.

Sin embargo, es aquí en donde el gorilla de los 500Kg hace su aparición para el que todavía no lo ha visto...

Sucede, que es muy fácil dispararle balas a Apple y acusar la empresa de ser "amigable a terroristas" (cosa que obviamente es totalmente opuesto a la realidad), por lo que pueden tener seguros que aquí "hay gato encerrado".

Ese gato encerrado, o gorilla de 500Kg o como lo quieran llamar, es que de este caso dependerá literalmente el futuro de nuestra privacidad personal en la red. Y no hablo simplemente de los ciudadanos estadounidenses, ya que (1) los iPhones se venden en todo el mundo, y (2) como bien sabemos el resto del mundo es bastante mono a la hora de copiar cualquier tendencia estadounidense.

Si Apple sucumbe, y da acceso al FBI a ese celular, eso logrará dos cosas monumentalmente peligrosas para la sociedad en general.

La primera, es que sentará un precedente judicial que hará que todas las otras empresas puedan ser demandadas por el FBI (o cualquier otra entidad gubernamental), para obligarlas a proveerles acceso a nuestros datos.

Y la segunda, es que a diferencia de lo que alega el FBI que hace eso para protegernos, esto al largo plazo será la manera más segura de que cualquiera obtenga los medios para lastimarnos. ¿Cómo? Siéntense bien y procedan al próximo párrafo...

Sucede, que cualquier tecnología que el FBI pueda poseer para espiar en los ciudadanos, tarde o temprano estará también disponible en manos de "los malos", los mismos terroristas de los cuales el FBI supuestamente nos quiere proteger.

¿Lo dudan? Pues lean aquí sobre como hace apenas un par de semanas unos hackers lograron acceso a las redes del FBI, así como a los registros personales de más de 22,000 empleados de esa institución.

Y lo peor de todo es, que si Apple abre una puerta trasera a sus productos, que después que cualquiera tenga acceso a la llave maestra, será solo cuestión de tiempo para que esa llave llegue al mercado negro, y ya no solo será el FBI que tendrá acceso a los datos personales de cualquier iPhone, sino que también tendrá acceso a ellos cualquier otro gobierno, o Al-Qaeda, o ISIS, y cualquier otro grupo terrorista o criminal que lo desee y esté dispuesto a pagar por ello.

Pero peor de todo, es que si se sienta el precedente, ya no solo será a iPhones que tendrán acceso, sino a cualquier otro dispositivo al cual el FBI demande acceso por la vía legal. Y eso se expandirá a Android, iPads, laptops, PCs, relojes inteligentes, etc, y posteriormente citando el mismo precedente a hogares inteligentes, autos inteligentes, y cualquier otro dispositivo electrónico que se puedan imaginar.

Pero la cosa no se queda ahí, el FBI, citando el mismo precedente, también va a poder demandar acceso a cualquier red social (Facebook, Twitter, Instagram, YouTube, etc), así como a cualquier sistema de mensajería como GMail, Whatsapp, Telegram, Snapchat, etc.

Y lo peor de todo es que sería algo hecho totalmente en vano, porque desde el momento que los chicos malos sepan que los canales tradicionales ya no son seguros, sencillamente elaborarán otros mecanismos seguros para su uso ilícito (como es bueno aclarar, ya existen y se venden en el mercado negro, y son utilizados activamente por grupos terroristas).

Por lo que al final del día con lo único que terminaremos es con un escenario en donde (1) los terroristas seguirán haciendo de las suyas, (2) el gobierno tendrá control total de invadir nuestra privacidad en cualquier momento, donde sea, y en cualquier dispositivo, y (3) terminamos con un mundo mucho más inseguro en donde cualquier ciudadano puede ser investigado o espiado ilícitamente tanto por los que abusen de su autoridad gubernamental, como los terroristas de los cuales el FBI supuestamente nos quiere proteger.

Y les pregunto a ustedes, ¿de verdad creen que el FBI no sabe todo esto que les estoy diciendo? Pues claro que lo saben, pero lo que desean es control, independientemente de las repercusiones.

Así que al final del día, ya entienden por qué aplaudo a Tim Cook y a Apple, pues aquí el tema tiene poco que ver con querer resolver un caso de homicidio, y mucho más que ver con lo que sería el futuro del derecho a la privacidad en nuestras vidas...

Actualización 1: Pocas horas después de escribir este artículo, Facebook se unió a Google anunciando su apoyo a Apple en esta lucha de derechos civiles.

Actualización 2: Twitter ahora también apoya a Apple.

Actualización 3: Curiosa (e irónicamente), Bill Gates ha declarado su apoyo al FBI, mientras que Microsoft a Apple.

Actualización 4: La Fundación Mozilla (los que crean y mantienen al navegador web Firefox) también han expresado su apoyo a Apple.

Actualización 5: Un juez federal de EEUU en New York se pone de lado de Apple, un día antes de una audiencia federal ante el Congreso de los EEUU.

Actualización 6: Apple hoy 1ro de Marzo 2016 se presenta ante el Congreso de los EEUU para una audición especial en donde expone su caso para defenderse de las demandas del FBI en relación al tema de que el FBI quiere que Apple modifique a iOS en el iPhone para crear una llave maestra que permita que las autoridades tengan acceso a nuestros datos privados.

Las palabras exactas que utilizará Apple hoy para iniciar el debate, que creo son palabras de extrema importancia para todos los que valoramos el derecho a nuestra privacidad, las pueden leer en este enlace dentro del grupo oficial de eliax en Facebook.

Actualización 7: A los interesados en los asuntos técnicos de este tema, les recomiendo leer este excelentísimo artículo por la EFF (Electronic Frontier Foundation).

Actualización 8: Video completo (5 horas) de la audiencia de Apple y el FBI ante el Congreso de los EEUU. Lo pueden ver aquí.

Actualización 9: Estas otras empresas han expresado abiertamente su apoyo a Apple: Airbnb, AT&T, Atlassian, Automattic, CloudFlare, eBay, GitHub, Intel, Kickstarter, LinkedIn, Mapbox, Medium, Meetup, Reddit, Square, Squarespace, Twilio, Twitter y Wickr.

Actualización 10: El ex-Director de la NSA y la CIA, Michael Hayden, también se pone (curiosamente) del lado de Apple.

Actualización 11: Un juez ordena retrasar el juicio del FBI contra Apple hasta el 5 de Abril, para darle oportunidad al FBI a acceder a los datos en el celular "de alguna otra forma alternativa". Si el FBI tiene éxito, el juez ordenará un paro inmediato al juicio.

Actualización 12: El FBI ya pudo entrar al iPhone en cuestión con los servicios de una empresa de seguridad israelí que se especializa en encontrar vulnerabilidades de software para romper la protección de sistemas. Documento oficial (PDF)

Leer 116 Comentarios


          Iphone update kills Exchange access   
OWNERS OF OLDER IPHONES and Ipod Touches will be in for a nasty surprise if they decide to update to the latest OSX for Iphone 3.1.

The point release - which is supposed to improve security, reliability and fix bugs - also stops all devices older than the brand new iPhone 3GS from accessing some Microsoft Exchange 2007 servers, according to reports.

Users are telling us that after installing the update, a message informs them: "Policy Requirement - The account [account name] requires encryption which is not supported on this iPod/iPhone". Although the encryption policy is a server side option, thousands of users have been succesfully syncing to these servers for many months without problem.

Which leads us to conclude that Apple devices have been misleading Exchange servers into thinking that they are capable of carrying out the level of on-device encryption demanded by their system administrators when they quite clearly are not.

The fact that Apple has been loudly extolling the virtues of the iPhone as a business class device whilst potentially compromising the security of companies all over the world is beyond irony. And any business that has decided to offer Apple devices to its employees for use with Exchange 2007 servers will now have a major headache to deal with.

The immediate solution seems to be either to turn off the need for on-device data encryption - which as anyone who has ever lost a mobile phone will agree is an entirely bad idea - or to upgrade every one of your Iphone-toting employees with a shiny new 3GS. Which is very nice for Apple's Iphone shipments and will make for some happy employees, but does nothing to improve business bottom lines in such troubled times.

The only other option is to 'downgrade' to OSX for Iphone 3.0. All very well if you know what you are doing and a) have a suitable Itunes-recoverable backup, b) use Time Machine and are happy to revert your entire sytem to a previous state or, c) are willing to install a back-up from a dodgy P2P or Usenet download.

It's not clear whether these older devices are capable of offering data encryption and can be fixed with a further update, as Apple is remaining tight-lipped about the problem.

But unless the Cupertino company wakes up and smells the cappuccino, it will do untold damage to the fragile relationship it has built with the few companies - not including the herd of media darlings with £100 haircuts - brave enough to dip their toes into Apple waters.

With much of the marketing surrounding the release of Snow Leopard relying on promises of Exchange support out of the box, we have to wonder whether Apple has betrayed the trust of business users once too often.

Source: The Inquirer






Add to Technorati FavoritesBlog: FreeiPhone - Get your quick ping button at   autopinger.com!


          VSFileEncrypt v1.2.3.149 released   
VSFileEncrypt Screen shot

VSFileEncrypt is an easy to use file encryption program. You can encrypt any file you choose. To access the file again, you would need access to the password that was used while encrypting. VSFileEncrypt is a serious solution, but at the same time is


Download7 MB | Windows | Freeware



          Beware Suspicious Phishing Emails   

This morning we were made aware that our company name and address were used on a cleverly-crafted spoofed email designed to phish usernames and passwords from recipients. This email was not sent by Allparts Music Corp. There is no hack or data leak. Any information of yours that we have is secured by encryption and/or offline storage.

Always keep the following in mind:

1) Allparts will never, ever send an email to you that contains links to a login page.

2) Always go to https://www.allparts.com to reach us. Your browser's address bar or its text will turn green, you will see a lock icon, and your connection to Allparts will be encrypted on every page of our webstore.

3) Generally speaking, do not use the same password for different websites. This is not as difficult as it sounds; try Googling something like "create password with formula" - the first few search results will be articles with great advice on how to do this.

Below is a screenshot of what this email looks like along with some of my comments on how to identify it as fake:



Note the following:

- The email appears to come from allpart.com - we are allparts.com (with an S). More sophisticated spoofs can make this look legitimate though, so always be aware and cautious in identifying the sender of new email.

- The text hyperlink behind HERE goes to a page on http:// www. beronienergy .com (don't bother going there) - which is definitely not https://www.allparts.com. In fact, it is a fake a energy company. :(

- If you are a long-time Allparts customer then you would recognize that the text and formatting of this message is very different from what we send to customers.

Please report any future suspicious emails involving Allparts Music Corp. to us by visiting our contact page at allparts.com/contact. We are grateful for the attention of those who reported these emails to us and offer our many thanks for your continued.

- Dean P., IT Manager


          25.11.2012 12:24:28 sud3n   
Eсть метод и замечательная тулза которая позволяет менять пароль на закриптованную внутреннюю память —
nelenkov.blogspot.com/2012/08/changing-androids-disk-encryption.html
          24.11.2012 13:21:18 Roy   
А чем собственно такой способ шифрования лучше стокового full encryption Android 4+?
Там так же шифруются целиком data и sdcard.
При загрузке поднимается временный Android — с data в RAM-drive — только для запроса пароля.
После чего он выгружается, data перемонтируется на настоящую и Android грузится вновь.

          5 Apps and Gadgets Every Techie Needs   
Technology is advancing at a rapid rate so it’s sometimes hard to keep up to date with the latest gadgets on the market. Even technology fanatics have difficulty staying current.
There are also some differences between what is marketed in the United States versus elsewhere, even when the products can be shipped internationally or the apps are available globally, so it’s likely there are quite a few apps or gadgets you haven’t heard of yet.
Yet since technology can add so much to our lives, why limit yourself to those you know already? Here are five apps and gadgets every techie needs.

“Pay” Apps


“Pay” apps, such as Android Pay, Samsung Pay and Apple Pay are essential for techies on the go. You simply link your bank account, credit or debit cards to the app and you can then use the app to purchase items locally. In many cases, it’s much quicker than swiping your credit or debit card when checking out and the app can be used at a variety of different retailers.
Samsung Pay, for example, can be used by entering a pin number to access the app and then you place your smartphone near the credit card terminal in the store to purchase items. The phone emits a signal similar to the magnet strip on an actual credit card, so check out is quick and easy.
Pay apps also allow you to cut down on the amount of clutter in your wallet since you can have all of your credit and/or debit cards arranged in your digital wallet instead of bringing each and every card along with on every shopping trip.

ExpressVPN


ExpressVPN is a Virtual Private Network (VPN) app that is essential for those who tend to use public WiFi often. A VPN allows you to connect to a remote server that is encrypted and when doing so, your internet traffic is routed through it.
The server’s encryption extends to your device and its IP address replaces your own, so you won’t have to worry about nearby hackers accessing your device when you’re using public WiFi and you can safely browse the net anonymously.
ExpressVPN also unblocks geo-restricted content online, so you can access Netflix libraries from other countries without any issues. Additionally, other websites that may normally be blocked in your country or wherever you happen to travel to can be accessed as well.

Oombrella


Smart gadgets such as Oombrella are some of the most popular among techies today. Oombrella isn’t just any old umbrella; it will tell you when you’ll need to carry it along with you to avoid getting rained on. It does this by sending real-time weather alerts directly to your smartphone.
Oombrella also notifies you if you leave it behind anywhere and perhaps the most interesting fact is that the design allows you to clip other gadgets or items onto the top tip of the umbrella. You can even use your Oombrella to go golfing and clip a GoPro on it!

Air Adjustable Mattress


An air adjustable mattress isn’t exactly the same as a regular air mattress; it’s a smart mattress that uses air to adjust the firmness of the bed to your liking. The most popular version is the Sleep Number bed.
Many of the Sleep Number mattresses are linked to an app called Sleep IQ. It tracks how long you slept, the quality of your sleep and offers advice on how to sleep better in the future.
The app doubles as an extra remote for the bed so you can adjust the firmness for either side of the mattress. Additional profiles can be created as well, making it great for couples.
If Sleep Number beds aren’t available in your area, Personal Comfort mattresses are a similar alternative.

Ember Temperature Control Mug


The Ember temperature control mug is a coffee lover’s dream. Now sold in Starbucks stores (and online), it allows you to adjust the temperature of whatever beverage you decide to put in it. All you have to do is twist the dial on the bottom of the mug to set it to the temperature of your choosing.
The temperature will remain consistent for two hours or even all day if you have the charging coaster handy. The mug itself has a stainless steel inner vessel, so it’s likely to last a long time. With the use of the Ember app, you can adjust the temperature remotely and save presets for your favorite beverages.
These are just a few apps and gadgets techies are certain to enjoy, so we’d love to hear if you have any additional recommendations. Let us know about them by commenting below.

About the Author: Cassie is a technology enthusiast who enjoys writing about the latest gadgets whenever possible. In her spare time, she also utilizes a variety of apps that add both convenience and entertainment to her daily life.

          Top 8 Best SSD Drive Performance   
When we buy a new best SSD Solid State Drive, the first thing came in mind is the top performance then reliability and after that energy efficiency, we need to make our old computers and laptops faster. We use benchmark in 2016 to check which is the top performance ssd in the world, and the results we found pretty good. few SSD drives i used in my own Apple Macbook Pro, i see the difference in processing like shutting down speed of macbook pro, opening apps and many more things. I don't know what's your favorite brand company but i just see which has best performance and make my laptop faster. So i make a list here of my best SSD Drive performance result and which really accurate.

Top 8 Best SSD Drive Performance


1. Samsung 850 PRO Solid State Drive     

Top 8 Best SSD Drive Performance
When you need performance samsung is one of the best SSD drive i have used in my life.
It reads 550MB/s speed and Writes in 520MB/s everything works fantastic in this drive. So i recommend you to go for 850 Pro if money is not a big deal. It's available in many online stores like amazon.

2. SanDisk Extreme Pro Solid State Drive

Top 8 Best SSD Drive Performance

I choose 2nd SSD sandisk because there is not much difference between samsung 850 pro vs sandisk extreme pro, i used both in my laptop both give me good benchmark of 550MB/s of reading speed, why i love sandisk because this drive gives me longer battery life and comes with smart support you can buy this on amazon.  

3. Crucial MX200 Solid State Drive

Top 8 Best SSD Drive Performance

Crucial MX200 has dynamic writing acceleration it's latest NAND technology allows drive to swap any NAND component between MLC and SLC mode. It has good sequential reading speed 555MB/s edurance wise the MX200 is one of the top SSDs in the market in early 2016.

 

4. Samsung 850 EVO Solid State Drive

Top 8 Best SSD Drive Performance 

There is no doubt Samsung 850 EVO is the best selling SSD in online stores, providing 5 year warranty, capability of TLC V-NAND is the endurance ratings. The 850 EVO also features the common samsung features set. Devsleep, hardware-accelerated encryption. Optical storage read speed 540 MB/s  

5. PNY CS1311 Solid State Drive

Top 8 Best SSD Drive Performance
PNY is taking good market in SSDs, i never used this in my laptop but i see lot of article which written it is the super fast OS booting time and speedy application loads performance is mind-blowing 550MB/s seq. read and 520MB/s seq. write speed, comes with 3 year warranty with 24/7 US based technical support.  

 

6. Transcend SSD370 Solid State Drive

Top 8 Best SSD Drive Performance

Transcend is doing pretty great job in SSD to be honest I'm using this ssd in my macbook pro and i like it as per the price and performance it's best value for money and good brand name. Read speed 560MB/s write speed 460MB/s and very light weight comes with 3 year warranty.  

7. SanDisk Ultra II Solid State Drive

Top 8 Best SSD Drive Performance
The Ultra II is available in four capacities: 120GB, 240GB, 480GB and 960GB. All come in a 2.5' 7mm form factor with a 9.5mm spacer included. There are no mSATA or M.2 models available. Specifications Seq read 550MB/s Seq Write 500MB/s.    

8. OCZ Vector 180 Solid State Drive

Top 8 Best SSD Drive Performance

OCZ SSD has advanced firmware suite of NAND flash management that keeps your drive at higher sustained performance, comes with 550 MB/s read speed and 530MB/s write speed. With Toshiba technology built into every drive, each Vector 180 SSD is engineered for superior quality as well as durability with its premium alloy housing. 

Check Out 10 Best Macbook Pro SSDs
 

          Full Stack Developer   
CA-Milpitas, Title: Full Stack Developer Location: San Jose, CA Contract: 6+months (renewed quarterly) Required Skills: Minimum 5+ years of experience in Core Java and J2EE application development. Experience in designing and developing complex licensing systems using proprietary licensing schemes as well as industry standard technologies like Flex, Safenet etc. Understanding of security and encryption related
          activate url encryption - does not seem to work   

Hello,

I have a question regarding the activation of the URL encryption.

When it is activated, we can see in the URL a new parameter WHPV with a key value; but we still see all the other parameters in plain text in the URL.

So what is the point with this feature? Is it a bug? Shouldn't the WHPV key replace all the other parameters in the URL in order to mask them from the browser or any middle man?

Can we deactivate it (however in the documentation it is said that we should not deactivate it in production environement). Do you think that this activation could have a performance impact on the response times (coding/decoding the key for each web request)?

Regards, FG.


          Benefits of Using a Remote VPN Server   
When using the Internet for personal or business purposes, it is important to think about encryption and protection of data exchanged between sites. Thus, a remote VPN server is indispensable in that case. The abbreviation “VPN” is a generic name of the connection, which is usually created on top of or inside another network. Considering […]
          WD My Passport Metal 2TB USB 3.0 HDD for $72 + pickup at Best Buy   
For in-store pickup only, Best Buy offers the Western Digital My Passport Ultra Metal Edition 2TB USB 3.0 External Hard Drive in Silver bundled with your choice of a Shutterfly 8x8" Photobook or $20 Shutterfly Credit for $71.99. (Click "Check stores" to find your closest store and to add it to cart.) That's the lowest price we could find for the hard drive alone by $17 and the best deal we've seen for this drive in any color. It features 256-bit hardware encryption and up to a 5Gb/s transfer rate.
          NordVPN VPN Service Subscription for $48 for 1yr; $79 for 2yrs   
NordVPN offers its NordVPN VPN Service 1-Year Subscription for $69. Coupon code "VIP70" cuts that to $48. (Click "Got Coupon?" at checkout to enter the code.) That's $95 off and tied with last month's mention for the lowest price we could find. The service features 2048-bit SSL encryption, 662 worldwide server locations in 57 different countries, a no-logs policy, and automatic kill switch. You can connect up to six devices simultaneously, and it's compatible with Windows, Mac, Linux, iOS, Android, and more.

Note: You can get a 2-year subscription for $79 when you apply coupon code "2YSpecial2017". (Click on the 1-year plan to go to checkout. When you enter the code, this message will appear: "This coupon code works on a 2-year plan only. Switch to 2-year plan." Click on the message to activate the 2-year subscription deal.) That's also tied with last month's mention, $208 off list, and the best deal we could find. Both deals end August 31.
          Data Protection - Comodo Disk Encryption   
Free and Open Source >> Security
          How cool is this data you don t need to decrypt to analyze   
Secuobs.com : 2011-08-18 06:39:58 - SecurityCurve - So here s an article via the always-interesting Mocana DeviceLine blog love those guys about Homomorphic Encryption fancy way of saying encryption doesn t change it s form and its use to secure data while also maintaining properties that allow statistical analysis So that s pretty cool, right The proof of concept they discuss illustrates how this type of concept
          Breach timelines more reasons for encryption instead of prevention   
Secuobs.com : 2011-05-16 17:09:33 - SecurityCurve - The Sony post-breach railroad rolls on and looks like it won t be stopping anytime soon Today, we have a writeup over on NetworkWorld discussing the timeframe of the information release, and the accuracy of the data made available to the public I m naturally inclined to respond well to this article because they source one of my
          Computer Certificates   

I've setup radius servers at a couple of sites, in my case we used freeradius running on a linux box. This did add a layer of difficulty to the process but we were able to get it running. I'm going to just talk in general terms since I haven't done this with the microsoft products.

At one location they did not have a local CA, so we setup a self signed CA using Microsoft's Certificate Authority. Once the CA was setup we created a server certificate for the radius server. The name of the certificate must match the DNS name of the radius server exactly. You need to select the advanced certificate type to get to select the server type of a certificate, with min 1024 bit encryption. You must do this for each radius server. Then you load the certificate into the radius server, in the case of freeradius we had to use openssl (windows...


          New troubleshooting and diagnostics for Azure Files Storage mounting errors on Windows   

Azure File Storage offers fully managed file shares in the cloud using the Server Message Block (SMB) protocol, which is the predominantly used file share protocol for on-premises Windows use cases. Azure Files can be mounted from any client OS that implements the SMB versions supported by Azure Files. Today, we are introducing AzFileDiagnostics to help first time Azure Files file share users ensure that the Windows client environment has the correct prerequisites. AzFileDiagnostics automates detection of most of the symptoms mentioned in the troubleshooting Azure Files article and helps set up your environment and receive optimal performance.

In general, mounting a file share can be simply achieved on Windows using a standard “net use” command. When you create a share, Azure Portal automatically generates a “net use” command and makes it available for copy and pasting. One can simply click on the “Connect” button, copy the command for mounting this file share on your client, paste it and you have a drive with mounted file share. What could go wrong? Well, as it turns out, use of different clients, SMB versions, firewall rules, ISPs, or IT policies can affect connectivity to Azure Files. Good news is AzFileDiagnostics isolates and examines each source of possible issues and in turn provides you with advice or workarounds to correct the problem.

As an example, Azure Files supports SMB protocol version 2.1 and 3.0. To ensure secure connectivity, Azure Files requires communication from another region or from on premises to be encrypted. Thus, requiring SMB 3.0 channel encryption for those use-cases. AzFileDiagnostics detects the SMB version on the client and determines whether the client meets the necessary encryption requirement automatically.

How to use AzFileDiagnostics

You can download AzFileDiagnostics from Script center today and simply run:

PowerShell Command:

AzFileDiagnostics.ps1 [-StorageAccountName <storage account name>] [-FileShareName <share name>] [-EnvironmentName <AzureCloud| AzureChinaCloud| AzureGermanCloud| AzureUSGovernment>]

Usage Examples:

AzFileDiagnostics.ps1 
AzFileDiagnostics.ps1 -UncPath \storageaccountname.file.core.windows.netsharename 
AzFileDiagnostics.ps1 -StorageAccountName storageaccountname –FileShareName sharename –Environment AzureCloud 

In addition to diagnosing issues, it will present you with an option to mount the file share when the checks have successfully completed.

Learn more about Azure Files

Feedback

We hope that AzFileDiagnostics will make your getting started experience smoother. We love to hear your feedback. If there are additional troubleshooting topics for Azure Files that you would like to see, please leave a comment below. In addition to this, if you have any feature request, we are always listening to your feedback on our User Voice. Thanks!


          Real Ip hide   

Real Hide IP v4.1.2.2 + Crack


Image



Are you aware that your IP address is exposed every time you visit a website? Do you know that many websites and hackers use your IP address to monitor your home address and other personal information?


Real Hide IP allows you to surf anonymously, keep your IP address hidden, protect your personal information against hackers and provide full encryption of your online activity, all with a simple click of a button.


    Hide Your Real IP Address
    Be assigned fake IP addresses from different countries to conceal your real IP.
    Anonymous Web Surfing
    Surf anonymously with fake IP, whenever you want to.
    Protect Your Identity Against Hackers
    Protect you from hackers and identity thieves who will be tricked by your fake IP.
    Un-ban Yourself from Forums or Restricted Websites
    Real Hide IP allows you to access any forums, blogs or websites that have ever banned you.
    Prevent Websites from Tracking Your Online Activities
    Hide your real IP when you are surfing the Internet to prevent you from being tracked by websites


Download:


          Price Drop: Day One Journal (Lifestyle)   

Day One Journal 2.3.1


Device: iOS Universal
Category: Lifestyle
Price: $4.99 -> Free, Version: 2.3.1 (iTunes)

Description:

Capture life as you live it. From once-in-a-lifetime events to everyday moments, Day One’s elegant interface makes journaling about your life a simple pleasure.

**App of the Year 2012 and Apple Design Award 2014**

---

“This superb journaling app remains pleasant to behold, easy to use, and a tough act for any rival to follow.” —Macworld

---

“Day One makes keeping a journal delightfully easy.” —Wired

---

“If you’re looking for a fantastic journaling app, or a great app for logging and recording various events and milestones of your life, then by far and away the best pick is Day One.” —The Sweet Setup

---

CREATE HABITS
Easily make journaling a part of your life:

- Reminders
- In-app and System Notifications
- Calendar

LIFE-ENRICHING BENEFITS
Reap the rewards of your consistency:

- On This Day flashbacks and Nearby entries
- On-the-spot memory enhancement
- Book printing

PRESERVE EVERY MOMENT
There’s no limit to the memories you can save in Day One:

- Unlimited photo storage (Premium only)
- Unlimited journals (Premium only)
- Social media with Day One's Activity Feed and IFTTT integration

SECURE YOUR MEMORIES
Day One Sync provides peace of mind:

- End-to-End Encryption
- Sync across all your devices (Premium only)
- Passcode and Touch ID lock

FOCUSED WRITING EXPERIENCE
Day One’s clean, distraction-free interface makes it easy to write down what’s important:

- Powerful text formatting with Markdown
- Templates
- Cross-platform support (mobile, desktop, and watch)

RECALL EVERY DETAIL
Metadata automatically records the finer points of life:

- Location
- Time and date
- Temperature and weather
- Activity—motion and step count
- Music playing

ORGANIZE YOUR ENTRIES
Finding any memory is fast and easy:

- Powerful search
- Multiple journals (Premium only)
- Tags
- Star favorite entries
- Browse by calendar, timeline, maps, or photos

SHARE YOUR MEMORIES
Our export options make it easy for you share your journals:

- Export to PDF, HTML, JSON
- Print your journals with Day One Book

---

Also available from Day One:

DAY ONE PREMIUM
- Unlimited Photo Storage
- Unlimited Journals
- Cloud sync to all Day One apps
- Unlimited encrypted cloud storage
- Automated Entries (IFTT integration)
- 25% Book Printing Discount
- Prioritized customer support

- New Users: $3.99/monthly and $34.99/yearly (US Dollars)
- Existing Users: $2.99/monthly and $24.99/yearly (US Dollars)

Day One Premium is an auto-renewing subscription. It is available for monthly or yearly periods. Your subscription is automatically renewed if it is not canceled at least 24 hours before the end of the current period. You're not allowed to cancel a subscription after it is activated. Subscriptions are managed in iTunes Account Settings.

Premium FAQ: dayoneapp.com/premium/faq

---

For technical assistance or other inquiries, email: support@dayoneapp.com

Terms of Use: dayoneapp.com/terms

What's New

Introducing Day One Premium:
- Unlimited journals and more! See: dayoneapp.com/premium/faq

Updated:
- Checklist styling changed from boxes to circles.
- Welcome screens have new images.

Fixed:
- Settings on iPad disappeared when rotating from portrait to landscape.
- App crashed for some users when selecting in-app camera.
- Instagram photos were cropped.
- Sync disabled when installing latest release.
- Various bug fixes and performance improvements.

Day One Journal


          Russia scraps plans to ban Telegram messaging app   
Telegram, which provides end-to-end encrypted messaging, has prided itself on privacy and has protested the Russian government's demands to get it to keep and share users' chat histories and encryption keys. Authorities have been putting pressure on Telegram, with Russia's FSB security agency saying Monday that the app was used by a suicide bomber who killed 15 people in St. Petersburg in April.
          Dr. Evil needs some legal "advise" ... or is it "advice?"    

When criminal-law cases imitate art,
they do not always choose its highest form.

United States v. Michael Mancil Brown, 16-6291 (6th Cir. 2017)



The Secret Service pays close attention when nefarious packages arrive at accounting firms from “Dr. Evil” - especially if “Dr. Evil” threatens the release of undisclosed tax returns of a presidential candidate unless $1 million in bitcoins is exchanged.

In August 2012, the Franklin, TN office of PricewaterhouseCoopers received a padded envelope containing a flash drive and letter demanding $1 million in bitcoins to stop the release of Mitt Romney’s undisclosed tax returns. The letter provided that the flash drive had these encrypted tax files and upon receipt of the bitcoins, an encryption key would be provided. The Williamson County Republican and Democratic party offices also received letters a few day later. After that, posts were placed on Pastebin.com that described the stolen documents and referenced the mailed letters. Several of these posts were signed by “Dr. Evil” and had the movie character’s image superimposed on the lobby of PricewaterhouseCoopers’ Franklin TN office. “Dr. Evil” was also wearing a Secret Service badge.

No matter how careful a technologically savvy extortionist may be – there are always digital crumbs left behind - even when the extortionist portrays himself as “Dr. Evil” from Austin Powers: International Man of Mystery.

In Michael Mancil Brown’s case - some of those crumbs included photographs on the flash drives of Tripper and Valentine - two cats that lived next door to him. It is unfortunate that neither were called “Mr. Bigglesworth.” Other clues that assisted the Secret Service with pinpointing his identity included text strings left behind on the flash drives that provided his wife’s name and a user name frequently used by Brown; and his consistent inability to properly use ‘advice’ and ‘advise.’

The Secret Service obtained a trap-and-trace order to watch Brown’s online activity and subsequently obtained a search warrant for his home. More inculpatory evidence was obtained against Brown leading to his indictment. He was later convicted on six counts of wire fraud and six counts of extortion. He received a 48-month sentence and was ordered to pay restitution to PricewaterhouseCoopers in the amount $201,836 for the cost of its investigation. He appealed his convictions arguing that the Secret Service’s search warrant lacked probable cause and that he was prejudiced by the lower court’s decision to allow questions from the jury. 

The Sixth Circuit affirmed the convictions but vacated his sentence due to an improper obstruction of justice enhancement. Brown had given a list of names of people having access to his computer. This information was used at sentencing by the government to apply the obstruction of justice enhancement. The Court concluded that the statement actually helped the government, undermined Brown’s credibility, and bolstered the government’s case. Thus, the information provided by Brown did not significantly obstruct or impede the government’s investigation and did not justify the obstruction of justice enhancement pursuant to U.S.S.G. § 3C1.1. 

This Sixth Circuit opinion is truly an informative and groovy read, especially if you are a fan of the Austin Powers movies, or if you truly need a detailed legal analysis concerning the issues raised by Brown.




          ZFS send/receive accross different transport mechanisms   
Sending ZFS snapshots across the wires can be done via multiple mechanisms. Here are examples of how you can go about it and what the strengths and weaknesses are for each approach. SSH strengths: encryption / 1 command on the sender weaknesses: slowest command: zfs send tank/volume@snapshot | ssh user@receiver.domain.com zfs receive tank/new_volume NetCat strengths: […]
          Dell Data Protection | Encryption - Activations   

This video will walk you through the steps of activating your Dell Data Protection| Encryption solution.


          Dell Data Protection | Encryption - The Adventures of Eddie   

Protect Eddie with Dell Data Protection | Encryption


          Dell Data Protection | Personal Edition   

Help protect system disks and external media with DDP | Personal Edition. Ideal for smaller organizations or departments, this easily deployed, locally managed solution offers flexible encryption options to help safeguard business and customer data.


          Dell Data Protection | Encryption for the Enterprise   

Dell Data Protection - Enterprise Edition offers flexible encryption, comprehensive data protection and one-touch compliance so you can tailor your security to fit the unique needs of your enterprise.

For more information, Please visit https://www.dell.com/dataprotection.


          Dell Data Protection | Endpoint Security Suite (DDP | ESS) Advantages   

The Dell Data Protection | Endpoint Security Suite (DDP | ESS) provides complete endpoint protection for business data, systems and reputations. Available for Dell and non-Dell devices, the suite provides advanced authentication, strong encryption and threat protection — all centrally managed by a single console.


          The Dell Data Protection | Endpoint Security Suite (DDP | ESS) Advantages   

The Dell Data Protection | Endpoint Security Suite (DDP | ESS) provides complete endpoint protection for business data, systems and reputations. Available for Dell and non-Dell devices, the suite provides advanced authentication, strong encryption and threat protection — all centrally managed by a single console.


          Dell Data Protection | Endpoint Security Suite (DDP | ESS) Advantages   

The Dell Data Protection | Endpoint Security Suite (DDP | ESS) provides complete endpoint protection for business data, systems and reputations. Available for Dell and non-Dell devices, the suite provides advanced authentication, strong encryption and threat protection — all centrally managed by a single console.


          How to Tethering your Android Mobile Phone : Samsung ACE as Wireless Access Point   

The Principal of this application is :
PC / Laptop Internet Connection from Android Mobile Phone using 3G Broadband Internet Access

Assumption :
  • Share Internet Connection from Android Mobile Phone
  • 3G Connection in Android Mobile Phone was ON
  • PC or Laptop has Wireless Enable.

To do Tethering, we need to enable Tethering in our Android Mobile Phone, in my case here : Samsung ACE. The detail steps:
  • Go to Tethering and Portable Hotspot
Android Tethering, Android Access Point, Samsung Ace Android Tethering, How to Tethering your Android Mobile Phone, Samsung ACE as Wireless Access PointAndroid Tethering, Android Access Point, Samsung Ace Android Tethering, How to Tethering your Android Mobile Phone, Samsung ACE as Wireless Access Point
Android Tethering, Android Access Point, Samsung Ace Android Tethering, How to Tethering your Android Mobile Phone, Samsung ACE as Wireless Access Point
  • Configure Security Access from Computer by provide SSID Name, encription method, and Password. The next step is Enable Mobile AP. You will see small wireless icon on the top show that mobile AP was active.
Android Tethering, Android Access Point, Samsung Ace Android Tethering, How to Tethering your Android Mobile Phone, Samsung ACE as Wireless Access PointAndroid Tethering, Android Access Point, Samsung Ace Android Tethering, How to Tethering your Android Mobile Phone, Samsung ACE as Wireless Access Point
  • Access from Computer with the same SSID, Encryption, and Password provide before.
Android Tethering, Android Access Point, Samsung Ace Android Tethering, How to Tethering your Android Mobile Phone, Samsung ACE as Wireless Access Point
Android Tethering, Android Access Point, Samsung Ace Android Tethering, How to Tethering your Android Mobile Phone, Samsung ACE as Wireless Access Point

  • Check if the computer have been alocated DHCP Ip Address by the Mobile Phone. Enjoy Internet Connection from PC or Laptop with Wireless Enable. #Example here we just ping google.com.Android Tethering, Android Access Point, Samsung Ace Android Tethering, How to Tethering your Android Mobile Phone, Samsung ACE as Wireless Access Point
  • Android Tethering, Android Access Point, Samsung Ace Android Tethering, How to Tethering your Android Mobile Phone, Samsung ACE as Wireless Access Point
  • Well done.

Any comment and feedback would be appreciate Guys. Thanks for visiting.




          Peace Revolution episode 070: How the Mind is Harnessed to Create Human Resources   
itunes pic

 

 

Click here to download this episode, or use the download link at the bottom of the notes for this episode.

Notes, References, and Links for further study:

Tragedy and Hope dot com

Invitation to the Tragedy and Hope online community (link expires monthly)

Log in page for the Tragedy and Hope online community

Peace Revolution primary site (2009-2012)*

Peace Revolution backup stream (2006-2012)*

Includes the 9/11 Synchronicity Podcast (predecessor to Peace Revolution)

*These 2 podcasts and lectures amount to 400+ hours of commercial-free educational content, which formulate a comprehensive and conscious curriculum.

The Ultimate History Lesson dot com (the film, notes, references, transcript, etc.)

IMDB Page for The Ultimate History Lesson

Facebook Page for The Ultimate History Lesson

Twitter feed for Tragedy and Hope

The Ultimate History Lesson Official Playlist (on YouTube)

UHL Research Bonus Pack and Gatto Fundraiser Pack(fundraiser for media partners and JTG)

Partner Coupon Codes (MUST BE IN ALL CAPS):

GNOSTICMEDIA

CORBETTREPORT

MEDIAMONARCHY

REDICERADIO

SCHOOLSUCKS

MERIAHELLER

FREEDOMSPHOENIX

Reference Map to Episode 070:

(1m-4m) Despotism vs. Aaron Dykes (Infowars Nightly News clip) by R.G.

(4m-6m) U.S. Army Kills Kids by Abby Martin (RT)

(6m-9m) Robert F. Kennedy did not agree Oswald lone assassin (ABC News)

(9m-13m) U.S. Government Found Guilty of Murdering Martin Luther King by Lee Camp

(13m-19m) U.S. Court: Martin Luther King Killed by the Authorities by Barrie Zwicker

(19m-28m) Richard’s introductory monologue

(28m-2h50m) Debate: Larken Rose (Anarchy) vs. Tom Willcutts (Authority) History… So It Doesn’t Repeat

(2h50-5h25m) Briefing: Kevin Cole (Classical Trivium vs. Trivium Method) History… So It Doesn’t Repeat

(5h25m-6h50m) “Behaviorism in Disguise” School Sucks Podcast #150

Hist ory... So It Doesn't Repeat (Official YouTube Series Playlist)History So It Doesn't Repeat Timecodes, notes, links, and references are posted just below the HD video:

Notes, Links, & References for "The Trivium Method vs. The Classical Trivium" (recorded February 17, 2013)

  1. 1m “The Great Chain of Being and the Organic Unity of the Polis” by Kevin Cole (Winter 2013)
  2. 2m “The Trivium Method” by Jan Irvin and Gene Odening @ Gnostic Media dot com
  3. 3m “The Trivium Method of Critical Thinking and Creative Problem Solving” vs. the innate method of learning, and comparing it to how the Classical Trivium (as a method of institutionalizing individuals) has historically been used prior to the 21st century.
  4. 4m History of the Classical Trivium is the history of the Great Chain of Being, useful in shaping cultures. The Great Chain of Being is defined in classical terms.
  5. 5m The concept of “balanced” government and civil society itself, The Ominous Continuity of the “education” system we know as schooling
  6. 6m The changing of terms as a means of gaining power over unwitting minds
  7. 7m The Occulting of Knowledge to create Power
  8. 8m Legacy of 2,500 years of the Noble Lie being used to create Power
  9. 9m Romantic Nationalism & Germany vs. Limited Government System, continued definition of the Great Chain of Being (3 estates)
  10. 10m Caste System, Divine Right of Kings, and the Classical Trivium; specifically the artificial scarcity of the “7” liberal arts
  11. 11m Enkyklios Paideia and the Caste System, Arnold Toynbee “it allows each empire to be immortal”
  12. 12m Great Chain of Being and the Classical Trivium in context of Organic Unity
  13. 13m United Nations Charter provisions, Positive and Negative Rights, staying knowledgeable about the first principles and jury nullification, Thomas Jefferson and First Principles
    1. Article 29: 1. Everyone has duties to the community in which alone the free and full development of his personality is possible. 2. In the exercise of his rights and freedoms, everyone shall be subject only to such limitations as are determined by law solely for the purpose of securing due recognition and respect for the rights and freedoms of others and of meeting the just requirements of morality, public order and the general welfare in a democratic society.
    2. Article 30: Nothing in this Declaration may be interpreted as implying for any State, group or person any right to engage in any activity or to perform any act aimed at the destruction of any of the rights and freedoms set forth herein.
  14. 14m Logical foundation of Negative Rights, Irrational foundation of Positive Rights
  15. 15m Definition of Organic Unity
  16. 16m Scott Buchannan quote on the Classical Trivium to create Organic Unity, Cardinal and Ordinal structures of the story (Buchannan was a Rhodes Scholar)
  17. 17m Definitions: The Auctors, The Polis, The Polity, Episcopal, hierarchical structures of authorities, Anglicanism (Church of England)
  18. 18m Comparison and Contrast the Trivium Method vs. the Classical Trivium, 7 Liberal Arts, Plato, Aristotle, educational philosophy and Isocrates,
  19. 19m The “general education” of the inscribed circle of the Enkyklios Paideia, foreshadowing Fichte and Hegel of the Prussian Education System
    1. encyclopedia (n.) 1530s, "course of instruction," from Modern Latin encyclopaedia (c.1500), literally "training in a circle," i.e. the "circle" of arts and sciences, the essentials of a liberal education; from enkyklios "circular," and paideia “education”.
    2. According to some accounts such as the American Heritage Dictionary copyists of Latin manuscripts took this phrase to be a single Greek word, enkuklopaedia.
  20. 20m plunder v. production and human livestock, classical Trivium as a system of creating production to be plundered… farming plunder
  21. 21m Latin education and the Divine Right of Kings, organic unity and feudalism, legitimizing the great chain of being (methods of authority), using the battlefield and education to subjugate individuals for lack of Knowledge.
  22. 22m Legitimizing the storyteller as the authority of the day, group-think, authority to control human resources. Any citizen can become an individual through learning habits of self-reliance
  23. 23m “Authorities” (educators, sophists) define the “Grammar” of the Classical Trivium, thus making the “Logic” a belief, not an understanding. No knowledge is necessary for belief, in fact belief is often what fills the void created when Knowledge is absent.
  24. 24m Unified systems of knowledge, cybernetics and the ship of state (Plato), first principles and common ground (Logic) necessary for linguistic communication. The use of these ideologies to create state systems.
  25. 25m Richard Haklyut and Queen Elizabeth, propagating organic unity as “natural”, even though it depends on people ruling over others. Scott Buchannan papers from Harvard University, “Poetry and Mathematics” (foreshadowing role of Rhodes Scholars)
    1. Richard Hakluyt (c. 1552 or 1553 – 23 November 1616) was an English writer. He is known for promoting the settlement of North America by the English through his works, notably Divers Voyages Touching the Discoverie of America (1582) and The Principal Navigations, Voiages, Traffiques and Discoueries of the English Nation (1589–1600).
  26. 26m Dorothy Sayers and removing the myths to get to the facts of her claims, Reinhold Niebuhr, Royal Institute of International Affairs, Milner Rhodes Roundtable Group, secularizing values to continue organic unity
  27. 27m Dorothy Sayers quotes in favor of British Empire building and Cecil Rhodes / Milner Roundtable Group and Organic Unity
  28. 28m Origins of the systems which create and facilitate organic unity, cybernetics, using the knowledge of self-learning to dissect the history and identify the contradictions of our public educations
  29. 29m Gnostic Media interview with Gene Odening, how the human being learns, removing the dogma from the process of learning for one’s self
  30. 30m Asking substantial questions and using a method to find valid answers consistently vs. the Classical Trivium (prescribed “Grammar”, mandated “Logic”, rhetoric which reinforces servitude)
  31. 31m Isocrates and literacy as a form of slavery (i.e. sophism) until the reader learns how to identify reality and remove unreality (i.e. logic).
  32. 32m closed systems of learning to maintain the city-states, aristocracy, and ruling class to manage the polity (public); educating the kings, adopting education systems to gain power over the polity, dichotomy of control, creating knowledge gaps to create “power”.
  33. 33m focus on significant and substantial, discard the arbitrary, dismiss the irrational. Sayers’ biases and the basis of Christian Homeschooling in America.
  34. 34m Sayers’ system as the “closest to the perfection of Plato’s Republic” – Freemasonry
  35. 35m Christian Homeschooling and predefined grammar, infecting the logic by not asking preliminary questions to identify that which exists, reality from unreality (Sayers’ seeds of irrationality)
  36. 36m History of Ideas in relation to the Trivium Method contrasted to the Classical Trivium and the history of creating organic unity
  37. 37m The Classical Trivium, Freemasonry as a feedback mechanism for creating organic unity through empire, “Builders of Empire: Freemasons and British Imperialism (1717-1927)” by Jessica Harland Jacobs
  38. 38m “Origins of Freemasonry” by Thomas Paine,
  39. 39m Johann Joachim Christoph “J.C.” Bode, Nicholas Bonneville, Philo’s Reply to Questions Concerning His Association with the Illuminati by Jeva Singh-Anand, Illuminati Manifesto of World Revolution (1792) translated by Marco de Luchetti,
  40. 40m King Elfwad, Charlemagne, and the origins of the word “Trivium” by Alcuin of York
  41. 41m Ancient Greece, systems of preserving itself against surrounding piranha states
  42. 42m Enkyklios Paideia created by Isocrates preserves organic unity until Thomas Jefferson recognizes what it is, and what it does
  43. 43m Scott Buchanan and Stringfellow Barr (Rhodes Scholars) and Freemasonry, origins of “Classical Trivium” revival veiling the Enkyklios Paideia
  44. 44m filling in between Isocrates and the Freemasons, Jesuits and the Ratio Studiorum, which was rejected by John Adams and Thomas Jefferson, Ratio Studiorum as continuation of organic unity under godhead of theology.
  45. 45m Thomas Jefferson (post-revolution) goes to William and Mary and has the Classical Trivium removed from the curriculum, breaking the mechanism of British perpetuation of their organic unity
  46. 46m Thomas Jefferson addressing the Educational Perennialists of his day, accepting the theory before inspection, condemnation prior to observation, “putting your logic before your grammar” as Jan Irvin says
  47. 47m Education as a tool of creating culture, its how the state reproduces itself, “reality” filtered through he prescribed rhetoric of the state,
  48. 48m Ignatius Loyola, Alumbrados, the Spiritual Exercises of Ignatius Loyola as the origins of the esoteric organic unity progressed by the Jesuits, various flavors of organic unity (various empires through time), sacrifice of the individual to the state
  49. 49m Bavarian Illuminati, Thomas Paine, Nicholas Bonneville, and connections to the origins of America, May 1, 1776, Adam Weishaupt (1911 Encyclopedia Britannica entry for Illumati), Baron Adolph ‘Philo’ Knigge as Weishaupt’s #2 in the Bavarian Illuminati
  50. 50m Bavarian Illuminati as intellectual group fighting against organic unity and divine right of kings in Europe. “Philo’s Reply to Questions Concerning His Association with the Illuminati” Reply by Jeva Singh Anand reveals the personal conversations between Adam Weishaupt and Baron von Knigge prior to Knigge’s resignation from the Bavarian Illuminati and the promotion of revolutionary publisher J.C. Bode.
  51. 51m Thomas Paine’s references to Samuel Prichard’s “Freemasonry is based on the foundation of the Liberal Arts” quote, Illuminati as a system trying to do away with the state, Isidore of Seville and the creation of civil polity by limited education
  52. 52m Bavarian Illuminati vs. Religion and the State, Freemasonry as the genitalia of the state and the injection of organic unity throughout indigenous populations, Illuminati plans to use for the state to reproduce itself via taking over Freemasonry.
  53. 53m the Strict Observance Lodge of Freemasonry in Bavaria, Degree Systems above traditional York Rite degrees, transcending nationhood. Reinhard Koselleck’s “Critique and Crises : Enlightenment and the Pathogenesis of Modern Society” (published by M.I.T.) on Freemasonry and creating organic unity
  54. 54m Original members of the Illuminati influencing American education, The Ultimate History Lesson with John Taylor Gatto
  55. 55m Juxtaposing internet lore vs. actual artifacts and evidence of the Bavarian Illuminati, similar to Jesuits in seeing value of controlling education, 1610 Wood Manuscript (The Hiram Key by Lomas and Knight)
  56. 56m Individual Liberty based on that which exists vs. irrational illusions of Authority, Bonneville, Jefferson, and the unknown history of Bavarian Illuminati influence in America’s origins.
  57. 57m Social Circle Freemasonic Lodge, papers published by J.C. Bode of the Bavarian Illuminati, promoted after Knigge’s resignation, connections to Prussian education.
  58. 58m Johann Fichte’s references to Johann Pestalozzi’s organic unity method of schooling and creation of the Prussian education system, giving birth to Romantic Nationalism as opposed to the Jeffersonian ideas of nationhood.
  59. 59m Milton Peterson’s works on Thomas Jefferson, rejection of classical forms of the Trivium as being connected to the Great Chain of Being, i.e. a caste society subjugating individuals to illusory authority
  60. 1h1m ideas of creating a balanced government based on first principles subject to existence, not dogma; derivative proofs of non-aggression undermined by changes in education system which Jefferson feared, J.J. Rousseau, John Locke, The Meaning of Meaning, particularity and universiality, from Charlemagne through to the 21st Century.
  61. 1h5m Jefferson displacing the Classical Trivium at the University of Virginia, Jefferson laments genocide of indigenous languages and loss of etymology.
  62. 1h6m encryption of language enables selective power transfer
  63. 1h8m how to preserve the first principles which inspired the Constitution
  64. 1h10m Ben Franklin’s education in the liberal arts and secret societies
  65. 1h11m parallels of Isocrates and Freemasonic organic unity, “Builders of Empire” as blueprint for how Freemasonry assumes authority throughout the world
  66. 1h14m philosophic corruptions of reality, claims of authority break down under scrutiny and defined terms, taboo to discuss because you might perceive the ruse of organic unity
  67. 1h15m Thomas Jefferson displaces classical Trivium as being tied to the Great Chain of Being
  68. 1h16m Legacy of Alcuin of York, creating a duality in Christianity, “othering” of the natural world, Basil Bernstein’s work on the classical Trivium, Noah Webster, John Adams, Thomas Paine, Emerson and Thoreau, Rousseau’s social contract, liberal arts as chains of garland flung over reality, Bavarian Illuminati
  69. 1h17m Epistemological cartoons instead of getting into the details and artifacts, Techne (Technology) as a Craft to propel Culture (see: Freemasonry), Thomas Paine quote on education and knowledge of language vs. knowledge of things, Syntax and Statecraft in history
  70. 1h18m Destutt De Tracy “Elements of Ideology”, science of ideas from Condillac’s Statue of Man, solidifying a science of ideas to map out human resource control
  71. 1h19m Destutt De Tracy: how to define and identify in order to think clearly and progress to understanding
  72. 1h20m Prussian Nationalism, Hegel and the obsolescence of the Divine Right of Kings and “Authority” in general, discovering that life is not how we were taught it is as a result of the Prussian education system changing America away from natural rights liberalism
  73. 1h21m systems of natural rights and state education are not compatible
  74. 1h22m unitary education by congress is in direct contradiction to the founding principles of America, collectivism, pre-amble missing from Constitution, ambiguity therefore included unnecessarily
  75. 1h24m Classical Trivium imparting language without defense against unreality, thus creates a system of control
  76. 1h25m without defense against unreality, society becomes skewed and actions in conflict with needs of survival, as a result of Enkyklios Paideia introduced into England by the Venetian Black Noblity
  77. 1h26m Webster Tarpley’s 1981 article on the Venetian Black Nobility, how to fill in the blanks when history has been purposely omitted, creating cognitive dissonance
  78. 1h28m Wilhelm Wundt and the “Clockwork Orange” mentality of treating people as mechanical toys, to be manipulated; and how asking questions is the key to circumventing Wundtian control systems
  79. 1h30m Frederick the Great and the Gymnasium of Prussian Education, Obama’s recent references to the value of Prussian industrial training
  80. 1h31m John Taylor Gatto’s “Underground History of American Education” referring to Prussian indoctrination methods being used in America, Prussian principles displace American first princples imparted in Constitution
  81. 1h32m Prussian education creates a strong nationalistic fervor, at behest of “national” interest, parallels between Nazi Germany and America today via the Prussian education system
  82. 1h33m Frederick the Great, Freemasonry, Education, and Illuminati connections; going after our youngest through compulsory schooling, creation of schooling in America by secret societies
  83. 1h34m Frederick the Great May 1, 1786 creating constitutions of Freemasonry, similar degrees to draw people into the Illuminati plan by imitating Freemasonry
  84. 1h35m Reworking masonic texts to re-present the ideas to foment revolution, Amis Reunis, Lodge of the Nine Sisters, and the Social Circle, French Revolution, Congress of Wilhelmsbad, Baron Knigge and the attempts to recruit powerful figures into their stable of talent. Hegel, Herter, Mozart, Goethe, Zeitgiest (spirit of the age)
  85. 1h36m origin myth of the Nine Muses / Nine Sisters lodge of Freemasonry in France
  86. 1h37m Rev. George Washington Snyder letter to George Washington, Oct 24, 1798 regarding the Bavarian Illuminati, spores dispersed into America, Anti-Freemasonic Party to drive Freemasons from power
  87. 1h38m Cecil Rhodes and fellow Freemasons creating British organic unity via a Secret Society based on the methods of the Jesuits (Ratio Studiorum)
  88. 1h39m Ben Franklin and the Lodge of the Nine Sisters, representing the Nine Muses (9 liberal arts) as set down by Martianus Capella, Destutt De Tracy, Voltaire members of the lodge, Jefferson’s rejection of their first principles, Positive vs. Negative origins of Government
  89. 1h40m Napoleon rejected the first principles as Jefferson did, Destutt De Tracy deposed from his educational system, Grammar, Logic, & Ideology (instead of rhetoric)
  90. 1h41m Jefferson’s own contradictions (not perfect) but noted the success of America dependent on independence from British linguistic controls
  91. 1h42m Cecil Rhodes and the Jesuits, organic unity common to plans of monopoly, power, and empire, tracing back to the Indian (of India) monitorial schools (pedagogical control of group by authority at the front of the room), another brick in the wall as the craft of masonry
    1. Cecil John Rhodes PC, DCL (5 July 1853 – 26 March 1902) was an English-born South African businessman, mining magnate, and politician. He was the founder of the diamond company De Beers, and an ardent believer in British colonialism, he was the founder of the state of Rhodesia, which was named after him. He set up the provisions of the Rhodes Scholarship, which is funded by his estate. Rhodes and his legacy are memorialized in the 1966 textbook “Tragedy and Hope: A History of the World in Our Time” by Dr. Carroll Quigley, professor at Georgetown’s School of Foreign Service.
  92. 1h43m Cecil Rhodes goal to change American Constitution to bring America back under control of Britain by rings-within-rings, using Rhodes Scholars to create organic unity.
  93. 1h43m Cecil Rhodes plans grow roots in America, proliferating Anglo-Saxon Nationalism (everyone else was a “barbarian”)
  94. 1h44m Equal rights only for “civilized” men (positive rights) vs. natural rights inherent to all human beings
  95. 1h45m Cecil Rhodes Last Will and Testament, seeking to decontextualize the history and create amnesia in the American polity
  96. 1h46m Cecil Rhodes’ band of merry men, bring in Prussian ideals via Rhodes Scholars, creating a spacial-temporal consciousness shift
  97. 1h47m Carroll Quigley’s books addressing Rhodes and organic unity (Evolution of Civilizations, Tragedy and Hope: A History of the World in Our Time, The Anglo-American Establishment), Porter Sargent’s books on the same topic
  98. 1h48m Clarence Streit’sUnion Now” plan to merge America with Britain, Andrew Carnegie’s “Triumph of Democracy”, Linus Pauling’s “Union Now” speech, Harris Wolford of the SDS (Students for a Democratic Society), Rhodes Roundtable group seeking to create a union of democracies, origins of Globalism, collaboration between Rhodes Roundtable, Rockefeller, Carnegie trusts.
  99. 1h49m undoing Thomas Paine’s “Common Sense”, to reverse roles and undo common sense to say America is subservient to Britain
  100. 1h50m Clarence Streit, Stringfellow Barr, and Scott Buchanan, (all Rhodes scholars) reviving the Classical Trivium, indoctrinating Anglo-American values and organic unity
  101. 1h51m Rhodes Roundtable supports “Union Now”, via Pilgrims Society, also seeking Organic Unity with Britain, origins of Apartheid in South Africa, Jan Smuts and Wholism as the philosophy of the British Empire (plunder rebranded as freedom)
  102. 1h52m “Union Now” as a Fabian Society for Federalists to create organic unity, Embers of World Conversation (Buchannan), origins of The Great Books of the Western World with Richard McKeown
  103. 1h53 Marshall McLuhan and I.A. Richards work on the Classical Trivium, James Bryant Conant
  104. 1h54m Poetry and Mathematics by Scott Buchanan (Rhodes Scholar) rediscovers the Classical Trivium, John Erskine, Nicholas Murray Butler, St. Thomas Aquinas, Great Chain of Being, and Mortimer Adler and logic existing within systems, Dr. Randall Hart “Classical Trivium” book
  105. 1h55m John Erskine bringing selective reading into the U.S., Woodbury and the X Club (see: Huxley), Matthew Arnold and Cecil Rhodes
  106. 1h56m Alfred Zimmern, William Benton, Benton and Bowles Advertising trending organic unity
  107. 1h57m “Union Now” and the liberal education at St. John’s University and the University of Chicago, Leo Strauss, Neocons, Robert Maynard Hutchins, and the origins of the Great Books of the Western World
  108. 1h58m Legacy of Cecil Rhodes, Pilgrims Society, RIIA, CFR, and creating organic unity in America
  109. 1h59m Arthur Balfour, Cecil Rhodes, Baron Rothschild and Palestine; Pilgrims Society as Anglo-American Alliance to usurp national government of the U.S. vis a vis Organic Union
  110. 2h re-branding British Empire as part of organic unity and role of St. John’s university in revival of the Classical Trivium within the Anglo-American tradition.
  111. 2h2m “Fat Man’s Class” and William Benton, J. Walter Thompson Company, Denise Sutton’s “Globalising Ideal Beauty: How Female Copywriters of the J. Walter Thompson Advertising Agency Redefined Beauty for the Twentieth Century”, De Beers Diamond Cartel, behaviorism (via John Watson) included to manipulate populations
  112. 2h3m Encyclopedia Britannica bought by William Benton vs. The Great Books of the Western World, Benton worked with R. Gordon Wasson, Bank of International Settlements
  113. 2h5m Benton and “Fat Man’s Class” sought to proliferate sophism into the business community, Henry Luce’s support, “The Romance of Commerce and Culture”, Walter Paepke, importation of Prussian/German culture into business and politics, boxing up our culture to bring concensus by de-individualizing and holding conflicting thoughts is the norm.
  114. 2h7m Great Books of the Western World and Eugenics, signers of the GBWW project (several Union Now supporters & Rhodes Scholars among other collectivist groups seeking organic unity for Anglo-Saxon Establishment power structures)
  115. 2h9m Society for the Cincinnatus and the ominous continuity of these ideas, Mirabeau as a member of the Social Circle, hereditary orders to create organic unity, Walter Paepke as founder of the Aspen Institute which funded the GBWW, founded on commemoration date of Goethe, ex-Bavarian Illuminati; origin of Aspen’s popularity and the Noble Lie
  116. 2h10m Leo Strauss at St. John’s University as a Scott Buchanan Scholar
  117. 2h11m GBWW to impart culture to common man, a scarcity not circulated in 70 years, a legacy of organic unity being propagated via Classical Trivium
  118. 2h12m Joseph S. Nye, Jr. (Rhodes Scholar, Harvard), Power and Interdependence
  119. 2h13m London School of Economics (Fabian Socialist institution), Rothschild family funding LSE
  120. 2h14m “The Real New World Order” (Foreign Affairs Publication) by Anne-Marie Slaughter, Office for Policy Planning, CFR driving organic unity
  121. 2h15m “The Real New World Order” is published by the Council on Foreign Relations
  122. 2h16m David Rockefeller, Memoirs, p. 505 quote, Admiral Chester Ward on CFR quote from Barry Goldwater biography “With No Apologies” chapter 33 “Our Non-Elected Rulers”
  123. 2h17m H.G. Wells, Fabian Socialist, Open Conspiracy, Island of Dr. Moreau, organic unity through Eugenics (see: G. Stanley Hall quote on organic unity in “NEA: Trojan Horse”), erasing of national borders, ethically responsible to control the many, “The Shape of Things to Come” by H.G. Wells
    1. H.G. Wells’ most consistent political ideal was the World State. He stated in his autobiography that from 1900 onward he considered a World State inevitable. He envisioned the state to be a planned society that would advance science, end nationalism, and allow people to progress by merit rather than birth. In 1932, he told Young Liberals at the University of Oxford that progressive leaders must become liberal fascists or enlightened Nazis in order to implement their ideas.[35]In 1940, Wells published a book called The New World Order that outlined his plan as to how a World Government will be set up.
  124. 2h18m Technocracy to control the thoughts of the polity, C.K. Ogden and I.A. RichardsThe Meaning of Meaning”, imparting of Liberal Arts to create civil polity, language as technology to control polity
  125. 2h20m Inherent rights (negative rights) vs. Positive Rights (arcane laws of governance and authority), “Fire in the Minds of Men” by James H. Billington (Rhodes Scholar & Librarian of Congress), the need to preserve oral traditions and the attack of our culture to manipulate our perceptions, thus to create organic unity, the use of cybernetics to wage psychological warfare, using the mind as the harness of human resources, Stephen Biko “the most powerful weapon in the hands of the oppressor are the minds of the oppressed.”
  126. 2h22m Ludwig Wittgenstein, I.A. Richards, and manipulating language to control perceptions in cybernetics, Macy Conferences of cybernetic applications, and “New Criticism” to decontextualize historical documents, thus re-defining liberty by separating literature from history. Rhodes/Milner Roundtable participation in supporting “New Criticism” and decontextualizing history to create organic unity; which evolved from the Prussian Nationalism which preceded it.
  127. 2h25m Frank Aydelotte (Rhodes Scholar) on Classical Trivium and Organic Unity, “spelling” to use words to further “liberty” in British terms.
  128. 2h26m Lord Percy v. Thomas Jefferson,
  129. 2h27m Arnold Toynbee and analogical reasoning using the Classical Trivium to promote British organic unity
  130. 2h28m Eugenics, Rockefeller, and organic unity vis a vis “The Molecular Biology of Life: Caltech, the Rockefeller Foundation, and the Rise of the New Biology ” by Lily Kay (M.I.T.)
  131. 2h29m Frank and James Angell, G. Stanley Hall, and others instrumental introducing the Prussian education system into America, John Taylor Gatto’s work, Max Weber and scientific dictatorship
  132. 2h30m Population Control, Eugenics, and the Rockefeller “Science of Man” project rebranded as “molecular biology”, Linus Pauling’s support of Lily Kay’s book, Mr. and Mrs. Pauling support “Union Now” and other Anglo-American plans of unification, Delphi Technique of mind control, managing consent, Walter Lippmann
  133. 2h32m Rockefeller “Science of Man”, Edward Alsworth Ross’ “Social Control”, mapping the individual to destroy individuality, Lily Kay unmasks the eugenic agenda of the elites, culling the polity to create organic unity. Artificial scarcity of technology, planned economies (Agenda 21)
  134. 2h33m SUMMARY: By changing the terms and definitions throughout history, the theme of controlling the polity by means of irrational means has thus far been successful. Our voluntary servitude to ideas which are unreality, continues to be the problem; learning and asking substantial questions and finding valid answers continues to be the solution.
  135. 2h34m Kevin Cole’s closing statement, the logic behind the liberal arts education, slavery vs. free minds, the perpetuation of organic unity throughout time to create slave vs. free dichotomy. In America rights were inherent, not because you’re become a subservient slave to the state.

WOULD YOU LIKE TO KNOW MORE?

CHECK OUT "THE ULTIMATE HISTORY LESSON: A WEEKEND WITH JOHN TAYLOR GATTO"!

Subtitled: A 5-hour journey examining the history, root-causes, and consequences of public schooling

Alternatively, you can also find The Ultimate History Lesson listed on Amazon.com.


          The Next Encryption Battleground: Congress   
The war over government access to encryption is moving to the battlefield on which Apple told the Justice Department it should always have taken place: Capitol Hill. The leaders of the Senate Intelligence Committee have introduced a bill that would mandate those receiving a court order in an encryption case to provide "intelligible information or data" or the "technical means to get it" — in other words, a key to unlock secured data. "I call it a 'follow the rule of law bill,' because that's what it does: It says nobody's exempt from a court order issued by a judge on the bench," said Committee Chairman Richard Burr, a North Carolina Republican. The top Democrat on the committee, California's Dianne Feinstein, is a co-sponsor. Supporters say that Congress must give law enforcement officials the tools they need to investigate cases like those that prompted the showdown between Apple and the government. The Justice Department asked a judge to order Apple to help it unlock an iPhone
          Comment on How To Hack WiFi With WIFIPHISHER: Best Tool To Hack WiFi by Joycelyn Chan   
load of crap. WEP can be cracked easily. WPA2 is the best encryption by far,for wifi. #ethicalhacker
          (USA-OH-Dublin) Database Engineer III, Dublin OH 43017   
**Database Engineer III, Dublin OH 43017. Contact Elisabeth Laspe for details. 314-669-8020 elaspe@pdstech.com** **8-Month Contract with possible extensions. Must be a US Citizen or Green Card to qualify. No. C2C** The **Staff Database Engineer provides database administration and engineering** for new and enhancements to existing database environments to include performance of the following related tasks: software installation, upgrades, query writing, configuration, database creation, security, system monitoring and tuning, disaster recovery planning, implementation and backup and recovery. **JOB DUTIES – INCLUDES PRIMARY RESPONSIBILITIES ONLY** **• Create and enhance databases across internal and end-user applications.** **• Analyze existing database applications to migrate into or improve the functioning on the platform.** **• Participate in the design and implementation of large/complex databases** **• Administer database security across all database environments.** • Prepare periodic reports regarding unit’s activities and goal attainment. • Maintain a state-of-the-art knowledge of existing best practices in database administration. • Support database centric projects from inception to production deployment (all things database) **EDUCATION and/or EXPERIENCE:** Bachelor’s degree in Computer Science, Information Technology or equivalent. Minimum 2 years of database related experience. **ADDITIONAL SKILLS/CERTIFICATIONS/LICENSES REQUIRED** **(SQL Server)** • **Prior experience with the following is preferred: SQL Clustering, Transact-SQL & MS Data Transformation Services (DTS) and SQL Server Integration Services (SSIS) knowledge, Replication, Availability Groups, Performance Tuning, Backup and recovery methods, Log shipping, Database Mirroring, Database capacity planning, and Users and Role creation and monitoring.** **• Experience in third party tools like Quest Software SQL LiteSpeed, Quest Software SpotLight, Quest Foglight and Quest Foglight Performance Analysis.** **• Experience in SQL 2005/2008/2008R2/2012 database management and related products from Microsoft including Powershell, Windows 2003/2008R2 Server and desktop operating systems.** **• SCOM 2007/2012 is a plus.** **Needs to have oracle and SQL experience. SQL side: needs database mirroring, Clustering. DBA side: 11g RAC, Data Guard, RMAN.** **(Oracle)** **• Prior experience performing database administration functions and supporting Oracle 9i,10g, and 11g RAC in a 24x7 production environment** **• Proven skills and experience with Oracle 10g/11g RAC** **• Database and RAC implementations experience and troubleshooting skills in mission critical environment** **• Setting up and maintaining DataGuard and/or Golden Gate on 10g/11g/12c with MAA** **• Knowledge of Oracle Database Tuning** **• Demonstrated knowledge of database internals and data structures** **• Knowledge of SQL/SQL*Plus, PL/SQL, and stored procedures** **• Knowledge of Database Backup and recovery using RMAN and logical backups** **• Understanding of OEM Grid Control for 10g/11g/12c** **• Knowledge of Unix shell or Perl scripting languages and underlying OS** **• Data / database encryption methodologies / implementations** **• Experience with Oracle 12c a plus** ESSENTIAL POSITION FUNCTIONS: • Excellent written and verbal communication skills to work effectively across multiple business lines, external technology partners and fellow team members. • Proven ability to manage projects. • Excellent analytical and design skills at multiple product level. • Excellent research, analysis, project planning and implementation skills. • Aware of business issues as they impact overall project plans. This position may require you to submit to and pass a drug test and/or background check. If this is a hands-on position, you may also be required to pass a safety and productivity examination. PDS Tech, Inc. will comply with all applicable federal and state laws governing the use of such background checks and drug tests. PDS Tech, Inc. is an Equal Opportunity Employer and will not discriminate against applicants on the basis of race, color, religion, sexual orientation, gender identity, national origin, veteran status, or disability. Founded in 1977, PDS Tech, Inc. is one of the nation's premier specialty staffing firms with 31 offices nationwide. We offer a full range of benefits including: + Health insurance + Paid holidays + Weekly payroll + Immediate 401(k) eligibility + Completion Bonuses + Training + Please note availability of benefits may vary by position PDS specializes in Engineering and IT arenas including Aerospace, Defense, Electronics, Telecommunications, Automotive, and Energy just to name a few. Our reputation, track record, and years of continuous growth reflect the commitment to quality that our employees and clients experience first-hand. To find out more about PDS, check out http://www.pdstech.com/ **$$$ PDS pays for referrals! $$$** We pay thousands each month in referral bonuses! Contact a recruiter for details To find a recruiter near you, look at our Branch Locator. at http://www.pdstech.com/pds_locations.htm
          Setting custom properties for PDF signatures   

Introduction


Software modules that digital signatures of the PDF file are called Filters (signature handlers) in PDF terms. There are a few existing filters e.g. Adobe.PPKLite or Adobe.PubSec.

When the signature object is being created it may have a preferred Filterproperty assigned to it. There is also an additional SubFilter property of the signature that defines how the signature data is being stored in the file; a few predefined values are as follows:

1. For signing PDF files using PKCS#1, the only value of SubFilter that should be used is adbe.x509.rsa_sha1, which uses the RSA encryption algorithm and SHA-1 digest method.

2. When PKCS#7 signatures are used allowed values are:

adbe.pkcs7.detached: The original signed message digest over the document’s byte range shall be incorporated as the normal PKCS#7 SignedData field. No data shall be encapsulated in the PKCS#7 SignedData field.

adbe.pkcs7.sha1: The SHA1 digest of the document’s byte range shall be encapsulated in the PKCS#7 SignedData field with ContentInfo of type Data. The digest of that SignedData shall be incorporated as the normal PKCS#7 digest.

Additional information can be found in PDF specification, see section 12.8.3 Signature Interoperability. It is intended that conforming readers allow interoperability between signature handlers; that is, a PDF file signed with a handler from one provider shall be able to be validated with a handler from a different provider.

If present, the SubFilter property of the signature shall specify the encoding of the signature value and key information, while the Filter property shall specify the preferred handler that should be used to validate the signature. When handlers are being registered according to specification they shall specify the SubFilter encodings they support enabling handlers other than the originally used to validate the signatures created.

So, to summarize all the things above: Filter - defines validation module, SubFilter – defines how to store the signature value and key info in PDF file.

In this example we’ll set a few custom properties for the signature, namely the name of the application that created the signature and GPS coordinates of the signer’s location.

Internally it uses the SignatureField.PropBuild dictionary to set the software module name when the signature is being created. PropBuild dictionary is a special dictionary that allows writing custom values along with the signature. Read the PDF Signature Build Dictionary Specification to find details about it.

The code


class Program
{
    private static void Sign(string pathToDocument, string pathToCertificate, 
        string password, string pathToSignatureImage, Boundary signatureViewLocation)
    {           
        // open existing document andd sign once
        using (Stream inputStream = new FileStream( pathToDocument,
            FileMode.Open, FileAccess.ReadWrite))
        {
            using (FixedDocument doc = new FixedDocument(inputStream))
            {
                string imageResourceId = Guid.NewGuid().ToString("N");
                string signatureFieldId = Guid.NewGuid().ToString("N");

                // register signature image resource
                doc.ResourceManager.RegisterResource(new Image(imageResourceId,
                    pathToSignatureImage));

                // create first signature field and initialize it using a stored certificate
                SignatureField signatureField = new SignatureField(signatureFieldId);
                using (Stream signatureDataStream = File.OpenRead(pathToCertificate))
                {
                    signatureField.Signature = new Pkcs7DetachedSignature(
                        new Pkcs12Store(signatureDataStream,password));
                    // set the software module name
                    signatureField.Signature.SoftwareModuleName =
                       "MyApp based on Apitron PDF Kit for .NET";        
                    // set the GEO location of the place where the signature was created
                    signatureField.PropBuild.SetValue("GEOTAG", "38.8977° N, 77.0365° W");
                }

                // add signature fields to the document
                doc.AcroForm.Fields.Add(signatureField);

                // create first signature view using the image resource
                SignatureFieldView signatureView = new SignatureFieldView(signatureField,
                    signatureViewLocation);
                signatureView.ViewSettings.Graphic = Graphic.Image;
                signatureView.ViewSettings.GraphicResourceID = imageResourceId;
                signatureView.ViewSettings.Description = Description.None;

                // add views to page annotations collection
                doc.Pages[0].Annotations.Add(signatureView);

                // save as incremental update
                doc.Save();
            }
        }

        Process.Start("signed.pdf");
    }
   
    private static void CreatePDFDocument(string fileName)
    {
        using (Stream stream = File.Create(fileName))
        {
            FlowDocument doc = new FlowDocument() { Margin = new Thickness(10) };
            doc.Add(new TextBlock("Signed using Apitron PDF Kit for .NET, 
                the signature has a custom
                property containing app name. " +
               "Click on the signature image and select \"Signature Properties...\"-
               >\"Advanced Properties...\""));
            doc.Write(stream, new ResourceManager());
        }
    }

    static void Main(string[] args)
    {
        string fileName = "signed.pdf";

        CreatePDFDocument(fileName);

        // sign once and save
        Sign(fileName, "../../data/certs/JohnDoe.pfx", "password",  
            "../../data/images/signatureImage.png"
            new Boundary(10, 750, 110, 800));                               
    }      
}

Please note that setting custom properties using PropBuild dictionary is only possible if you use PKCS7 detached signature. The complete code sample can be found in our github repo.

And the result:

Pic. 1 Custom signature properties added using Apitron PDF Kit for .NET

Pic. 1 Custom signature properties added using Apitron PDF Kit for .NET

Summary


As you can see, Apitron PDF Kit provides an easy to use API that allows you to solve complex tasks like signing PDF and setting custom signature properties using a couple lines of code. Additionally, its cross-platform nature simplifies development if you’re targeting multiple platforms at once e.g. .NET ecosystem, Android and iOS (using Xamarin) as it’s available for all modern web, desktop or mobile platforms. Contact us if you have any questions and we’ll be happy to help you. 

          How Safe Are the Sites You're Using in the Classroom?   

As teachers, we know student safety is one of our primary responsibilities. We practice emergency drills numerous times each year, we screen school visitors, and we put rules and norms in place to protect the kids under our charge.

But when it comes to keeping students and their personal information safe online, it can feel a little overwhelming. Many times we swing between two extremes: Either we turn a blind eye to the risks and put our faith in the school's internet filters, or we put away the devices altogether. Of course, neither of these options is best for our students.

So what can you do?

Fortunately, there are a few quick and easy ways to check the security of the websites you and your students are using in the classroom. These practices are terrific habits to model for your students as you help them build their media-literacy skills.

Tip 1: Look for the "s" in "https."

Look for the "s" in the URL whenever you use a website, especially when logging in. Do you see "https" or a lock symbol? That means the site is encrypted and probably a lot more secure.

Tip 2: Check out our list of secure websites.

Of course, websites can gather personal information from more than a login page. And clicking through every page of a website can be an impossible task. Good news! The Common Sense privacy team is running a thorough check of encryption on many popular educational websites. Take a look at our list of secure sites, or send us the URL of a site you'd like us to check.

Tip 3: Find the tool's privacy policy.

Privacy policies can be pretty overwhelming, and we often skip reading them because they aren't written in plain language. A privacy policy spells out what information a site collects and how it uses and shares it. As weird as this sounds, just make sure a privacy policy is there. You'd be surprised how many policies are really hard to find or don't even exist!

For a deeper assessment of a tool's privacy policy, rely on the experts. Common Sense Education conducts extensive privacy evaluations of popular tools. Basically, we read the policies and surface the need-to-know information.

Believe it or not, these simple habits are a terrific starting point for keeping students' data private. Model these for students and share them with your colleagues. Then use what you find to start a privacy conversation at your school.


          COLD BOOT ATTACKS ON ENCRYPTION KEYS (Don't get hacked!)   
none
          2017 Annual HLS Survey Results   

As many of you know, Cadence (more correctly, “I”) recently performed an industry survey about HLS (High Level Synthesis) to get a fuller view of the productivity experiences and expectations from users and non-users alike.

With nearly 200 responses, roughly half from HLS users and half not, we got a representative picture of what HLS users, potential users, and even skeptics believe about HLS. So let’s dive in.

How familiar are you with high-level synthesis (HLS)?

 This was a good cross-section of high-level synthesis users and non-users, which I was very happy to see. The numbers are high enough that they are likely a decent representation of the industry perceptions.

In the analysis of the following questions, I break down the responses by people who have used HLS (the mustard and light blue sections of the above graph) vs non-users (the next three categories). I excluded the responses from people who answered “not at all,” since they self-identified as not even hearing about HLS before this survey.

The next question, only for HLS users, is about what they have designed with HLS.

 

What types of hardware have you designed with HLS? (select all that apply)

The first takeaway should be that the old opinion that HLS is only used for datapath types of applications is just that… old. Many years ago, that was true, but not today. “Controllers” or “processors” combine to account for 24% of the design types. Of course, some of the other areas, such as “wired networking,” are likely to include a lot of non-datapath processing, as well.

Compared to the survey I did in 2015, “Image Processing,” the combined “networking” categories, and “encryption” have all decreased as an overall percentage. To be clear, this reflects the diversely growing user base of HLS, not an absolute decrease in these categories. (As a matter of fact, wireless was the fastest growing market segment for Stratus™ HLS in 2016.)

The remainder of this year’s survey focuses on productivity, starting with overall productivity compared to an RTL designer. In the following graphs, red bars are the reported users’ experiences, and blue bars are the reported non-users’ expectations.

 

On average, how productive is an HLS designer compared to an RTL designer?

Most HLS users (red bars) are seeing a good productivity benefit. The spread in productivity didn’t appear to have any correlation with the types of HW being designed. It’s quite possible it’s related to the learning curve, as productivity tends to increase as familiarity with HLS flow increases. Next year, I’ll be sure to ask, “How long have you been using HLS?”

It was interesting to see that 5% of HLS users are exceeding the standard HLS claim of “up to 10x better productivity.” Perhaps we should increase the claim…?

One disappointing result is the shape of the graph for non-users compared to users. As a group, non-users have lower productivity expectations than what is being realized by industry users. In fact, almost a third believe there is no productivity benefit. I guess that gives me and the rest of the HLS community some homework…

The next question asked about how the productivity gained through behavioral IP reuse.

How much productivity is gained through behavioral IP reuse? “Behavioral IP” is defined as high-level IP created for implementation with high-level synthesis (HLS). Behavioral IP can typically be reused or retargeted by changing some controls on the HLS tool.

Again, most HLS users (red bars) are seeing a good productivity benefit from behavioral IP, and 5% are exceeding even the marketing claims.

Unlike the previous question, the shapes of the graphs of the user experiences and non-user expectations were mostly in line, albeit with a few more at the extreme high and low ends of expectations.

The final productivity question is about verification.

How much more productive is verification in the HLS flow?

 

Once again, most HLS users (red bars) are seeing a good productivity benefit. As before, there didn’t seem to be any correlators with the spread in productivity. Over 6% of users are exceeding the HLS productivity claims. Interestingly, more non-users seem to believe the HLS productivity benefit when it comes to verification.

 

 At this point, you may be going cross-eyed from all the graphs, so let me summarize.

  • The types of applications where HLS is being used has broadened significantly.
  • HLS users are getting, and sometimes exceeding, the productivity benefits that we EDA vendors claim.
  • Non-HLS users accept the productivity benefit when it comes to verification more readily than design.

I’m sure there are other correlations and data that can be gleaned from the results. Maybe I can get my hands on some of that machine learning IP to sift through the raw data….

 

I’ll close with one final survey result. This one may be immediately applicable to you, and might even save you some money. The Pursley household recently saw three early summer “blockbuster” movies. Previews suggested each could be the movie of the year, so I did a not-so-anonymous survey to see which movie was the best.

As you can see, Guardians of the Galaxy Vol. 2 was the clear winner with 75% of the respondents saying it was the best. It also got a very rare “maybe 10 out of 10 stars” from our resident movie critic. Wonder Woman was also a fantastic movie, getting 25% of the votes and a “8 out of 10 stars” only because it started a little slow.

Pirates of the Caribbean: Dead Men Tell No Tales was a different experience altogether. I think it got negative stars, but I can’t remember because we were almost running to get out of the theater.  Yeah, it was that bad… but your mileage may vary.

For more information about the sequel Dead Men Don't Do HLS...sorry, my brain is still mush...I mean Stratus, see the product page.


          CyberSecurity Engineer - Black Box Network Services - Lawrence, PA   
Configuration and monitoring of detection technologies:. Experience in configuration of Symantec Endpoint Protection and Endpoint Encryption....
From Black Box Network Services - Wed, 07 Jun 2017 20:18:04 GMT - View all Lawrence, PA jobs
          Cryptography   
Presenter: 
Wang, Qian; Guha, Arup
When: 
5 Oct 2011 - 19:00 - 20:45
Venue: 
Taste
Where: 
Taste
Street:
717 W. Smith Street
City:
Orlando
,
Province:
Florida
Postal Code:
32804
Country:
United States

Cryptography is often considered one of the crown jewels in a young discipline, computer science, but it’s really an ancient subject that helped bring into existence the computer age. Our speakers will explore the ways cryptography is used (and abused) to run our world, as well as introduce some of the mathematics that modern cryptography is built on.

Arup Guha grew up in Winter Park and got undergraduate degrees in Mathematics and Computer Science at MIT in 1997. After getting his Masters in Computer Science at the University of Wisconsin-Madison, Arup returned to Orlando in 1999 to teach at UCF in the Computer Science department, where he teaches a cryptography course each fall semester.

Qian Wang got his Bachelor’s and Master’s degrees in Computer Science at MIT in 2001. He works with encryption algorithms and thinks about security problems daily as part of his job at QFX Software, a local company he founded.


          Us vs the Europeans   
The European Union definition of personal information and of privacy is so much more restrictive than ours that it should come as no surprise that the Europeans are not as interested in using massive data suction tools to find terrorists as this government is.

I wish I could say that any of the presidential candidates understood the issues around privacy, in particular digital privacy, but I'm afraid we are going to have to leave that to the Supreme Court.

The FBI director says he was greatly misunderstood, that he's simply interested in being able to read "clear text."  Meanwhile, we learn that there was nothing of interest on the work phone in San Bernardino that caused the FBI to take Apple to court to break the device's encryption and to create software most of us in the business call a "back door."  The FBI however is still hopeful that they might be able to figure out what the terrorists did in time not yet accounted for by checking out their GPS data.  (If they were smart enough to use burner phones, they would have been smart enough to turn off "Location Services," thus turn off GPS.)

I am looking for a leader, perhaps a former government official, to become the clear spokesperson for privacy and in particular for digital privacy.  I don't think that Tim Cook can do this and run his business at the same time.  We need a private sector leader to explain clearly to the American public what is at stake in these skirmishes. 


          A reasonable expectation of privacy.   



I'm in my office before class, having started my morning with a New York University-hosted forum on the Zika virus, which actually will be up for discussion in class this afternoon. About an hour after that forum concluded, Microsoft announced that it was suing the U.S. Department of Justice, "challenging as unconstitutional the government’s authority to bar tech companies from telling customers when their data has been examined by federal agents." (Wall Street Journal)  

Now, class prep completed, I'm listening to an address that FBI director James Comey gave at Kenyon College's "Expectation of Privacy" conference.  He is of course arguing that there needs to be a way Hinto encrypted systems, with many examples being tossed out, usually about terrorists or kidnappers or murderers.  He rejects absolutely the "slippery slope" argument. He asks for a substantive thoughtful conversations of security and liberty.  He ignores the issue of the back door becoming accessible to the criminals, nation states or terrorists.

The late Antonin Scalia argued some time ago that "There is nothing new in the realization that the Constitution sometimes insulates the criminality of a few in order to protect the privacy of us all."
Let's hope that the Congress can remember this, divided as it is, as one or more anti-encryption bills go forward.

I admire Director Comey enormously, including his references to FBI agent training he has instituted via a visit to the Holocaust Museum, and the order from Bobby Kennedy to wiretap Dr. Martin Luther King Jr.'s phones.  I think, though, here you will find the other side of the article missing -- the side that makes the "slippery slope" argument, that believes that source code is protected speech, and that resists creating a tool that the government asks for, one that breaks its own product.

He is right, we have never been closer to a condition of complete privacy with the advent of encryption. May I also point out that the question and answer session that follows his talk is well worth listening to.  He is a good teacher.



          Highlights from the ONTAP 9.2 RC1 Release Notes & More   
Caveat lector: This post is unofficial and details of ONTAP 9.2 are subject to change whilst it’s not yet GA.

Image: ONTAP 9.2 Logo
6 months after last years "Highlights from the ONTAP 9.1 RC1 Release Notes", comes another new and exciting ONTAP release.

The following post covers changes in 9.2 as in the 9.2RC1 release notes, with a bit of supplemental material on 3 highlights.

Highlights from the ONTAP 9.2 RC1 Release Notes

Changes in ONTAP 9.2
This release includes the following new and changed features:

File access protocol enhancements
- Name service configuration checker
- Support for specifying hostnames in LDAP and NIS configurations
- Enhanced support for SMB protocols

Hardware support updates
- Disk auto-assignment changes for AFF systems
- Additional platform support for the X1133A-R6 adapter

Manageability enhancements
- Aggregate-level Inline Data Deduplicationenabled by default in AFF systems
- Support for capacity based license
- Support for minimum throughput value (QoS)
- Support for Cluster Expansion (in System Manager)
- Support for automatic switchless-cluster detection
- Unified Manager 7.2 integrates Performance Manager functionality
- Max aggregate size increase
- Support for verifying name mapping in a multiprotocol environment
- Support for encrypting volumes
- Support for root-data partitioning enhancements

MetroCluster configuration enhancements
- Support for Brocade G620 switches
- Support for ISL sharing
- Support for DS460C disk shelves
- Support for eight ISLs per fabric on Brocade G620 and Cisco 9396S switches

Networking and security protocol enhancements
- Enhanced support for digital security certificates
- Support for configuring maximum SSH login attempts

SAN enhancements
- Support for iSCSI Endpoint Isolation

Storage resource management enhancements
- Support for storage tiers by using FabricPool

Storage efficiency enhancements
- Storage efficiency visualization changes in the CLI

Highlight 1: Aggregate Inline Deduplication

ONTAP 9.2 Feature Support:
- AFF systems only (enabled by default)
- Inline only
- Adaptive compression
- Thin provisioned volumes
- FlexGroup
- MCC
- FabricPool (Flash tier only)

Minimal Performance Impact:
- Overall impact with all efficiency technologies (inline compression, inline dedupe and inline zero-block elimination) < 10%

Opportunistic in nature:
- Preference to maximize latency and throughput.

Check out Justin Parisi’s: ONTAP 9.2RC1 Available

Highlight 2: QoS now with Minimum Policies

QoS Min delivers:
- Dedicated IOPS Performance
- Enables Service Classes
- Applicable to Vols & LUNs
- Up to 12’000 objects/cluster
- One object per Policy Group
- AFF & SAN only (in 9.2)


Highlight 3: FabricPool

Saving the best for last ... FabricPool is arguably the most exciting new feature in ONTAP 9.2.

Image: FabricPool - Unique value add
Note: The Performance Tier needs to be on flash (i.e. SSD aggregates only). Check with NetApp for supported platforms.

FabricPool Features Support:
- Data Protection (Snapmirror and SnapVault)
- Storage Efficiencies (inline dedupe, inline compression, compaction*, aggregate inline dedupe*)
- Encryption (NVE and NSE)
*supported on performance tier

FabricPool use case #1: Make room for active workloads on Primary storage

Image: FabricPool use case 1: Putting snapshot data in the cloud.
FabricPool use case #2: Shrink your secondary storage footprint

Image: FabricPool use case 2: Expand the capacity of secondary cluster by automatically tiering data to the cloud.
FabricPool use case #3: Volume archive using “vol move” in primary cluster

Image: FabricPool use case 3: “Vol move” off Production HA-pair aggregate to Archive HA-pair aggregate and tier to the cloud.

          - WINDOWS   
Mircorost Windows atau biasa kita sapa dengan sebutan Windows adalah Sistem Operasi yang dikembangkan oleh Microsoft Corporation yang menggunakan antarmuka dengan berbasikan GUI (Graphical User Interface) atau tampilan antarmuka bergrafis.

Awalnya Windows bermula dari Ms-Dos (Microsoft Disk Operating System) yaitu sebuah Sistem Operasi yang berbasiskan teks dan Command-Line interpreter. Windows Versi pertama, Windows Graphic Environmnet 1.0 merupakan perangkat lunak yang bekerja atas arsitekstur 16-Bit dan bukan merupakan Sistem Operasi dan berjalan atas MS-DOS, sehingga untuk menjalankannya membutuhkan MS-DOS. MS-DOS sendiri sebenarnya dibuat oleh perusahaan pembuat komputer Seattle Computer Products dan barulah kemudian direkrut oleh Microsoft yang selanjutnya dibeli lisensinya.

Kemudian berkembang menjadi Windows 1.0 versi pertama Sistem Operasi dalam dunia Sistem Operasi yang berbasiskan GUI (Graphical User Interface) dan mendukung Multi-Tasking atau dapat mengerjakan banyak pekerjaan secara simultan. Setelah itu Windows 1.0 berkembang menjadi Windows 2.0, Windows 2.0 ini berbasis GUI dan mendukung penggunaan VGA (Video GraphicsArray) dan juga mendukung Multi-Tasking. Windows 2.0 juga support terhadap penggunaan Processor Intel 80286 dimana Processor Intel 80286 adalah Processor pertama dengan kemampuan untuk memproteksi area memory.

Kemudian dilanjutkan dengan generasi Windows 3.0 dimana Windows 3.0 memiliki kemampuan yang sama dengan Windows sebelumnya dan ditambah dukungan kartu grafis SVGA atau XGA dan juga icon yang lebih baik. Dalam era tersebut, Microsoft juga menyediakan SDK (Software Development kit) sehingga para developer piranti lunak dapat mengembangkan aplikasi/programnya agar mampu berjalan di Windows 3.0 ini. Windows 3.0 juga memperkenalkan adanya Virtual Device Driver (VXD) dimana dapat berguna untuk meminimalisasi ketergantungan pada setiap driver pada perangkat keras tertentu. Windows 3.0 kemudian berevolusi menjadi Windows 3.1 yang sudah diperkenalkan dengan fitur Multimedia dan True Type Font selain itu juga memudahkan End-User karena adanya fitur Drag and Drop dan akhirnya Windows versi 3 ini berkembang menjadi Sistem Operasi yang sudah mengenal NetWorking (Windows 3.11).

Setelah berkembang cukup lama akhirnya Microsoft memperkenalkan Sistem Operasi hibrida 16-Bit/32-Bit yang dikenal dengan nama Windows 95. Banyak perubahan dari Windows versi sebelumnya, yaitu : Windows 95 memiliki GUI yang lebih menarik dan atraktif, mendukung Plug and Play, mendukung penamaan yang panjang, memiliki beberapa fasilitas seperti : Browser yang terintegrasi dan Windows Explorer untuk menjelajah Windows. Selain itu juga Windows 95 memiliki fitur untuk memanajemen daya (APM) dan diperkenalkannya juga Client-Server.

Generasi penerus dari Windows 95 adalah Windows 98 dimana Windows 98 sudah mendukung VGA berbasis AGP, serta mendukung media penyimpanan ringkas seperti USB, diperkenalkannya NAT untuk berbagi koneksi Internet dan digantikannya Virtual Device Driver dengan Windows Driver Model. Ada juga beberapa fitur tambahan berupa aplikasi Microsoft Office dan Internet Explorer versi 5. Windows 98 juga sudah memiliki kemampuan-kemampuan untuk memainkan Game dan menjalankan aplikasi Multimedia.

Perkembangan selanjutnya adalah Windows ME, tidak ada yang spesial dari Windows ME selain transisi dukungan grafis dari 16-Bit ke 32-Bit dan pada era Windows ME sudah banyak pengguna rumahan yang memakainya. Windows ME pun akhrinya digantikan dengan Windows NT yang sudah mendukung arsitekstur x86 (80×86) , Intel IA64 dan AMD64 (x64) serta mendukung grafis 32-Bit. Windows NT sebenarnya dibangun dari pengembangan IBM OS/2 dan Windows NT juga banyak digunakan dalam jaringan komputer. Windows NT juga memperkenalkan File System NTFS yang lebih baik dari FAT maupun FAT-32.

Selanjutnya Windows NT berkembang menjadi Windows 2000 banyak fitur tambahan diantaranya : Active Directory, Image Preview, Browser Internet Explorer v6, DirectX dan Open GL, Plug and Play dan Windows Driver Model yang lebih baik performanya dibanding sebelumnya. Setelah generasi Windows NT munculah Windows XP yang menawarkan banyak perubahan, mempunyai banyak fitur dan performa yang semakin mengingkat. Bisa dikatakan Windows XP merupakan Windows yang paling laris dan digandrungi oleh pengguna PC maupun perangkat PC bergerak (Mobile). Seiring dengan kebutuhan akan networking maka Microsoft Corporation mengeluarkan Sistem Operasi yang berkonsentrasi pada jaringan, yaitu : Windows Server 2003. Bisa dibilang Windows Server 2003 adalah reinkarnasi dari Windows NT.

Banyak sekali fitur yang ditawarkan pada Windows Server 2003 ini salah satunya adalah diperkenalkannya platform .Net. Diperkenalkan juga fitur Domain Controller Server, PKI (Public Key Infrastructure) Server, Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), Windows Internet Name Service (WINS), Microsoft IIS, dan lain sebagainya. Microsoft pun melanjutkan perkembangan Sistem Operasi dengan Windows Vista (Longhorn), ini merupakan revolusi dari Windows XP. Windows Vista lebih mengutamakan interface atau penampilan grafis antarmuka dibandingkan dengan performa, dibuktikan dengan adanya fitur : AERO, Sidebar, dan lain sebagainya.

Windows Vista juga menawarkan tingkat keamanan yang lebih baik dibandingkan dengan Windows XP, karena pada Windows Vista diperkenalkan adanya Windows Firewall with Advanced Security, Windows Defender, Parental Control, User Account Control (UAC), BitLocker Drive Encryption, ASLR. Windows Vista juga sudah mengenal IPv6, DirectX versi terbaru, dan arsitekstur 64-Bit. Perkembangan selanjutnya adalah transisi dari Windows Server 2003 menjadi Windows Home Server yang ditujukan sebagai File Server untuk rumahan. Windows Server juga mengenalkan beberapa teknologi yaitu : Headless Operation (Server tidak membutuhkan monitor atau keyboard untuk memanjemen perangkat), Kontrol jarak jauh, Pemantauan kesehatan komputer, Sharing dan Streaming.

Generasi berikutnya ditandai dengan munculnya penggabungan Sistem Operasi Windows Vista dengan Windows Server, yaitu Windows Server 2008. Fitur Windows Vista dan Windows Server digabung menjadi satu padu untuk meningkatkan keamanan dan kenyamanan End-User. Selanjutnya Windows Server 2008 berkembang menjadi Windows Server 2008 R2. Versi terakhir Sistem Operasi besutan Windows adalah Windows 7, Windows 7 dirilis untuk menggantikan kekurangan Windows XP dan kelebihan Windows Vista. Boleh dikatakan jikalau Windows 7 adalah fusi dari Windows XP dan Windows Vista, tidak seperti pada Windows Vista, Windows 7 memiliki performa yang lebih baik dari Windows Vista.
          Thoughts on presence, chat, and groups...   
Even though it's pretty much early for this, I've started to muse more in detail about scaling the chat/presence/identity thing. I think it's actually pretty straightforward if we introduce the concept of "home server" - a place where the avatar "belongs". This does not have to be a sim as such - since these activities are not necessarily related to the 3d presence.

A user would have a "home identity server" - something that they trust enough to hold the private key of the avatar, and authorize the signing / encryption operations using this key. This server would house also their "profile" - something that holds the pointers to the their "home inventory server", "home message server", "home presence server", possibly even "home physics server" (even though at current the distributed physics is probably out of the question, one should not assume it will always be like this). The "publicly viewable" profile would also hold the offline contact mail - dedicated to the communications when "off-line".

Then a lot of things become quite easy. Let's take a look at presence. If I add you to my contact list, all I have to do upon my login is to have my home presence server contact the home presence servers of my contact list and notify them that I am online - then they can update the state of the contact lists for the folks who are based there - and correspondingly to let my presence server know in return which of my contacts are online. Assuming the "friendship" link between the presence servers is protected by a shared key specific for this link, it will be rather difficult to spoof - as well as to get an unsolicited presence queries, unless explicitly permitted.

Of course, then revoking the "friendship" is also possible by either of the sides - you just invalidate the shared key for that link, and then the matter of
unsolicited queries reduces to a classic problem of fighting off the DoS against a website - which, although it is a difficult problem, has already received enough attention and has some solutions.

IMs are again trivial - my chat server knows who is online and who is not from the presence server, and can either relay the message to the contacts' chat servers or directly send it to them via their contact email in case they are offline. What's nicest is that then it is only the two servers - those of the sender and of the recipient - participating in the process, so this should scale pretty well as the number of "providers" go up.

Groups then could become just an special abstraction of "contact list" - with the difference that it would act more in a hub-spoke fashion - the members would send their presence / chat data to this server, and it would be the group server authorizing (or not!) chat in the groups, or providing this right to only a few people, etc.

These "contact list records" stored in the friends list / groups could hold some more interesting stuff - e.g. does this user allow the inventory offers from members of the given group, or from its contacts. Of course, the final permission check would be done on the recipient's servers - but putting the signed info as close to the source as possible, it would allow to prevent the waste of resources amongst the "well-behaved" servers.

And again - the protection from the ill-behaved servers reduces to countering a DoS from an untrustworthy source.

I'm pretty sure this is all doable with a little bit of PKI+shared secret+SSL woodoo.

The only (possibly large for some) drawback that I see is the need to expose an email address into the "identity profile" - which needs to be tackled. But the exposing of the email address only makes it resilient in the case of the server-side problems - i.e. in the case of IM, if your chat server could not contact my chat server (which was brought down by a vicious admin), then it would send an email using the exposed mail address.

Nothing prevents from just allocating a "VW-only" email address on the chat server (or its mail-handling counterpart) itself - then the server failures will only cause the delayed delivery of the IMs, but not a total failure. Probably that's the best way.

And given that your home chat server might allocate more than one email - say, one per contact, it would become quite easy to sort/prioritize the email-based IMs. And possibly even request the sent messages be signed by the sender + have the sender's profile attached - this way one can verify their authenticity, and store the state within the message itself.
          Quantum Entanglement?   
I was asked to go on the BBC Radio 4 today programme the other day to talk about the Chinese quantum entanglement satellite (you can hear the interview here) - a number of people said it was interesting, but they really didn't get the whole entanglement thing.

I thought it would be worth sharing part of the first chapter of my book The God Effect below. Incidentally, I also get curiosity about that title (which has done the book no harm). It has a rather obscure heritage. When physicist Leon Lederman wanted to write a book about the search for the Higgs boson, he wanted to call it The Goddam Particle, as the Higgs was so elusive. The publishers wouldn't let him, so they compromised on The God Particle. I justify the book's title because at the time was there some talk about entanglements between Higgs bosons and other particles. But in reality it was because entanglement is - in Einstein's words - spooky. I think it has a certain ring.

Here's the extract:

The phenomenon at the heart of this book is a linkage between the incomprehensibly small particles that make up the world around us. At this quantum level it is possible to link particles (photons, electrons and atoms, for instance) together so completely that the linked objects become to all intents and purposes part of the same thing. Even if these entangled particles are then separated to opposite sides of the universe they maintain this strange connection. Make a change to one particle, and that change is instantly reflected in the other – however far apart they may be. Entanglement has an unsettling omnipresence.

It is this unbounded linkage that leads to the remarkable applications of quantum entanglement that are being developed. It enables the distribution of a secret key for data encryption that is impossible to intercept. It plays a fundamental role in the operation of a quantum computer – a computer where each bit is an individual subatomic particle, capable of calculations that are beyond any conventional computer, even if it ran for the whole lifetime of the universe. And entanglement makes it possible to transfer a particle, and potentially an object, from one place to another without passing through the space in between.


This counter-intuitive ability of entanglement to provide an intimate link between two particles at a distance seems just as odd to physicists as it does to the rest of us. Albert Einstein, who was directly responsible for the origins of quantum theory that made entanglement inevitable, was never comfortable with the way entanglement acts at a distance, without anything connecting the entangled particles. He referred to the ability of quantum theory to ignore spatial separation as “spükhafte Fernwirkungen”, literally spooky or ghostly distant actions, in a letter written to fellow scientist Max Born:
I cannot make a case for my attitude in physics which you would consider reasonable… I cannot seriously believe in [quantum theory] because the theory cannot be reconciled with the idea that physics should represent a reality in time and space, free from spooky actions at a distance.
Entanglement, as a word, seems to have entered the language of physics at the hand of German scientist Erwin Schrödinger, in an article in the Proceedings of the Cambridge Philosophical Society. Although German, Schrödinger was working and writing in English at the time – interestingly, and this may have inspired his use of “entanglement” – the German word for the phenomenon, Verschränkung, has a rather different meaning.

The English term has subtly negative connotations. It gives a sense of being out of control and messed up. But the German word is more structured and neutral – it is about enfolding, crossing over in an orderly manner. A piece of string that is knotted and messed up is entangled, where a carefully woven tapestry has Verschränkung. In practice neither word seems ideal. Quantum entanglement may lack the disorder implied by “entanglement”, but it is much stronger and more fundamental than the pallid Verschränkung seems to suggest.

For Einstein, the prediction that entanglement should exist was a clear indicator of the lack of sense in quantum theory. The idea of entanglement was an anathema to Einstein, a challenge to his view on what “reality” truly consisted of. And this was all because entanglement seemed to defy the concept of locality.

Locality. It’s the kind of principle that is so obvious we usually assume it without even being aware of it. If we want to act on something that isn’t directly connected to us – to give it a push, to pass a piece of information to it, or whatever – we need to get something from us to the object we wish to act on. Often this “something” involves direct contact – I reach over and pick up my coffee cup to get it moving towards my mouth. But if we want to act on something at a distance without crossing the gap that separates us from that something, we need to send an intermediary from one place to another.
Imagine that you are at throwing stones at a can that’s perched on a fence*. If you want to knock the can off, you can’t just look at it and make it jump into the air by some sort of mystical influence; you have to throw a stone at it. Your hand pushes the stone, the stone travels through the air and hits the can; as long as your aim is good (and the can isn’t wedged in place), the can falls off and you smile smugly.

Similarly, if I want to speak to someone across the other side of a room, my vocal chords vibrate, pushing against the nearest air molecules. These send a train of sound waves through the air, rippling molecules across the gap, until finally those vibrations get to the other person’s ear, start her eardrum vibrating and result in my voice being heard. In the first case, the ball was the intermediary, in the second the sound wave, but in both cases something traveled from A to B. This need for travel – travel that takes time – is what locality is all about. It says that you can’t magically act on a remote object without that intervention.

All the evidence is that we are programmed from birth to find the ability to influence objects at a distance something remotely unnatural. Research on babies has shown that they don’t accept action at a distance, believing that there needs to be contact between two objects to allow one to acton the other.

This seems an extravagant assertion. After all, babies are hardly capable of telling us that this is what they think, and no one can remember how they saw the world in their first few months of life. The research technique that gets round this problem is delightfully cunning. Babies are made bored by constant repetition of a particular scene, then after many repeats, some small aspect of the scene is changed. The babies are watched to see how they react. If the new movement involves action with contact, the babies get less worked up than if it appears to involve action at a distance. The inference that babies don’t like the ability to act remotely is indirect, but the monitoring does appear to display babies’ concern about action at a distance – the whole business feels unnatural.

Next time you are watching a magician at work, doing a trick where he manipulates an object at a distance, try to monitor your own reaction. As the magician’s hand moves, so does the ball (or whatever the object he is controlling happens to be). Your mind rebels against the sight. You know that there has to be a trick. There has to be something linking the action of the hand and the movement of the object, whether directly – say with a very thin wire – or indirectly, perhaps by a hidden person moving the object while watching the magician’s hand. Your brain is entirely convinced that action at a distance is not real.

* In the original draft of the book the example was a coconut shy, but the US publisher had never heard of them.

... find out more in The God Effect.
          Data Center: Storage Area Networking Software   
SAN-OS for the Cisco MDS family of storage area network switches now offers advanced encryption and backup capabilities. The discussion also covers integration with EMC and new MDS hardware capabilities.
          skedCloud – Easy To Use, Cloud Based, Calendar Sharing iPhone App!   

Want to be more productive with your mobile calendar and have the option for easy calendar sharing between users? Well, the new skedClolud Business app lets you do just that. And with useful features such as full encryption, cloud based storage, and a simple user interface, it won’t take long for it to become your […]

The post skedCloud – Easy To Use, Cloud Based, Calendar Sharing iPhone App! first appeared on CrazyMikesapps


          Enjoy The Fun Of Madden Mobile Hack Play Like Pros   

madden mobile hack cheats

Madden Mobile Hack Can Make You Best Team

The Madden NFL Mobile game is in the circuit for long. It has millions of download. You will enjoy playing it with Madden Mobile Hack.

The game allows you to create your NFL team. You are the owner of the team, and the onus will be on you to recruit the players. The new version has incorporated a few sweeping changes. The field is now leveled to give equal opportunity to all. Your old team is now in Trophy Room, the coins and cards are now all reset, and you got only the cash balance of the last season. It’s almost a clean slate for all and everybody is on equal footing. The only other option to generate coins is to use the madden mobile cheats.

How to get help?

There is a fallback system in place. The fallback is maintained by the sports giant to address your problems if any in the new season. To avail the assistance you must

  • Go to the website of the gaming company and select your device. The choice is simple
  • You have to declare whether your phone is Android, iOS or Windows and if you are using tablets then the type.
  • If you think your account is hacked, then you must contact with gaming company or
  • You can sign in without logging in through the troubleshooting option in the lowermost right corner
  • You go through the process and reset your security settings
  • Do not use unsafe websites and use only madden mobile 17 cheats to keep your account safe.

How to locate the spammers?

madden mobile hack

To get the cheats, you must at the first search and locate a reliable website. Now, it is easy to say than to do. Here are a few tips to discard the hazardous sites

  • Do not deal with those asking for the personal details like email ID or passwords
  • Avoid all websites asking for your mobile number and your zip code
  • Do not divulge your details other details asked in the guise of a general survey or similar pleas.
  • If you use the madden mobile coins, you will be requested to give your username only
How to get cheats?

If you are in the correct site they will not ask you to give your personal details like date of birth etc. Once you have given your Madden Mobile username

  • You will be requested to select your device, Android, iOS, Windows or others then it will ask
  • Whether you need the encryption or not and the amount of cash and the number of coins you need to generate.
  • Click the generate button to get the cash and coins
  • You can use madden mobile coin hack to get the unlimited cash and coins
What about the genuineness of the codes?

The hackers exploit that weakness of the program and they do it to test their ability. However, it can so happen that the chink in the armor that the hackers were exploiting is now stand corrected. In that case, you report to the hacker’s site that the cheat is not working. You will get the update; after all, you are not alone. Until that time use the cheats for madden mobile and enjoy playing the game.…


          Encryption Wizard in Backtrack 5 R3   



          The Jihadi Forums, Blogs & Social Media   
Understanding Online Radicalization: The Jihadi Forums

Rising terrorism arrests in America, particularly the breaking up of 22 plots between May 2009 and November 2010, have sparked questions about how young Muslim men become terrorists. Although radicalization has become a catch phrase in the media, little has been written about the methods, websites, and actors involved in the process.

This series, “Understanding Online Radicalization,” seeks to shed light on how the Internet functions as a tool for radicalizing would-be terrorists. It will answer questions about the kinds of websites popular among jihadists, how these sites have used new media and technology, and how they appeal to young people.

Understanding the world of online jihadists gives us insight into what motivates its participants and what drives some of them to act out their violent fantasies.

Jihadi Forums: The Ansar al-Mujahideen Network

For converts to violent Islamism, the ideology that has motivated attacks ranging from 9/11 to the Fort Hood massacre, the Internet is the ultimate tool in their arsenal. It guides, educates, and provides a sense of community among the isolated Western followers of the path of jihadists.

In particular, jihadi forums provide a one-stop shop for news, publications, and media. Though the forums lack the organized worldview of jihadi blogs, they do provide some of the strongest links bonding would-be terrorists to one another and to larger networks abroad.

Among the jihadi forums, Ansar al-Mujahideen [AM] and its sister site Ansar al-Mujahiden English Forum [AMEF] provide a readily accessible example of the potential of websites in this genre. AM began in 2008 as a “rather low-frills, Arabic-language clone forum with questionable credibility and a membership of mostly silent observers,” according to counterterrorism expert Evan Kohlmann. Although the website grew by leaps and bounds even before Kohlmann’s February 2010 article on the site, it has since become one of the primary beacons among aspiring radicals in the West.

The construction of the Arabic-language edition of the site is simple but graphically sharp. Well-designed ads at the top of the page highlight the latest publications by a number of jihadi media groups, including al-Qaeda branches, Somali terrorist organization al-Shabaab, and independent scholars of jihad. Underneath these ads is a ringing endorsement of the site by Jordanian Islamist Abu Muhammad al-Maqdisi, followed by links to general news about the ummah (Muslim nation), specific theaters of war, a “College of Electronic Jihad,” and many more dedicated sub-forums.

The world of jihadi forums is a fast-moving place, where groups post links to books, articles, videos, and other multimedia using mostly Western file transfer services. Although there is an expectation that most of these links will be taken down, AM features an archive of key texts and “redeploys” significant ideological manuscripts and technical manuals in a timely fashion.

AMEF, the English-language brand of AM, is a smaller and more focused version of its parent website. It features the same glossy links to new jihadi publications as well as the slightly back-dated English translations of those items, but features less sub-categories. For AMEF, the spotlight is on news of the ummah, jihadi media, publications, and press releases.

Materials posted to the forum can be divided into three general categories: “The War on Islam,” the need to fight back, and a smaller subset of publications that support traditional Islamist points of view.

Using violent sections of traditional Islamic texts linked to historic events, the forum presents the view of constant war between Islam and all other ideologies. In its latest episode of this epic war, the forces of disbelief are led by Americans and Jews, who seek to manipulate and oppress Muslims and Islam.

Grievances with American foreign policy — whether real or imagined — reinforce their beliefs. Self-declared scholars dismiss the sell-out Westernized intellectuals on the circuit of mainstream Islamic conferences, often with a high degree of success. Their message has a strong degree of acceptability among predisposed youth, who believe Islam is under attack and subsequently feel alienated when their local religious leaders fail to take actions to protect Islam and Muslims. Jihadist forums provide a powerful answer to the anger these youth experience, combining violence with theological justification.

Once readers buy into the general notion of conflict between Islam and other ideologies, materials on the forum illustrate the how, when, where, and why of carrying out terrorist attacks.

Biographies of previous attackers provide inspiration, video series and glossy magazines give technical training, and “authentic” scholars of jihad provide targets to strike. Presented in a closed forum session, inspired individuals can confidentially prepare themselves and others to follow through on their ideology and to become heroes of the faith who will be idolized by the next generation of online jihadists.

In recent years, ideologues popular among Western jihadists — such as Yemeni-American scholar Anwar al-Awlaki — have tried to dissuade forum members from travelling to the lands of jihad. Instead, they have encouraged a greater focus on media production and so-called “homegrown” attacks, which are meant to leave the smallest paper trail for American intelligence agencies to follow.

Other major themes include teaching participants how to avoid Western intelligence operations, and expanding dawah (proselytizing). There has also been a growth in “supporting” materials, which supply a more general Islamic education. The move has been a response to the accusations of more moderate clerics, who attack extremists for their weak grasp of general Islamic principles and their calls for conflict without tangible ends.

AM and AMEF have made strong headway among American and European audiences. Faical Errai, a 26-year-old Moroccan living in Spain who founded the webpage, was arrested by Spanish Guardia Civil forces and later deported to his home country. According to Spanish trial documents and researcher Raff Pantucci at the ICSR, Errai had personally used the AM website to fundraise and direct fighters to Chechnya and the Taliban-dominated Pakistani province of Waziristan. From Spain, Errai boasted of directing Libyan terrorists to war zones, a marker of the international success of AM. After Errai’s arrest, the website was taken over by other jihadists, who continued the same mission and expanded the group to include AMEF.

AMEF became a major site for American and European jihadists who did not possess fluency in Arabic. Examples include convicted American terrorists Colleen LaRose (Jihad Jane), Zachary Chesser (Abu Talha al-Amriki), and Emerson Begolly (Asadullah al-Shishani), who were all major contributors to AMEF. German couple Fritz and Filiz Gelowicz, both convicted of providing material support to jihadi groups, were also regular participants.

For Chesser and Jihad Jane, the radicalization process was fairly similar. Both were converts who bought into “The War on Islam” narrative, who experienced significant radicalization outside the Internet, and who later became major participators in online forums. Chesser, who was apprehended before joining al-Shabaab, told investigators about his participation in AMEF and al-Shabaab forum alqimmah.net. He was also a leading activist for the Revolution Muslim blog, and was the founder of “themujahidblog.” Jihad Jane was also an active participant on AMEF and Revolution Muslim, which later became islampolicy.com.

Begolly, a would-be terrorist who was nabbed well before becoming operational, was an active participant in several forums including AMEF, Shumukh al-Islam, and Fallujah, according to SITE intelligence group.

With large numbers already radicalized, AMEF and AM have also begun to expand their reach into new technology. In October 2009, AM’s “Mobile Detachment” created a special data package for cell phones, according to expert Nico Prucha at jihadica.com. Aside from speeches and educational materials, the package includes an encryption program for jihadists to communicate securely, as well as new data packages that capitalize on new and older materials.

Part 2 - Understanding Online Radicalization: The Jihadi Blogs
In the next part of the series, we will examine jihadi blog Revolution Muslim and its successor, Islam Policy. Unlike jihadi forums, which are online warehouses of information, blogs take a more limited amount of data and weave a narrative from the chosen items.

Revolution Muslim / Islam Policy

Few websites, even in the jihadi world, can claim to have singlehandedly created terrorists. One American blog, the now-defunct Revolution Muslim [RM] site, and its successor, Islam Policy [IP], illustrate the power that jihadi blogs can wield.

If jihadi forums represent a one-stop shop for jihad material, jihadi blogs are the ideological factories that put the pieces together. Although lacking the sophisticated graphics of professional jihadi sites, Revolution Muslim and Islam Policy provided a narrative that justifies jihad.

The group also strived to exploit freedom of speech to encourage al-Qaeda’s mission of destroying the West, although they would eventually step over the line and into the waiting hands of law enforcement.

RM’s message was so powerful that it motivated a secular British woman to become an extremist, and then an attempted murderer. Roshonara Choudhry, an aspiring teacher studying at King’s College in London, underwent a total change after watching Anwar al-Awlaki videos and participating in RM’s forums.

Choudhry’s plot targeted her local member of parliament at a meet-and-greet. While pretending to shake hands with him she stabbed him twice in the stomach. She later told the judge that she wanted to be a “martyr,” and refused to defend herself in a secular court she didn’t recognize.

The key to the blog and the organization’s success comes from its humble origins. RM started as a small collection of misfits in 2007, when founders Yousef al-Khattab and Younes Abdullah Muhammad gathered together a handful of like-minded Islamists to promote the teachings of radical cleric Abdullah el-Faisal. El-Faisal guided the group through online classes taught in video chat rooms, as the group’s small and fringe street dawah (proselytizing) team recruited stray Islamists.

The group’s vocal presence in New York City’s Times Square and outside of the Islamic Cultural Center of New York encompassed more than shouting slogans and passing out pamphlets; RM’s blunt support for the 9/11 attacks, al-Qaeda, and its affiliate organizations gave it a recruiting edge over similar Islamist organizations.

That’s not to say that RM’s message was much different than that found on many jihadi forums. Revolution Muslim preached the common message that the West is at war with Islam, and that means Islam must defend itself.

But RM’s distinguishing factor was its ability to reinforce these sentiments with Western and jihadi news sources and to connect terrorists to relevant videos by catchy preachers like Anwar al-Awlaki. RM drilled its message home with protests, online speeches by el-Faisal, and chat room sessions discussing jihad. By catching young converts early, RM shaped the worldview of these new Muslims and molded them into supporters of al-Qaeda.

RM was so successful at its mission that it absorbed other jihadi startup blogs, as described in the criminal complaint against Abdel Hameed Shehadeh. Although he was charged with making false statements in a matter involving international terrorism, agents alleged that Shehadeh had additional connections to terror, including RM. Shehadeh created a jihadi blog called civiljihad.com, which quickly became a mirror site of RM.

RM’s success can also be measured in the number of terrorists it produced. Zachary Chesser, a Muslim convert and former leader of the group, was convicted of trying to join Somali terrorist group al-Shabaab and for making threats to the South Park cartoonists. The currently leader of IP, Jesse Morton (aka Younus Abdullah Muhammad), was arrested last month in Morocco and will be extradited to the U.S. to face charges for his role in those threats.

Several other terrorists participated in RM’s activities. Neil Bryant Vinas, who plotted to blow up trains on the Long Island Rail Road, was a friend of RM’s former leader Yusuf al-Khattab. Tarek Mehanna, convicted on material support charges, and Daniel Maldonado, who is serving 10 years for training with al-Shabaab, were also acquaintances of the group.

Ultimately, the fame that brought new members to RM would bring it down. In April 2010, Zachary Chesser was drawn into RM’s sphere and issued threats against South Park’s creators for their Muhammad cartoon. The threat, coupled with Chesser’s later indictment for trying to join al-Shabaab, was the first time someone was convicted for information posted on RM’s blog. It would not be the last.

On November 4, 2010, a British member of RM posted a detailed threat against British parliamentarians, as well as a salute to Roshanara Choudhry’s involvement with the blog. The post prayed for Choudhry release, encouraged others to follow her path, reposted the documents that most inspired her, and outlined how and where to strike the politicians. Shortly thereafter, RM’s website was shut down and British police arrested Bilal Zaheer Ahmad for making the post.

RM leader Younus Abdullah Muhammad, the senior leader of RM following the arrest of Chesser and the departure of senior member Yusuf al-Khattab, refused to let the group die. Muhammad founded a successor group called Islam Policy, and linked various Revolution Muslim websites to it. He added other elements, such as an emphasis on Islamic economics and TV commentary for anti-American English news site Russia Today. By mainstreaming the group, he could continue promoting al-Qaeda’s ideology while becoming an international media star.

However, the South Park incident soon caught up with Muhammad. An indictment showed that he was a key player in formulating the “credible” threats for which Chesser took the fall.

Although RM/IP’s history is more developed than many blogs, it shows the power that the jihadist narrative has. Without RM, those indicted for terrorism would not have had the reinforcement and community that motivated their attacks.

Ali Teymouri is a researcher specializing in jihadi publications and translations. He believes that moderate Muslims need to support American counterterrorism efforts, and is committed to making that happen.

Part 3 - Understanding Online Radicalization: Facebook and Social Media
The first two parts of this series covered the two primary website types that jihadists create to radicalize individuals, namely blogs and web forums. The third part of this series will focus on jihadi social media and how jihdaists use Facebook.

“Islam can dominate, over the world, only by jihad,” says the very plain jihadi website realjihad.tk. It reminds readers that jihad doesn’t have stages, and that “lame excuses” like making a living shouldn’t stand in the way.

RealJihad lacks the sharp graphics, interactive chat rooms, and other tools used by more sophisticated jihadi blogs and forums. Despite this, it has a leg up on its competitors: it is one of the primary links provided on the Facebook page of Jaish-e-Mohammad, a Pakistani terror organization.

Jihadi radicalization occurs on a number of sites and is not limited to the dedicated sites, blogs, and forums commonly used by terrorist supporters. Jihadists exploit popular Western social media sites, like Facebook, to radicalize, build contact networks, and pass information.

“All users, to learn all detailed rules related to JIHAD, read from this source,” says a user on Jaish-e-Mohammad’s Facebook page, directing readers to an English-language recruiting site. “All users, plz try to read and understand the rules and virtues of JIHAD, through this weblink,” he states on another post with another link. Likewise, Jaish-e-Mohammad’s reputation for daring attacks on the Indian army and even on India’s parliament provides a base around which social media users rally.

Other designated terrorist organizations ranging from Hamas to al-Shabaab have already taken advantage of Facebook, with their spokesman units and media groups establishing pages dedicated to terror. Popular jihadi forums like Ansar al-Mujahideen and its English counterpart also operate closed discussion groups on Facebook.

Facebook’s terms of use rejects violent content: “You will not post content that: is hateful, threatening … incites violence; or contains … graphic or gratuitous violence,” the guidelines state. Yet terrorist organizations bypass the rules by linking to third party sites and by posting in obscure foreign languages like Somali and Urdu.

Facebook is also inconsistent about applying standards against unofficial terrorist pages. Al-Shabaab, whose media page on Facebook was recently taken down after the Investigative Project on Terrorism wrote about it, can still influence Facebook users through an unofficial page run by the group’s supporters. More specific pages are dedicated to al-Shabaab’s followers in Kenya and elsewhere.

Self-appointed teachers — “ustadhs” — and other young radicals are also creating their own communities outside of mainstream mosques and social groups. “I don’t have sabr [patience] for the jahil [ignorant] Westernized Muslim,” says self-appointed teacher and internet extremist Khalifah al-Akili, in a posting praising Osama bin Laden and criticizing a young Muslim against extremism. “Osama [bin Laden] dedicated his life to Islam and I don’t see why his acts weren’t justified in Islam,” chimes in al-Akili’s friend, Amir Khan.

Al-Akili’s radical postings and his open support for al-Shabaab and other al-Qaida-linked terrorist groups are characteristic of the Facebook-brand extremist. “May Allah bring death to the kuffar [disbelievers] and the munafiqeen [hypocrites] that wish to celebrate the death of any of the mujahideen,” al-Akili said in response to the killing of bin Laden. “Read it and learn it … and practice it,” he wrote about 44 Ways to Support Jihad, a text by al-Qaeda ideologue Anwar al-Awlaki.

Many of those who believe in al-Akili’s brand of extremism don’t follow through on it. Although many buy into the critical ideas of radicalization, such as the glorification of martyrdom and Islam’s war with the West, most are wannabe terrorists without the means or ability to carry out attacks. However, a small minority carry ideology into action.

A Muslim convert from Baltimore, Antonio Martinez [Muhammad Hussain], was a test case for how far social media extremists might actually go. On his Facebook page, he describes himself as just “a yung brotha from the wrong side of the tracks who embraced Islam.” But it didn’t take long for him to buy into the radical narrative being preached on Facebook.

Martinez was caught by the FBI in a Facebook sting operation after using the site to call for violence to stop the oppression of Muslims. In December 2010, the FBI set up the 21-year-old with a fake car bomb, and apprehended it after he drove to an intended target and attempted to detonate it. Martinez’s affidavit also describes his Facebook affiliations with “Call to Islam” and “Authentic Tawheed,” two online movements promoting jihadi ideology.

Government agents have even discovered terrorist plots conceived entirely on Facebook. Awais Younis, who plotted to bomb the D.C. metro and the capital’s shopping district Georgetown, was discovered when someone reported threats he made through the site’s chat function. Younis described a plan to build a pipe bomb and stated that he knew “what types of shrapnel would cause the greatest damage.”

Younis’ threats developed over a short period of time. “That is the problem with Americans[,] they cant leave well enough alone until something happends [sic] then they sit there wondering why we dropped the twin towers like a bad habit hahaha,” he told an unnamed Facebook friend. By the time police swooped in on him, Younis was already planning to place a pipe bomb underneath a sewer head in Georgetown during rush hour to maximize casualties.

The growth of social networks and even full-fledged plots on Facebook defies the expectations of some experts. In 2008, George Washington University professor Marc Lynch wrote that Facebook extremists would struggle with the question of how to “get your people in, and keep intelligence agents out.” The past few years have proven that security may be a consideration; but, the draw of the world’s largest social network has penetrated even the jihadi world.

Poster Note:
This is a great research of Ali Teymouri on the jihadi forums and blogs. Please go inside the links of Pajamas Media web page to find out the jihadi websites Ali is talking about. Thank you.


Photo: Ansar al-Mujahideen Forum

Read More - Part 1:
Pajamas Media - Jihadi Forums

Read More - Part 2:
Pajamas Media - Jihadi Blogs

Read More - Part 3
Pasjamas Media - Facebook & Social Media
          How Tech Companies Can Fight for Their Users in the Courts   

Donald Trump's silhouette and balance scales.There are a lot of political uncertainties around the incoming Trump administration, but the threats to civil liberties are potentially greater than ever. President Obama failed to rein in the surveillance state, and Mr. Trump has nominated cabinet members like Mike Pompeo who are big fans of bulk surveillance. Now, given Mr. Trump’s campaign posture of being a “law and order” candidate who has openly criticized Apple for standing up for strong encryption, tech companies need to be even more vigilant in fighting for their users in the courts.

EFF stands ready to support those who will be pioneers in these efforts. Below, we highlight a few ways companies can stand up for their users, along with some prominent examples of from the past. In addition, for the last six years EFF has produced an annual “Who Has Your Back?” report evaluating the practices of technology companies in categories such as insisting on a warrant for user content and issuing transparency reports. Companies can look at these reports to get a sense of best practices in the industry.

Pushing Back Against Overbroad and Unlawful Requests for User Information

Because they tend to hold lots of user data, tech companies get a lot of requests for this information from the government—warrants, subpoenas and other court orders—and not all of them are valid.  These requests can have many deficiencies, ranging from being overly broad to downright getting the law wrong. Companies should publicly push back against these deficient requests in favor of proper legal processes rooted in well-established law.

Perhaps most famously, Yahoo challenged a secret order the company received in 2007 to produce user data in bulk under a just-passed law giving the NSA warrantless surveillance authority. Instead of blindly accepting the government’s constitutionally questionable order, Yahoo fought back and challenged the legality of the order in the Foreign Intelligence Surveillance Court (FISC), the secretive court that routinely grants expansive government applications for surveillance. Though Yahoo ultimately lost the battle, we applauded the company for silently fighting for its users because it was right thing to do.

Other prominent examples of this in recent years include Microsoft’s successful challenge of a search warrant that required the company to produce email content stored in Ireland. Microsoft fought to establish the precedent that warrant issued by a U.S. federal court under the Stored Communications Act (SCA) does not allow law enforcement to get user data no matter where it’s located in the world.

Beyond the context of government data requests, CloudFlare has pushed back against court orders that are aimed at pressuring Internet intermediaries into becoming Internet censors on behalf of rightsholders. Taking action against these potentially dangerous legal instruments also deserves recognition.

Fighting Against National Security Letters and Unconstitutional Gag Orders

In addition to fighting improper requests for information, companies can play an important role by publicizing these requests as part of regular transparency reports. But one thing that often stands in the way of publishing a fully honest transparency report is a gag order, particularly in the national security context. Companies may receive government data requests that come with mandatory gags, preventing them from notifying their users of the request and in some cases even forcing them not to acknowledge they have received a request at all. While there may be circumstances where the government has good reason to prevent a company from informing the target of a data request—if it would truly compromise a sensitive investigation or endanger someone’s life, for example—the Constitution requires that these gag orders be very tightly controlled.

Perhaps the most egregious example of unconstitutional gag orders are national security letters (NSLs), which allow the FBI to request user information from communication service providers and force the providers to stay completely silent about the request for a potentially unlimited time, just on the FBI’s say-so. With help from courageous NSL recipient companies, EFF has been fighting to get the NSL statute struck down and establish the principle that the First Amendment requires a court to promptly assess the true need for a gag order in every case. Recently, we were able to reveal that one of our clients is CREDO Mobile, which has been fighting NSLs for years, and we also successfully pushed back against an NSL on behalf of the Internet Archive. Other companies such as Google and Yahoo have been publishing NSLs when allowed to do so by the FBI.

Outside of NSLs, Microsoft recently went above and beyond by filing a straight-up challenge to another law that allows the government to get indefinite gag orders when seeking access to its customers’ stored email and other content. As Microsoft pointed out, an astoundingly high percentage of these gag orders last indefinitely, even though the First Amendment requires they be limited in time and scope and the Fourth Amendment requires that users get notified at some point about these searches. EFF filed an amicus brief in support of Microsoft’s lawsuit, and we commend the company’s efforts to set an important and far-ranging legal precedent.

Resisting Demands for Encryption Backdoors

Anyone familiar with EFF’s work knows that we are big supporters of strong encryption because it is crucial for our collective security, privacy, and free expression. Government officials may renew their calls for encryption “backdoors”, where an encryption system is intentionally weakened so that government can access data with a court order. But this is a nonstarter. Encryption is fundamentally math, and you can’t manipulate math problems to be solved only by one particular group of people, i.e. the government. Additionally, designing secure systems is already hard enough, and intentionally introducing vulnerabilities is a recipe for disaster.

Apple recognizes this and bravely resisted the government’s demand for it to intentionally weaken the security of its mobile operating system, iOS. Despite immense pressure from some public figures including Mr. Trump himself, who called for a boycott of Apple products, the company did the right thing and stood up for its users’ privacy and security. Similarly, other tech companies have taken strong stances in support of encryption and should resist and fight back against future government demands for encryption backdoors, or pressure to redesign their systems for ease of government surveillance.

Looking Ahead

We hope that companies will severely limit what information they collect and keep on their users in the first place. Regardless, there is a strong possibility that the incoming administration will be more aggressive in its desire to get whatever information companies have, and companies should be prepared for that scenario.

When we launched our inaugural Who Has Your Back Report? in 2011, tech companies largely weren’t fighting for their users in courts. Out of 13 major companies of the time, only 3 were meaningfully engaged in the practice. Thankfully, by 2014, things were a lot different. Out of the 26 companies we surveyed, 13 were standing up for their users in courts in some manner. The industry has made significant progress, but more can be done, by more companies and in more areas.

The political climate may present tech companies with plenty of opportunities to fight for their users in the courts, and we hope they’ll be ready. We will be here to support them.


          Grassroots Digital Rights Alliance Expands Across U.S.   

Observers around the world are scrutinizing the President-elect’s transition team and prospects for digital rights under the incoming administration. Trump’s campaign statements offered few reasons to be optimistic about the next administration’s commitments, making the unrestrained domestic secret surveillance regime that President Trump will inherit an even greater threat not only to privacy, but also dissent, individual autonomy and freedom of conscience, and—ultimately—our democracy.

If you're concerned about the future of digital rights and working with a local group like a hacker space, a student organization, or community coalition, we want to hear from you.

At EFF, we have committed ourselves to redoubling our efforts to defend digital rights. We know, however, that it will take the concerted actions of our supporters to help our goals find their reflection in law, policy, technology, and culture.

That’s why we launched the Electronic Frontier Alliance (EFA), a network of grassroots groups taking action in their local communities to promote digital rights.

Training neighbors

In places like Brooklyn, Baltimore, Chicago, Denver, and Los Angeles, local organizers have hosted workshops to train social movement activists how to incorporate encryption into their communication practices.

Their work not only helps encrypt the web—ensuring that privacy and dissent can survive, however the legal regime may empower intelligence agencies. It also enables and cultivates alliances with local communities and neighbors responding to underlying social issues from state violence and climate change to domestic violence and the rights of refugees.

Restraining police

In other places, such as San Jose, Oakland, St. Louis, and New York, grassroots groups in the EFA have advocated in coalition with local allies for legal protections at the municipal level to ensure that police departments can no longer buy or use military surveillance equipment in secret.

Those campaigns help their neighbors stay safe from the secret and unaccountable use of surveillance devices that state & local authorities have used around the country—in some cities, thousands of times—for reasons including suppressing dissenting voices. They also help create opportunities for future policymakers, journalists, and activists by forcing a democratic decision-making process on what has otherwise been a secret metastasis of domestic surveillance, as thousands of agencies across the U.S. have been transformed under our feet from police departments into local spy centers.

Defending innovation

Meanwhile, groups from Atlanta to Austin are pressing university administrations to consider the public interest when licensing patents to monetize scientific research.

Their work helps protect access to science, and ensure that discovery enables innovation, rather than financial opportunism by parasitic patent trolls using the courts as a tool at the public’s expense. It also builds a voice on campuses to challenge the orthodoxy of corporate rightsholders that have increasingly restricted access to culture and the right to tinker by, for example, forcing on device owners digital locks backed up by vicious and unreasonable legal penalties that treat innovators like criminals.

If you're concerned about the future of digital rights and working with a local group like a hacker space, a student organization, or community coalition, we want to hear from you. If you're not yet organizing locally, join our next EFA teleconference to connect with the dozens of allied groups around the country who already are and learn how to follow their lead.

Dissent and resistance grow only more meaningful in times of crisis. And if the days to come prove as dark as some fear, we—not only EFF, but also you, the Internet, your rights, and our democracy—will need all the allies we can find.


          IT Services Specialist II - Electronic Arts - Redwood City, CA   
MS Offce Suite, MS Visual Studio, Skype for Business, Oracle, OKTA, Adobe Suite, Cisco VPN, Virtual Machines, Data Encryption, Python, Tableau, Slack, Box, Maya...
From Electronic Arts - Tue, 13 Jun 2017 05:11:07 GMT - View all Redwood City, CA jobs
          Tech Specialist - Expert - EMV / Encryption Technologies for Cards   

          Going Linux #308 · Listener Feedback    

Commercial software licenses are a total FRAUD! That's how our feedback starts this month. We get into the difficulties of installing Ubuntu on a dual-boot system with Win10, audio technical details, full-disk encryption, and much, much more. We even have a Gone Linux story.

Episode 308 Time Stamps
00:00 Going Linux #308 · Listener Feedback
00:15 Introduction
00:52 Bill is off
01:13 Charlie: Commercial software licenses are a total FRAUD!
07:09 Scott: Network manager shows only strongest access points
11:25 Bob: Is full disk encryption really encrypting the whole disk in a dual-boot system?
19:50 Richard: Dual booting with Windows 10 is not always easy
22:40 Paul: Building a new computer and looking for a Linux MOBO
25:16 Göran: Writing bash scripts
26:38 Nancy: Audio is perfect now
27:27 John: Thank you! VNC to Ubuntu MATE with VPN
28:38 Bruce: More in-depth on audio
32:41 Dylan: Gone Linux
36:35 goinglinux.com, goinglinux@gmail.com, +1-904-468-7889, @goinglinux, feedback, listen, subscribe
37:59 End


          Going Linux #277 · Using VeraCrypt    

Going Linux #277 · Using VeraCrypt

VeraCrypt is High Security Disk Encryption software that picks up from where TrueCrypt left off. The VeraCrypt team has enhanced the security algorithms used for system and partition encryption, improve security and reduced its vulnerability overall. It can mount your old TrueCrypt volumes and allows you to convert TrueCrypt containers and non-system partitions to the VeraCrypt format.

Episode 277 Time Stamps
00:00 Going Linux #277 · Using VeraCrypt
00:15 Introduction
00:44 A new-old office suite to try
05:18 Listener David suggested an episode on TrueCrypt
07:34 What is VeraCrypt?
08:03 System requirements
08:33 Overview
09:47 Installing VeraCrypt
10:26 Cautions when sharing VeraCrypt volumes
13:47 goinglinux.com, goinglinux@gmail.com, +1-904-468-7889, @goinglinux, feedback, listen, subscribe
14:51 End


          Going Linux #266 · Listener Feedback    

Going Linux #266 · Listener Feedback

As always, we start a new year with your feedback. The Grinch escapes Bill's grasp, Jared helps with printing, Michael asks about Mint versions, Greg wants encryption, Charles gets a new computer and Ken makes a recording.

Episode 266 Time Stamps
00:00 Going Linux #266 · Listener Feedback
00:15 Introduction

00:54 Happy New Year
05:18 Bill and the Grinch
06:29 Jared: Setting up a Linux printer
11:37 Michael: Which version of Mint?
17:25 Greg: TrueCrypt alternatives
24:14 Jesse: A VPN for Netrunner
28:37 Charles: Linux pre-installed
32:10 Ken: Making voice recordings
36:06 goinglinux.com, goinglinux@gmail.com, +1-904-468-7889, @goinglinux, feedback, listen, subscribe
37:42 End


          Going Linux #258 · Computer America #78    

Going Linux #258 · Computer America #78

Topic: Apple was right! The magic of hardware and operating system made for each other. Everything just works when a computer's hardware and software are designed to work together.

Episode 258 Time Stamps
00:00 Going Linux #258 · Computer America #78
00:15 Introduction
03:19 Topic: Apple was right! The magic of hardware and operating system made for each other
23:21 What does the System76 driver do?
30:15 The reason Windows comes pre-installed
51:35 The reason OSX comes pre-installed
57:58 The reason to get a computer with Linux pre-installed
59:43 Why do we tinker with a computer?
70:33 Ken: Wait! You buy a new computer pre-installed with Linux, then replace the OS?
78:20 Joe: Backups?
87:38 Paul: Bill's mention of encryption
92:06 Ken: Netflix unlocked for Linux?
94:57 Rainy: Problems with AntennaPod
98.59 Rob: Nemo media columns extension problem
100:52 goinglinux.com, goinglinux@gmail.com, +1-904-468-7889, @goinglinux, feedback, listen, subscribe
122:43 End


          Going Linux #126 - Computer America #34    

Going Linux #126 - Computer America #34

Topic: Resources for learning about Linux. Tom visits the chat room in hour 1. We provide a lengthy list of links to manuals, training courses and classes to learn about Linux. Of course we answer listener emails as well.

Episode 126 Time Stamps
00:00 Going Linux #126 - Computer America #34
00:16 Introduction
05:05 Resources for learning about Linux
06:00 Where it the manual?
07:06 Ubuntu Manual PDF documentation for the beginner
09:24 An open source manual
11:15 Ubuntu Manual PDF for more advanced users
13:45 International translations are standard practice for Linux documentation
16:27 Linux Mint Offical Users Guide
18:20 Is WUBI right for Carey's client wanting to try Linux?
23:21 Is there a better option?
25:00 The Going Linux guys can help with support
26:00 What is Quick Shot?
29:19 You don't have to have a degree (or even a manual) to learn how to use Linux
31:53 Additional resources to use to learn about Linux
35:15 Computer America back episodes
36:38 Amy: Sharing encryption key files on Dropbox
40:47 Chris: Synergy and a Gone Linux story
52:25 Jim: Thanks for Disk Utility
55:07 SpinRite: Good or bad?
60:19 Paul: Can't find Remote Desktop Viewer on Linux Mint
63:23 Larry will be talking at the Southern California Linux Expo (SCALE)
67:22 End


          Senior Systems Engineer - Open iT Inc. - Houston, TX   
Shell scripts, batch/PowerShell, Perl, Ruby, Python), and encryption. Senior Systems Engineer will oversee the successful installation, configuration and...
From Indeed - Thu, 22 Jun 2017 15:10:51 GMT - View all Houston, TX jobs
          GoldBug Secure Instant Messenger V 0.5.1903   
GoldBug is a secure Instant Messenger with strong multi-encryption.
          CyberSecurity Engineer - Black Box Network Services - Lawrence, PA   
Experience in configuration of Symantec Endpoint Protection and Endpoint Encryption. This position is for a senior engineer in the CyberSecurity department....
From Black Box Network Services - Wed, 07 Jun 2017 20:18:04 GMT - View all Lawrence, PA jobs
          Zilab Remote Console Server   
Zilab Remote Console Server, as its name implies, is an advanced and convenient remote access server for Windows 2003/XP/2000/NT that works with console-based and DOS legacy applications. It features multiple user support and SSL encryption.

Learn more about Zilab Remote Console Server Download Zilab Remote Console Server now!
          Without A Trace Surf Guard   
Without A Trace Surf Guard is a powerful 3 in 1 privacy tool that combines a history eraser with a powerful pop up stopper and robust encryption tools that will lock down any file or folder.

Learn more about Without A Trace Surf Guard Download Without A Trace Surf Guard now!
          Windows 10 tip: Save a copy (or two) of your BitLocker recovery key   
BitLocker Drive Encryption is a tremendous way to keep a thief from accessing your business and personal secrets. But don't let BitLocker lock you out of your own PC. Here's how to save a secure backup copy of your encryption key for panic-free recovery.
          The week in GRC: FTSE Russell said to consider curbs on unequal voting rights, and regulators support Volcker rule rethink   

This week’s governance, compliance and risk-management stories from around the web

– Some cyber-attacks on hospitals involving ransomware don’t appear on the US Department of Health and Human Services’ (HHS) public list of data breaches, according to The Wall Street Journal. HHS rules say hospitals need only report attacks that result in the exposure of private medical or financial information, such as malware that steals data. When ransomware’s data encryption meets that threshold is a gray area.

Proponents for more mandatory reporting say this regulatory gap limits the healthcare system’s ability to fight cyber-criminals. They argue that hospitals left in the dark about attacks hitting their rivals are less likely to be ready to defend themselves. Opponents say HHS reporting comes with a harsh spotlight, potential penalties and liability risks. Spokespeople for HHS didn’t respond to a request to clarify the agency’s position on the issue.


Bloomberg reported that hedge fund manager John Paulson joined the board of Valeant Pharmaceuticals International. Paulson’s firm became Valeant’s biggest shareholder this year. ‘With his significant business and financial expertise, John will be a strong addition to the board,’ Valeant CEO Joseph Papa said. ‘His experience will be especially valuable as we continue to execute our transformational strategy to turn around Valeant.’


Reuters said investors are hoping the Federal Reserve will allow large US banks to put an estimated $150 billion in idle capital into stock buybacks, dividends and investments in the coming weeks after conducting the latest round of stress tests. President Donald Trump has not yet made any appointments to the Fed, but Republicans have turned up pressure on the central bank to cut red tape and ease regulations.

Analysts said they do not expect the Fed to announce any explicit changes to the stress test, but they do expect higher payouts. According to their estimates, the Fed could allow banks to distribute nearly as much capital to shareholders over the next year as they generate in profits, a benchmark not hit since before the financial crisis.


– According to the WSJ, two trends are converging as younger investors come of age: socially responsible investing (SRI) and robo-advisory services. Over the past year, a small but growing number of firms have introduced automated investment services that include SRI. Driving the interest is a desire on the part of individuals to spend and invest in ways that are consistent with their values, and SRI-based investments can outperform over the long run. Since 1990, the MSCI KLD 400 Social Index has returned an average of 8.4 percent a year, compared with 7.6 percent for the S&P 500 index.

‘There is a fair amount of evidence from investor surveys that millennials and women are especially interested in sustainable and impact investing,’ said Jon Hale, director of sustainability investing research at Morningstar. Given that millennials are also the target market for many robo-advisory services, ‘it seems like a natural combination.’


– The US Supreme Court dealt a blow to consumer plaintiffs by limiting where lawsuits against companies with business in multiple states can be heard, the WSJ reported. Its ruling stated that California courts could hear only claims by Californians against Bristol-Myers Squibb. An attorney for the plaintiffs declined to comment. ‘We are hopeful this decision will provide litigants more certainty regarding where lawsuits can be heard,’ Bristol said in a statement. ‘At its core, this decision was about basic principles of federalism and fairness in our legal system.’

The court’s ruling may give a boost to companies by limiting the opportunities for judicial forum shopping. But consumer groups have warned that cutting back too sharply on plaintiffs’ ability to sue could give big companies more ways to avoid responsibility for harm they cause.


Bloomberg reported that proponents of UK corporate governance reform are worried plans floated by Prime Minister Theresa May won’t make it into her government’s legislative program to be announced this week. Expectations that a bill will implement reforms are receding after this month’s election results mean Brexit talks are taking priority for the government. Corporate governance legislation is now ‘in the balance,’ said Stefan Stern, director of the High Pay Centre.

‘I’d be quite surprised if there was a bill referred to in the Queen’s Speech, given the complexity of Brexit,’ said Philippa Foster Back, director of the Institute of Business Ethics. ‘But I hope the momentum is strong enough for business itself to address the issues of concern.’


– The WSJ reported that the UK’s Serious Fraud Office (SFO) filed criminal charges against Barclays and four former senior executives linked to their handling of Middle Eastern investments that rescued the bank during the financial crisis. The case is the first time time top executives at a UK bank have faced criminal charges for their actions during the crisis. The SFO charged the individuals and the bank with conspiracy to commit fraud.

Barclays said in a statement that it is ‘considering its position in relation to these developments.’ Former CEO John Varley and Roger Jenkins, a former top investment bank executive, were charged with conspiracy to commit fraud and unlawful financial assistance. Thomas Kalaris, who used to run the bank’s wealth division, and Richard Boath, who headed the bank’s European financial institutions group, were charged with conspiracy to commit fraud.

A law firm representing Varley said it couldn’t immediately comment. Jenkins intends to vigorously defend himself against the charges, his lawyer said, adding that Jenkins had received internal and external legal advice on all the matters covered in the SFO case. A spokesperson for Boath didn’t immediately have comment. Kalaris hung up the phone when asked for comment.


– Trump nominated James Clinger, former chief counsel of the House Financial Services Committee, to replace Martin Gruenberg as chair of the Federal Deposit Insurance Corporation, according to Bloomberg. Clinger would fill a vacant seat at the agency until Gruenberg’s term ends in November. The selection means Trump’s team of officials responsible for easing bank rules is taking shape. They will probably focus on rolling back regulations, instead of pursuing policies – such as breaking up big lenders – which Trump promised on the campaign trail.


– The Financial Times said some of the largest US financial services firms are looking at whether to move transactions totaling hundreds of billions of dollars out of London to rival centers because of Brexit. Although bank bosses have made many statements about moving thousands of jobs out of the UK because of its withdrawal from the EU, the possibility that they will drain some of their big pools of money out of London has drawn less attention.

But reducing the funds they hold in the UK could have consequences for almost every aspect of their presence in the country, including staffing. ‘From a supervisory perspective what matters is aligning the risk taking, the management and the money (both in the form of capital and revenues),’ said Stephen Adams, senior director at consultancy Global Counsel.


– According to the WSJ, FTSE Russell is proposing possible restrictions on the inclusion of companies with unequal voting rights in its indexes, although the firm will consider input from clients and investors before working out specifics. The proposal could force companies to choose between keeping their places in broad stock benchmarks or changing their share class structures.

The plan calls for setting a minimum threshold for the percentage of voting control attached to company shares in an index. For example, a company whose Class A shares in an index control 40 percent of the total votes might be excluded from FTSE Russell’s main indexes if the threshold were higher than that.


The Guardian reported that ExxonMobil, Shell, BP and Total are among a group of large corporations supporting a plan to tax carbon dioxide emissions in an effort to tackle climate change. The companies have revealed their support for the Climate Leadership Council, a group of senior Republican figures that in February proposed a $40 fee on each ton of carbon dioxide emitted as part of a ‘free market, limited government’ response to climate change.

As further tradeoff for the new tax, the plan would dismantle all major climate regulations, including the Environmental Protection Agency’s authority over carbon dioxide emissions and an ‘outright repeal’ of the Obama administration’s Clean Power Plan. Exxon, BP and Shell have acknowledged that climate change is real and poses an economic and societal threat.


The New York Times said Travis Kalanick stepped down as CEO of Uber amid a shareholder revolt that made it untenable for him to stay on at the company. His exit came under pressure after hours of drama involving Uber’s investors, according to two people familiar with the matter. Kalanick consulted with at least one Uber board member and, after long discussions with some of the investors, he agreed to step down. He will remain on Uber’s board of directors.

‘I love Uber more than anything in the world and at this difficult moment in my personal life I have accepted the investors’ request to step aside so that Uber can go back to building rather than be distracted by another fight,’ Kalanick said. The board said in a statement that Kalanick had ‘always put Uber first’ and that his stepping down as CEO would give the company ‘room to fully embrace this new chapter in Uber’s history.’ An Uber spokesperson declined to comment further.


– State Street has urged the SEC to prevent companies from adopting voting structures used by Facebook, Alphabet and Snap over concerns that they concentrate power in the hands of founders and weaken shareholder rights, according to the FT. The firm attended an investor advisory committee meeting at the SEC in March, where it called on the agency to stop companies limiting the voting rights of shareholders. Rakhi Kumar, head of corporate governance at State Street Global Advisors, who attended the meeting, said the regulator needed to intervene as investor efforts to persuade companies to stop using inequitable voting structures have not been effective.

‘We have engaged on this for years,’ she said. ‘Our ability to have an impact is limited. We think it has to come from the regulator to stop the dual share-class issue. When we don’t have the mechanism to elect or vote for directors, we don’t have a voice or the ability to influence.’


– Trump has picked Marvin Kaplan, counsel at the independent Occupational Safety and Health Review Commission, to fill a vacant seat on the National Labor Relations Board – a first step toward securing Republican control of the agency that referees disputes between unions and business for the first time in nearly a decade, the WSJ noted. If he wins Senate confirmation, Kaplan would be the second Republican on the panel. A fifth position remains vacant, but it is expected the White House will name another Republican for that spot.


– The FT looked at six areas – defined by RSG Consulting – in which in-house attorneys can play a role in transforming operations, relationships and roles. These include taking on a lobbying role to influence legislation and regulation and promoting ethical and social responsibility in the business, broader industry and legal sector. Another example is the general counsel who pre-empts problems and protects the business from legal, regulatory or reputational threats through processes, tools or collaborations with other areas of the business.


– The WSJ reported that PwC is adding independent directors to its governing board, a first for the private partnership. The firm has named two new members to its board of partners and principals from outside the firm: Carol Pottenger, a retired US Navy vice admiral who was one of the first women selected for sea duty, and Carlos Gutierrez, a former Kellogg CEO who served as commerce secretary under former US president George W Bush.

PwC and other big accounting firms are partnerships that generally have governing boards made up of their own personnel, unlike public companies that trade on major exchanges, which are required to have a majority of directors who have no connection to the company.


– The SEC announced a number of new appointments:

  • Robert Evans has been named deputy director in the agency’s division of corporation finance. He will join deputy director Shelley Parratt as a senior adviser to the division’s director, William Hinman. Evans most recently worked at Shearman & Sterling as a partner in the firm’s capital markets practice
  • Kelly Gibson has been named as associate regional director for enforcement in the agency’s Philadelphia office. She joined the SEC as a staff attorney in the enforcement division in 2008. When the division was reorganized in 2010, she joined the market abuse unit
  • Kathryn Pyszka has been named an associate regional director for enforcement in the SEC’s Chicago office. She succeeds Timothy Warren, who retired from the agency in January. In her new role, Pyszka co-leads the Chicago office’s enforcement program with Robert Burson. She joined the SEC as a staff attorney in the enforcement division in 1997, was promoted to branch chief in 1998 and became senior trial counsel in 2000.



– The WSJ said growing concerns about threats are prompting the aviation industry to devise an unlikely new safeguard: real-time warnings to pilots about potential hacking attempts. Work to develop such systems is part of separate efforts by Thales, Raytheon and other companies to expand cyber-protections for aircraft. Airbus and Boeing support the pilot-alerting goal, reflecting a desire to try new things as global threats intensify and evolve.


Calstrs said its director of corporate governance Anne Sheehan was elected chair of the SEC’s investor advisory committee. ‘The [committee’s] impact on the regulatory regime at the SEC over the past five years has been positive and constructive. As one of the original members since 2012, I’ve been part of the committee’s work to help focus and shape the priorities of the commission to enhance investor protection,’ Sheehan said.


– The largest US banks survived a hypothetical stress test and could continue lending even during a deep recession, the Federal Reserve said in a report that could bolster the industry’s case for cutting back regulation, according to the WSJ. In the first part of its annual tests, the Fed said 34 of the largest US banks have significantly improved their defenses since the financial crisis. The results signal that many banks could win the Fed’s approval to increase dividend payouts to investors, in the second round of the tests.


– The FT reported that Peter Hambro, co-founder of Petropavlovsk, was voted off the Russia-focused gold mining company’s board following a battle with its largest shareholders over corporate governance. Attendees at the company’s annual general meeting in London voted to remove Hambro and appoint four new directors. ‘I will not hide my disappointment with the outcome of today’s vote,’ Hambro said.


– According to Reuters, financial regulators and lawmakers who appeared at a congressional hearing generally agreed that the Volcker Rule needs to be reconsidered. The rule should focus only on banks that do a lot of trading, said Federal Reserve governor Jerome Powell, who leads banking regulation for the central bank. ‘We believe we have the authority to draw a line between those with the big trading books (and other banks),’ he told the Senate Banking Committee. ‘We could have that group regulated one way and have everyone else regulated less, a lot less.’


          Motorola Xts 5000 7/800 Mhz Radio   
IMG_20170628_224509.jpg

by: windows1268

Description:

Like new condition Motorola Xts 5000 7/800 mhz 9600 baud trunking model 1 radio.

Holds up to 48 channels/talkgroups.

Has DES And AES encryption keys.

Comes with great condition battery, charger, Motorola mic, and Motorola r20.01.00 programming cps. 

All accessories on radio are Motorola.

Returns not accepted.

I can be reached by phone at 865-203-4023 (call or text).


          West Wind Web Connection 6.10 released   
 West Wind Technologies has released Web Connection 6.10 of its Web Development toolset for Visual FoxPro. This release is a maintenance release that also adds a handful of new feature. It adds support for automatic Html Encoding for script tags, support for FTP over SSH (SFTP), user security password encryption, an updated Markdown parser, a new and improved MVC script compiler and a host of small utility class enhancements. As always you can download the free shareware version, or if you're registered you should have received an update notification via email.
          My 2017 Favorite Windows 10 Apps/Programs #MIEExpert   
It's been ages since I've put together a list of all my favorite Windows apps. So, here goes with an update! What would you add to this list? 

Here are the questions this blog entry answers:

  1. How do I update to the latest version of Windows 10?
  2. How do I protect/secure my Windows 10 Computer?
  3. How do I encrypt my data so hackers can't get to it?
  4. How do I secure my WiFi Connection from Hackers and Surveillance?
  5. How do I capture/edit images?
  6. How do I work with sound and video?
  7. How do I quickly add or find free software?
  8. How do I remotely control my Windows computers?
  9. How do I read ebooks on Windows 10?

And, if you are looking for Microsoft apps for your surface book/table or, maybe just great Win10 programs, you can click those links to find TONS of info.



1. How do I update to the latest version of Windows 10?
2. How do I protect/secure my Windows 10 Computer?
  • Keep your Windows computer up to date, using Windows Update and Patch My PC
  • Eliminate 90% of security issues by not running your user account in administrator mode
  • Anti-Malware
    • Malware Bytes* – Great to use when you think your computer has been infected with malware/spyware and you need your computer “cleaned out.”
    • AntiRansomware – Although still in beta, Malware Bytes’ solution to ransomware offers real-time protection against ransomware, catching it before it can encrypt your files.
    • Spyware Blaster*– An easy to use “inoculation” program against spyware/malware.
    • Spybot Search and Destroy* – The best part of Spybot is the TeaTimer which protects your computer’s registry against contamination and immunizes your browsers (IE, Firefox) against malware.
  • AntiVirus
    • BitDefender Free – This free for home use antivirus works great and does not drive you crazy with advertisements.
    • Sophos Home Antivirus – This is another protection free for home use.
  • Run Windows in Virtual Mode
    • VMWare Player - Free for personal, home use
    • VirtualBox - Not as good as VMWare Player (in my opinion) but still does the job
3. How do I encrypt my data so hackers can't get to it?

File/Folder Encryption?

Text/Email Encryption?


You may also want to get a copy of File Shredder for Windows to securely delete information from your Windows computer.

4. How do I secure my WiFi Connection from Hackers and Surveillance?
Not sure this is necessary? It is and increasingly so. Be sure to take this information to heart.
"Virtual Private Networks provide an important element of privacy protection for users," Electronic Frontiers Association says. . .VPNs [are] one of the most effective tools for protecting privacy when using the Internet, due to the degree of anonymity they provide when accessing online services.

Free VPNs for Your Browser

    1. Opera browser has a built-in VPN that works well
    2. DotVPN Chrome add-on works with your Chrome browser

VPNs that Protect All Internet Traffic from Your Windows Computer

    1. Private Internet Access (PIA) (approx <$40 annually or $6.95 per month)
    2. Express VPN
    3. NordVPN

Mobile VPN for Android and/or iOS

    1. All VPNs above have mobile versions
    2. OperaVPN (not to be confused with Opera browser) works great

5. How do I capture/edit images?
6. How do I work with sound and video?
Audio
    1. Audacity (Free)
    2. Beautiful Audio Editor on Chrome browser) (Free)
    3. Microsoft Sway for narrated images or podcasts
    4. VLC Media Player (audio & video)
    5. Convert YouTube Music Videos to MP3 Audio Files with ATube Catcher
Video
    1. Shotcut (Free)
    2. Powerpoint+Office Mix
    3. Screencastify and other tools
    4. Get this codec pack - XP Codec Pack
    5. Video Conversion Tools? AnyVideo Converter or

7. How do I quickly add or find free software?


8. How do I remotely control my Windows computer?
Wish you could remotely control a computer from work or home? Perhaps you need to have an online meeting? Try one of these solutions.
9. How do I read ebooks on Windows 10?

Everything posted on Miguel Guhlin's blogs/wikis are his personal opinion and do not necessarily represent the views of his employer(s) or its clients. Read Full Disclosure


          IAM Consultant - The Herjavec Group - Canada   
Experience with J2EE technologies, scripting, directories, certificates (PKI), and encryption are highly desirable....
From The Herjavec Group - Wed, 17 May 2017 15:13:43 GMT - View all Canada jobs
          Apa yang dimaksud dengan Virtual Private Networks (VPN)?   

.(VPN) The use of encryption in the lower protocol layers to provide a secure connection through an otherwise insecure network, typically the internet. VPNs are generally cheaper than real private networks using private lines but rely on having the same encryption system at both ends. The encryption may be performed by firewall software or possibly by routers. Link-level (layer 2 and 3) encryption provides extra protection by encrypting all of each datagram except the link-level information. This prevents a listener from obtaining information about network structure. While link-level encryption prevents traffic analysis (a form of attack), it must encrypt/decrypt on every hop and every path. Protocol-level encryption (layer 3 and 4) encryption encrypts protocol data but leaves protocol and link headers clear. While protocol-level encryption requires you to encrypt/decrypt data only once, and it encrypts/decrypts only those sessions that need it, headers are sent as clear text, allowing traffic analysis. Application (layer 5 up) encryption is based on a particular application and requires that the application be modified to incorporate encryption.


          Brazilian site teaches journalists how to protect sources and personal data from digital attacks   

Metadata? Encryption? Backdoor? Tor Browser? VPN? PGP? When it comes to digital security for journalists, the amount of technical terms and acronyms can be scary. But tools to ensure online privacy can be crucial to protecting sources, which is why the site Privacidade para Jornalistas (Privacy for Journalists) has been launched in Brazil.

read more


          Benefits of Using a Remote VPN Server   
When using the Internet for personal or business purposes, it is important to think about encryption and protection of data exchanged between sites. Thus, a remote VPN server is indispensable in that case. The abbreviation “VPN” is a generic name of the connection, which is usually created on top of or inside another network. Considering […]

          For sale - Motorola xts5000 I vhf 136-174 mhz 48ch Astro xts... - $150   

Humboldt 50548, IA, United States
Motorola xts5000 I vhf 136-174 mhz 48ch Astro xts 5000 This radio has been auto tuned/aligned with an Aeroflex 3920 by Elite Technology Printout of results included ...for tx and rx Cosmetics is a 9.9 out of 10 Decoding Flashcode: ... Q806: astro imbe Digital Operation Q498: Hardware Multikey Encryption w/ otar G996: Over the Air Provisioning ...
ebay.com

          Google Docs -- Still a Risk for the Casual User?   

How secure are your Google Docs?  If you use Gmail, you may recall that a few months ago Google turned on SSL (Secure Socket Layer) encryption -- the protocol that encrypts connections to prevent your email from being hijacked.  So, great -- your email is reasonably safe from hackers.  But what about your Google Docs?  According to ReadWriteWeb in Your Google Docs May Be Open to Hijacking, not if you have a basic account.  If you happen to be using the paid Google Apps Premier or Education editions, you have SSL encryption.  SSL is not, however, an automatic option for users of free Google Docs.

Now that's not entirely true -- if you're a free Google Docs user and you want to encrypt your documents, all you really need to do is type in HTTPS when entering the URL for Google Docs; that will give you an encrypted connection.  Also, according to ReadWriteWeb you can also get a secure connection if you click to other services from the Gmail navigation menu (at the top left of the page).  However, for most of you this probably isn't the best solution.

Again, another reason why, at least for now, Google Docs (the free version, anyway) is not quite ready to permanently store your legal documents. 


          FroKnowsPhoto RAWtalk 209: Watch Out For FAKE Canon Lenses, Camera Encryption and Nikon Does 360   
FroKnowsPhoto RAWtalk 209: Watch out for FAKE Canon Lenses, Should Your Camera Encrypt and Nikon KeyMission 360 Welcome to the Holiday edition of FroKnowsPhoto RAWtalk. It looks like somehow Santa was able to squeeze down my gas fire place to bring some holiday cheer. If you are in the market for a Canon 50mm 1.8 […]
          (USA-VA-Suffolk) Computer Technician   
ManTech Advanced Systems International is looking for a highly motivated Computer Technician to join our team in performing analytical, engineering, programmatic, and acrhitecture support services. This position will join a team of highly qualified individuals performing technology insertions, cyber capabilities, developing projects and integrating solutions. **Job Description:** • Fully deploy and configure a Microsoft Active Directory environment from initial server hardware installation through implementation of common core services (DNS, email, file and print services) in configurations representative of DoD environments • Implement DISA STIG (Security Technical Implementation Guide) requirements for Microsoft operating systems, services and roles (DNS, AD, etc.) and applications (MS Office) • Create, deploy and maintain Windows 10 workstation images via Windows Deployment Services (WDS) and System Center Configuration Manager (SCCM). Deploy these standardized configurations to large user communities in support of events • Interact with remote DoD and coalition partner administrators to establish interoperable services in notional distributed environments that provide (AD trusts, directory synchronization, SMTP email, root DNS) • Maintain Windows systems in a VMWare ESXi virtual environment. Configure and troubleshoot virtualized system hardware and peripheral access issues • Troubleshoot WAN and LAN network connectivity issues from end to end. Requires a thorough understanding of the interactions between physical and virtual network infrastructure components and an understanding of the network OSI layers • Troubleshoot hardware, operating system and software issues that occur in the course of supporting organizational tasks and routine maintenance activities • Conduct daily system maintenance activities including log reviews and connectivity checks to maintain the infrastructure in a project-ready state • Support infrastructure users with domain account creation and logon issues, application troubleshooting and other general support tasks • Physically install server, workstation and peripheral devices in equipment racks and user workspaces • Occasional travel to remote locations in support of position responsibilities. Possibly up to six weeks duration per year. Two (2) years’ experience in classified and unclassified computer: hardware and software diagnostic procedures, Windows 7/8/10 including Servers 2008R2, 2012R2, 2016, UNIX, and knowledge in LINUX Red Hat or later operating systems and environment. • One (1) year experience in configuring and customizing classified and unclassified desktop and laptop computer systems, optimizing internal memory use, resolving hardware/software interrupt conflicts, and installing device drivers. • One (1) year experience in computer diagnostic, file defragmentation, file backup, file recovery, and LAN management procedures used in fault isolation of hardware and software. • One (1) year experience in Virtual Environments. • Certified DOD 8570.1-M (IAT level 2 or Higher) • Must have an active Top Secret security clearance based on Single Scope Background • Must be a U.S. citizen **Preferred Skills:** • Familiarity with DISA SCAP (Security Content Automation Protocol) tools and their application in securing operating systems and applications Familiarity with system accreditation requirements of the DoD Information Assurance Certification and Accreditation Process (DIACAP)and DISA Risk Management Framework (RMF) • Ability to independently interpret broad technical requirements requiring the implementation of enterprise IT technologies in environments replicating operational DoD infrastructure. • Experience deploying and maintaining a Windows based Public Key Infrastructure (PKI) implementation in a DoD environment. Including generation of certificate requests, installing issued certificates, implementing and supporting PKI smart card logins in Active Directory. • Virtualization background (VMware 6.x) • VDI background (VMWare Horizon 6.x) • Knowledge of XMPP chat server installation and configuration (OpenFire, Jabber, etc.) • Familiarity with AD based deployment of bitlocker drive encryption (BDE) • Experience administering Microsoft System Center Configuration Manager (SCCM) • Experience administering DISA Host Based Security System (HBSS) • NetApp Filer experience (or general Storage Area Network experience) • Brocade SAN fibre channel fabric switch configuration experience (or equivalent SAN fabric switch technology) • Cross domain system (CDS) experience (Radiant Mercury, for example) • Linux experience (Red Hat Enterprise Linux ideally) • Microsoft Windows Server Update Services (WSUS) experience (in an offline environment) • Experience with installation of Microsoft SQL server 2012 and procedures required to secure it in a DoD environment • Experience with installation of Microsoft Internet information Server (IIS) and procedures required to secure it in a DoD environment • Experience with installation of Microsoft SharePoint and procedures required to secure it in a DoD environment • Experience with installation of Microsoft Internet information Server (IIS) and procedures required to secure it in a DoD environment • Experience with installation of Microsoft SharePoint and procedures required to secure it in a DoD environment **Qualifications** Requires Bachelors degree in (field mathematics, telecommunications, electrical engineering, computer engineering, computer science) or related discipline, and two to four years related experience or Certification in systems administrator, network certif **Degrees** Equivalent Experience/Education, Bachelor's Degree **Years of Experience** 02-03 years w/High School Diploma, 03-04 years w/High School Diploma, See Qualifications **Position Type** Full-Time **Shift** Day **Overview** For more than 40 years, ManTech employees have been solving complex problems for the national security community. We are comprised of approximately 10,000 talented employees around the world. We adhere to the simple, no-nonsense values on which ManTech was founded more than four decades ago, aligning squarely with the mission objectives of our customers. As our customer base continues to expand and diversify, we continue to diversify our workforce and solutions. Half our employees have a military background, and more than 70 percent hold a government security clearance. As a leading provider of innovative technology services and solutions for the nation's defense, security, space, and intelligence communities; we hold nearly 1,000 active contracts with more than 40 different government agencies. ManTech International Corporation, as well as its subsidiaries proactively fulfills its role as an equal opportunity employer. We do not discriminate against any employee or applicant for employment because of race, color, sex, religion, age, sexual orientation, gender identity and expression, national origin, marital status, physical or mental disability, status as a Disabled Veteran, Recently Separated Veteran, Active Duty Waretime or Campaign Badge Veteran, Armed Forces Services Medal, or any other characteristic protected by law. If you require a reasonable accommodation to apply for a position with ManTech through its online applicant system, please contact ManTech's Corporate EEO Department at (703) 218-6000. ManTech is an affirmative action/equal opportunity employer - minorities, females, disabled and protected veterans are urged to apply. ManTech's utilization of any external recruitment or job placement agency is predicated upon its full compliance with our equal opportunity/affirmative action policies. ManTech does not accept resumes from unsolicited recruiting firms. We pay no fees for unsolicited services. If you are a qualified individual with a disability or a disabled veteran, you have the right to request an accomodation if you are unable or limited in your ability to use or access http://www.mantech.com/careers/Pages/careers.aspx as a result of your disability. To request an accomodation please click careers@mantech.com and provide your name and contact information.
          EU GDPR Compliance puts Focus on Data Tracking, Encryption   
GDPR compliance is mandatory by May 25, 2018. Discover how encryption will be an overlooked but key part in compliance, as well as how to reduce risk by avoiding keeping more personal data than is necessary for business/legal needs. Published by: The Media Trust
          New Post: FileExists sporadically fails   
I am trying to move to using netftp in my Keepass2Android app but things are not working as expected.

Running the code below, it seems like even though "IsConnected" returns true, a directly following call to FileExists() calls Connect (which means the connection is lost exactly between the calls?). However, as Connect() can fail every now and then, this also results in a failing FileExists() (where failing means it throws Connection refused).

Is there anything wrong with my code? Is this something to be expected, i.e. should I be prepared to retry everything I do with an FtpClient? Is there any flag to set to automatially do the retry which I have created my own for my GetClient method (which calls Connect() in a retry loop).

Thanks for any help or suggestion!

Philipp
private static T DoInRetryLoop<T>(Func<T> func)
{
    double timeout = 30.0;
    double timePerRequest = 1.0;
    var startTime = DateTime.Now;
    while (true)
    {
        var attemptStartTime = DateTime.Now;
        try
        {
            return func();
        }
        catch (System.Net.Sockets.SocketException e)
        {
            if ((e.ErrorCode != 10061) || (DateTime.Now > startTime.AddSeconds(timeout)))
            {
                throw;
            }
            double secondsSinceAttemptStart = (DateTime.Now - attemptStartTime).TotalSeconds;
            if (secondsSinceAttemptStart < timePerRequest)
            {
                Thread.Sleep(TimeSpan.FromSeconds(timePerRequest - secondsSinceAttemptStart));
            }
        }
    }       
}

internal FtpClient GetClient(IOConnectionInfo ioc)
{
    FtpClient client = new FtpClient();
    if ((ioc.UserName.Length > 0) || (ioc.Password.Length > 0))
        client.Credentials = new NetworkCredential(ioc.UserName, ioc.Password);
    else
        client.Credentials = new NetworkCredential("anonymous", ""); //TODO TEST

    Uri uri = IocPathToUri(ioc.Path);
    client.Host = uri.Host;
    if (!uri.IsDefaultPort) //TODO test
        client.Port = uri.Port;
    client.EnableThreadSafeDataConnections = false;

    client.EncryptionMode = ConnectionSettings.FromIoc(ioc).EncryptionMode;

    Func<FtpClient> connect = () =>
    {
        client.Connect();
        return client;
    };
    return DoInRetryLoop(connect);

}


string myPath = ..;
string myTempPath = myPath+".tmp";

_client = GetClient(_ioc, false);
var _stream = _client.OpenWrite(myTempPath);

//write to stream

_stream.Close();
Android.Util.Log.Debug("NETFTP", "connected: " + _client.IsConnected.ToString()); //always outputs true

if (_client.FileExists(myPath) //sporadically throws, see below
    _client.DeleteFile(myPath);
    
System.Net.Sockets.SocketException : Connection refused
10-24 13:08:07.487 I/mono-stdout(24073):          at System.Net.Sockets.SocketAsyncResult.CheckIfThrowDelayedException () [0x00017] in /Users/builder/data/lanes/3540/1cf254db/source/mono/mcs/class/System/System.Net.Sockets/SocketAsyncResult.cs:127 
          at System.Net.Sockets.SocketAsyncResult.CheckIfThrowDelayedException () [0x00017] in /Users/builder/data/lanes/3540/1cf254db/source/mono/mcs/class/System/System.Net.Sockets/SocketAsyncResult.cs:127 
10-24 13:08:07.487 I/mono-stdout(24073):          at System.Net.Sockets.Socket.EndConnect (IAsyncResult result) [0x0002f] in /Users/builder/data/lanes/3540/1cf254db/source/mono/mcs/class/System/System.Net.Sockets/Socket.cs:1593 
          at System.Net.Sockets.Socket.EndConnect (IAsyncResult result) [0x0002f] in /Users/builder/data/lanes/3540/1cf254db/source/mono/mcs/class/System/System.Net.Sockets/Socket.cs:1593 
          at System.Net.FtpClient.FtpSocketStream.Connect (System.String host, Int32 port, FtpIpVersion ipVersions) [0x0011a] in [my source folder]src
etftpandroid\System.Net.FtpClient\FtpSocketStream.cs:611 
10-24 13:08:07.487 I/mono-stdout(24073):          at System.Net.FtpClient.FtpSocketStream.Connect (System.String host, Int32 port, FtpIpVersion ipVersions) [0x0011a] in [my source folder]src
etftpandroid\System.Net.FtpClient\FtpSocketStream.cs:611 
10-24 13:08:07.487 I/mono-stdout(24073):          at (wrapper remoting-invoke-with-check) System.Net.FtpClient.FtpSocketStream:Connect (string,int,System.Net.FtpClient.FtpIpVersion)
          at (wrapper remoting-invoke-with-check) System.Net.FtpClient.FtpSocketStream:Connect (string,int,System.Net.FtpClient.FtpIpVersion)
10-24 13:08:07.487 I/mono-stdout(24073):          at System.Net.FtpClient.FtpClient.Connect () [0x000ce] in [my source folder]src
etftpandroid\System.Net.FtpClient\FtpClient.cs:807 
          at System.Net.FtpClient.FtpClient.Connect () [0x000ce] in [my source folder]src
etftpandroid\System.Net.FtpClient\FtpClient.cs:807 
          at System.Net.FtpClient.FtpClient.Execute (System.String command) [0x00136] in [my source folder]src
etftpandroid\System.Net.FtpClient\FtpClient.cs:735 
10-24 13:08:07.487 I/mono-stdout(24073):          at System.Net.FtpClient.FtpClient.Execute (System.String command) [0x00136] in [my source folder]src
etftpandroid\System.Net.FtpClient\FtpClient.cs:735 
10-24 13:08:07.487 I/mono-stdout(24073):          at System.Net.FtpClient.FtpClient.Execute (System.String command, System.Object[] args) [0x00001] in [my source folder]src
etftpandroid\System.Net.FtpClient\FtpClient.cs:694 
          at System.Net.FtpClient.FtpClient.Execute (System.String command, System.Object[] args) [0x00001] in [my source folder]src
etftpandroid\System.Net.FtpClient\FtpClient.cs:694 
10-24 13:08:07.487 I/mono-stdout(24073):          at System.Net.FtpClient.FtpClient.DirectoryExists (System.String path) [0x0005d] in [my source folder]src
etftpandroid\System.Net.FtpClient\FtpClient.cs:2679 
          at System.Net.FtpClient.FtpClient.DirectoryExists (System.String path) [0x0005d] in [my source folder]src
etftpandroid\System.Net.FtpClient\FtpClient.cs:2679 
10-24 13:08:07.487 I/mono-stdout(24073):          at System.Net.FtpClient.FtpClient.FileExists (System.String path, FtpListOption options) [0x0001c] in [my source folder]src
etftpandroid\System.Net.FtpClient\FtpClient.cs:2751 
10-24 13:08:07.487 I/mono-stdout(24073):          at System.Net.FtpClient.FtpClient.FileExists (System.String path) [0x00001] in [my source folder]src
etftpandroid\System.Net.FtpClient\FtpClient.cs:2733 
          at System.Net.FtpClient.FtpClient.FileExists (System.String path, FtpListOption options) [0x0001c] in [my source folder]src
etftpandroid\System.Net.FtpClient\FtpClient.cs:2751 
          at System.Net.FtpClient.FtpClient.FileExists (System.String path) [0x00001] in [my source folder]src
etftpandroid\System.Net.FtpClient\FtpClient.cs:2733 

          New Post: How to use different port?   
i made a ftp application with system.net.ftpclient library and have no problem with port 21.
But now i need to use random port.
for testing, I use IIS to create a ftp site with port number 34 (no SSL). I use window explorer and try to enter ftp://192.168.x.xxx:34+username+password and it was ok to connect, but when i set port=34 in application and it didn't work. Here is my code:
 using (FtpClient conn = new FtpClient())
                {
                    conn.Host = UserSettings.m_sHostIP;
                    conn.Port = int.Parse(tbPort.Text);
                    //conn.DataConnectionType = FtpDataConnectionType.PASV;
                    //conn.EncryptionMode = FtpEncryptionMode.Implicit;
                    conn.Credentials = new NetworkCredential(UserSettings.m_sUser, UserSettings.m_sPassword);
                    try
                    {
                        conn.Connect();
                        m_bIsConnect = true;
                    }
catch (Exception)
{
}
}
i also tried to config some value (DataConnectionType, EncryptionMode) but it still didn't work
Anyone can help me?

          Comment on [Single] LuHan – I (MP3) by Ethan   
mega link doesn't work... says it wants an encryption key
          George Brandis's salvo in cryptowars could blow a hole in architecture of the internet   

Attorney general isn’t just proposing a backdoor into encrypted communications – it’s a giant sinkhole your backdoor fell into

In 1993 the US president Bill Clinton’s administration introduced the “Clipper chip” into America’s digital and consumer electronics. It was one of the earliest attempts to enforce a backdoor into digital products, and the first in what is known as the cryptowars, when the US government fought to control and regulate strong encryption.

The Clipper chip was a catastrophic failure. It’s a failure the attorney general, George Brandis, may find instructive, as he places Australia on the frontline of a new cryptowar.

Continue reading...
          Protected: Password Encryption (Login)   
There is no excerpt because this is a protected post.
          Matias SecurePro Keyboard Would Take A Billion Billion Years To Crack   

  Here’s another keyboard from Matias to get you through this post-CES Friday. This one is called the SecurePro, and it’s target market might be the smallest intersection of any Venn diagram ever: Users who want a stylish Bluetooth keyboard AND who require 128-bit AES encryption of its wireless connection. That’s not to say that […]

(via Cult of Mac - Tech and culture through an Apple lens)


          Tips to Securing Your Business Network   
securing your business networkThere are a countless number of threats out there that are ready to compromise your company’s network, but thankfully, there are plenty of precautionary steps that can be taken to keep this from happening.

SMBs are particularly prone to the plague of cybercrime. Sometimes SMB networks simply do not have the necessary network security. This is normally due to the fact that most SMBs do not have the resources or expertise to ensure their network’s security. In many small office settings, an office administrator with only basic IT skills is in charge of network security. This can leave your company’s network open to numerous threats. Paulette Altmaier, VP of Dell Solutions, has said that 92 percent of businesses suffer some sort of computer attack in any given year.

All of these SMB network threats cause some serious concerns. In response to some of these SMB needs Dell has just recently announced their partnerships with Trend Micro and Juniper. They hope to collaborate in an attempt to present some SMB security solutions. Altmaier stated that Dell has decided to focus on SMB security because they “have the same complexity of security problems as bigger companies but lack the resources.”

One of the huge problems with security threats is realizing how they evolve to attack your network. Threats aren’t just delivered by spam anymore. They are everywhere. There are limitless ways that your network could be compromised. If you’re a small business owner and you don’t have the protection that your network truly needs, here are some tips to keep your business safe and secure.

1.Layered Security
This is absolutely necessary. You must have an anti-virus program running on every desktop in the office, but you must also make sure that every aspect of your network is protected. You must have something that manages and protects data at rest and in transit. Security methods like encryption can help you deal with things like this. You must also make sure to control mobile devices that utilize your network at all. The security simply must be layered.

2.Security Policy
The size of the company doesn’t matter; it is a good idea to have a security plan. Any business with a network could benefit from a security policy. If you educate your employees on your plan and update your plan for the newest technology, many security issues can be avoided.

3.Unified Threat Management (UTM)
These devices can really help with your security layering. A UTM will contain a firewall, content filtering, VPN, and intrusion detection technologies. Many of the UTMs now available are designed for easy use and do not need IT support.

4.Secure Endpoints
This is essential. An endpoint is anything that can attach to your network like a server or a USB drive. Threats can sneak right into your network through these means. There are plenty of different products available that can help secure your endpoints.

5.User Security
Companies must make sure to restrict the content that their users can see and not see. This really cuts down on the possibility of security threats. Don’t allow a free-for-all network at your workplace. If you monitor and control what is being viewed through your network, you can eliminate many security issues.

6.Mobile Device Security
Although security threats are not as serious on smartphones and mobile devices like the iPad, there is no reason that you should leave these devices unsecured. You should treat them like any other endpoint and make sure that they follow any of your company’s security policies.

7.Software Updates
You should always make sure that all of your programs and software are up-to-date at all times. This helps to make sure that you have the best possible protection.

Keeping your company’s network secure should be your top priority. No one wants to deal with the hassle and costs of cybercrime. With these tips you can easily boost your network’s security and keep your computers, information, and network safe.

Looking for a nationwide Digital Signage Rental? If so, then call Rentacomputer.com today at 800-736-8772.

          Sexting: Stay Out of Trouble   
sexting-stay-out-of-troubleHow private are those saucy messages and photos you're sharing?You probably know someone who has been involved in sexting. It can start innocently enough but might escalate to messages or videos that can be troublesome.

Sexting has been linked to intimate partner violence. Sharing those saucy or explicit images or messages can make you vulnerable.

Why is sexting a bad idea?

First, recognize your sexts are not private. Anything that goes over a cellular network can be subpoenaed. The government has the ability to keep records of any communication that is sent electronically. Snapchat is not immune to storage.

Second, the person who is asking you to send sexts is probably not a good guy. Studies show that men who engage in sexting are more likely to be violent. Complaints come into the Orange County (California) Sheriff’s Department frequently that sext content is being shared publicly. Your intended audience is probably sitting with a buddy when texting. You must assume it’s not being kept private.

If you share your information online, keep in mind that it will be available in the future. Be sure you won’t be embarrassed about what you’re posting in ten years.

Apple offers end-to-end encryption so they don’t have access to the actual content of messages. But, this doesn’t guarantee that your sexts are private. Screen shots may be shared when your relationship ends.

There are criminal and civil penalties for sharing sexting content, depending on the state laws. The problem is that it’s happening so often that the guilty sharer will probably get away with it. This frequently happens to girls in junior high school. Young ladies are going through body changes and dealing with esteem issues. These girls are sharing photos of their bodies for acceptance from love interests and are vulnerable to future online abuse as a result of these images.

There are parental controls to help you keep your daughter safe by monitoring websites and hours of cell phone use. Lay down boundaries for texting by defining what’s allowed and what might be provocative and damaging. Turn on tracking on phones. Be sure your child knows that a cell phone is a privilege and not a right. Establish boundaries in the beginning so you don’t have to backpedal.

Keep the sexts coy so they wouldn’t make you do more than blush if they appeared online. Subtlety is sexy. Do not send pictures and video. Exes can be vengeful jackasses. The person who is must likely to hurt you with these images is the recipient. Delete these images yourself.

Listen in as tech expert David Sparks shares what you should know to protect yourself from the dangers of sexting.
          3 Steps to Improve Mobile Device Security   
3-steps-to-improve-mobile-device-securityFollow these three simple steps to improve security on your mobile device.You conduct so much of your daily life every day on your mobile devices. What sensitive information do you keep on your phone?

What if someone gets a hold of your phone? Not only can they hack your accounts, but they can also find personal information like photos of your family.

How can you protect yourself?

1. Enable Password/Fingerprint Encryption. Most smart devices have a lock screen with a code. Newer iPhones are encrypted for fingerprints. If you don’t have it set up on your phone now, look into setting it up.

2. Set up Two-Factor Authentication with all key services. The way someone can hack your account is by getting your name and password. Many people use the same name and password across several accounts. If they hack your login from one site, they can take it to other sites. Many of these sites now send a secret code to your cell phone number if activity is suspicious. Google, Twitter, Dropbox, Facebook and Apple provide these services. Look it up to see how to set it up on your favorite sites.

3. Be aware of photograph GPS Data. Smart phones always know where you are. They apply GPS data to all of your photographs. This is generally a great service. But, when you post a photo to social media it often has the GPS data attached to it. Someone can pull that photo and look at the GPS information to find out where you live. Look for an EXIF app to remove that info from your photos.

Listen in as tech expert David Sparks shares his advice for mobile device security.
          CyberSecurity Engineer - Black Box Network Services - Lawrence, PA   
Experience in configuration of Symantec Endpoint Protection and Endpoint Encryption. This position is for a senior engineer in the CyberSecurity department....
From Black Box Network Services - Wed, 07 Jun 2017 20:18:04 GMT - View all Lawrence, PA jobs
          Koofr 100GB Storage Plan Subscriptions for $29   
Access All Files Across Your Cloud & Personal Storage in One Place
Expires July 25, 2017 23:59 PST
Buy now and get 84% off





KEY FEATURES

If you're going nuts trying to keep track of all your files across your hard drive, Google Drive, Dropbox, and more, you'll love Koofr. This premium app lets you connect all your cloud accounts and personal storage, consolidating all your files in one place. You'll be able to find any of your photos, videos, and documents with no trouble, free up hard drive space, and rest assured knowing your files are encrypted and backed up for maximum protection.

4/5 Stars on Google Play

  • Connect multiple cloud accounts & personal storages including Dropbox, Google Drive, & OneDrive accounts
  • Access all your photos, videos & documents in one place
  • Synchronize the information across different devices
  • Free up space on your hard drive
  • Spend less time searching for files in all your clouds & devices
  • Automatically back up your phone data & synchronize it to your computers
  • Secure your files w/ SSL/TLS & server-side encryption
  • Delete any files without worrying about leaving copies behind

PRODUCT SPECS

Details & Requirements

  • Updates included
  • 100 GB

Compatibility

  • Internet required
  • iOS
  • Android
  • Mac OS X
  • Windows
  • Linux
  • All modern browsers (Chrome, Safari, Firefox, etc.)

SOFTWARE LICENSE DETAILS

  • License deadline: redeem within 30 days of purchase
  • Length of access: 5 years
  • NOTE: You must have an existing Koofr account to redeem this deal. If needed, please create an account as indicated in the redemption instructions after purchasing.

          Zoolz Dual Cloud 1TB Storage: Lifetime Subscription for $29   
Lock In a Smarter, More Reliable Storage Solution With 1 TB of Data for Life
Expires July 08, 2017 23:59 PST
Buy now and get 99% off

Zoolz Dual Cloud 500GB Archive Storage





KEY FEATURES

Cloud storage is an incredibly valuable thing, and Cloud solutions don't get much better than Zoolz. With this lifetime of 500GB of Cold Storage, you'll have an extremely affordable place to safely store massive amounts of data. Sometimes you'll have data you just won't need for awhile, and with Zoolz archive capabilities you can deposit up to 500GB securely in the cloud.

  • Archive 500GB of retrievable data for life w/ no additional costs
  • Have your data encrypted w/ military-grade 256-AES encryption before it even leaves your machine
  • Retrieve stored files in approximately 3-5 hours from Cold Storage
  • Enjoy backup scheduling, bandwidth throttling, icon overlay, file retention & more
  • Preview thumbnails of images
  • Get reliability w/ data stored over multiple facilities & devices

PRODUCT SPECS

Details & Requirements

  • Amazon AWS infrastructure
  • Updates included
  • Includes: 500GB Archive Storage
  • Auto backup
  • Accounts cannot be merged

Compatibility

  • RAM: 512MB
  • Hard drive space: 200MB
  • Windows 7 or later
  • Mac OS X 10.7 or later
  • Android & iOS (viewing only)

SOFTWARE LICENSE DETAILS

  • License deadline: redeem within 30 days of purchase
  • Length of access: lifetime
  • You may download Zoolz on 2 machines. You can only restore from a third device, not back up. To back up, you must delete a machine and add the third.

Zoolz Dual Cloud 500GB Instant Vault





KEY FEATURES

Cloud storage is an incredibly valuable thing, and Cloud solutions don't get much better than Zoolz. With 500GB of Instant Vault, you'll be able to free up precious space on your computer or external hard drive, allowing them to run faster and cleaner. And the best part is you'll still be able to access your Instant Vault quickly and easily, restoring data you need within minutes. Zoolz know you want options, and Zoolz gives you options.

  • Store 500GB of instantly accessible data for life, w/ no additional costs
  • Have your data encrypted w/ military-grade 256-AES encryption before it even leaves your machine
  • Quickly drag & drop files into your web browser to store them in the cloud
  • Retrieve stored files instantly
  • Preview thumbnails of images
  • Get reliability w/ data stored over multiple facilities & devices

PRODUCT SPECS

Details & Requirements

  • Amazon AWS infrastructure
  • Updates included
  • Includes: 500GB of Instant Vault
  • Accounts cannot be merged

Compatibility

  • RAM: 512MB
  • Hard drive space: 200MB
  • Windows 7 or later
  • Mac OS X 10.7 or later
  • Android & iOS (viewing only)

SOFTWARE LICENSE DETAILS

  • License deadline: redeem within 30 days of purchase
  • Length of access: lifetime
  • You may download Zoolz on 2 machines. You can only restore from a third device, not back up. To back up, you must delete a machine and add the third.

          GuardedID® Internet Security for $9   
Outsmart Cyber Criminals by Encrypting Your Keystroke Data
Expires June 30, 2017 23:59 PST
Buy now and get 50% off





KEY FEATURES

It's possible you haven't heard of the term "keylogging," but in the age of cybersecurity, it's an important buzzword to be familiar with. Many cyber criminals will steal your data by tracking the keystrokes you use while you're browsing, thereby knowing exactly what you're typing and where you're typing it. GuardedID® outsmarts cyber criminals by encrypting your keystroke data from the point of origin — your keyboard — and delivering it safely and securely to your browser so that when you type, keyloggers see only a meaningless sequence of numbers. Install GuardedID® and you can keep your internet browsing secure from snoops and hackers without having to constantly scan your computer or check in with software.

  • Protects you from keylogging attacks & kernel- & desktop-based keyloggers
  • Creates a secure information pathway between your keyboard & web browser with military-grade 256-bit encryption
  • Detects & highlights hidden clickjacking attacks, warning you away from clicking on malicious invisible objects
  • Prevents screen scraping malware from taking screenshots of your info secretly
  • Works as a constant anti-subversive service, detecting untrusted drivers
  • Encrypts USB, wireless, PS2, Bluetooth, & international keyboards
  • CryptoColor visual verification (for Internet Explorer only) shows you what is protected by highlighting what you type in a color you select
Note: This protection is for web browsers only.

PRODUCT SPECS

Details & Requirements

  • Version 4.0
  • Updates included

Compatibility

  • Windows 7, 8.1, 10
  • Mac OS X 10.7 or later
  • Supported Browsers: Internet Explorer, Chrome, FF, Safari & Opera

SOFTWARE LICENSE DETAILS

  • Redemption: must redeem within 30 days of purchase
  • Restrictions: for use on 1 computer
  • Length of access: 1 year

          Degoo Premium: Lifetime 2TB Backup Plan for $59   
Secure Storage & Transfers of More Data Than Any Other Service
Expires July 11, 2017 23:59 PST
Buy now and get 95% off





KEY FEATURES

Everyday computer users are juggling huge amounts of data, so it makes sense that you're taking care of that data responsibly. With Degoo you get 2TB of supremely secured cloud storage from which to manage and share files with awesome simplicity. With high speed transfers from a database that offers more storage than Dropbox, OneDrive, and Google Drive combined, you'll love how easy it is to keep tabs on all of your valuable data.

  • Send files easily to friends via email or link
  • Store up to 2TB of data under ultra secure 256-bit AES encryption
  • Replicate your backup as you perform it, giving you extra peace of mind
  • Perform backup to all of your devices
  • Get more storage space than Dropbox, OneDrive, & Google Drive combined
  • Keep your backup automatically up to date thanks to automatic file change detection

PRODUCT SPECS

Compatibility

  • Windows XP or later
  • Mac OS X 10.7 or later
  • iOS 10 or later
  • Android 4.1 or later

SOFTWARE LICENSE DETAILS

  • Redemption: must redeem within 30 days of purchase
  • Length of access: lifetime

          TigerVPN: Lifetime Subscription for $49   
Make the Internet a Safe Place with Anonymous & Unrestricted Browsing
Expires July 27, 2017 23:59 PST
Buy now and get 93% off



KEY FEATURES

Spice up your Internet access and defend your right to privacy with TigerVPN. With their military grade encryption software for Windows, Mac, Android, and iOS your entire communication on the Internet is end to end secured and protected. Don’t let anyone (including your ISP or the government) monitor, target or even sell your internet activity and enjoy the benefits of unlocking geo-restrictions from content providers such as Netflix, Youtube, and many others with unlimited access to any of 15 VPN nodes spread across the globe.

Featured in Engadget, CNET, Techradar, MakeUseOf, Techspot, Geekwire, Top10BestVPN, VPNMentor, and The Next Web
4.7/5 Stars, Verified Reviews

  • Provides military grade encryption & privacy protection for all of your devices & gadgets
  • Maintains high connection speeds thanks to low latency servers w/ up to 10Gbps connectivity
  • Features native apps for Windows, Mac, Android, & iOS
  • Includes 15 VPN nodes across 11 countries
  • Gives you the freedom of protocol choice, including OpenVPN, L2TP, IPSec, & PPTP
  • Shields you from other VPN users w/ a NAT Firewall
  • Offers maximum security due to shared IPs (IP-Mashing)

PRODUCT SPECS

Details & Requirements

  • Updates included
  • TigerVPN offers you lifetime access to 15 nodes. Here's the complete list of nodes you can connect to: NL - Amsterdam US - Denver, Los Angeles, Miami, New York RO - Bucharest NO- Oslo DE - Frankfurt UK - London ES - Madrid CA - Montreal, Toronto AT - Vienna CH - Zurich FR- Paris
  • 2 active connections allowed at any given moment
  • Use of torrents permitted
  • Protocols: OpenVPN, IPSec L2TP, PPTP
  • Unlimited speed
  • Unlimited data
  • Priority support
  • Gigabit network

Compatibility

  • iPhone 4s or later
  • iPad 2 or later
  • iOS 9 or later
  • Android 5.0 or later
  • Mac OS X 10.10 or later
  • Selected Wireless Routers (Connection type (WAN) must be VPN) commonly used as 2nd router!
  • Windows: Microsoft Windows 7 or later
  • Not compatible with Windows Phones
  • Compatible with PPTP, L2TP & OpenVPN protocols
  • Due to government regulations, this product may not be suitable for customers in China, UAE, and other countries where the government applies technology filters to block VPN protocols (e.g. OpenVPN, L2TP, PPTP, IPSec)
  • Customer must have internet or mobile data plan (APN) that allows VPN usage (please check w/ your carrier first if you are in doubt)

SOFTWARE LICENSE DETAILS

  • License deadline: redeem within 30 days of purchase
  • Length of access: lifetime access to 15 locations
  • Restrictions: for use on up to 2 devices

          Pay What You Want: Ashampoo Best Selling Software Bundle for $1   
Revamp Your PC with 8 Top-Rated Apps from Renowned Developer, Ashampoo
Expires July 14, 2017 23:59 PST
Buy now and get 99% off

Burning Studio 18





KEY FEATURES

This is not your middle school mixtape burning software. The new Ashampoo Burning Studio has seen enhancements across the board, from an intuitive new user interface, to improved visuals and audio clarity, to a range of new supported formats. There's no limit to your creativity with Burning Studio, letting you listen to your music, make your video projects, and design your own albums with more flexibility than ever.

4/5 Stars, CNET Editors

  • Burn data to CD, DVD or Blu-ray safely & w/ great flexibility
  • Pick songs & transport to numerous presets for various radio models, letting you listen the way you want
  • Make & burn movies w/ first-rate scene transition & sound effects in a huge array of formats
  • Cut movies quickly w/ feature assistance
  • Turn your photos into slideshows w/ music to capture the most memorable moments
  • Design the perfect cover for your self-curated CD
  • Burn or save your data securely where you want it w/ compression & password-protection
  • Rip & store CDs either in high quality or w/ maximum space savings

PRODUCT SPECS

Details & Requirements

  • Version 18.0.3
  • Updates included
  • Languages: German, English, Dutch, French, Hungarian, Russian, Polish, Italian, Norwegian, Portuguese, Spanish, Swedish, Turkish, Slovenian, Czech, Simplified Chinese, British English, Serbian, Brazilian Portuguese, Traditional Chinese, Dansk, Greek, Romanian, Catalan, Slovakian, Finnish, Latvian, Belorussian, Norwegian Nynorsk

    Compatibility

    • Windows 7 or later

    SOFTWARE LICENSE DETAILS

    • Redemption: must redeem within 30 days of purchase

Backup Pro 10






KEY FEATURES

Disaster strikes in many ways, be it hardware defects, corrupt updates, or viruses, which is why a good backup program is essential to ensuring your data's security and accessibility. Backup Pro 10 provides professional, secure backups that meet the highest requirements and supports all common storage types like hard disks, SSDs, flash, or network drives. Whether you're backing up single files or entire disk partitions, Backup Pro 10 has you covered.

9.8/10, File Critic

  • Supports all common storage types like hard disks, SSDs, flash, or network drives
  • Extensive cloud support includes backups of entire disks & works w/ Dropbox, Google Drive, & OneDrive
  • Only modified data is saved w/ each successive backup, preventing duplicates
  • Automatic backups are performed securely in the background
  • Backups can be accessed as virtual drives in Windows Explorer making it easy to restore single files & folders
  • In the even of a total system failure, Backup Pro can come to your aid w/ a rescue disc

PRODUCT SPECS

Details & Requirements

  • Version 10.01
  • Updates included
  • Languages: German, English, Dutch, French, Hungarian, Russian, Polish, Italian, Norwegian, Portuguese, Spanish, Swedish, Turkish, Slovenian, Czech, Simplified Chinese, British English, Serbian, Brazilian Portuguese, Traditional Chinese, Dansk, Greek, Romanian, Catalan, Slovakian, Finnish, Latvian, Belorussian, Norwegian Nynorsk

    Compatibility

    • Windows Vista or later

    SOFTWARE LICENSE DETAILS

    • Redemption: must redeem within 30 days of purchase

Music Studio 6






KEY FEATURES

You thought Spotify was a cool way to manage your playlists. Well, let us introduce you to Music Studio 6. This one program can rip, burn, cut, convert, mix, and organize music, as well as print album covers and allow you to create playlists with ease. Yes, you can mix your own music and enjoy it anywhere you want, be it on your PC, smartphone, or even in your car.

9.3/10, All PC Stuff
4/5 Stars, CNET Editors

  • Smoothly burn & convert iTunes songs
  • Mix, cut, & edit up to three songs together ultra precisely
  • Split up audio books or live concert recordings w/ smart splitting technology
  • Create playlists for any device
  • Convert sound w/ individual format & quality settings
  • Rip audio discs w/ powerful automatic features
  • Easily create & design individual covers w/ various template or use custom motives
  • Convert audio tracks from videos into single sound files

PRODUCT SPECS

Details & Requirements

  • Version 6.0.2
  • Updates included
  • Languages: German, English, Dutch, French, Hungarian, Russian, Polish, Italian, Norwegian, Portuguese, Spanish, Swedish, Turkish, Slovenian, Czech, Simplified Chinese, British English, Serbian, Brazilian Portuguese, Traditional Chinese, Dansk, Greek, Romanian, Catalan, Slovakian, Finnish, Latvian, Belorussian, Norwegian Nynorsk

    Compatibility

    • Windows Vista or later

    SOFTWARE LICENSE DETAILS

    • Redemption: must redeem within 30 days of purchase

Photo Commander 15






KEY FEATURES

You like to take photos, but you're not made of the kind of money Photoshop demands for its photo editing software. Thankfully, there's Ashampoo Photo Commander 15, the comprehensive solution to viewing, editing, and organizing your photos all in one place. Bring order to your photo library, batch-optimize multiple files at once, create your own calendars and slideshows easily, and much more! You can even geotag photos so you'll always remember where they were taken. You don't need to break the bank to get your digital photo albums organized, you just need Photo Commander 15.

4.5/5 Stars, CNET Editors
"Ashampoo Photo Commander 15 is a profound solution to edit and view photo and video content in one application on the particular device," 5 Best Things

  • Customize greeting cards, web albums, & calendars quickly & easily
  • Turn GPS data from JPG & RAW images into concrete locations
  • Filter photos by country, city, street, or even street number
  • Use design tools for maximum creativity
  • Cut out people & objects w/ ease
  • Optimize your photos w/ over 60 stunning effects

PRODUCT SPECS

Details & Requirements

  • Version 15.0.3
  • Updates included
  • Languages: German, English, Dutch, French, Hungarian, Russian, Polish, Italian, Norwegian, Portuguese, Spanish, Swedish, Turkish, Slovenian, Czech, Simplified Chinese, British English, Serbian, Brazilian Portuguese, Traditional Chinese, Dansk, Greek, Romanian, Catalan, Slovakian, Finnish, Latvian, Belorussian, Norwegian Nynorsk

    Compatibility

    • Windows Vista or later

    SOFTWARE LICENSE DETAILS

    • Redemption: must redeem within 30 days of purchase

Snap 9




KEY FEATURES

Screenshots and video screen capturing have become an extremely important means of communication in the business world. How do you show a coworker what you're looking at if they're in another office? A screen capture of course! Ashampoo Snap 9 lets you capture anything on your screen as an image or video and annotate before sharing with others. Whether you need to explain, document, or simply demonstrate, Snap 9 gets it done.

3.5/5 Stars, PC Mag
4/5 Stars, CNET Editors

  • Create screenshots & videos fast & easily
  • Use the integrated text recognition to copy entire pages of text or share your processed images
  • Save time & effort on your screen captures
  • Record, edit & send screen captures instantly
  • Work faster & more flexibly
  • Use live editing & new automatic features to share & avoid post-processing

PRODUCT SPECS

Details & Requirements

  • Version 9.0.5
  • Updates included
  • Languages: German, English, Dutch, French, Hungarian, Russian, Polish, Italian, Norwegian, Portuguese, Spanish, Swedish, Turkish, Slovenian, Czech, Simplified Chinese, British English, Serbian, Brazilian Portuguese, Traditional Chinese, Dansk, Greek, Romanian, Catalan, Slovakian, Finnish, Latvian, Belorussian, Norwegian Nynorsk

    Compatibility

    • Windows 7 or later

    SOFTWARE LICENSE DETAILS

    • Redemption: must redeem within 30 days of purchase

WinOptimizer 14






KEY FEATURES

Clean, optimize, and protect your PC the smart way with Ashampoo WinOptimizer 14! This software frees disk space, fixes errors, and ensures steady performance, all while allowing you to customize what your system needs and what it needs to share with Microsoft. WinOptimizer tackles the shortcomings of Windows and provides you with a faster, cleaner and leaner system.

4/5 Stars, PC Mag
5/5 Stars, CNET Editors

  • Pick & choose whether your computer will share passwords, telemetry data or photos w/ Microsoft
  • Customize your security needs within Windows w/ ease
  • View your entire system's health parameters at a glance, from the amount of memory consumed to the hardware components running
  • Gain a massive speed boost in your system
  • Declutter your disk by eliminate old & unneeded files & data

PRODUCT SPECS

Details & Requirements

  • Version 14.00.05
  • Updates included
  • Languages: German, English, Dutch, French, Hungarian, Russian, Polish, Italian, Norwegian, Portuguese, Spanish, Swedish, Turkish, Slovenian, Czech, Simplified Chinese, British English, Serbian, Brazilian Portuguese, Traditional Chinese, Dansk, Greek, Romanian, Catalan, Slovakian, Finnish, Latvian, Belorussian, Norwegian Nynorsk

    Compatibility

    • Windows Vista or later

    SOFTWARE LICENSE DETAILS

    • Redemption: must redeem within 30 days of purchase

Privacy Protector






KEY FEATURES

Your data is precious, and hackers are getting more creative and adept than ever at cracking systems to harvest personal information. Don't become a victim! Encrypt and archive your files with Privacy Protector's innovative security approach. Rather than investing in several security tools, Privacy Protector incorporates the best of many, giving you a single, well-balanced solution that does away with confusing settings in favor of clarity.

9.4/10, File Critic

  • Enjoy maximum encryption for your private data
  • Burn & archive data safely w/ high-security recordables
  • Use flash drives as master keys
  • Work without passwords by using existing files & images as password keys
  • Delete sensitive information completely & permanently
  • Find & eliminate any revealing data traces from your system

PRODUCT SPECS

Details & Requirements

  • Version 1.1.3
  • Updates included
  • Languages: German, English, Dutch, French, Hungarian, Russian, Polish, Italian, Norwegian, Portuguese, Spanish, Swedish, Turkish, Slovenian, Czech, Simplified Chinese, British English, Serbian, Brazilian Portuguese, Traditional Chinese, Dansk, Greek, Romanian, Catalan, Slovakian, Finnish, Latvian, Belorussian, Norwegian Nynorsk

    Compatibility

    • Windows Vista or later

    SOFTWARE LICENSE DETAILS

    • Redemption: must redeem within 30 days of purchase

UnInstaller 6






KEY FEATURES

You take cars for test drives, why can't you take computer programs? Some may tell you you can, but even when you try a free trial and don't buy, there are still vestiges of the program left behind. Ashampoo UnInstaller 6 lets you try out software and uninstall it completely at the click of a button. This software enables you to trace system modifications extremely efficiently and remove any sneaking files that may be slowing your computer down.

4/5 Stars, PC Mag

  • Protect yourself against unwanted software installations
  • Uninstall applications completely w/ one click
  • Trace all system modifications w/ snapshots
  • Maintain & monitor your system efficiently
  • Perfectly uninstall nested setups, multiple applications in a row, & old applications without installation logs

PRODUCT SPECS

Details & Requirements

  • Version 6.00.14
  • Updates included
  • Languages: German, English, Dutch, French, Hungarian, Russian, Polish, Italian, Norwegian, Portuguese, Spanish, Swedish, Turkish, Slovenian, Czech, Simplified Chinese, British English, Serbian, Brazilian Portuguese, Traditional Chinese, Dansk, Greek, Romanian, Catalan, Slovakian, Finnish, Latvian, Belorussian, Norwegian Nynorsk

    Compatibility

    • Windows XP or later

    SOFTWARE LICENSE DETAILS

    • Redemption: must redeem within 30 days of purchase

          Pay What You Want: The Full Stack Web Development Bundle for $1   
The World's Best Developers Are Full Stack Developers. Here's 122+ Hours of Instruction to Help You Join Them.
Expires March 06, 2022 23:59 PST
Buy now and get 99% off

The Full Stack Web Development Course


KEY FEATURES

Full Stack development refers to the complete creation of all facets of an app or website, from front end to back end, to databasing, debugging, and testing. In sum, being a Full Stack developer can be incredibly lucrative, although getting there can be tough considering the diverse amount of education you must receive. This course is different. Covering all aspects of the development cycle, this immersive course will teach you all the tools and techniques needed to become a Full Stack developer, allowing you greater freedom on your own projects, while greatly increasing your market value as a developer.

  • Access 207 lectures & 33.5 hours of content 24/7
  • Learn front end technologies like HTML5, CSS3, Twitter Bootstrap, JavaScript, & more
  • Master back end tools like Nose.js, Meteor.js, Angular 2, PHP, & Ruby on Rails
  • Explore databasing w/ MySQL, MongoDB, Apache Cassandra, & more
  • Dive into Memcahced, Redis, Apache Lucene, & Apache Solr
  • Debug like a pro & understand important version control technologies
  • Create complete, functional projects using the various tools you learn

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

Eduonix creates and distributes high-quality technology training content. Their team of industry professionals have been training manpower for more than a decade, and aim to teach technology the way it is used the industry and professional world. Their professional team of trainers range from Mobility, Web to Enterprise and Database and Server Administration.

Projects In ReactJS: The Complete React Learning Course


KEY FEATURES

ReactJS is a JavaScript library that has changed the way front end development is done, and has become one of the most sought after skills in the tech industry. This course covers the React APIs that make creating interactive UIs a much simpler and faster process, as well as a variety of associated technologies like JavaScript, jQuery, Twitter Bootstrap, and much more.

  • Access 56 lectures & 8 hours of content 24/7
  • Learn app development processes & techniques w/ ReactJS
  • Cover associated technologies like core JavaScript, Firebase, MongoDB, & more
  • Explore the latest API versions across a variety of technologies
  • Build real, functional projects using ReactJS

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

Eduonix creates and distributes high-quality technology training content. Their team of industry professionals have been training manpower for more than a decade, and aim to teach technology the way it is used the industry and professional world. Their professional team of trainers range from Mobility, Web to Enterprise and Database and Server Administration.

Projects in JavaScript & JQuery


KEY FEATURES

JavaScript may enable developers to quickly build robust, scalable apps, but the jQuery library further expedites JavaScript Web development by simplifying client-side HTML scripting. This course will acquaint you with this dynamic duo, walk you through 10 projects encompassing everything from YouTube API integration to content slider creation, and teach you the art of crafting dynamic, feature-rich apps without breaking a sweat.

  • Master JavaScript & jQuery by building working apps & features over 50 lectures & 9 hours
  • Utilize supplementary languages & technologies: HTML5, CSS3, GitHub, etc.
  • Craft statements using variables, loops, arrays & more
  • Build interactive features such as content, accordion & Apple-style image sliders
  • Use the YouTube Data API w/ the “search . list’ method & the FancyBox lightbox script
  • Create a plugin & upload it to the jQuery.com plugin registry
  • Use the jQuery Mobile framework to craft a mobile app

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime access
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

Eduonix creates and distributes high-quality technology training content on the web! Their team of industry professionals have been training manpower for more than a decade, and aim to teach technology the way it’s used in the professional world. They have a professional team of trainers for technologies ranging from mobility to web to enterprise to database and server administration.

ReactJS and Flux: Learn By Building 10 Projects


KEY FEATURES

ReactJS and Flux were both created by Facebook to simplify the coding process. ReactJS is a powerful JavaScript library that helps you easily create interactive UI components and reuse them in other projects. Flux is an app architecture used for creating dynamic, client-side JavaScript web applications that manages scalability, allowing you to present apps appropriately across different platforms, from desktops to mobile devices. Over this course, you'll learn how to use both of these technologies by building ten individual projects.

  • Access 60 lectures & 11 hours of content 24/7
  • Use Bootstrap to create basic React components
  • Learn how to use ReactJS to create a UI & fetch data from the Github API
  • Create a movie find databases that uses the OMDB API to fetch movies from the database
  • Build a contact list & use Firebase database tech to organize it
  • Design a fully-functional search engine using the DuckDuckGo API
  • Add YouTube videos to a video gallery using just the ID of the video
  • Create your own functional chat application
  • Build a workout logger that will teach you how to create local storage

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

Eduonix creates and distributes high-quality technology training content on the web! Their team of industry professionals have been training manpower for more than a decade, and aim to teach technology the way it’s used in the professional world. They have a professional team of trainers for technologies ranging from mobility to web to enterprise to database and server administration.

Projects in MongoDB: Learn MongoDB Building 10 Projects


KEY FEATURES

MongoDB has quickly become one of the most popular NoSQL database solutions available, and will quickly enhance your ability to handle data with ease. With a document-based approach, MongoDB lets professionals model data however they prefer. While MySQL limits modeling to rows and columns, MongoDB is much more flexible, allowing developers to use a familiar programming language like Ruby, and a JSON format. What does this mean? Faster and more intuitive storage of data.

  • Utilize MongoDB to manage data more efficiently w/ 67 lectures & 12 hours of content
  • Develop quickly w/ a document-based approach
  • Utilize JavaScript to communicate w/ MongoDB for faster development
  • Study best practices for NoSQL development
  • Get querying capabilities w/ the flexibility of storing data in an intuitive manner

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

Eduonix creates and distributes high-quality technology training content. Their team of industry professionals have been training manpower for more than a decade, and aim to teach technology the way it is used the industry and professional world. Their professional team of trainers range from Mobility, Web to Enterprise and Database and Server Administration.

Projects Using PHP Frameworks


KEY FEATURES

Get familiar with PHP by building ten real, functional projects across this course. You'll dive into ten unique PHP frameworks to get a complete understanding of how this powerful scripting language can be used to create interactive apps. Regardless of your experience, this course will give you a multi-faceted background in web development using an especially popular programming language.

  • Access 87 lectures & 17.5 hours of content 24/7
  • Create a patient manager using the CakePHP framework
  • Design a job board using the Yii2 framework
  • Build an event calendar w/ the Symfony framework
  • Learn how to design a photo gallery w/ the Laravel framework
  • Make an idea diary using the Nette framework
  • Design a weblink manager w/ the PHPixie framework

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

Eduonix creates and distributes high-quality technology training content. Their team of industry professionals have been training manpower for more than a decade, and aim to teach technology the way it is used the industry and professional world. Their professional team of trainers range from Mobility, Web to Enterprise and Database and Server Administration.

Projects in HTML5


KEY FEATURES

If you've ever considered becoming a web developer, there is no better way to start than by diving into HTML5 and JavaScript, two of the most advanced web programming languages in use today. In this course, you'll learn by actually using HTML5, JavaScript and other tools to build a variety of fully-functioning apps, games, and websites. By the end of this course you'll be well on your way towards a profitable career in front-end development and have 10 projects to boost your portfolio.

  • Access 52 lectures & 15.5 hours of content
  • Learn & apply concepts to 10 real-life games, apps, and sites
  • Become a front-end expert developing unique apps & responsive websites
  • Develop the front-end for a blog using tags, forms, CSS3 & responsive design
  • Create an animated image gallery, a sticky note app & a snake game
  • Master the Drag and Drop Image Uploader
  • Expand your client base & update your resume to advance your career

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

THE EXPERT

Eduonix creates and distributes high-quality technology training content. Their team of industry professionals have been training manpower for more than a decade, and aim to teach technology the way it is used the industry and professional world. Their professional team of trainers range from Mobility, Web to Enterprise and Database and Server Administration.

Learn NodeJS by Building 10 Projects


KEY FEATURES

Further strengthen your JavaScript skills with Node.js, an open source cross-platform environment for creating server-side and network apps. This course will walk you through 10 projects through which you'll gain practical experience in a number of important Node.js technologies, including HTML, CSS, NoSQL, and much more. By the time you're finished, you'll know all you need to create Web apps that are lightweight and highly scalable.

  • Gain experience in Node.js by completing 10 projects across 16 hours of instruction
  • Learn about a number of different Web technologies: HTML, CSS, NoSQL & more
  • Quickly & easily create lightweight, highly scalable Web apps
  • Dive into both front-end & back-end development principles
  • Design & build user interfaces for different apps
  • Implement different features including password encryption, user registration, etc.
  • Add a valuable skill set to your development repertoire

PRODUCT SPECS

Details & Requirements

  • Length of time users can access this course: lifetime access
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate
  • Internet required

THE EXPERT

Eduonix creates and distributes high-quality technology training content on the web! Their team of industry professionals have been training manpower for more than a decade, and aim to teach technology the way it’s used in the professional world. They have a professional team of trainers for technologies ranging from mobility to web to enterprise to database and server administration.

          OneVPN: Lifetime Subscription for $39   
Enjoy an Ad-Free, Completely Secure Internet Experience with OneVPN
Expires August 26, 2017 23:59 PST
Buy now and get 91% off




KEY FEATURES

VPNs offer an invaluable service, cleaning up your internet experience, while keeping you anonymous from hackers and government snoops who may be monitoring your activity. OneVPN provides this secure browsing service on a budget, while maintaining high speeds and offering a variety of features. You'll be able to use the internet safely, through over 60 servers based in 21 countries.

  • Adblocker makes ads disappear as if they had never even existed
  • Up to 256-bit encryption ensures your personal information is always safe from prying eyes
  • Anti-malware protects your data & operating system from harmful malware
  • NAT firewall stops third parties from connecting to your device
  • One-Stream lets you access the streaming content you want from anywhere you want w/ ultra-fast streaming speed

PRODUCT SPECS

Details & Requirements

  • 60+ servers in 21 countries
  • Unlimited bandwidth and sessions

Compatibility

  • Internet required

SOFTWARE LICENSE DETAILS

  • Length of access: Lifetime
  • Number of devices connectable: 3

<