Tcx Blue cabinet From We Re-Build The is a working wiki project to document vendors and manufacturers of surveillance equipment that are used in dictatorships and democracies around the internets. Blue Cabinet Wiki is . This means that may add truthful data with sources i.e. urls to where you found it online. You can make an to login with -- by using a fake name/nick and being responsible of your password. How to Extract Media from PowerPoint Files (works for both Windows and Mac) — Guide 2 Office Lately I’ve been receiving a number of files in pptx format, but I present using my iPad and so convert these presentations to Keynote. If the slides contain images and text only, this conversion is relatively painless – usually there are just a few formatting and alignment issues that need to be addressed and then I’m good to go. All I need do is open the pptx file in keynote, either on my Mac or iPad, and Keynote handles the conversion quite well. If, however, the presentation contains media, then this process will not transfer across the video presentations, and I end up with an image snapshot of the video in the slide as a placeholder where the video used to be (or an image of a play symbol, if the media is an audio file). In order to access media files embedded within pptx files, follow these steps (and they work on both Windows machines and Macs): Step 1Make a copy of the pptx file.
Official Guide to the legal practice of the drone in France The DGAC has published the Rules of Usage of a recreational drone in France. 10 common sense principles to fly in accordance with the law. The famous regulations which govern the use of drones published in April 2012 by the Directorate General of Civil Aviation (DGCA) has been much talk and pour gallons of ink over the past two years, among both amateur among professionals. Too rigid, too complicated (I recently chatted with an approved professional, known and recognized with flying hours and production of aerial images under his belt who confessed to me that he was struggling to navigate the 32 Text pages), this regulation could only evolve towards more flexibility and readability. And the more she had completely ignored the most frequent use (by far) drones : recreational use “recreation”, most frequently for the aerial photography.
Skype makes chats and user data more available to police The changes to online chats, which are written messages conveyed almost instantaneously between users, result in part from technical upgrades to Skype that were instituted to address outages and other stability issues since Microsoft bought the company last year. Officials of the United States and other countries have long pushed to expand their access to newer forms of communications to resolve an issue that the FBI calls the “going dark” problem. Microsoft has approached the issue with “tremendous sensitivity and a canny awareness of what the issues would be,” said an industry official familiar with Microsoft’s plans, who like several people interviewed for this story spoke on the condition of anonymity because they weren’t authorized to discuss the issue publicly. The company has “a long track record of working successfully with law enforcement here and internationally,” he added. “The issue is, to what extent are our communications being purpose-built to make surveillance easy?”
Some applications relating with XMind Posted on December 8th, 2011 in Opensource | 1 Comment » Every week, XMind receives many emails about the development. There are already some products in the market. Here introduces three of them. XMindlook. This is made by NG Logic, a company located in Warsaw, Poland. Destroy Internet Tracking Files With PrivacyScan Editor’s note: The following review is part of Macworld’s GemFest 2012 series. Every weekday from mid June through mid August, the Macworld staff will use the Mac Gems blog to briefly cover a favorite free or low-cost program. Visit the Mac Gems homepage for a list of past Mac Gems.
You Are Not Anonymous, Nothing Is Secure We’ve had the opportunity to have a chat with a former member of the infamous TeaMp0ison collective who has been recently raided by authorities. Although he has asked us not to reveal his true identity because the case is sealed, he wants to get his message out to all the black hats who are still active on the hacking scene. “I got raided on June 26 by 16 FBI agents, 2 special agents and 2 helicopters at 6AM. On the same day, 30 other, including Cosmo and JoshTheGod were raided.
Why passwords have never been weaker—and crackers have never been stronger In late 2010, Sean Brooks received three e-mails over a span of 30 hours warning that his accounts on LinkedIn, Battle.net, and other popular websites were at risk. He was tempted to dismiss them as hoaxes—until he noticed they included specifics that weren't typical of mass-produced phishing scams. The e-mails said that his login credentials for various Gawker websites had been exposed by hackers who rooted the sites' servers, then bragged about it online; if Brooks used the same e-mail and password for other accounts, they would be compromised too. The warnings Brooks and millions of other people received that December weren't fabrications. Within hours of anonymous hackers penetrating Gawker servers and exposing cryptographically protected passwords for 1.3 million of its users, botnets were cracking the passwords and using them to commandeer Twitter accounts and send spam. Newer hardware and modern techniques have also helped to contribute to the rise in password cracking.
Apple zombie malware ‘NetWeird’ rummages for browser and email passwords When we write Naked Security articles about Mac malware, we often end up creating a bit of a stir. Usually that's not on account of the malware itself, but on account of us writing about it in the first place. Here's how it goes down.
CRYPTO 2012 : Day One The annual return of cryptographers to sunny Santa Barbara started today. The morning was dominated by an excellent invited talk by Jonathan Zittrain entitled "The End of Crypto". The talk gave an interesting initial presentation of the history of computers and networks. In terms of computers before the advent of the PC there was essentially two models. Reprogrammable computers which were essentially mainframes and kept out of the hands of the public; and non-programmable computers which the public could use but had limited functionality (think of the old pong video consoles). An App Keeps Spies Away from Your iPhone Anytime you use your phone to make a call or send an e-mail or text message, there’s a chance it will be intercepted by someone who has access—legal or otherwise—to your providers’ servers. A new app called Silent Circle tries to change that by encrypting calls, e-mails, and texts. It’s aimed at activists, companies, and individuals who fear they’re being spied on. Silent Circle is also the name of the company behind the app. Both were masterminded by Phil Zimmermann, who earned a place in Internet history in 1991 by releasing PGP (for pretty good privacy), open-source software that can be used to encrypt e-mails and other digital messages. PGP quickly earned a large following amongst free speech and privacy activists worldwide, but the technology is now controlled by a company that sells it to businesses.
Cryptoparties, danger, and why you (the hacker) should help. Recently, cryptoparties have “gone viral” the world over. In short, they are gatherings where people with knowledge of crypto take the opportunity to spread that knowledge to others who has a need and/or interest, such as journalists, activists etc. However, I hear from one of the originators, Asher Wolf, that the wiki has been changed by “experts”, who claim that “crypto is dangerous” in various ways. I will attempt to address these concerns quickly: Privacy 101: privacy, anonymity and you This is a double guest post, incorporating two separate presentations from the recent Melbourne Crytoparty event. Cryptoparties are grass-roots data security education activism – CryptoParties are free to attend, public, and are commercially non-aligned. Some of the information provided below is specific to Australian law; find a Cryptoparty MeetUp local to you if you want to check your specific legalities (follow the proceedings online if you can’t get to the MeetUp itself). Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn’t want the whole world to know, but a secret matter is something one doesn’t want anybody to know.
Skype hands 16-year-old's personal information to IT company AMSTERDAM - Skype illegally distributed a user's personal information to a private company during a police investigation into Anonymous-sanctioned cyberattacks on PayPal. Foto: AFP Dit artikel is oorspronkelijk verschenen in het Nederlands.