For everyone with nostalgia to TrueCrypt. Here is link to one of the last versions:
Linux HERE – truecrypt-7.1a-linux-x64.tar
Windows – TrueCrypt Setup Windows
Member from group of European security researchers twitted today that critical vulnerabilities in PGP/GPG and S/MIME email encryption was found. Full details will be published in a paper on Tuesday 15 May 2018 at 07:00 AM UTC.
EFF reported that they already establish connection with the research team running this investigation.
In December of 2016, Yahoo announced it had uncovered a massive data hack, compromising more than 1 billion user accounts. This was in addition to an earlier 2014 data breach, which had affected over 500 million users. While users may scream for blood when such a breach happens – usually blaming the owners of the affected websites – the real culprit can likely be found in their own bathroom mirrors.
You see, many data breaches are caused by one seemingly innocent common factor: computer and mobile device users reuse their passwords on multiple websites at an alarmingly high rate.
Many veteran journalists, but not only these, surely noticed that we are all of a sudden bombarded again from all-over with mentions of Watergate. Books like George Orwell’s 1984 are on display at bookstores and an air of danger to freedom of speech and freedom of the press is spreading slowly like a dark cloud over the Western Hemisphere, Continue reading
Starting new 3d printing posts by offering you a really handy and practical things to print.
We will search the web and offer new and interesting files to print by using our test settings.
Like proud owners of cheap Prusa i3 ProB, we will try to provide photo and if possible video support for each model we presenting.Continue reading
It is time to get your data back? Instead of storing files in the public cloud, the Minebox acts as your personal cloud, which is dedicated for you, and you only. It is secured, safe and reliable. Promoted as the most powerful NAS ever. Pre-order for Minebox 8TB/16TB is open now.
Minebox NAS is smart data storage box that Continue reading
People with inkjet printers have all considered, if not tried, clone inks from third-party vendors. It’s way cheaper, often by as much as 90 percent. Printer companies do not like hearing this, but most of the printer users playing with various brands of clone inks for 20 years and they never experienced any of the problems that you commonly read about in forums, like clogged heads or ruined warranties. “Only use the brand name meant for the printer!”
Until recently, you could buy a new printer for the cost of replacement ink. It’s obvious that the printers were the loss Continue reading
When you visit a website, you are allowing that site to access a lot of information about your computer’s configuration. Combined, this information can create a kind of fingerprint — a signature that could be used to identify you and your computer. “Browser fingerprinting” is a method of tracking web browsers by the configuration and settings information they make visible to websites, rather than traditional tracking methods such as IP addresses and unique cookies. Some companies use this technology to try to identify individual computers. How secure is your browser from attack from Internet. Here are our favorite free online Continue reading
With the recent Bitfinex heist models for decentralized exchanges have received a bit more attention as usual.
This is a repeating pattern happening every few months after a major incident.
And it goes back to business as usual after people are entertained by the next soap opera.
So I do not expect that the majority of cryptoland citizens will radically change their behavior. And that has several understandable reasons.
But beside that, Continue reading
Collecting metadata “can be more intrusive than traditional communications data,” Scotland Yard’s deputy assistant commissioner has admitted to Ars.
Neil Basu made his comment during a briefing session on law enforcement requirements for investigatory powers. The UK government claims that the new Internet connection records (ICRs) at the heart of the Investigatory Powers Bill are “only” metadata, and therefore no more intrusive than traditional communications data.
OpenBazaar is now released on the mainnet and is ready for real transactions. You can download the program on the OpenBazaar website.
Anyone with a computer and internet connection can easily install the OpenBazaar software and begin trading with anyone else in the world – for free – without permission. The believe in decentralized, P2P trade network is going to fundamentally change commerce for the better.it’s a decentralized peer-to-peer network for trade that uses Bitcoin. That trade happens directly between buyers and sellers with no one in the middle – and no fees or restrictions on trade. Continue reading
Like small part of the world bitcoin community, we were really surprised to find that Andreas Antonopoulos will make short stop to Barcelona for a scheduled meetup of Barcelona Bitcoin Community(BBC) during his European tour 2016.
Persons like Andreas are the gifted parents for any new and radical idea. They are ready to donate their time and energy to shape this idea and present it to the community in understandable way. People like him can understand the future, and then explain it to the rest of us in close, simple and efficient way. Continue reading
Barcelona Bitcoin Community proudly presents next Bitcoin meetup in FabLab Barcelona with special guest Andreas Antonopoulos. The meeting is scheduled for 24th of March 2016 and will take place at our great hosts from FabLab Barcelona.
Language (talk and Q&A): English
Free entrance with previous reservation.
Andreas Antonopoulos is a technologist and serial entrepreneur who has become one of the most well-known and well-respected figures in bitcoin. He is the author of “Mastering Bitcoin”, published by O’Reilly Media and considered by many to be the best technical guide to bitcoin.
As an engaging public speaker, teacher and writer, Andreas makes complex subjects accessible and easy to understand. As an advisor, he helps Continue reading
Ubuntu Core, also known as Snappy, is a stripped down version of Ubuntu, designed to run securely on autonomous machines, devices and other internet-connected digital things. From homes to drones, these devices are set to revolutionise many aspects of our lives, but they need an operating system that is different from that of traditional PCs.
We found intriguing method to hide your important files:
USB – Micro SD card reader, butt plug and data storage dongle! Back that data up like a boss! Show’em the files you be work’n with
Back in November Microsoft confirmed Windows 10’s worst kept secret: its extensive telemetry (or ‘spying’ as it has been labelled) cannot be stopped. What no-one realised until now, however, is just how staggering the extent of this tracking really is…
Interesting project can be found this year at Barcelona Mini Maker fair 2016.
The purpose of the TicrCube is to display the current Bitcoin price in a local currency. Many Bitcoin enthusiasts (including ourselves) check the Bitcoin price several times per day online or via smartphone apps, but currently no dedicated device exists to do this effortlessly. The TicrCube is wireless and intended to stay at the user’s office desk or workstation, but it could brought along outdoors. The device connects to the local WiFi network or hotspot of the user, polls the Bitcoin price Continue reading
We have made this in 2015…. And yes – in 2016 we will repeat that and publish our updated list with software we think is good to share it with everyone who cares about the way they communicate in Internet or just want to keep data safe and unreachable from all the bad guys out there. We will split the helpful Software and Continue reading
Last year many users of the encrypting software TrueCrypt was asking only one question: TrueCrypt, secure or insecure?
A group of Ten auditors from the Fraunhofer Institute for Secure Information Technology has conducted a six-month audit of TrueCrypt under contract from the German Government. The researchers have expressed a Continue reading
A commentator on a recent post about the DEA installing license plate scanners on the nation’s interstate highways asks, “If you aren’t doing anything illegal why would you care if someone captures your license plate number?”
Another commentator Continue reading
If you still didn’t tried VLC Media Player , you need to worry a bit. HERE you can fix your error and download VLC for free.
In the next few rows we will try to meet you with few incredible tricks from VLC for which you normally is using a bunch of other software or add-ons. Save some headaches and Continue reading
In the wide world of dating, there are many options. Do you go for the flashy guy with the smooth smile, or the dude in the corner typing away on his laptop? The following are reasons why I think my fellow females should pay more attention to the quiet geeks and nerds, and less attention to the flashy boys.
1.) Sex. Yep. Sex. I’m not really familiar with this myself, Continue reading
Photograph: Monty Rakusen/Corbis
In the age of internet for many users, mobile devices provide the only way of going online. The devices serve as gateways to information, resources, and innovation, but they can also leak intimate details about the Continue reading
Find out how many hours of work it takes to buy…
Every job and career has its perks and range of disposable income. With Salaries in Real-Time, you can discover the purchasing power of popular occupations. Compare your salary to other occupations and Continue reading
There’s a saying that “a great programmer can be as 10 times as good as a mediocre one”. No one really wants to be labeled as a bad developer, but the sad reality is that a lot of developers aren’t even aware that they’re bad. So, the question is: Are you a bad developer? Take this quiz to find out here on www.codementor.io.
In two separate presentations at DEF CON in Las Vegas last weekend, security experts demonstrated vulnerabilities in two consumer drones from Parrot. The simplest Continue reading
Windows 10 has now officially been released to the public in most countries for free, but the devil is in the details. Microsoft’s new small print Continue reading
The brain behind Deep Dreamer was developed at Google as a tool to try and understand how neural networks work. Google open sourced the code, allowing anyone with the know-how to create these images. However, setting up the code on a server is not a trivial task. We’ve become fascinated with how deepdream processes our photos, and wanted to make it easy for anyone to explore.
Bulgarian government will pay EUR 30,000,000.00 $… Yes, 30 Millons of EURO to Microsoft for licensee fees for using Windows OS and Office packages for the Bulgarian administration in the next three years.
They pay this Continue reading
Why good hackers are going in prison and the bad ones are making business legally?
Unknown attackers are sabotaging popular TV and movie torrents by flooding swarms with IPv6 peers. This new method of peer flooding makes a lot of people think there are issues with torrents. From an anti-piracy point of view it is achieving Continue reading
Latest updates from Bitsquare website:
” There are many centralized bitcoin exchanges to choose from. All have different advantages and disadvantages so you can decide which one fits your needs best.
Why would we need another one? Continue reading
Voxel8 exists to disrupt the design and manufacture of electronic devices by providing new functional materials with a novel 3D printing platform. Desktop 3D printers today are constrained to printing thermoplastics or UV resins. Continue reading
The Intel® Compute Stick is a new generation compute-on-a-stick device that’s ready-to-go out-of-the-box and offers the performance, quality, and value you expect from Intel. Pre-installed with Windows 8.1* or Linux*, get a Continue reading
Send Later is another good Add-on for Thunderbird mail client. At Shanomag we already using it and we are happy to introduce it for you. Helping every time when you are not able to be physically on your working place or desk, and sending your mail in any scheduled by you time. Continue reading
“Push the boundaries of self-organising systems, robust reputation systems and craft collaborative systems with millions of active participants under continuous attack from spammers and other adversarial entities.” Continue reading
Our friends from Bitsquare just passed alpha testing and their Decentralized Bitcoin Exchange is near to the Grand Opening and ready to meet your trades requirements in one new form.
There have been many discussions in the forums about how to build a pure P2P based solution but there is still no real decentralized bitcoin exchange available yet. That’s where Bitsquare comes in. Continue reading
The Daily Mail has revealed that people could be being watched in their own homes or at work as hackers are targeting webcams and uploading the live footage to the internet. The warning comes from the Information Commissioner’s Office (ICO), which is urging people to upgrade their passwords from the default setting. Continue reading
If you miss Silk Road 2, don’t worry, Swift Road is coming in December. That’s right — that Swift, as in Taylor.
After the mega security fail of SpaceX engineer Blake Benthall and Silk Road 2 the dark side is ready to strike back. Let check what mistakes Blake made so FBI busted him :
For Download follow the link HERE.
In the latest TV appearance Edward Snowden advised web users to “get rid” of Dropbox and social networks such as Facebook and Google, too.
Such services only insist on encrypting user data during transfer and when being stored on the servers. Other services he recommends instead, such as SpiderOak(Please check our previous posts where we already posted an article for SpiderOak in Shanomag.com earlier this month), encrypt information while it’s on your computer as well.
When our personal data is compromised by government Intelligence agencies like NSA we need to react and just change the Service provider. One of the options we have is SpiderOak and their Zero-Knowledge’ Privacy Promise. SpiderOak creates an easy way to sync data between your phones, laptops, and tablets. You can drag and drop files/folders into your SpiderOak Hive folder, or – for greater control – select specific folders to sync across all your devices.
In technical terms, ‘Zero-Knowledge’ means that the server has ‘zero-knowledge’ of your data. In non-technical terms it means that your data is 100% private and only readable to you. No plain text data is stored on our servers, ensuring absolute confidentiality between you and your data.
It work on all systems – Windows, Linux and Mac OS. 2 GB free for life. Enjoy.