For everyone with nostalgia to TrueCrypt. Here is link to one of the last versions:
Linux HERE – truecrypt-7.1a-linux-x64.tar
Windows – TrueCrypt Setup Windows
Member from group of European security researchers twitted today that critical vulnerabilities in PGP/GPG and S/MIME email encryption was found. Full details will be published in a paper on Tuesday 15 May 2018 at 07:00 AM UTC.
EFF reported that they already establish connection with the research team running this investigation.
In December of 2016, Yahoo announced it had uncovered a massive data hack, compromising more than 1 billion user accounts. This was in addition to an earlier 2014 data breach, which had affected over 500 million users. While users may scream for blood when such a breach happens – usually blaming the owners of the affected websites – the real culprit can likely be found in their own bathroom mirrors.
You see, many data breaches are caused by one seemingly innocent common factor: computer and mobile device users reuse their passwords on multiple websites at an alarmingly high rate.
Many veteran journalists, but not only these, surely noticed that we are all of a sudden bombarded again from all-over with mentions of Watergate. Books like George Orwell’s 1984 are on display at bookstores and an air of danger to freedom of speech and freedom of the press is spreading slowly like a dark cloud over the Western Hemisphere, Continue reading
We will search the web and offer new and interesting files to print by using our test settings.
Like proud owners of cheap Prusa i3 ProB, we will try to provide photo and if possible video support for each model we presenting.
This month our model comes from Continue reading
It is time to get your data back? Instead of storing files in the public cloud, the Minebox acts as your personal cloud, which is dedicated for you, and you only. It is secured, safe and reliable. Promoted as the most powerful NAS ever. Pre-order for Minebox 8TB/16TB is open now.
Minebox NAS is smart data storage box that Continue reading
People with inkjet printers have all considered, if not tried, clone inks from third-party vendors. It’s way cheaper, often by as much as 90 percent. Printer companies do not like hearing this, but most of the printer users playing with various brands of clone inks for 20 years and they never experienced any of the problems that you commonly read about in forums, like clogged heads or ruined warranties. “Only use the brand name meant for the printer!”
Until recently, you could buy a new printer for the cost of replacement ink. It’s obvious that the printers were the loss Continue reading
When you visit a website, you are allowing that site to access a lot of information about your computer’s configuration. Combined, this information can create a kind of fingerprint — a signature that could be used to identify you and your computer. “Browser fingerprinting” is a method of tracking web browsers by the configuration and settings information they make visible to websites, rather than traditional tracking methods such as IP addresses and unique cookies. Some companies use this technology to try to identify individual computers. How secure is your browser from attack from Internet. Here are our favorite free online Continue reading
With the recent Bitfinex heist models for decentralized exchanges have received a bit more attention as usual.
This is a repeating pattern happening every few months after a major incident.
And it goes back to business as usual after people are entertained by the next soap opera.
So I do not expect that the majority of cryptoland citizens will radically change their behavior. And that has several understandable reasons.
But beside that, Continue reading