free and open-source disk encryption utility
POPULARITY
Cryptomator and VeraCrypt are both excellent encryption tools. We'll look at how to choose the right one for your situation.
Q&A209: What other private cell carriers exist aside from Mint Mobile? Should you use Bitlocker or Veracrypt on Windows? How can you shred old data effectively? Can you safely remove a car's modem? How was Henry's time in Vienna? Join our next Q&A on Patreon: https://www.patreon.com/collection/415684?view=expanded or XMR Chat: https://xmrchat.com/surveillancepodWelcome to the Surveillance Report Q&A - featuring Techlore & The New Oil answering your questions about privacy and security.❤️ Support us on Patreon: https://www.patreon.com/surveillancepod
* Addressed common technical issues in Mac OS and Windows.* Reviewed Kabar, a popular knife brand used by Marines.* Insights on Chevy Silverado EV's features - range potential, multi-flex mid-gate with pass-through.* Explored open-source project, Kiwix, enabling offline website access, illustrated with Wikipedia.* Examined data growth trends; revealed 50% increase of English Wikipedia content in three years.* Discussed VeraCrypt for encrypting personal images, with emphasis on plausible deniability.* Discussed multi-system booting on an Android device, highlighting encryption related privacy issues.* Shared thoughts on changing roles in engineering, highlighting the shift towards strategic management.* Discussed a leak from an AWS meeting regarding new developer prerequisites.* Shared practical experience on using the LLM model to handle complex SQL queries and validating AI outputs.* Introduced the concept of 'double APIs', illustrated with Gemini examples.* Explored the GPUD project - the pros of GPU-level monitoring.* Exchanged views on DNS service transition from Pie Hole to AdGuard Home.* Discussed benefits of AdGuard, notably DNS over TLS without taxing resources for improved privacy.* Shared issues experienced during Pie Hole to AdGuard transition on a Synology home server.* Introduced Uptime Kuma, a Docker-based service health monitoring system for small enterprises.
https://youtu.be/xILGdtI9NPohttps://odysee.com/@NaomiBrockwell:4/Veracrypt:9Our devices contain a treasure trove of private information. We have sensitive work documents, cherished family photos, archives of private communications. You can keep these digital files safe by using encrypted containers, which are secure digital vaults that will help keep your data private. In this video, we explain how use the free, open source encryption program VeraCrypt.00:00 Our Digital Files Are Precious03:29 VeraCrypt04:43 Mounting and Directories Explained06:11 Tutorial13:27 Benefits of VeraCryptOur personal data is the currency of the modern surveillance world. Locking away our personal files behind an encrypted barrier is not just a luxury - it's a necessity.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Reuben Yap, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the Show.
1: Get a credit freeze - go to the credit bureaus and do this right now 2: Use a password manager - I like bitwarden.com 3: Encrypt your data - Veracrypt is great for this 4: Change your router's password 5: Use 2FA but not by text - Authy is great --- Support this podcast: https://podcasters.spotify.com/pod/show/rosszeiger/support
Bill runs Arch, by the way. We discuss zutils, podcatcher software, hacker scam, trying distros, encrypted files and file formats. Episode Time Stamps 00:00 Going Linux #453 · Listener Feedback 00:57 Bill tries Arch Linux 02:35 Bill gets better Internet speeds 06:48 What happened to Nix OS? 07:54 Is Arch finally for new Linux users? 10:02 Update on Zorin give-away 11:28 David: The xzutils vulnerability 17:59 Stephen: Struggling to listen using Pocketcast 20:52 Anonymous listener can pay cash for urgent assistance with hacker software. Is this a scam? 24:05 Jesper: Please fix the audio volume 25:59 George: Toots vs. tweets 26:52 George: Feedback on Antennapod, Ventoy, Distrosea, Veracrypt, and the most compatible file format 36:59 Thank you, listeners, for all your engagement with our podcast 39:28 goinglinux.com, goinglinux@gmail.com, +1-904-468-7889, @goinglinux, feedback, listen, subscribe 40:36 End
Bill runs Arch, by the way. We discuss zutils, podcatcher software, hacker scam, trying distros, encrypted files and file formats. Episode Time Stamps 00:00 Going Linux #453 · Listener Feedback 00:57 Bill tries Arch Linux 02:35 Bill gets better Internet speeds 06:48 What happened to Nix OS? 07:54 Is Arch finally for new Linux users? 10:02 Update on Zorin give-away 11:28 David: The xzutils vulnerability 17:59 Stephen: Struggling to listen using Pocketcast 20:52 Anonymous listener can pay cash for urgent assistance with hacker software. Is this a scam? 24:05 Jesper: Please fix the audio volume 25:59 George: Toots vs. tweets 26:52 George: Feedback on Antennapod, Ventoy, Distrosea, Veracrypt, and the most compatible file format 36:59 Thank you, listeners, for all your engagement with our podcast 39:28 goinglinux.com, goinglinux@gmail.com, +1-904-468-7889, @goinglinux, feedback, listen, subscribe 40:36 End
We're building a completely hidden Linux OS inside an existing system—with no trace left behind.Sponsored By:Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices!Kolide: Kolide is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps.Support LINUX UnpluggedLinks:
When using VeraCrypt containers, the default setting may interfere with backing up your container. Here's how to fix that.
Adobe Flash Player Updater is (still) desperately trying to update Veracrypt password security Firefox moves to 120 with a bunch of very nice new features Do-Not-Track is back on track "ownCloud" -or- "PwnCloud" ? CrushFTP Critical Vulnerability Bypassing fingerprint authentication ApacheMQ TransUnion & Experian both hacked Show Notes - https://www.grc.com/sn/SN-950-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: paloaltonetworks.com/ot-security-tco Melissa.com/twit GO.ACILEARNING.COM/TWIT
Adobe Flash Player Updater is (still) desperately trying to update Veracrypt password security Firefox moves to 120 with a bunch of very nice new features Do-Not-Track is back on track "ownCloud" -or- "PwnCloud" ? CrushFTP Critical Vulnerability Bypassing fingerprint authentication ApacheMQ TransUnion & Experian both hacked Show Notes - https://www.grc.com/sn/SN-950-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: paloaltonetworks.com/ot-security-tco Melissa.com/twit GO.ACILEARNING.COM/TWIT
Adobe Flash Player Updater is (still) desperately trying to update Veracrypt password security Firefox moves to 120 with a bunch of very nice new features Do-Not-Track is back on track "ownCloud" -or- "PwnCloud" ? CrushFTP Critical Vulnerability Bypassing fingerprint authentication ApacheMQ TransUnion & Experian both hacked Show Notes - https://www.grc.com/sn/SN-950-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: paloaltonetworks.com/ot-security-tco Melissa.com/twit GO.ACILEARNING.COM/TWIT
Adobe Flash Player Updater is (still) desperately trying to update Veracrypt password security Firefox moves to 120 with a bunch of very nice new features Do-Not-Track is back on track "ownCloud" -or- "PwnCloud" ? CrushFTP Critical Vulnerability Bypassing fingerprint authentication ApacheMQ TransUnion & Experian both hacked Show Notes - https://www.grc.com/sn/SN-950-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: paloaltonetworks.com/ot-security-tco Melissa.com/twit GO.ACILEARNING.COM/TWIT
Adobe Flash Player Updater is (still) desperately trying to update Veracrypt password security Firefox moves to 120 with a bunch of very nice new features Do-Not-Track is back on track "ownCloud" -or- "PwnCloud" ? CrushFTP Critical Vulnerability Bypassing fingerprint authentication ApacheMQ TransUnion & Experian both hacked Show Notes - https://www.grc.com/sn/SN-950-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: paloaltonetworks.com/ot-security-tco Melissa.com/twit GO.ACILEARNING.COM/TWIT
Adobe Flash Player Updater is (still) desperately trying to update Veracrypt password security Firefox moves to 120 with a bunch of very nice new features Do-Not-Track is back on track "ownCloud" -or- "PwnCloud" ? CrushFTP Critical Vulnerability Bypassing fingerprint authentication ApacheMQ TransUnion & Experian both hacked Show Notes - https://www.grc.com/sn/SN-950-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: paloaltonetworks.com/ot-security-tco Melissa.com/twit GO.ACILEARNING.COM/TWIT
Adobe Flash Player Updater is (still) desperately trying to update Veracrypt password security Firefox moves to 120 with a bunch of very nice new features Do-Not-Track is back on track "ownCloud" -or- "PwnCloud" ? CrushFTP Critical Vulnerability Bypassing fingerprint authentication ApacheMQ TransUnion & Experian both hacked Show Notes - https://www.grc.com/sn/SN-950-Notes.pdf Hosts: Steve Gibson and Ant Pruitt Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: paloaltonetworks.com/ot-security-tco Melissa.com/twit GO.ACILEARNING.COM/TWIT
Adobe Flash Player Updater is (still) desperately trying to update Veracrypt password security Firefox moves to 120 with a bunch of very nice new features Do-Not-Track is back on track "ownCloud" -or- "PwnCloud" ? CrushFTP Critical Vulnerability Bypassing fingerprint authentication ApacheMQ TransUnion & Experian both hacked Show Notes - https://www.grc.com/sn/SN-950-Notes.pdf Hosts: Steve Gibson and Ant Pruitt Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: paloaltonetworks.com/ot-security-tco Melissa.com/twit GO.ACILEARNING.COM/TWIT
Adobe Flash Player Updater is (still) desperately trying to update Veracrypt password security Firefox moves to 120 with a bunch of very nice new features Do-Not-Track is back on track "ownCloud" -or- "PwnCloud" ? CrushFTP Critical Vulnerability Bypassing fingerprint authentication ApacheMQ TransUnion & Experian both hacked Show Notes - https://www.grc.com/sn/SN-950-Notes.pdf Hosts: Steve Gibson and Ant Pruitt Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: paloaltonetworks.com/ot-security-tco Melissa.com/twit GO.ACILEARNING.COM/TWIT
This week Noah and Steve talk about migrating subnets from a smaller one, to a larger one. What things should you think about, how should you approach the problem, and tools should you know about. -- During The Show -- 01:43 MARS/MS-DMT On Linux? - Klaus Never used MARS 02:57 Using Chrome Extension of IE requirements - Glenn ANS 361 ~25:14 Min (https://podcast.asknoahshow.com/361) IE Tab Extension (https://chrome.google.com/webstore/detail/ie-tab/hehijbfgiekmjfkfjpbkbammjbdenadd) Pull things to modern Frigate (https://frigate.video/) 06:18 Veracrypt, bash and ACLs? - ST Bash history program Add the following to your ~/.bashrc ``` Avoid duplicates HISTCONTROL=ignoredups:erasedups When the shell exits, append to the history file instead of overwriting it shopt -s histappend After each command, append to the history file and reread it PROMPTCOMMAND="${PROMPTCOMMAND:+$PROMPT_COMMAND$'n'}histor ``` Original Stack Exchange Post (https://unix.stackexchange.com/questions/1288/preserve-bash-history-in-multiple-terminal-windows) Works on all distros fallocate -l 16GB hidden.img add file system encrypt with LUKS KDE Vaults CryFS EncFS gocrypfs SELinux Ask AI hallucinates alot gets you a jumping off point Persons IT SELinux Link (https://www.pearsonitcertification.com/articles/article.aspx?p=2990397&seqNum=2) fapolicyd (https://github.com/linux-application-whitelisting/fapolicyd) Mandatory Access Control 20:50 News Wire Blender 4.0 - Blender (https://wiki.blender.org/wiki/Reference/Release_Notes/4.0) OBS 30.00 - Phoronix (https://www.phoronix.com/news/OBS-Studio-30-Released) Bazzite 2.0 - Gaming On Linux (https://www.gamingonlinux.com/2023/11/steamos-like-linux-package-bazzite-20-is-out-now-for-steam-deck-and-desktop/) Fedora 39 - Fedora (https://docs.fedoraproject.org/en-US/releases/f39/) Alma Linux 9.3 - 9 to 5 Linux (https://9to5linux.com/almalinux-os-9-3-is-here-as-a-free-red-hat-enterprise-linux-alternative) CBL Mariner Update - Phoronix (https://www.phoronix.com/news/CBL-Mariner-2.0-November-2023) CIQ & CentOS Migration - Inside HPC (https://insidehpc.com/2023/11/ciq-announces-rocky-linux-solutions-for-centos-migration-on-google-cloud/) Linux-Based Amazon OS - OMG Ubuntu (https://www.omgubuntu.co.uk/2023/11/amazon-vega-linux-based-os) ADA Joins JDF - Tech Crunch (https://techcrunch.com/2023/11/08/google-app-defense-alliance-linux-foundation-meta-microsoft/) New Attack Steals SSH Keys - ARS Technica (https://arstechnica.com/security/2023/11/hackers-can-steal-ssh-cryptographic-keys-in-new-cutting-edge-attack/) Malware in Trojanized Code Libraries - ARS Technica (https://arstechnica.com/security/2023/11/developers-targeted-with-malware-that-monitors-their-every-move/) BiBi Wiper - Bleeping Computer (https://www.bleepingcomputer.com/news/security/israel-warns-of-bibi-wiper-attacks-targeting-linux-and-windows/) Silo AI Unveils Poro - Venture Beat (https://venturebeat.com/ai/silo-ai-unveils-poro-a-new-open-source-language-model-for-europe/) 23:10 Unexpected Keyboard Git Hub (https://github.com/Julow/Unexpected-Keyboard) Fdroid (https://f-droid.org/packages/juloo.keyboard2/) Type characters and numbers by swiping to the corners Arrow Keys Originally developed for Termux No Ads, No Internet connection No voice or swipe input Hacker Keyboard (FDroid) (https://f-droid.org/en/packages/org.pocketworkstation.pckeyboard/) 29:47 Network Migration IOT is on it's own VLan Created network migration plan map out static IPs hidden gotchas (ie. static routes) hardware access/configuration/management set expectations set time window & stick to it roll back plan test cases, have multiple be prepared for after math over communication firewall rules Monitoring solutions? NAT reflection Problems PFSense stopped handling default routes software with hard coded IPs access control and security, static IPs set on device other devices, static IPs set on the router Prioritizing services -- The Extra Credit Section -- For links to the articles and material referenced in this week's episode check out this week's page from our podcast dashboard! This Episode's Podcast Dashboard (http://podcast.asknoahshow.com/363) Phone Systems for Ask Noah provided by Voxtelesys (http://www.voxtelesys.com/asknoah) Join us in our dedicated chatroom #GeekLab:linuxdelta.com on Matrix (https://element.linuxdelta.com/#/room/#geeklab:linuxdelta.com) -- Stay In Touch -- Find all the resources for this show on the Ask Noah Dashboard Ask Noah Dashboard (http://www.asknoahshow.com) Need more help than a radio show can offer? Altispeed provides commercial IT services and they're excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show! Altispeed Technologies (http://www.altispeed.com/) Contact Noah live [at] asknoahshow.com -- Twitter -- Noah - Kernellinux (https://twitter.com/kernellinux) Ask Noah Show (https://twitter.com/asknoahshow) Altispeed Technologies (https://twitter.com/altispeed)
ValiDrive release follow-up Passkeys exportability and phishing risk Passkeys for device verification like SSH keys Possibility of hobby browsers vs. production browsers Availability of SpinRite 6.1 pre-release Filling drives with crypto noise using VeraCrypt Steve and Leo's favorite OTP apps Google Docs link rewriting could be to prevent referrer leakage Abusing HTTP/2 Rapid Reset Show notes: https://www.grc.com/sn/SN-944-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: Melissa.com/twit cs.co/twit bitwarden.com/twit
ValiDrive release follow-up Passkeys exportability and phishing risk Passkeys for device verification like SSH keys Possibility of hobby browsers vs. production browsers Availability of SpinRite 6.1 pre-release Filling drives with crypto noise using VeraCrypt Steve and Leo's favorite OTP apps Google Docs link rewriting could be to prevent referrer leakage Abusing HTTP/2 Rapid Reset Show notes: https://www.grc.com/sn/SN-944-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: Melissa.com/twit cs.co/twit bitwarden.com/twit
ValiDrive release follow-up Passkeys exportability and phishing risk Passkeys for device verification like SSH keys Possibility of hobby browsers vs. production browsers Availability of SpinRite 6.1 pre-release Filling drives with crypto noise using VeraCrypt Steve and Leo's favorite OTP apps Google Docs link rewriting could be to prevent referrer leakage Abusing HTTP/2 Rapid Reset Show notes: https://www.grc.com/sn/SN-944-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: Melissa.com/twit cs.co/twit bitwarden.com/twit
ValiDrive release follow-up Passkeys exportability and phishing risk Passkeys for device verification like SSH keys Possibility of hobby browsers vs. production browsers Availability of SpinRite 6.1 pre-release Filling drives with crypto noise using VeraCrypt Steve and Leo's favorite OTP apps Google Docs link rewriting could be to prevent referrer leakage Abusing HTTP/2 Rapid Reset Show notes: https://www.grc.com/sn/SN-944-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: Melissa.com/twit cs.co/twit bitwarden.com/twit
ValiDrive release follow-up Passkeys exportability and phishing risk Passkeys for device verification like SSH keys Possibility of hobby browsers vs. production browsers Availability of SpinRite 6.1 pre-release Filling drives with crypto noise using VeraCrypt Steve and Leo's favorite OTP apps Google Docs link rewriting could be to prevent referrer leakage Abusing HTTP/2 Rapid Reset Show notes: https://www.grc.com/sn/SN-944-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: Melissa.com/twit cs.co/twit bitwarden.com/twit
ValiDrive release follow-up Passkeys exportability and phishing risk Passkeys for device verification like SSH keys Possibility of hobby browsers vs. production browsers Availability of SpinRite 6.1 pre-release Filling drives with crypto noise using VeraCrypt Steve and Leo's favorite OTP apps Google Docs link rewriting could be to prevent referrer leakage Abusing HTTP/2 Rapid Reset Show notes: https://www.grc.com/sn/SN-944-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: Melissa.com/twit cs.co/twit bitwarden.com/twit
ValiDrive release follow-up Passkeys exportability and phishing risk Passkeys for device verification like SSH keys Possibility of hobby browsers vs. production browsers Availability of SpinRite 6.1 pre-release Filling drives with crypto noise using VeraCrypt Steve and Leo's favorite OTP apps Google Docs link rewriting could be to prevent referrer leakage Abusing HTTP/2 Rapid Reset Show notes: https://www.grc.com/sn/SN-944-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: Melissa.com/twit cs.co/twit bitwarden.com/twit
Hoje é dia de Consultório Bitcoin, um espaço para responder suas perguntas sobre Bitcoin através do https://supersats.tv/bitcoinheiros Discord de suporte do SuperSATS https://discord.com/invite/qMMe2Jtysm Compra de BTC e SWAP Lightning https://www.bitcoinheiros.com/kyc/ Gravado AO VIVO no ciberespaço 00:00 Sala de espera 01:29 Vídeo BIT.RUTO ANIME OPENING/ PARÓDIA NARUTO SHIPPUDEN feat Núcleo Rothbard by Liberdade Cultural 05:28 Introdução - Bloco 808619 07:40 Spiderchains, Drivechains e outros projetos de sidechains para rodar em paralelo à rede Bitcoin utilizando o token BTC como base monetária sólida, sem shitcoins 16:57 Especulações em cima de projetos sem valor ou com valor distorcido no Bitcoin é ruim para a rede? 19:02 Quais são os objetivos das poupanças de satoshis feitas pelos Bitcoinheiros? 21:44 Tails com Electrum offline: Qual é a melhor forma de fazer backup? 25:26 A melhor dica para guardar satoshis com segurança de acordo com o valor 27:35 Hoje é mais difícil importar ColdCard? 31:25 Tails com Electrum: 34:04 Qual é a melhor forma de guardar satoshis para um iniciante? 36:40 É seguro e uma boa ideia guardar as seeds na nuvem criptografadas pela VeraCrypt? 39:28 Formas de gerar seeds: É melhor jogar 100 vezes um dado ao invés de usar a entropia da ColdCard? 43:30 Qual é o vídeo que aparece no final das lives dos Bitcoinheiros e quais documentários e séries sobre Bitcoin assistir? 48:40 Estados Unidos não aceitará deixar de ser a potência mundial e está incentivando a rede Bitcoin a migrar para o país e ter controle do BTC? 52:38 Iniciativa Crypto da PayPal e Paxos pagando taxa recorde de BTC para fazer transação 57:12 PayPal lança a sua stablecoin PYUSD e os usos práticos e úteis de stablecoins no dia a dia 59:52 Qual é o lastro da nova Stablecoin do PayPal e a liquidez de algumas stablecoins do mercado? 01:03:40 ETF aumentará 100 vezes o valor do BTC? - O que fazer para me proteger e aumentar minha segurança nesse caso? 01:05:11 Bitconheiros é o mesmo que Bitcoiners? 01:07:59 Por que o volume de taxas na Ethereum está superior ao do Bitcoin? 01:11:50 Os problemas das taxas altíssimas na rede Bitcoin em 2017 e as razões de ter se mantido por um longo período de tempo 01:16:20 O caso do bitcoin.org: Por que foi condenado a pagar meio milhão de libras e tirar o Whitepaper do site? 01:20:24 Um documentário brasileiro sensacional para bitcoinheiros 01:23:03 JADE é uma carteira confiável para Cold Storage? 01:28:48 Cadê o Ivan, ele parou de participar do canal Bitcoinheiros? 01:30:14 Super Trunfo dos Bitcoinheiros: A partir de que ano cada participante dos Bitcoinheiros se tornaram Bitcoinheiros? 01:32:43 Os Bitcoinheiros irão participar da Satsconf? ________________ APOIE O CANAL https://bitcoinheiros.com/apoie/ ⚡ln@pay.bitcoinheiros.com Loja dos Bitcoinheiros https://loja.bitcoinheiros.com/ Escute no Fountain Podcasts (https://fountain.fm/join-fountain) para receber e enviar satoshinhos no modelo Value4Value SIGA OS BITCOINHEIROS: Site: https://www.bitcoinheiros.com Youtube: https://www.youtube.com/bitcoinheiros Twitter: https://www.twitter.com/bitcoinheiros Allan - https://www.twitter.com/allanraicher Dov - https://twitter.com/bitdov Becas - https://twitter.com/bksbk6 Ivan - https://twitter.com/bitofsilence Instagram: https://www.instagram.com/bitcoinheiros Facebook: https://www.fb.com/bitcoinheiros Podcast: https://anchor.fm/bitcoinheiros COMO GUARDAR SEUS BITCOINS? Bitcoinheiros recomendam o uso de carteiras Multisig com Hardware Wallets de diferentes fabricantes ou próprias. Para ver as carteiras de hardware que recomendamos, acesse https://www.bitcoinheiros.com/carteiras Veja os descontos e clique nos links de afiliados para ajudar o canal Por exemplo, para a COLDCARD - https://store.coinkite.com/promo/bitcoinheiros Com o código "bitcoinheiros" você ganha 5% de desconto na ColdCard Playlist "Canivete Suíço Bitcoinheiro" https://www.youtube.com/playlist?list=PLgcVYwONyxmg-KH5bwzMU4sdyMbVMPqwb Playlist "Carteiras Multisig de Bitcoin" https://www.youtube.com/playlist?list=PLgcVYwONyxmi74PiIUSnGieNIPqmtmdjW ISENÇÃO DE RESPONSABILIDADE: Este conteúdo foi preparado para fins meramente informativos. NÃO é uma recomendação financeira nem de investimento. As opiniões apresentadas são apenas opiniões. Faça sua própria pesquisa. Não nos responsabilizamos por qualquer decisão de investimento que você tomar ou ação que você executar inspirada em nossos vídeos. --- Send in a voice message: https://podcasters.spotify.com/pod/show/bitcoinheiros/message
Seja membro deste canal e ganhe benefícios: https://www.youtube.com/channel/UCTEAZTTJ69yatuMd70k2Wow/join Adentre um universo de proteção digital sem limites com o SecurityCast! Em nosso último episódio, mergulhamos nas águas profundas da segurança em nuvem e containers, desvendando estratégias infalíveis para resguardar seus dados mais preciosos. Junte-se a nós nessa emocionante jornada tecnológica enquanto exploramos os segredos, desafios e soluções que moldam o cenário da cibersegurança moderna. Prepare-se para fortalecer suas defesas digitais e navegar com confiança na era da computação em nuvem e dos containers. Sintonize no SecurityCast e esteja um passo à frente das ameaças digitais. Sua segurança é nossa prioridade número um! Prepare-se para um debate acalorado, com especialistas de alto nível compartilhando suas perspectivas sobre a segurança em nuvem e seu impacto real na segurança cibernética. Participe conosco no próximo SecurityCast! #SecurityCast #InfoSec #segurancaemnuvem #SegurançaCibernética #ProteçãoReal #cloudsecurity #ViolacõesDeSegurança #Conformidade #DadosDigitais #Cibersegurança #DilemaÉtico #EficáciaEmInfoSec #Regulamentações #DebateAcalorado #SegurançaDigital #CyberSecurity #TechPodcast #SegurançaDeDados #InfoSecPodcast Nossos links - https://linktr.ee/seccast Site - http://securitycast.com.br/ Maior grupo de discussão sobre Segurança em língua portuguesa -https://t.me/SecCastOficial Fonte das matérias e notícias: - https://techcrunch.com/2023/08/25/moveit-mass-hack-by-the-numbers/ - https://www.cisoadvisor.com.br/hackers-invadem-app-espiao-brasileiro-e-fazem-76-mil-vitimas/ - https://www.darkreading.com/dr-tech/nist-publishes-first-draft-standards-for-post-quantum-cryptography - https://www.uol.com.br/tilt/noticias/redacao/2023/08/09/ia-consegue-decifrar-senhas-apenas-ouvindo-som-das-teclas-sendo-digitadas.htm Links adicionais: - EDITAL DE CONVOCAÇÃO - TESTE DA URNA 2023 - https://www.justicaeleitoral.jus.br/tps/#edicao-2023 - An Attacker Looks at Docker: Approaching Multi-Container Applications - https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Wesley%20McGrew/DEFCON-26-Wesley-McGrew-An-Attacker-Looks-at-Docker-WP.pdf - Slides da apresentação - https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Wesley%20McGrew/DEFCON-26-Wesley-McGrew-An-Attacker-Looks-at-Docker.pdf - Link para o programa da Cisco https://skillsforall.com/ - Link para o VeraCrypt - https://www.veracrypt.fr/code/VeraCrypt/
Der 28. Januar ist Europäischer Datenschutztag: Passend dazu geben wir in c't uplink Tipps zum Verschlüsseln von Daten auf PCs, Notebooks und externen Speichermedien. Die meisten Betriebssysteme können von Haus aus den kompletten Rechner verschlüsseln. In der aktuellen Folge von c't uplink erklären wir, wie das genau funktioniert und wie man sein System dafür konfiguriert. Windows bringt von Haus aus die SSD- und Festplattenverschlüsselung BitLocker mit - auch in der Home-Variante in abgespeckter Form als "Geräteverschlüsselung". Als Alternative bietet sich das Open-Source-Tool VeraCrypt an, dass man auf Linux, macOS und Windows nutzen kann. Sowohl BitLocker als auch Veracrypt haben so ihre Tücken, weshalb c't-Windows-Experte Jan Schüßler dazu häufig Leserfragen bekommt. Christof Windeck aus dem Hardware-Ressort erklärt, wie Sicherheitschips auf dem PC mit Verschlüsselungssoftware zusammenspielen und warum das alles ziemlich sicher ist, obwohl man zum Entsperren eines verschlüsselten Windows-Notebooks kein kompliziertes Passwort eingeben muss. Deshalb muss man auch höllisch aufpassen: Wenn bei einem Update etwas schief geht und der Bitlocker-Wiederherstellungsschlüssel verlangt wird, sollte man ihn unbedingt parat haben. Am besten, man druckt ihn aus und heftet ihn für alle Fälle ab. In c't hat Lutz Labs außerdem spezielle USB-Sticks, Festplatten und SSDs mit integrierter Verschlüsselung getestet. Um die zu entsperren, muss man eine PIN auf einem eingebauten Tastenfeld eintippen oder sich per Fingerabdruck identifizieren. Für den Test hat Lutz die Hardware auch an einen Sicherheitsexperten geschickt, der die Dinger aufgebohrt und zu hacken versucht hat. Mit dabei: Achim Barczok, Lutz Labs, Jan Schüßler, Christof Windeck
Der 28. Januar ist Europäischer Datenschutztag: Passend dazu geben wir in c't uplink Tipps zum Verschlüsseln von Daten auf PCs, Notebooks und externen Speichermedien. Die meisten Betriebssysteme können von Haus aus den kompletten Rechner verschlüsseln. In der aktuellen Folge von c't uplink erklären wir, wie das genau funktioniert und wie man sein System dafür konfiguriert. Windows bringt von Haus aus die SSD- und Festplattenverschlüsselung BitLocker mit - auch in der Home-Variante in abgespeckter Form als "Geräteverschlüsselung". Als Alternative bietet sich das Open-Source-Tool VeraCrypt an, dass man auf Linux, macOS und Windows nutzen kann. Sowohl BitLocker als auch Veracrypt haben so ihre Tücken, weshalb c't-Windows-Experte Jan Schüßler dazu häufig Leserfragen bekommt. Christof Windeck aus dem Hardware-Ressort erklärt, wie Sicherheitschips auf dem PC mit Verschlüsselungssoftware zusammenspielen und warum das alles ziemlich sicher ist, obwohl man zum Entsperren eines verschlüsselten Windows-Notebooks kein kompliziertes Passwort eingeben muss. Deshalb muss man auch höllisch aufpassen: Wenn bei einem Update etwas schief geht und der Bitlocker-Wiederherstellungsschlüssel verlangt wird, sollte man ihn unbedingt parat haben. Am besten, man druckt ihn aus und heftet ihn für alle Fälle ab. In c't hat Lutz Labs außerdem spezielle USB-Sticks, Festplatten und SSDs mit integrierter Verschlüsselung getestet. Um die zu entsperren, muss man eine PIN auf einem eingebauten Tastenfeld eintippen oder sich per Fingerabdruck identifizieren. Für den Test hat Lutz die Hardware auch an einen Sicherheitsexperten geschickt, der die Dinger aufgebohrt und zu hacken versucht hat.
Der 28. Januar ist Europäischer Datenschutztag: Passend dazu geben wir in c't uplink Tipps zum Verschlüsseln von Daten auf PCs, Notebooks und externen Speichermedien. Die meisten Betriebssysteme können von Haus aus den kompletten Rechner verschlüsseln. In der aktuellen Folge von c't uplink erklären wir, wie das genau funktioniert und wie man sein System dafür konfiguriert. Windows bringt von Haus aus die SSD- und Festplattenverschlüsselung BitLocker mit - auch in der Home-Variante in abgespeckter Form als "Geräteverschlüsselung". Als Alternative bietet sich das Open-Source-Tool VeraCrypt an, dass man auf Linux, macOS und Windows nutzen kann. Sowohl BitLocker als auch Veracrypt haben so ihre Tücken, weshalb c't-Windows-Experte Jan Schüßler dazu häufig Leserfragen bekommt. Christof Windeck aus dem Hardware-Ressort erklärt, wie Sicherheitschips auf dem PC mit Verschlüsselungssoftware zusammenspielen und warum das alles ziemlich sicher ist, obwohl man zum Entsperren eines verschlüsselten Windows-Notebooks kein kompliziertes Passwort eingeben muss. Deshalb muss man auch höllisch aufpassen: Wenn bei einem Update etwas schief geht und der Bitlocker-Wiederherstellungsschlüssel verlangt wird, sollte man ihn unbedingt parat haben. Am besten, man druckt ihn aus und heftet ihn für alle Fälle ab. In c't hat Lutz Labs außerdem spezielle USB-Sticks, Festplatten und SSDs mit integrierter Verschlüsselung getestet. Um die zu entsperren, muss man eine PIN auf einem eingebauten Tastenfeld eintippen oder sich per Fingerabdruck identifizieren. Für den Test hat Lutz die Hardware auch an einen Sicherheitsexperten geschickt, der die Dinger aufgebohrt und zu hacken versucht hat. Mit dabei: Achim Barczok, Lutz Labs, Jan Schüßler, Christof Windeck
We dig into Shufflecake, a tool that lets Linux users hide data with plausible deniability, then let our live stream SSH into our server and see if they can discover our secret data. Plus, we follow up on Brent's never-ending desktop distro search and Chris' new Linux rig.
Apple wants to simplify Siri by taking "Hey" out of the trigger phrase, Elon Musk slashes Twitter staff, recovering an external hard drive with proprietary connections, stopping automatic Windows updates, spotting online scams, and more! Apple is reportedly working to simplify Siri's trigger phrase Twitter slashes its staff as Musk era takes hold on platform Can I open up a WD MyPassport external hard drive and still connect to Sata? Lucid UX 2.0 Lucid Air wheelbearings.media Airless Tires Why won't Congress make Daylight Saving Time permanent? Will TrueCrypt update automatically? VeraCrypt GRC InControl How to tell if a suspicous message is a scam Converting audio files Spotting Twitter scams Man busted in 2020 Twitter hack, bitcoin scam of Biden, Obama, Musk, Buffett accounts Astronomers have detected another 'planet killer' asteroid. Could we miss one coming our way? Space rock slams into Mars, forming a crater that revealed chunks of ice nytimes.com/wirecutter TP-Link AC1750 Dual Band Wireless Gigabit WiFi 5 Router- (Archer C7) UofSC discovery of widespread platinum may help solve Clovis people mystery Host: Leo Laporte Guests: Sam Abuelsamid, Chris Marquardt, and Rod Pyle Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/the-tech-guy/episodes/1942 Download or subscribe to this show at: https://twit.tv/shows/the-tech-guy Sponsors: addigy.com/twit Melissa.com/twit
Apple wants to simplify Siri by taking "Hey" out of the trigger phrase, Elon Musk slashes Twitter staff, recovering an external hard drive with proprietary connections, stopping automatic Windows updates, spotting online scams, and more! Apple is reportedly working to simplify Siri's trigger phrase Twitter slashes its staff as Musk era takes hold on platform Can I open up a WD MyPassport external hard drive and still connect to Sata? Lucid UX 2.0 Lucid Air wheelbearings.media Airless Tires Why won't Congress make Daylight Saving Time permanent? Will TrueCrypt update automatically? VeraCrypt GRC InControl How to tell if a suspicous message is a scam Converting audio files Spotting Twitter scams Man busted in 2020 Twitter hack, bitcoin scam of Biden, Obama, Musk, Buffett accounts Astronomers have detected another 'planet killer' asteroid. Could we miss one coming our way? Space rock slams into Mars, forming a crater that revealed chunks of ice nytimes.com/wirecutter TP-Link AC1750 Dual Band Wireless Gigabit WiFi 5 Router- (Archer C7) UofSC discovery of widespread platinum may help solve Clovis people mystery Host: Leo Laporte Guests: Sam Abuelsamid, Chris Marquardt, and Rod Pyle Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/the-tech-guy/episodes/1942 Download or subscribe to this show at: https://twit.tv/shows/all-twittv-shows Sponsors: addigy.com/twit Melissa.com/twit
Apple wants to simplify Siri by taking "Hey" out of the trigger phrase, Elon Musk slashes Twitter staff, recovering an external hard drive with proprietary connections, stopping automatic Windows updates, spotting online scams, and more! Apple is reportedly working to simplify Siri's trigger phrase Twitter slashes its staff as Musk era takes hold on platform Can I open up a WD MyPassport external hard drive and still connect to Sata? Lucid UX 2.0 Lucid Air wheelbearings.media Airless Tires Why won't Congress make Daylight Saving Time permanent? Will TrueCrypt update automatically? VeraCrypt GRC InControl How to tell if a suspicous message is a scam Converting audio files Spotting Twitter scams Man busted in 2020 Twitter hack, bitcoin scam of Biden, Obama, Musk, Buffett accounts Astronomers have detected another 'planet killer' asteroid. Could we miss one coming our way? Space rock slams into Mars, forming a crater that revealed chunks of ice nytimes.com/wirecutter TP-Link AC1750 Dual Band Wireless Gigabit WiFi 5 Router- (Archer C7) UofSC discovery of widespread platinum may help solve Clovis people mystery Host: Leo Laporte Guests: Sam Abuelsamid, Chris Marquardt, and Rod Pyle Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/the-tech-guy/episodes/1942 Download or subscribe to this show at: https://twit.tv/shows/total-leo Sponsors: addigy.com/twit Melissa.com/twit
Apple wants to simplify Siri by taking "Hey" out of the trigger phrase, Elon Musk slashes Twitter staff, recovering an external hard drive with proprietary connections, stopping automatic Windows updates, spotting online scams, and more! Apple is reportedly working to simplify Siri's trigger phrase Twitter slashes its staff as Musk era takes hold on platform Can I open up a WD MyPassport external hard drive and still connect to Sata? Lucid UX 2.0 Lucid Air wheelbearings.media Airless Tires Why won't Congress make Daylight Saving Time permanent? Will TrueCrypt update automatically? VeraCrypt GRC InControl How to tell if a suspicous message is a scam Converting audio files Spotting Twitter scams Man busted in 2020 Twitter hack, bitcoin scam of Biden, Obama, Musk, Buffett accounts Astronomers have detected another 'planet killer' asteroid. Could we miss one coming our way? Space rock slams into Mars, forming a crater that revealed chunks of ice nytimes.com/wirecutter TP-Link AC1750 Dual Band Wireless Gigabit WiFi 5 Router- (Archer C7) UofSC discovery of widespread platinum may help solve Clovis people mystery Host: Leo Laporte Guests: Sam Abuelsamid, Chris Marquardt, and Rod Pyle Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/the-tech-guy/episodes/1942 Download or subscribe to this show at: https://twit.tv/shows/the-tech-guy Sponsors: addigy.com/twit Melissa.com/twit
Apple wants to simplify Siri by taking "Hey" out of the trigger phrase, Elon Musk slashes Twitter staff, recovering an external hard drive with proprietary connections, stopping automatic Windows updates, spotting online scams, and more! Apple is reportedly working to simplify Siri's trigger phrase Twitter slashes its staff as Musk era takes hold on platform Can I open up a WD MyPassport external hard drive and still connect to Sata? Lucid UX 2.0 Lucid Air wheelbearings.media Airless Tires Why won't Congress make Daylight Saving Time permanent? Will TrueCrypt update automatically? VeraCrypt GRC InControl How to tell if a suspicous message is a scam Converting audio files Spotting Twitter scams Man busted in 2020 Twitter hack, bitcoin scam of Biden, Obama, Musk, Buffett accounts Astronomers have detected another 'planet killer' asteroid. Could we miss one coming our way? Space rock slams into Mars, forming a crater that revealed chunks of ice nytimes.com/wirecutter TP-Link AC1750 Dual Band Wireless Gigabit WiFi 5 Router- (Archer C7) UofSC discovery of widespread platinum may help solve Clovis people mystery Host: Leo Laporte Guests: Sam Abuelsamid, Chris Marquardt, and Rod Pyle Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/the-tech-guy/episodes/1942 Download or subscribe to this show at: https://twit.tv/shows/all-twittv-shows Sponsors: addigy.com/twit Melissa.com/twit
This week's tools, tips and tricks talk about VeraCrypt. This tools is a very powerful and useful tool for people to encrypt their drives and sensitive files. Source - https://www.veracrypt.fr/en/Home.html Be aware, be safe. Support the show and get access to behind the scenes content as a patron - https://www.patreon.com/SecurityInFive *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five Mighty Mackenzie - https://www.facebook.com/mightymackie Where you can find Security In Five - https://linktr.ee/binaryblogger Email - bblogger@protonmail.com
Fitbit announced their FDA approval to detect atrial fibrillation in their wearable. What privacy and security concerns does this pose and what can you do about it? We tackle your questions, plus the news! It's a packed week! -- During The Show -- 03:40 Response to weaponization of OSS - Jose Steve and Noah's response 14:20 Bhikhu feed back Open Snitch (https://github.com/evilsocket/opensnitch) 16:00 PFSense not getting DHCP - Jaren Untangle (https://www.untangle.com/shop/firewall/) Smooth Wall (https://smoothwall.org/) Shorewall (https://shorewall.org/) OpenWRT (https://openwrt.org/docs/guide-user/installation/openwrt_x86) VyOS (https://vyos.io/) 23:10 Transcribe Audio from Video? - HJ Simon (https://simon.kde.org/) 25:18 Backup drive question - Ishaan Luks ENCFS KDE Vaults LUX Makeuseof (https://www.makeuseof.com/tag/encrypt-files-folders-ubuntu/) VeraCrypt (https://www.veracrypt.fr/code/VeraCrypt/) Fedora Doc on encrypting drives (https://docs.fedoraproject.org/en-US/quick-docs/encrypting-drives-using-LUKS/) Zipped Folder encrypted with GPG Key Write back in, maybe we can help more! 31:30 Feedback on Noah's Charging Station - Dave GFCI style duplex outlets with Arc Fault Protection Smoke Detector to cut AC power (Kiddie sm120x module) GFCI USB C 45+ Watt PD Outlet? 36:30 Tiny Asked I loved the discussion about freeipa and sso for a homelab and I'm curious if either of you have had experience with setting up an oauth provider like keycloak or goauthentik.io setting up ldap with nextcloud and gitlab is easy enough but I would like to use some of the mfa options available with oauth and would like to know what your experience is Keycloak used frequently at Red Hat Authentication vs Authorization 38:55 Pick of the Week - Unlock Distro With Your Face Deepin 20.5 face unlock feature (https://news.itsfoss.com/deepin-os-20-5-release/) Howdy (https://itsfoss.com/face-unlock-ubuntu/) 40:33 Gadget of the Week Home Accent Lighting Extruded Aluminum Mount (https://www.aliexpress.com/item/4000011656157.html) Addressable LED Guide (https://www.thesmarthomehookup.com/the-complete-guide-to-selecting-individually-addressable-led-strips/) 42:25 NewsWire Chinese RISC-V Processor (https://technode.com/2022/04/11/china-opens-new-research-institute-to-develop-risc-v-processor-project/) OpenMower Hackaday (https://hackaday.com/2022/04/07/openmower-open-source-robotic-lawn-mower-with-rtk-gps/) Github (https://github.com/ClemensElflein/OpenMower) 5-20X Nebuly-AI Training Increase Hackernoon (https://hackernoon.com/this-open-source-library-accelerates-ai-inference-by-5-20x-in-a-few-lines-of-code) Github (https://github.com/nebuly-ai/nebullvm) EleutherAI GPT-NeoX-20B (https://www.infoq.com/news/2022/04/eleutherai-gpt-neox/) Grafana Labs Series D Funding CRN (https://www.crn.com/news/applications-os/open-source-software-developer-grafana-labs-scores-240-million-in-funding-round) Venture Beat (https://venturebeat.com/2022/04/06/grafana-labs-reaches-a-fork-in-the-open-source-road/) Cocos Technology Raised $50 Million (https://venturebeat.com/2022/04/11/cocos-raises-50m-to-fuel-open-source-game-engine-growth/) ASPIRE Open Robotics (https://www.wam.ae/en/details/1395303038413) Mayhem Heroes Program (https://technical.ly/software-development/forallsecure-open-source/) NVIDIA RTX 30 Code Drop and Firmware (https://www.phoronix.com/scan.php?page=news_item&px=NVIDIA-Ampere-Firmware-Blobs) Rocky Linux in Google's Cloud (https://www.zdnet.com/article/rocky-linux-arrives-on-google-cloud/) Alan Pope's Unsnap Tech Republic (https://www.techrepublic.com/article/how-to-convert-snap-packages-flatpak-ubuntu-unsnap/) Its Foss (https://news.itsfoss.com/unsnap-migrate-snap-to-flatpak/) GitHub (https://github.com/popey/unsnap) Gentoo Live Image Gentoo (https://www.gentoo.org/news/2022/04/03/livegui-artwork-contest.html) Make Use Of (https://www.makeuseof.com/gentoo-reintroduces-livegui-distro/) Endeavor OS Apollo Released (https://9to5linux.com/endeavouros-apollo-lands-with-worm-wm-improved-installation-experience-and-more) MX Linux 21.1 Released (https://betanews.com/2022/04/10/mx-linux-211-wildflower-debian/) Tails 5.0 Enters Beta (https://9to5linux.com/tails-5-0-enters-beta-testing-as-first-release-based-on-debian-gnu-linux-11-bullseye) OpenSSH 9.0 (https://www.openssh.com/txt/release-9.0) OpenWall 1.2.3 (https://www.openwall.com/lists/musl/2022/04/07/1) 45:39 Medical Tech & Privacy ArsTechnica Article (https://arstechnica.com/gadgets/2022/04/fitbit-gains-fda-approval-for-new-atrial-fibrillation-detection-feature/) Fitbit (Google) gets FDA approval for atrial fibrillation detection feature Regulation Outdated medical equipment -- The Extra Credit Section -- For links to the articles and material referenced in this week's episode check out this week's page from our podcast dashboard! This Episode's Podcast Dashboard (http://podcast.asknoahshow.com/281) Phone Systems for Ask Noah provided by Voxtelesys (http://www.voxtelesys.com/asknoah) Join us in our dedicated chatroom #GeekLab:linuxdelta.com on Matrix (https://element.linuxdelta.com/#/room/#geeklab:linuxdelta.com) -- Stay In Touch -- Find all the resources for this show on the Ask Noah Dashboard Ask Noah Dashboard (http://www.asknoahshow.com) Need more help than a radio show can offer? Altispeed provides commercial IT services and they're excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show! Altispeed Technologies (http://www.altispeed.com/) Contact Noah live [at] asknoahshow.com -- Twitter -- Noah - Kernellinux (https://twitter.com/kernellinux) Ask Noah Show (https://twitter.com/asknoahshow) Altispeed Technologies (https://twitter.com/altispeed) Special Guest: Steve Ovens.
Wondering why someone decides to do privacy education and research full-time? This episode, we're sitting down with Sun Knudsen to chat about his education and research on privacy, funding in the privacy and FOSS spaces, and a little bit of macOS vs Linux.More about Sun Knudsen:Sun Knudsen's guest profile -- https://www.optoutpod.com/guests/sun-knudsen/Sun Knudsen's recommended tools to Opt Out:Tails, a portable operating system that protects against surveillance and censorship -- https://tails.boum.org/Signal, an easy-to-use end-to-end encrypted messenger -- https://signal.org/Yubikey, a hardware approach to multi-factor auth and key management -- https://www.yubico.com/products/KeePassXC, a FOSS password manager -- https://keepassxc.org/Veracrypt, an open-source tool for creating and managing encrypted volumes -- https://www.veracrypt.fr/en/Home.htmlTrezor, an open-source hardware wallet for cryptocurrencies -- https://trezor.io/Cold Card, an extremely secure Bitcoin hardware wallet -- https://coldcard.com/This week's project to help you Opt Out - i2p:Website -- https://geti2p.net/en/Getting started with i2p -- https://geti2p.net/en/about/introOfficial i2p client downloads -- https://geti2p.net/en/about/introi2p-zero, a lightweight i2p client -- https://github.com/i2p-zero/i2p-zeroOpt Out's Sponsors:Cake Wallet, an easy to use Monero mobile wallet -- https://optoutpod.com/sponsors/#cake-walletLocalMonero, an excellent and privacy-preserving way to buy and sell Monero -- https://optoutpod.com/sponsors/#localmoneroIVPN, an ethical, no-nonsense, non-logging VPN provider -- https://optoutpod.com/sponsors/#ivpnSupporting Opt Out:Donations -- https://optoutpod.com/about/#donationsLeave a review on your favorite podcast platform, if possible!Share it with your friends, family, and other communities!
China is van het laatste Westerse sociale netwerk af (Linkedin), Facebook denkt een trucje te kennen om geen toestemming te moeten vragen en gezichtsherkenning normaliseert langzaam maar zeker. Verder kijken we nog naar schadevergoedingen voor privacyschendingen, het principe van “nanotargeting” en nog meer privacy nieuws! Tools van deze week: Filen.io en Veracrypt. Shownotes: https://tweakers.net/nieuws/188220/criminelen-gebruiken-ai-namaakstem-bij-bankroof-van-ruim-30-miljoen-euro.html https://www.forbes.com/sites/thomasbrewster/2021/10/14/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions/?sh=36f8feca7559… Continue reading 40 – China gonna China, Facebook kent een GDPR trucje, nog meer gezichtsherkenning
Uma das melhores maneiras de proteger a privacidade e os dados pessoais é através de encriptação. Neste episódio vou falar sobre algumas soluções. _________________ Patrocínios: Arxi _________________ Redes Sociais: Facebook Youtube Twitter Soundcloud RSS FEED Twitch Discord Itunes Telegram Mattermost ___________ Musicas tocadas durante o episódio: Nameless: The Hackers RPG Soundtrack by BoxCat Games (itunes.apple.com/us/developer/box…-llc/id519986951) is licensed under a Creative Commons Attribution License (creativecommons.org/licenses/by/3.0/) Mixkit ___________ Imagem de capa Joana Afonso (website) @JoanaAfonso ___________ Cryptomator Veracrypt Gocryptfs AES Crypt Luks
It's not just data that we need to back up. We also need to back up processes. I recently failed to do that and I share a story of woe from my phone breaking my two-factor authentication. TOPICS * story about 2FA backup methods * 3-2-1 * backup to external drives * consider encryption * how often? as often as your data changes.... * two local drives - continuous backup vs point in time HOMEWORK FOR NEXT TIME * Do you first (next?) backup. * Extra credit: Do a test restore! LINKS FROM THIS EPISODE * https://authy.com/ (Authy) - two-factor authentication (2FA) app * https://support.apple.com/en-us/HT201250 (Apple TimeMachine) (macOS and Mac OS X only) * https://www.microsoft.com/en-us/account/authenticator (Microsoft Authenticator) - two-factor authentication (2FA) app * https://amzn.to/2OCO4az (SanDisk 256GB USB Flash Drive) * https://amzn.to/2ZbX3S9 (Seagate Backup Plus Portable 5TB for Windows or Mac) * https://www.veracrypt.fr/en/Home.html (VeraCrypt) - encryption software for Windows Mac, and Linux (warning, not incredibly user friendly -- I'll cover this more humanely in the future) * https://support.microsoft.com/en-us/windows/back-up-and-restore-your-pc-ac359b36-7015-4694-de9a-c5eac1ce9d9c (Windows Backup) (Windows 8.1 only) PODCAST WEBSITE https://monozukuritech.com/podcast HUMANE TECH EMAIL NEWSLETTER Sign-up to receive a http://eepurl.com/he8SQ9 (weekly newsletter) that's to-the-point with helpful advice, links, and information on upcoming podcast episodes, and more! Your information will never be sold or shared. COMING SOON * file sharing services: Dropbox, OneDrive, Google Drive, iCloud Drive, etc * secure cloud storage If you're enjoying the podcast please leave a review and subscribe. If you have comments, questions, concerns, or suggestions please email us at humanetechpodcast@protonmail.com.
https://www.subscribestar.com/thatfakeguydan On today's episode we're talking about how weird things are getting and how to prepare, the crazy economy of crypto, online stupidity, interner ephemera, geopolitics and a little more. https://www.youtube.com/ThatFakeGuyDan https://www.patreon.com/ThatFakeGuyDan https://www.minds.com/ThatFakeGuyDan https://www.twitter.com/ThatFakeGuyDan https://www.parler.com/ThatFakeGuyDan https://www.instagram.com/ThatFakeGuyDan https://gab.com/ThatFakeGuyDan Showlinks: https://www.nytimes.com/2021/01/09/us/politics/state-dept-taiwan-united-states-china.html https://twitter.com/atrupar/status/1348298333056544770 https://phys.org/news/2021-01-rare-quadruple-helix-dna-human-cells.html https://startpage.com https://keybase.io https://docs.microsoft.com/en-us/windows/wsl/install-win10 https://www.veracrypt.fr/code/VeraCrypt/ https://gnupg.org --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app --- Send in a voice message: https://anchor.fm/thatfakeguydan/message Support this podcast: https://anchor.fm/thatfakeguydan/support
This is the final part of the series of articles comparing Elcomsoft Distributed Password Recovery with Hashcat. We’ve already compared the features, the price and performance of the two tools. In this study, we tried breaking passwords to several common formats, including Word document, an encrypted ZIP archive, and a VeraCrypt container. We summarized our […]
Today I will discuss: 1. What is the importance of Data Encryption? 2. How can you protect your valuable data through encryption? 3. Demonstration of the open-sourced Veracrypt encryption? Watch
Recorded 11th October 2020 This week Mark and Jim join me to talk about the possibilities of the upcoming event… and take a quick gander at the news of the week. GIVEAWAYS & OFFERS Glenn Fleishman's Working From Home book is completely FREE and can be downloaded here and now he has also released Take Control of Zoom Essentials free as well. Steve at Geeks Corner has restarted his podcast which is a 5-15 min show of his thoughts on tech. Also keep an eye on his site or follow him on Twitter @GeekCorner_uk to watch for regular giveaways. Why not come and join the Slack community? You can now just click on this Slackroom Link to sign up and join in the chatter! Slacker @MacJim has a family friendly Flickr group for listeners to share photos because the Darkroom channel in the Slack has become so popular - if you're interested head over to to the Essential Apple Flickr and request an invitation. On this week's show: JAMES ORMISTON MacJim in the Slack In charge of the Essential Apple Flickr Also on Flickr as thesrpspaintshop Has videos on Vimeo MARK CHAPPELL @oceanspeed, @essentialapple and @essentialmac on Twitter Puts Essential Apple related stuff on YouTube Co-host of the The Watching Men Podcast with Karl Madden APPLE Apple's next iPhone will be announced on October 13th – The Verge Apple's T2 Chip Has Unpatchable Security Flaw, Claims Researcher – Mac Rumors Apple's T2 security chip has an unfixable flaw – Ars Technica More Details on the Mac T2 Security Chip Jailbreak – The Mac Observer Comment from @Dougee: “My thoughts on this after reading the articles is that it's been blown out of all proportion and mostly click bait headlines as usual.If you are a high value target then you may have an issue. But as you have said you need physical access to the device with enough time to brute force the users password. The vulnerability is not persistent so for long term attack you would need multiple access to the device.A good strong login password would protect most users and if you have a high valuable data it would be best to use another encryption to protect the data, use file vault to do full disk encryption and then use something like Veracrypt to protect sensitive data.Where I think it will be used is in stolen devices as now there is a way to brute force the user login to wipe the device and then resell.When out and about always keep your device with you if you are a high value target.” Apple made ProtonMail add in-app purchases, even though it had been free for years – The Verge iOS 14 icon set nets designer six figures in six days – 9to5 Mac PSA: No, iOS 14 widgets can't secretly steal private info with your keyboard – 9to5 Mac Apple to extend Apple TV+ free year trials through February 2021 – 9to5 Mac Apple's Internal Networks Were Hacked for Three Months – The Mac Observer Judge denies preliminary injunction to Epic and Fortnite will remain banned from App Store – 9to5 Mac Apple using retail stores as distribution centers to speed up new product deliveries – 9to5 Mac TECHNOLOGY House Democrats push Congress to break up Big Tech monopolies – Engadget Needham: There's no real threat to Apple from regulators – CNBC Microsoft thumbs its nose at Apple with new “app fairness” policy – Ars Technica Microsoft digs at Apple with 10 principles for app store fairness, but they won't apply to Xbox – Geekwire My take is this is BS - The Mac is no less open than Windows and developers can be in the MAS or not. NOTE that Microsoft isn't including Xbox in this - that's a closed market just like iOS... There MS take 30% just like all the others... SECURITY & PRIVACY UK 'mass surveillance' regime is illegal, EU court declares – IT Pro Wi-Fi security risks during pandemic – FBI warning – 9to5 Mac WORTH A CHIRP / ESSENTIAL TIPS Sketchpad 5.1 - Draw, Create, Share! Sketchpad: Free online drawing application for all ages. Create digital artwork to share online and export to popular image formats JPEG, PNG, SVG, and PDF. Chairman of our MUG sent this to everyone as an interesting find maps.nls.uk/geo/explore/side-by-side Mostly covers the UK but there are a couple of world atlases… The side by side bit is what makes it special JUST A SNIPPET For things that are not worth more than a flypast @Dougee says of the Blacklight tool: “Blacklight is an awesome tool as you can check the website without actually visiting it. When you visit a site with an ad blocker you don't know beforehand if the blocker can fully protect your browser, you still leave a fingerprint or get tracked. Blacklight does all this for you.” NEMO'S HARDWARE STORE (1:23:16) SOS Hydration Electrolyte Drink Mix or UK Store $10 US / £8 UK SOS Hydration Waterbottle or UK Store $7 US / £6 UK IO Gear Charger – Amazon $35 US doesn't appear to be in the UK store. Essential Apple Recommended Services: Pixel Privacy – a fabulous resource full of excellent articles and advice on how to protect yourself online. Doug.ee Blog for Andy J's security tips. Ghostery – protect yourself from trackers, scripts and ads while browsing. Simple Login – Email anonymisation and disposable emails for login/registering with 33mail.com – Never give out your real email address online again. AnonAddy – Disposable email addresses Sudo – get up to 9 “avatars” with email addresses, phone numbers and more to mask your online identity. Free for the first year and priced from $0.99 US / £2.50 UK per month thereafter... You get to keep 2 free avatars though. ProtonMail – end to end encrypted, open source, based in Switzerland. Prices start from FREE... what more can you ask? ProtonVPN – a VPN to go with it perhaps? Prices also starting from nothing! Comparitech DNS Leak Test – simple to use and understand VPN leak test. Fake Name Generator – so much more than names! Create whole identities (for free) with all the information you could ever need. Wire – free for personal use, open source and end to end encryted messenger and VoIP. Pinecast – a fabulous podcast hosting service with costs that start from nothing. Essential Apple is not affiliated with or paid to promote any of these services... We recommend services that we use ourselves and feel are either unique or outstanding in their field, or in some cases are just the best value for money in our opinion. Social Media and Slack You can follow us on: Twitter / Slack / EssentialApple.com / Soundcloud / Facebook / Pinecast Also a big SHOUT OUT to the members of the Slack room without whom we wouldn't have half the stories we actually do – we thank you all for your contributions and engagement. You can always help us out with a few pennies by using our Amazon Affiliate Link so we get a tiny kickback on anything you buy after using it. If you really like the show that much and would like to make a regular donation then please consider joining our Patreon or using the Pinecast Tips Jar (which accepts one off or regular donations) And a HUGE thank you to the patrons who already do. Support The Essential Apple Podcast by contributing to their Tip Jar: https://tips.pinecast.com/jar/essential-apple-show This podcast is powered by Pinecast.
Breaking passwords becomes more difficult with every other update of popular software. Microsoft routinely bumps the number of hash iterations to make Office document protection coherent with current hardware. Apple uses excessive protection of iTunes backups since iOS 10.1, making brute force attacks a thing of the past. VeraCrypt and BitLocker were secure from the […]
Filevault is Apple's proprietary full-disk encryption technology. It uses XTS-AES encryption, the industry-standard used by Microsoft's BitLocker, and the open-source Veracrypt among many others. It's fast, secure, and thanks to hardware support built-into all Macs with the T2 chip, it protects you without impacting efficiency or performance. Filevault is so efficient that it's on by default on all Macs sold today.Why would you want to turn on Filevault on an older Mac? Suppose you lose your Mac. Anyone who has it could bypass your account login and access the disk directly. Which means anything your store on your hard drive would be vulnerable. Modern smartphones are encrypted, so should be the drive on your Mac.Macs shipped with OS X Lion and later offer Filevault 2 - and that's the version we're referring to here. The original version was fairly limited. Filevault 2 is a great choice for all Mac users.When FileVault is enabled the system invites the user to create a master password for the computer. If a user password is forgotten, the master password or recovery key may be used to decrypt the files instead.Launch **System Preferences**.Select **Security & Privacy**.Click the **Lock** icon to enable changes.Read the **WARNING**.Click **Turn On FileVault**.You must make a choice on whether you want to use your iCloud account as a key to unlock your encrypted disk or to create a recovery key. If you plan on having highly sensitive data that you want to ensure that no one but you can get access to, the select to create a recovery key. Otherwise choose to **Allow my iCloud Account to unlock my disk**.If you've chosen to create a recovery key you must **store it in a safe place** not on your hard drive where you'll be able to retrieve it for recovery purposes. Otherwise your data will be unrecoverable.Instead of using FileVault to encrypt a user's home directory, using Disk Utility a user can create an encrypted disk image themselves and store any subset of their home directory in there (for example, ~/Documents/private). This encrypted image behaves similar to a Filevault encrypted home directory but is under the user's maintenance.Users who use FileVault 2 in OS X 10.9 and above can validate their key correctly works after encryption by running sudo fdesetup validaterecovery in Terminal after encryption has finished. The key must be in form xxxx-xxxx-xxxx-xxxx-xxxx-xxxx and will return true if correct.Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit
Filevault is Apple's proprietary full-disk encryption technology. It uses XTS-AES encryption, the industry-standard used by Microsoft's BitLocker, and the open-source Veracrypt among many others. It's fast, secure, and thanks to hardware support built-into all Macs with the T2 chip, it protects you without impacting efficiency or performance. Filevault is so efficient that it's on by default on all Macs sold today.Why would you want to turn on Filevault on an older Mac? Suppose you lose your Mac. Anyone who has it could bypass your account login and access the disk directly. Which means anything your store on your hard drive would be vulnerable. Modern smartphones are encrypted, so should be the drive on your Mac.Macs shipped with OS X Lion and later offer Filevault 2 - and that's the version we're referring to here. The original version was fairly limited. Filevault 2 is a great choice for all Mac users.When FileVault is enabled the system invites the user to create a master password for the computer. If a user password is forgotten, the master password or recovery key may be used to decrypt the files instead.Launch **System Preferences**.Select **Security & Privacy**.Click the **Lock** icon to enable changes.Read the **WARNING**.Click **Turn On FileVault**.You must make a choice on whether you want to use your iCloud account as a key to unlock your encrypted disk or to create a recovery key. If you plan on having highly sensitive data that you want to ensure that no one but you can get access to, the select to create a recovery key. Otherwise choose to **Allow my iCloud Account to unlock my disk**.If you've chosen to create a recovery key you must **store it in a safe place** not on your hard drive where you'll be able to retrieve it for recovery purposes. Otherwise your data will be unrecoverable.Instead of using FileVault to encrypt a user's home directory, using Disk Utility a user can create an encrypted disk image themselves and store any subset of their home directory in there (for example, ~/Documents/private). This encrypted image behaves similar to a Filevault encrypted home directory but is under the user's maintenance.Users who use FileVault 2 in OS X 10.9 and above can validate their key correctly works after encryption by running sudo fdesetup validaterecovery in Terminal after encryption has finished. The key must be in form xxxx-xxxx-xxxx-xxxx-xxxx-xxxx and will return true if correct.Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit
Filevault is Apple's proprietary full-disk encryption technology. It uses XTS-AES encryption, the industry-standard used by Microsoft's BitLocker, and the open-source Veracrypt among many others. It's fast, secure, and thanks to hardware support built-into all Macs with the T2 chip, it protects you without impacting efficiency or performance. Filevault is so efficient that it's on by default on all Macs sold today.Why would you want to turn on Filevault on an older Mac? Suppose you lose your Mac. Anyone who has it could bypass your account login and access the disk directly. Which means anything your store on your hard drive would be vulnerable. Modern smartphones are encrypted, so should be the drive on your Mac.Macs shipped with OS X Lion and later offer Filevault 2 - and that's the version we're referring to here. The original version was fairly limited. Filevault 2 is a great choice for all Mac users.When FileVault is enabled the system invites the user to create a master password for the computer. If a user password is forgotten, the master password or recovery key may be used to decrypt the files instead.Launch **System Preferences**.Select **Security & Privacy**.Click the **Lock** icon to enable changes.Read the **WARNING**.Click **Turn On FileVault**.You must make a choice on whether you want to use your iCloud account as a key to unlock your encrypted disk or to create a recovery key. If you plan on having highly sensitive data that you want to ensure that no one but you can get access to, the select to create a recovery key. Otherwise choose to **Allow my iCloud Account to unlock my disk**.If you've chosen to create a recovery key you must **store it in a safe place** not on your hard drive where you'll be able to retrieve it for recovery purposes. Otherwise your data will be unrecoverable.Instead of using FileVault to encrypt a user's home directory, using Disk Utility a user can create an encrypted disk image themselves and store any subset of their home directory in there (for example, ~/Documents/private). This encrypted image behaves similar to a Filevault encrypted home directory but is under the user's maintenance.Users who use FileVault 2 in OS X 10.9 and above can validate their key correctly works after encryption by running sudo fdesetup validaterecovery in Terminal after encryption has finished. The key must be in form xxxx-xxxx-xxxx-xxxx-xxxx-xxxx and will return true if correct.Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit
Filevault is Apple's proprietary full-disk encryption technology. It uses XTS-AES encryption, the industry-standard used by Microsoft's BitLocker, and the open-source Veracrypt among many others. It's fast, secure, and thanks to hardware support built-into all Macs with the T2 chip, it protects you without impacting efficiency or performance. Filevault is so efficient that it's on by default on all Macs sold today.Why would you want to turn on Filevault on an older Mac? Suppose you lose your Mac. Anyone who has it could bypass your account login and access the disk directly. Which means anything your store on your hard drive would be vulnerable. Modern smartphones are encrypted, so should be the drive on your Mac.Macs shipped with OS X Lion and later offer Filevault 2 - and that's the version we're referring to here. The original version was fairly limited. Filevault 2 is a great choice for all Mac users.When FileVault is enabled the system invites the user to create a master password for the computer. If a user password is forgotten, the master password or recovery key may be used to decrypt the files instead.Launch **System Preferences**.Select **Security & Privacy**.Click the **Lock** icon to enable changes.Read the **WARNING**.Click **Turn On FileVault**.You must make a choice on whether you want to use your iCloud account as a key to unlock your encrypted disk or to create a recovery key. If you plan on having highly sensitive data that you want to ensure that no one but you can get access to, the select to create a recovery key. Otherwise choose to **Allow my iCloud Account to unlock my disk**.If you've chosen to create a recovery key you must **store it in a safe place** not on your hard drive where you'll be able to retrieve it for recovery purposes. Otherwise your data will be unrecoverable.Instead of using FileVault to encrypt a user's home directory, using Disk Utility a user can create an encrypted disk image themselves and store any subset of their home directory in there (for example, ~/Documents/private). This encrypted image behaves similar to a Filevault encrypted home directory but is under the user's maintenance.Users who use FileVault 2 in OS X 10.9 and above can validate their key correctly works after encryption by running sudo fdesetup validaterecovery in Terminal after encryption has finished. The key must be in form xxxx-xxxx-xxxx-xxxx-xxxx-xxxx and will return true if correct.Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit
Filevault is Apple's proprietary full-disk encryption technology. It uses XTS-AES encryption, the industry-standard used by Microsoft's BitLocker, and the open-source Veracrypt among many others. It's fast, secure, and thanks to hardware support built-into all Macs with the T2 chip, it protects you without impacting efficiency or performance. Filevault is so efficient that it's on by default on all Macs sold today.Why would you want to turn on Filevault on an older Mac? Suppose you lose your Mac. Anyone who has it could bypass your account login and access the disk directly. Which means anything your store on your hard drive would be vulnerable. Modern smartphones are encrypted, so should be the drive on your Mac.Macs shipped with OS X Lion and later offer Filevault 2 - and that's the version we're referring to here. The original version was fairly limited. Filevault 2 is a great choice for all Mac users.When FileVault is enabled the system invites the user to create a master password for the computer. If a user password is forgotten, the master password or recovery key may be used to decrypt the files instead.Launch **System Preferences**.Select **Security & Privacy**.Click the **Lock** icon to enable changes.Read the **WARNING**.Click **Turn On FileVault**.You must make a choice on whether you want to use your iCloud account as a key to unlock your encrypted disk or to create a recovery key. If you plan on having highly sensitive data that you want to ensure that no one but you can get access to, the select to create a recovery key. Otherwise choose to **Allow my iCloud Account to unlock my disk**.If you've chosen to create a recovery key you must **store it in a safe place** not on your hard drive where you'll be able to retrieve it for recovery purposes. Otherwise your data will be unrecoverable.Instead of using FileVault to encrypt a user's home directory, using Disk Utility a user can create an encrypted disk image themselves and store any subset of their home directory in there (for example, ~/Documents/private). This encrypted image behaves similar to a Filevault encrypted home directory but is under the user's maintenance.Users who use FileVault 2 in OS X 10.9 and above can validate their key correctly works after encryption by running sudo fdesetup validaterecovery in Terminal after encryption has finished. The key must be in form xxxx-xxxx-xxxx-xxxx-xxxx-xxxx and will return true if correct.Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit
Filevault is Apple's proprietary full-disk encryption technology. It uses XTS-AES encryption, the industry-standard used by Microsoft's BitLocker, and the open-source Veracrypt among many others. It's fast, secure, and thanks to hardware support built-into all Macs with the T2 chip, it protects you without impacting efficiency or performance. Filevault is so efficient that it's on by default on all Macs sold today.Why would you want to turn on Filevault on an older Mac? Suppose you lose your Mac. Anyone who has it could bypass your account login and access the disk directly. Which means anything your store on your hard drive would be vulnerable. Modern smartphones are encrypted, so should be the drive on your Mac.Macs shipped with OS X Lion and later offer Filevault 2 - and that's the version we're referring to here. The original version was fairly limited. Filevault 2 is a great choice for all Mac users.When FileVault is enabled the system invites the user to create a master password for the computer. If a user password is forgotten, the master password or recovery key may be used to decrypt the files instead.Launch **System Preferences**.Select **Security & Privacy**.Click the **Lock** icon to enable changes.Read the **WARNING**.Click **Turn On FileVault**.You must make a choice on whether you want to use your iCloud account as a key to unlock your encrypted disk or to create a recovery key. If you plan on having highly sensitive data that you want to ensure that no one but you can get access to, the select to create a recovery key. Otherwise choose to **Allow my iCloud Account to unlock my disk**.If you've chosen to create a recovery key you must **store it in a safe place** not on your hard drive where you'll be able to retrieve it for recovery purposes. Otherwise your data will be unrecoverable.Instead of using FileVault to encrypt a user's home directory, using Disk Utility a user can create an encrypted disk image themselves and store any subset of their home directory in there (for example, ~/Documents/private). This encrypted image behaves similar to a Filevault encrypted home directory but is under the user's maintenance.Users who use FileVault 2 in OS X 10.9 and above can validate their key correctly works after encryption by running sudo fdesetup validaterecovery in Terminal after encryption has finished. The key must be in form xxxx-xxxx-xxxx-xxxx-xxxx-xxxx and will return true if correct.Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit
Filevault is Apple's proprietary full-disk encryption technology. It uses XTS-AES encryption, the industry-standard used by Microsoft's BitLocker, and the open-source Veracrypt among many others. It's fast, secure, and thanks to hardware support built-into all Macs with the T2 chip, it protects you without impacting efficiency or performance. Filevault is so efficient that it's on by default on all Macs sold today.Why would you want to turn on Filevault on an older Mac? Suppose you lose your Mac. Anyone who has it could bypass your account login and access the disk directly. Which means anything your store on your hard drive would be vulnerable. Modern smartphones are encrypted, so should be the drive on your Mac.Macs shipped with OS X Lion and later offer Filevault 2 - and that's the version we're referring to here. The original version was fairly limited. Filevault 2 is a great choice for all Mac users.When FileVault is enabled the system invites the user to create a master password for the computer. If a user password is forgotten, the master password or recovery key may be used to decrypt the files instead.Launch **System Preferences**.Select **Security & Privacy**.Click the **Lock** icon to enable changes.Read the **WARNING**.Click **Turn On FileVault**.You must make a choice on whether you want to use your iCloud account as a key to unlock your encrypted disk or to create a recovery key. If you plan on having highly sensitive data that you want to ensure that no one but you can get access to, the select to create a recovery key. Otherwise choose to **Allow my iCloud Account to unlock my disk**.If you've chosen to create a recovery key you must **store it in a safe place** not on your hard drive where you'll be able to retrieve it for recovery purposes. Otherwise your data will be unrecoverable.Instead of using FileVault to encrypt a user's home directory, using Disk Utility a user can create an encrypted disk image themselves and store any subset of their home directory in there (for example, ~/Documents/private). This encrypted image behaves similar to a Filevault encrypted home directory but is under the user's maintenance.Users who use FileVault 2 in OS X 10.9 and above can validate their key correctly works after encryption by running sudo fdesetup validaterecovery in Terminal after encryption has finished. The key must be in form xxxx-xxxx-xxxx-xxxx-xxxx-xxxx and will return true if correct.Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit
As health services and society in general struggle to cope with the coronavirus pandemic, people are desperately seeking new and inventive ways to curb the spread of the disease. A tried and true tool of epidemiologists is contact tracing: interviewing infected subjects in order to create lists of people they've had contact with in recent days and weeks. But people's memories are notoriously sketchy and they may not even know all the names, let alone contact information. Google and Apple have united to propose a technical solution. Android phones and iPhones will silently record anonymous identifiers of every other device they come near, in hopes of eventually notifying those device owners if a person later tests positive for COVID-19. But doing this in a way that preserves privacy and resists mass surveillance is difficult. I'll walk through the technical and social implications of their proposal. In other news: Zoom is working hard to fix their privacy and security issues (and repair their reputation); bad guys are capitalizing on Zoom's popularity to trick users into installing malware along with the app; smart locks can actually be pretty stupid (and insecure); and now that we're all working from home, it's a good time to review standard security practices to keep your company's data and devices secure. (And by the way, this is good practice for your personal stuff, too.) Further Info: Remote working security checklist: https://doist.com/blog/security-checklist-remote-workers/ VeraCrypt hard drive encryption app: https://www.veracrypt.fr/
Information security is more important than ever these days, so it's time to talk best practices, from two-factor authentication to Yubi keys, password strength, drive encryption, financial security, and more. Don't miss out on free food like we did!
TechByter Worldwide (formerly Technology Corner) with Bill Blinn
Carrying important information around on an unencrypted phone, computer, or thumb drive is dangerous, but you might think that encrypting important files is difficult. It's not. In Short Circuits: The prices for solid state disk drives continue to drop and 2TB SSDs are now available for about $100. If you've ever had to deal with a stubborn Windows update that simply will not install, you might find the process I used this month to be helpful. Adobe is working on a new feature for Illustrator -- one that may seem more than a bit odd to you, but I think digital artists will like it. In Spare Parts (only on the website): The on-line reservation service OpenTable is promoting the use of "Dining Mode" for Mothers Day (and maybe other important and not-so-important occasions). It involves ignoring your phone. • A company has released a system that can generate up to 70 trillion passwords per second. Does that make you nervous?
Deine Daten sind kostbares Gut. Ob Emails, Firmen-Dokumente, Steuerdaten, persönliche Fotos u.s.w., all diese Daten sollten vor fremden Blicken und unbefugtem Zugang geschützt werden. Wie du Dateien und/oder Ordner mit VeraCrypt verschlüsselst wird in diesem Wissensbissen! gezeigt. VeryCrypt ist kostenlos erhältlich für Windows, Mac, etc. Viel Spaß
In diesem Podcast möchte ich dir ein paar echt coole Programme vorstellen. Und ich möchte die mit seinen proprietären Kollegen vergleichen und gegenüber stellen. Welche kostenlosen Programme oder Open Source Software kennst du, die du weiter empfehlen würdest? Mit welchen Programmen hast du schlechte Erfahrungen gemacht? Und was habe ich deiner Meinung nach hier vergessen? Wie denkst du: Lieber von einem Hersteller ein Programm kaufen, oder eine kostenlose Alternative benutzen? Wie denkst du im Allgemeinen über Open Source Software? Sinnvoll oder total daneben? Schreib mir deine Meinung bitte in die Kommentare. Ich freu mich darüber! Vielen Dank! Dein Christoph Hier die Links zu den Programmen: Firefox Browser: https://www.mozilla.org/de/firefox/new/ Thunderbird E-Mail Programm: https://www.thunderbird-mail.de/ Linux Mint (Tolle Alternative zu Windows): https://linuxmint.com/ Ubuntu: https://www.ubuntu.com/ LibreOffice (tolle Alternative zu Microsoft Office): https://de.libreoffice.org/ Sumatra PDF Reader (super Alternative zum Acrobat Reader): https://www.sumatrapdfreader.org/download-free-pdf-viewer.html Foxit Reader (super Alternative zum Acrobat Reader): https://www.foxitsoftware.com/de/pdf-reader/ PDF-Xchange Viewer (super Alternative zum Acrobat Reader): https://www.tracker-software.com/product/pdf-xchange-viewer Gimp (sehr mächtige Alternative zu Photoshop): https://www.gimp.org/ IrfanView (Bilder anzeigen und bearbeiten): https://www.irfanview.de/ Notepad++ (klasse Editor zum Programmieren und als Alternative zum Windows Editor): https://notepad-plus-plus.org/ CDBurnerXP (kostenloses Brennprogramm): https://cdburnerxp.se/de/home Shotcut (Videobearbeitung): https://shotcut.org/ VeraCrypt (verschlüsselte Festplatten und USB-Sticks): https://www.veracrypt.fr/en/Home.html VLC media player (der Klassiker und der beste Video Abspieler den es weltweit gibt!!): https://www.videolan.org/vlc/index.de.html #opensource #proprietär #windows #kostenlos #programmierer #microsoftedge #internetexplorer #firefox #outlook #thunderbird #linux #linuxmint #ubuntu #msoffice #libreoffice #keepass #acrobatreader #adobe #sumatra #foxitreader #pdfxchangeviewer #photoshop #gimp #irfanview #notepad++ #cdburnerxp #shotcut #veracrypt #keepass #vlc
Nel gruppo Telegram Stefano - @FStefanoF - ci parla di Truecrypt (da non usare piu'). Credevo di aver fatto piu' di una puntata ma era una vecchia.Quindi ho aggiornato il tema parlandone di nuovo e suggerendo un altro trucco per far passare inosservato un file.Ricordate pero': qualsiasi cosa si registra su un pc puo' essere sempre ritrovato. Sempre.ps: provate https://www.veracrypt.fr/en/Home.html
Show Notes A 11 EM adásban túléltük a karácsony és a szilveszter megpróbáltatásait. Beszélünk kicsit az nVidia GForece Now-ról, kitárgyaljuk a bankokkal szerzett rossz tapasztalatainkat. Megemlítjük a két új ígéretes szolgáltatást, a Revolutot és a Transferwise-t. Soma digitalizálta az összes fontos papírját, majd VeraCrypt-tel letitkosította ezeket egy meghajtóra. Beszélünk picit az Affinity termékeiről, és hogy hogyan tudta Soma két Adobe termékét is kiváltani egy Affinity Designer nevű csodával. Beszélünk picit az olvasási szokásainkról, és arról, hogy ki mit olvas majd idén. Máté beszél majd jó könyvekről és szóba kerül majd a Get things done is. (Amiből Lali ki van ábrándulva…) Csatlakozzatok Telegram közösségünkhöz! Lalit @diwiny_ néven, Somát @szs0ma és Mátét @m4ttty néven éritek el twitteren. Ha tetszik a podcast iratkozz fel és értékelj minket Spotify-on és iTunes-on. Music: Mountkid - Dino [NCS Release] Linkek AirPods-os paródia videó: (link) nVidia GForce Now: (link) TransferWise: (link) Revolut: (link) Bobby app: (link) Affinity Designer: (link) Affinity Publisher: (link) VeraCrypt: (link) Get Things Done: (link) Telegram közösség: (link) Music: (link)
Odbita do bita bo tudi v letu 2019 obsedena z varnostjo. Tokrat testira Signal, VeraCrypt in Jitsi, to so možnosti za varno komuniciranje zaupnih podatkov. Raziskovalna novinarka Anuška Delić pravi, da je uporaba orodij primerna za vse, še posebej za novinarje in javne uslužbence.
Salve, galera! No episódio de hoje, Marlon Sousa (Splyt) demonstra o uso do VeraCrypt, um programa poderoso, gratuito e acessível que te ajuda a manter dados e arquivos protegidos. Além disso, colocamos a correspondência em dia, falamos sobre alguns dos motivos que nos fizeram ficar este tempo todo sem episódios e contamos algumas novidades, tudo como de costume com excelente O post BlindTec 33 – Criptografias, Crizes e Correspondências apareceu primeiro em BlindTec.
This week's Tools, Tips and Tricks episode talks about VeraCrypt. If you care about protecting your very sensitive data, hard drives, USB drives then VeraCrypt is for you. The successor to the very popular and powerful TrueCrypt (now defunct), VeraCrypt offers the same powerful encryption capabilities for your use. This episode goes into the details on how it can be helpful for your personal IT security. Download: https://www.veracrypt.fr/en/Home.html Be aware, be safe. ------------------------------------ Website - https://www.binaryblogger.com Podcast Page - http://securityinfive.libsyn.com Podcast RSS - http://securityinfive.libsyn.com/rss Twitter @binaryblogger - https://www.twitter.com/binaryblogger iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2 YouTube - https://www.youtube.com/binaryblogger TuneIn Radio - Security In Five Channel Spotify - Security In Five Podcast Page Email - contactme@binaryblogger.com
Serge provides multiple suggestions for replacing Skype. Jim describes some mobile AntennaPod issues, Greg discusses powering off by force, Norm suggests Mail-In-A-Box, Emilio asks about a portable VeraCrypt for Linux, Simohamed offers a suggestion and Jack describes how he has Gone Linux. Episode 342 Time Stamps 00:00 Going Linux #342 · Listener Feedback 00:15 Introduction 00:59 Serge: Multiple suggestions for Skype replacement 02:31 Jim: AntennaPod issues on mobile 05:53 Greg: Power off - by force 08:33 Norm: Mail-In-A-Box 11:50 Simohamed: Episode suggestion 12:31 Emilio: Portable VeraCrypt for Linux? 14:58 Jack: Gone Linux 15:57 goinglinux.com, goinglinux@gmail.com, +1-904-468-7889, @goinglinux, feedback, listen, subscribe 18:57 End
Serge provides multiple suggestions for replacing Skype. Jim describes some mobile AntennaPod issues, Greg discusses powering off by force, Norm suggests Mail-In-A-Box, Emilio asks about a portable VeraCrypt for Linux, Simohamed offers a suggestion and Jack describes how he has Gone Linux. Episode 342 Time Stamps 00:00 Going Linux #342 · Listener Feedback 00:15 Introduction 00:59 Serge: Multiple suggestions for Skype replacement 02:31 Jim: AntennaPod issues on mobile 05:53 Greg: Power off - by force 08:33 Norm: Mail-In-A-Box 11:50 Simohamed: Episode suggestion 12:31 Emilio: Portable VeraCrypt for Linux? 14:58 Jack: Gone Linux 15:57 goinglinux.com, goinglinux@gmail.com, +1-904-468-7889, @goinglinux, feedback, listen, subscribe 18:57 End
5 juli-podden goes bokcirkel, typ, och först ut är Kevin Mitnicks bok The Art of Invisibility. Boken blir vår utgångspunkt för ett samtal om personlig it-säkerhet: Truecrypt och Veracrypt, evil maid- och cold boot-attacker, USB rubber ducky och inte minst de ack så viktiga USB-kondomerna. Är boken då läsvärd? Nej. Varför får du höra i avsnittet. Vi nämner även boken Dark Territory: The Secret History of Cyber War av Fred Kaplan. Githubprojektet vi nämner är sshluks - LUKS crypto containers over SSHFS on untrusted remote storage: https://github.com/fw42/sshluks Vi hälsar Karl Ståhl välkommen till 5 juli-podden, som leds av Karl Andersson som en del av 5 juli-stiftelsens arbete för ett fritt internet. Inspelat i Stockholm och Berlin fredagen den 16 februari 2018.
Auction professionals spend a lot of time working on their laptops and never know when disaster might strike. In this episode, host Aaron Traffas looks at preventative measures that can save both time and stress when, not if, a computer is broken or stolen. Subscribe on iTunes | Google Play | Stitcher Today’s SponsorsGlobal Auction Guide Episode Linkshttp://www.auctioneertech.com The Fast Talking Podcast is a small business building podcast as seen through the lens of auctioneers and auction professionals. Focusing on social media, marketing strategies, finance, operations, human resources, and time management, we provide focused discussions on important topics weekly. ----- Episode 190: Transcription Hello and welcome to the Fast Talking Podcast. My name is Aaron Traffas and I'm excited to once again be your guest host for today's episode. We auctioneers store large amounts of important and sensitive information on our laptops. What happens to our work if our computer is broken or, worse, stolen? We'll examine two crucial preventative measures that will save us both time and stress in just a moment after a word from our sponsor. [sponsor] I wrote the article that inspired this episode recently for the Colorado Auctioneers Association quarterly newsletter which, this quarter, is focused on technology. After making sure we're using strong passwords, which was the topic of my last appearance on the Fast Talking Podcast, I feel that backup and encryption are the two next steps auctioneers need to make as we strive to make sure our data is secure and our work is safe. It was 2007. NAA Conference and Show was in San Diego. My bags were packed in my truck. I swung by the office to grab my computer and other electronics that I'd need for the week in California. As I walked out the door for my two hour drive from Manhattan, Kansas, to the Kansas City airport, I realized I'd forgotten something. I sat my computer bag on the ground next to my pickup's passenger door and went back inside. When I returned, I got in my truck, cranked the wheel to the left and backed out, only to realize that my front tire just rolled over my laptop bag. My computer — and my mood — was crushed. I had unfinished work for upcoming auctions that I'd planned to do on the plane and I had no time before my flight to prep another computer. It made for an interesting and uncomfortable trip. Broken hardware is one thing, but what if I'd lost the computer? What if instead of picking up pieces off the ground, I was instead unsure of where it was? Had it fallen into malicious hands? Were all the accounts that I'd logged in to now at risk of being compromised? It's always better to know a computer is destroyed than to wonder if someone is combing through the data. The scenario is simple — at any time, you can suddenly lose your laptop. In order to make sure that the only cost to you is the value of the hardware, it's crucial that your computer is encrypted and backed up properly. Encryption Computer encryption can get very technical very quickly, but for our purposes it simply means a way of scrambling the data on the computer's hard drive so it can't be read by anyone who doesn't have the password. The password to login to Windows isn't enough, as it's fairly trivial to bypass. The correct solution is called full disk encryption, where everything on the computer is encrypted for everyone who doesn't have the password. For many years, the right answer for encryption was a product called TrueCrypt. It was free software and the encryption was bulletproof. A few years ago, the TrueCrypt project closed down. Luckily it's successor, called VeraCrypt, is also free and based on much of the same code base as TrueCrypt. Since it's open source, third parties have been able to audit the software to make sure there aren't backdoors or other ways for criminals or governments to bypass the encryption. Operating systems have their own versions of encryption. Windows has BitLocker and Apple has FileVault. While I'll always prefer a free and open source solution over one from an operating system provider, these solutions may be a good fit in some situations. Many modern laptops also provide built-in encryption options on the hardware level. Many of these might work as well as VeraCrypt, though there's no way to guarantee there isn't a backdoor. Sometimes, a laptop's password simply prevents the laptop from booting up and doesn't actually encrypt the data. This means someone could simply remove the hard drive and put it in another computer to access your files. Make sure if you're using a built-in password function on your laptop that it's actually encrypting the data. Only by using full disk encryption can you rest assured that if your computer falls into the wrong hands, all your data about your auctions, customers, clients and personal accounts won't be at risk. Entering a password every time you boot your computer is a small price to pay for that peace of mind. Backup Encryption prevents the bad guys from getting your data, but what about losing your work? If you drive over your laptop with the front wheel of a diesel pickup, how do you get your files off of a hard drive that's in pieces on the ground? In addition to the possibility of losing your computer, new viruses called ransomware actually encrypt your files and make you pay a ransom before giving you the key to decrypt them. A good backup solution can mitigate a ransomware infection by allowing you to restore the unencrypted versions of your files. There is a frequently recited rule of backup called 3-2-1. You need three copies of your data, on two different mediums and one needs to be offsite. Simply buying an external hard drive and copying your files there is better than nothing, but it's also grossly insufficient and inefficient. A good backup solution will run continually in the background, copying versions of your files offsite as you create them, so you don't notice it until you need it. In much the way that TrueCrypt was the best answer for encryption, there was also a best answer for backup called Crashplan. Crashplan allowed users to backup to friends for free. I wrote on my AuctioneerTech blog in 2012 how this was a perfect backup solution that didn't have a monthly fee like most of the backup services. Unfortunately, a few weeks ago, Crashplan announced that it's discontinuing its free version in October 2018. While I've been hunting for a replacement, it's unlikely that anything will be as simple as Crashplan to use without a monthly fee. There are still myriad subscription backup services. Some of the best known are Carbonite, Backblaze and Mozy, and each has a different pricing plan based on the amount of data to store and how many computers will be using the service. As you shop around for the best deal, pay attention to the cost to get your data back. In 2011, I lost 2 terabytes of data that was backed up with Mozy. Only then did I learn that they charged $.50 per gigabyte to restore the data, and I had to come up with the $1000 within 30 days before my files were deleted. In the auction business, like any business, time is money. Some backup solution is better than nothing. In my search for a Crashplan replacement, I've found a lot of negative comments about Carbonite and a lot of positive comments about Backblaze, so if I were looking for a simple turn-key subscription backup service, I'd probably start with Backblaze. Wrap-up In summary, disaster happens when we least expect it. We need to take steps now to ensure that when, not if, we lose a computer, it might cost us money to replace the device but it doesn't cost us time to recreate all our work or, worse, cost us sleep worrying about who might have our data and what he or she might be doing with it. And now, here's a word from our sponsor. [sponsor] I'd like to thank Andy for giving me the opportunity to guest host the Fast Talking Podcast this week. The show is built for you, the fast talking nation. We're always looking for suggestions and feedback, so if you have an idea for great topic or guest you think would be a good fit, leave a comment on fasttalkingpodcast.com or find us @auctionpodcast on Twitter or facebook.com/fasttalkingpodcast. My blog is auctioneertech.com and if you'd like to contact me personally, find me on Twitter @traffas or, better yet, email aaron.traffas@purplewave.com With that, we want to thank you for gifting us with your time. As always, be sure to like, favorite and share this podcast in whichever venue you choose to listen. We enjoy creating this podcast for you and strive to share this industry we love with more and more people each week. I'm Aaron Traffas. Thanks for listening. Now go sell something.
You want to take your paper and turn it into electronic documents. You also want to be able to find those electronic documents when you need them. And it would be nice if those electronic documents are backed up and secure. How do you do that? In this jam-packed episode, paperless expert Brooks Duncan shows us the three-part system needed to get your paperless system going. Brooks also shares the software and hardware you will need to find success with your paperless goals. In this episode we cover: Reasons why you may want to reduce the amount of paper in your life. How to choose a scanner that fits your needs. How to start going paperless. (hint: avoid scanning boxes of old paper first) Best way to organize your digital documents once they are scanned. Costs and benefits of batch scanning. Why you should name files and documents for 'future you.' What you need to do to protect your digital life. Quotables: When going paperless, my goal was to get rid of the paper I didn't need. Now my goal is to be able to access my information quickly.Click To Tweet Links and resources mention: Courtney Carver, minimalist at bemorewithless.com It's All Too Much by Peter Walsh Collect Organizing Solutions for People with ADHD by Susan Pinsky Smart Phone App Scanners: Scannable (iPhone only) Scanbot (iPhone and Android) Portable Two Sided Scanners: Fujitsu ScanSnap S1300i - A personal scanner that works on both Mac and Windows. It scans 12 pages per minute and can hold 10 sheets of paper at once. Doxie Go Home Office Scanner: Fujitsu xi500 - A desktop scanner that works on both Mac and Windows and has wireless scanning capabilities. It scans 25 pages per minute and can hold 50 sheets of paper at once. Organize Software: Hazel File Juggler DropIt TextExpander $10 Going Paperless With Hazel Webinar Brett Kelly, name for future self. Zachary's Google Drive File Structure Protect Off site Backup: CrashPlan Backblaze External HardDrive: Time Machine (Built-in Mac software) File History (Built-in Windows software) Seagate (Brook's recommended external HardDrive) Cloud Backup: Dropbox Google Drive Box Evernote OneNote Encrypt Your Computer's HardDrive: FileVault 2 (Mac) Bitlocker (Windows native app) Veracrypt (Windows open source) Veracrypt vs Bitlocker Connect with Brooks: Facebook: https://www.facebook.com/documentsnap/ Twitter: https://twitter.com/brooksduncan Website: http://www.documentsnap.com/ Free going paperless cheat sheet over at DocumentSnap.com. Subscribe to the podcast on iTunes, Stitcher, Overcast, PocketCast or your favorite podcast player. It’s easy, you’ll get new episodes automatically, and it also helps the show gain exposure. The shownotes can be found at zacharysexton.com/13
We've been overdue for for a rapprochement with one of our favorite past topics: Privacy and Security in Swinging & Polyamory.The team of Mister Pent and Dylan Thomas put together information about securing yourself on the internet that a panel also including Dr. Liz Powell, Mike Joseph, and Cooper S. Beckett could discuss, digest, and put into action. In the age of our ability to connect anywhere and anytime, share information easily, and be as open as we want to be, it's important we arm ourselves with the knowledge necessary to make good decisions about what we put online and the information required to raise our level of computer and internet security. As you listen, don’t forget to tweet at #sspodcast and feel free to ask questions of @MisterPent and @DylanTheThomas! We’re sponsored by Castle Megastore, a one stop shop with everything you could want, from wand vibrators, to harnesses, to lube and condoms, to a complete suite of BDSM equipment including sex furniture. If you use the promo code SWINGSET at check out you can save 20% on your order. While we are definitely going to put together ebook / guide on cybersecurity for perverts, we wanted to list some of the resources we discussed during the podcast here: On Two-Factor Authentication When enabled, two-factor authentication (or 2FA) can surface as a "we don't recognize this device" message sent to an email address or a mobile phone number, or it can refer to an installed mobile app or a physical security token. You can find a list of websites that support 2FA here: https://twofactorauth.org/ In the meantime if you have a Google account, or have logins on sites like Dropbox, Lastpass, or Microsoft, go grab the Google Authenticator app. If you're a steam gamer, grab the Steam app and enable Steam Guard. On Passwords Securityinabox.org has a lot of great contnet with tools and tactics for digital security, they have a particularly good guide on creating, maintaining, remembering, and recording secure passwords, including with a password manager. XKCD's comic on Password Security that we love: On Password Managers and Sharing Passwords: Mister Pent, Cooper S. Beckett, and Dylan Thomas use Lastpass. Lastpass allows you to have a single set of passwords securely accessible over multiple devices and over the web, while setting up two factor authentication to limit access. It includes web browser extensions to automatically log you into sites and an Android app that does the same, depending on desired level of ease of use. It also allows you to share sets of passwords secureiy and simply with other people. Dylan Thomas also uses mSecure synchronized to a Dropbox account. mSecure has mobile and computer apps. It's not as nice or feature filled as Lastpass, but it's a little extra hassle for a lot of extra security for the most sensitive of passwords. If you need to share a temporary password with someone you can use OneTimeSecret. You create an a self-destructing link that disappears once it's accessed or once a certain amount of time passes. On using VPNs: You can't always trust the access to the internet you have, whether it's because you're in an airport on free airport wireless or a coffee shop or because you're travelling. Sometimes you may just want to tune into BBC Radio 5 using their iPlayer and you happen to not live in the Commonwealth. VPNs can keep your traffic secure when you can't trust your connection, with the added benefit of giving you choice on what country your traffic exits so you can use region specific resources. Dylan Thomas uses BlackVPN. Mister Pent and Cooper S. Beckett use Private Internet Access. Both can support simultaneous connections to cover multiple devices at once, and both allow multiple country exit points It has guides for usage on Windows, OS X, Linux, Android and iOS. On Encrypting your Devices using Passwords or Biometric Authentication: If you don't use a password, pin code, or thumbprint on your mobile devices, set one up! Modern Android and iOS based phones will automatically encrypt your device or give you the option to once you've set a password. While a six digit pin code or better is best, anything is better than nothing. Just Do It. On Encrypting your Computer with Full Disk Encryption! If you have a maching running a Pro version of Windows, use Bitlocker. Windows 7 ||| Windows 10 If you are running any other version of Windows, use Veracrypt. Securityinabox.org has a great guide on using Veracrypt to encrypt an external drive or your entire computer. If you're running MacOS, Backblaze (the Cloud Storage company) has a comprehensive FileVault usage guide, though Apple's isn't so bad. If you're running Linux you probably don't need our assistance. *grin* On Backing up your data & Encryption in the Cloud: One of the biggest risks to your data is physical failure or destruction of your devices. While services like Google Drive, iCloud, Dropbox and Box give us places to put our files in a pretty secure way, information stored on those services can be accessed and recovered by the services themselves in case of an investigation or subpoena. We recommend Backblaze as they encrypt data at rest and support two factor authentication. On Communicating Securely: We recommend using Signal Private Messenger, which includes iOS and Android apps and a Chrome extension and supports private messaging and calling. Whatsapp supports end-to-end encryption. With Facebook Messenger you can enable secret conversations. We suggest never sending sensitive information over email. On Social Media: Check out SecurityInABox.org's guide to security and privacy on social networking sites. On Browsing Secureiy: Drive-by malware downloads and poisoned ad networks, or shady looking porn sites, can mean you may pick something up while browsing the internet, often through no fault of your own. Most of us use both Google Chrome and Mozilla Firefox to browse the web, each for different sets of accounts (Multiple Google Accounts!) and with different sets of extensions installed to help protect ourselves. Mister Pent prefers Ghostery. Dylan Thomas uses Adblock Plus with Google Chrome, and NoScript on Mozilla Firefox. For ultimate browsing privacy, the Tor Browser is a good option. Leave us a review and a five star rating on iTunes! Leave us a review and a five star rating on Stitcher! Subscribe to us on Youtube! Android Users: Download and review our Android App! Leave us a comment on this post or at contact@lifeontheswingset.com or leave us a voicemail at 573-55-SWING (573-557-9464). Find Cooper on Twitter @CooperSBeckett, Dylan on Twitter @DylanTheThomas, and Ginger on twitter @GingerNTheProf. You can Cooper’s novel about swinging, A Life Less Monogamous, at alifelessmonogamous.com or his memoir My Life on the Swingset: Adventures in Swinging & Polyamory at mylifeontheswingset.com as an ebook, paperback, or audiobook and if you buy them from his sites, use promo code SWINGSET to save 10%! Our 2017 LOTS THEME comes courtesy of Vlad Lucan and his track: Reverse! Intro Music: Pegboard Nerds - Talk About It f/ Desirée Dawson, off the new Nerds By Nature EP Outtakes Music: Tokyo Machine - PIXEL Outro Music: nanobii - Chipland Cooper S Beckett Dylan Thomas Dr. Liz Powell Mike Joseph Chris Pent
Our old friend Christopher joins Andrew and Steve to talk about some games, IoT, VeraCrypt, voting software, voting hardware, growing hardware, the LHC, doomed projects, CSP, and a few other tidbits.
Canonical is not first to the live patching game, but they could have the best take on it. VeraCrypt, the successor to TrueCrypt, audit results are out & KDE shares their long term plans for the Plasma Desktop. Then we bust some brewing Linux FUD and misconceptions & ponder the role of Free Software in a world that doesn't care.
Episode 2 of The Complete Privacy & Security Podcast. We continue our updates from the book and discuss the differences in TrueCrypt vs. VeraCrypt.
In today's podcast we learn about claims made by hackers calling themselves "the Shadow Brokers." They say they've pwned the Equation Group, and obtained NSA attack code which they're now selling for one million Bitcoin. Guccifer 2.0 gets a lot more polished and even leakier. A bogus QuadRooter patch is serving malware in Google's Play Store. Fidelis tells us about Vawtrak's evolution. Someone's watching the Veracrypt audit. Iran looks into possible cyber causes of oil-and-gas facility fires. Fake Pokémon installers have trainers choosing ransomware. No more Pokéstops allowed in Germany's Flughafen. Vikram Sharma from Quintessence Labs outlines the challenges and opportunities of combining cutting edge science with market realities. Hardik Modi from Fidelis Cybersecurity expains changes they're tracking in the Vawtrak banking trojan. And British lawyers get a license to hunt hackers.
I revisit Mr. Robot and The Expanse. I also talk about Childhood's End, Stranger Things, VeraCrypt, and that BBC iPlayer WiFi TV licence snooping thingy.
I revisit Mr. Robot and The Expanse. I also talk about Childhood's End, Stranger Things, VeraCrypt and that BBC iPlayer WiFi TV licence snooping thingy.
I revisit Mr. Robot and The Expanse. I also talk about Childhood's End, Stranger Things, VeraCrypt and that BBC iPlayer WiFi TV licence snooping thingy.
This is episode 4 of our 4 part series on everyday encryption in your business. Today we tackle why, and how, you would encrypt your USB thumb drive with VeraCrypt. Download Download episode transcript (PDF) Links eSecurity tutorial using VeraCrypt to encrypt a thumb drive. DISCLAIMER: We have no connection to this site or its ...read more The post 27: Lock Up Your Thumb Drive appeared first on Shoestring Networks.
Episode consacré à VeraCrypt avec Mounir Idrassi The post VeraCrypt appeared first on NoLimitSecu.
Hannes Czerulla und Jan-Keno Janssen hatten vor kurzem die Microsoft HoloLens in den c't-Laboren. In der aktuellen Folge unseres uplink diskutieren wir darüber, wie gut die Entwickler-Version der Mixed-Reality-Brille jetzt schon ist, und ob sie wohl in naher Zukunft auf den Markt kommen wird. Damit es für die HoloLens und andere Virtual-Reality-Brillen demnächst auch ordentlich viele Inhalte gibt, geben wir außerdem Tipps, wie man mit Unity und Sketchup selbst in wenigen Schritten erste 3D-Modelle baut und auf seine Oculus lädt. Dennis Schirrmacher aus dem Security-Ressort hat sich für c't mit dem VeraCrypt-Macher Mounir Idrassi über das Verschlüsselungs-Tool unterhalten. Wir sprechen darüber, ob man VeraCrypt vertrauen kann und wie man seine alten TrueCrypt-Container für VeraCrypt konvertiert. Mit dabei: Hannes Czerulla, Jan-Keno Janssen , Achim Barczok und Dennis Schirrmacher Die c't 14/16 gibts am Kiosk, im heise Shop und digital in der c't-App für iOS und Android. Alle früheren Episoden unseres Podcasts gibt es unter www.ct.de/uplink
Hannes Czerulla und Jan-Keno Janssen hatten vor kurzem die Microsoft HoloLens in den c't-Laboren. In der aktuellen Folge unseres uplink diskutieren wir darüber, wie gut die Entwickler-Version der Mixed-Reality-Brille jetzt schon ist, und ob sie wohl in naher Zukunft auf den Markt kommen wird. Damit es für die HoloLens und andere Virtual-Reality-Brillen demnächst auch ordentlich viele Inhalte gibt, geben wir außerdem Tipps, wie man mit Unity und Sketchup selbst in wenigen Schritten erste 3D-Modelle baut und auf seine Oculus lädt. Dennis Schirrmacher aus dem Security-Ressort hat sich für c't mit dem VeraCrypt-Macher Mounir Idrassi über das Verschlüsselungs-Tool unterhalten. Wir sprechen darüber, ob man VeraCrypt vertrauen kann und wie man seine alten TrueCrypt-Container für VeraCrypt konvertiert. Mit dabei: Hannes Czerulla, Jan-Keno Janssen , Achim Barczok und Dennis Schirrmacher Die c't 14/16 gibts am Kiosk, im heise Shop und digital in der c't-App für iOS und Android. Alle früheren Episoden unseres Podcasts gibt es unter www.ct.de/uplink
Hannes Czerulla und Jan-Keno Janssen hatten vor kurzem die Microsoft HoloLens in den c't-Laboren. In der aktuellen Folge unseres uplink diskutieren wir darüber, wie gut die Entwickler-Version der Mixed-Reality-Brille jetzt schon ist, und ob sie wohl in naher Zukunft auf den Markt kommen wird. Damit es für die HoloLens und andere Virtual-Reality-Brillen demnächst auch ordentlich viele Inhalte gibt, geben wir außerdem Tipps, wie man mit Unity und Sketchup selbst in wenigen Schritten erste 3D-Modelle baut und auf seine Oculus lädt. Dennis Schirrmacher aus dem Security-Ressort hat sich für c't mit dem VeraCrypt-Macher Mounir Idrassi über das Verschlüsselungs-Tool unterhalten. Wir sprechen darüber, ob man VeraCrypt vertrauen kann und wie man seine alten TrueCrypt-Container für VeraCrypt konvertiert. Mit dabei: Hannes Czerulla, Jan-Keno Janssen , Achim Barczok und Dennis Schirrmacher Die c't 14/16 gibts am Kiosk, im heise Shop und digital in der c't-App für iOS und Android. Alle früheren Episoden unseres Podcasts gibt es unter www.ct.de/uplink
This week on BSDNow, Allan is back in down from Europe! We'll get to hear some of his wrap-up and get caught up on the latest BSD This episode was brought to you by Headlines FreeBSD Quarterly Report (http://www.freebsd.org/news/status/report-2016-01-2016-03.html) This quarterly status report starts with a rather interesting introduction by Warren Block ASLR Porting CEPH to FreeBSD RCTL I/O Rate Limiting The Graphics Stack on FreeBSD (Haswell is in, work is progressing on the next update) CAM I/O Scheduler NFS Server updates, working around the 16 group limit, and implementing pNFS, allowing NFS to scale beyond a single server Static Analysis of the FreeBSD Kernel with PVS Studio PCI-express HotPlug GitLab Port committed! WITHFASTDEPEND and other improvements to the FreeBSD build system Lots of other interesting stuff *** A Prog By Any Other Name (http://www.tedunangst.com/flak/post/a-prog-by-any-other-name) Ted Unangst looks at what goes into the name of a program “Sometimes two similar programs are really the same program with two names. For example, grep and egrep are two commands that perform very similar functions and are therefore implemented as a single program. Running ls -i and observing the inode number of each file will reveal that there is only one file. Calling the program egrep is a shorthand for -E and does the same thing.” So BSD provides __progname in libc, so a program can tell what its name is But, what if it has more than one name? “In fact, every program has three names: its name in the filesystem, the name it has been invoked with, and whatever it believes its own name to be.” Of course it is not that easy. “there's another set of choices for each name, the full path and the basename” “It's even possible on some systems for argv[0] to be NULL.” He then goes on to rename doas (the OpenBSD light replacement for sudo) to banana and discuss what happens “On that note, another possible bug is to realize that syslog by default uses progname. A user may be able to evade log monitoring by invoking doas with a different name. (Just fixed.)” Another interesting article from our friend Ted *** FreeBSD (https://summerofcode.withgoogle.com/organizations/4892834293350400/) and NetBSD (https://summerofcode.withgoogle.com/organizations/6246531984261120/) Google Summer of Code projects have been announced Some FreeBSD highlights: Add SCSI passthrough to CTL (share an optical drive via iSCSI) Add USB target mode driver based on CTL (share a USB device via iSCSI) API to link created /dev entries to sysctl nodes Implement Ethernet Ring Protection Switching (ERPS) HD Audio device model in userspace for bhyve Some NetBSD highlights: Implement Ext4fs support in ReadOnly mode NPF and blacklistd web interface Port U-Boot so it can be compiled on NetBSD Split debug symbols for pkgsrc builds *** libressl - more vague priomises (http://www.tedunangst.com/flak/post/libressl-more-vague-promises) We haven't had a Ted U article on the show as of late, however this week we get several! In his next entry “LibreSSL, more vague promises” He then goes into some detail on what has happened with LibreSSL in the past while, as well as future plans going forward. “With an eye to the future, what new promises can we make? Some time ago I joked that we only promised to make a better TLS implementation, not a better TLS. Remains true, but fortunately there are people working on that, too. TLS 1.3 support is on the short term watchlist. The good news is we may be ahead of the game, having already removed compression. How much more work can there be?” “LibreSSL integrated the draft chacha20-poly1305 construction from BoringSSL. The IETF has since standardized a slightly different version because if it were the same it wouldn't be different. Support for standard variant, and the beginning of deprecation for the existing code, should be landing very shortly. Incidentally, some people got bent out of shape because shipping chacha20 meant exposing non IANA approved numbers to Internet. No promises that won't happen again.” *** Interview - Samy Al Bahra - @0xF390 (https://twitter.com/0xF390) Backtrace *** News Roundup systrace(1) is removed for OpenBSD 6.0 (http://marc.info/?l=openbsd-cvs&m=146161167911029&w=2) OpenBSD has removed systrace, an older mechanism for limiting what syscalls an application can make It is mostly replaced by the pledge() system OpenBSD was the first implementation, most others have been unmaintained for some time The last reported Linux version was for kernel 2.6.1 NetBSD removed systrace in 2007 *** pfSense Video Series: Comprehensive Guide To pfSense 2.3 (https://www.youtube.com/playlist?list=PLE726R7YUJTePGvo0Zga2juUBxxFTH4Bk) A series of videos (11 so far), about pfSense Covers Why you would use it, how to pick your hardware, and installation Then the series covers some networking basics, to make sure you are up to speed before configuring your pfSense Then a comprehensive tour of the WebUI Then goes on to cover graphing, backing up and restoring configuration There are also videos on running DHCP, NTP, and DNS servers *** DuckDuckGo announces its 2016 FOSS Donations (https://duck.co/blog/post/303/2016-foss-donations-announcement) The theme is “raising the standard of trust online” Supported projects include: OpenBSD Foundation announces DuckDuckGo as a Gold Sponsor (http://undeadly.org/cgi?action=article&sid=20160503085227&mode=expanded) the Freedom of the Press Foundation for SecureDrop the Freenet Project the CrypTech Project the Tor Project Fight for the Future for Save Security Open Source Technology Improvement Fund for VeraCrypt (based on TrueCrypt) Riseup Labs for LEAP (LEAP Encryption Access Project) GPGTools for GPGMail *** Larry the BSD Guy hangs up his hat at FOSS Force (http://fossforce.com/2016/04/bsd-linuxfest-northwest/) After 15 years, Larry the BSD Guy has decided to hang it up, and walk into the sunset! (Figuratively of course) After wrapping up coverage of recent LinuxFest NorthWest (Which he didn't attend), Larry has decided it's time for a change and is giving up his column over at FOSS Force, as well as stepping away from all things technical. His last write-up is a good one, and he has some nice plugs for both Dru Lavigne and Michael Dexter of the BSD community. He will be missed, but we wish him all the luck with the future! He also puts out the plug that FOSS Force will be needing a new columnist in the near future, so if you are interested please let them know! *** Beastie Bits If you sponsored “FreeBSD Mastery: Advanced ZFS”, check your mail box (http://blather.michaelwlucas.com/archives/2648) pkg-1.7.0 is an order of magnitude slower than pkg-1.6.4 (https://marc.info/?l=freebsd-ports&m=146001143408868&w=2) -- Caused by a problem not in pkg LinuxFest Northwest 2016 Recap (https://www.ixsystems.com/blog/linuxfest-northwest-2016/) Dru Lavigne's 'Doc like an Egyption' talk from LFNW (https://www.linuxfestnorthwest.org/2016/sessions/doc-egyptian) Michael Dexters' 'Switching to BSD from Linux' talk from LFNW (https://www.linuxfestnorthwest.org/2016/sessions/devil-details-switching-bsd-linux) Michael Dexters' 'Secrets to enduring user groups' talk from LFNW (https://www.linuxfestnorthwest.org/2016/sessions/20-year-and-counting-secrets-enduring-user-groups) January issue of Freebsd Journal online for free (https://www.freebsdfoundation.org/journal/) Ghost BSD releases 10.3 Alpha1 for testing (http://ghostbsd.org/10.3_alpha1) EuroBSDcon 2016 - Call for Papers - Dealine: May 8th (https://www.freebsdnews.com/2016/04/15/eurobsdcon-2016-call-for-papers/) KnoxBUG Initial Meeting (http://www.knoxbug.org/content/knoxbug-maiden-voyage) Photos, slides, and videos from the Open Source Data Center Conference (https://www.netways.de/en/events_trainings/osdc/archive/osdc2016/) *** Feedback/Questions Mohammad - Replication (http://pastebin.com/KDnyWf6Y) John - Rolling new packages (http://pastebin.com/mAbRwbEF) Clint - Unicast (http://pastebin.com/BNa6pyir) Bill - GhostBSD (http://pastebin.com/KDjS2Hxa) Charles - BSD Videos (http://pastebin.com/ABUUtzWM) ***
In this episode Chris and Kim announce the winner of the Twitter contest announced in the previous episode. Chris touches briefly on the VeraCrypt utility and gives an example of what you may wish to encrypt. Kim takes us on a tour of the three new features of the just released update to the Victor Reader Stream. We also include a new coupon good until January 4, 2016. We conclude by wishing everyone a happy holiday season and a happy new year.
In this episode Chris and Kim announce the winner of the Twitter contest announced in the previous episode. - Chris touches briefly on the VeraCrypt utility and gives an example of what you may wish to encrypt. - -
In this episode Chris and Kim announce the winner of the Twitter contest announced in the previous episode. Chris touches briefly on the VeraCrypt utility and gives an example of what you may wish to encrypt. Kim takes us on a tour of the three new features of the just released update to the Victor Reader Stream. We also include a new coupon good until January 4, 2016. We conclude by wishing everyone a happy holiday season and a happy new year.
In this episode Chris and Kim announce the winner of the Twitter contest announced in the previous episode. Chris touches briefly on the VeraCrypt utility and gives an example of what you may wish to encrypt. Kim takes us on a tour of the three new features of the just released update to the Victor Reader Stream. We also include a new coupon good until January 4, 2016. We conclude by wishing everyone a happy holiday season and a happy new year.
Horst JENS, Gregor PRIDUN und Denis K. plaudern über freie Software und andere Nerd-Themen. Shownotes auf http://goo.gl/Cofcns oder http://biertaucher.at
Going Linux #277 · Using VeraCrypt VeraCrypt is High Security Disk Encryption software that picks up from where TrueCrypt left off. The VeraCrypt team has enhanced the security algorithms used for system and partition encryption, improve security and reduced its vulnerability overall. It can mount your old TrueCrypt volumes and allows you to convert TrueCrypt containers and non-system partitions to the VeraCrypt format. Episode 277 Time Stamps 00:00 Going Linux #277 · Using VeraCrypt 00:15 Introduction 00:44 A new-old office suite to try 05:18 Listener David suggested an episode on TrueCrypt 07:34 What is VeraCrypt? 08:03 System requirements 08:33 Overview 09:47 Installing VeraCrypt 10:26 Cautions when sharing VeraCrypt volumes 13:47 goinglinux.com, goinglinux@gmail.com, +1-904-468-7889, @goinglinux, feedback, listen, subscribe 14:51 End