This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Saturday, June 06, 2015

Password and Hash Encryption using DuckDuckGo Search Engine

A Private search engine DuckDuckGo claims that when you click on one of their search results, they do not send personally identifiable information along with your request to the third party.

Like Google dorks (advance search patterns), there are thousands of similar, but technically more useful search hacks are also available in DuckDuckGo called DuckDuckGoodies. Today I am going to share about Handy "Cryptography" using DuckDuckGo search engine.



Duckduckgo is a search engine which gives you a flexibility to perform such operations. It enables user to generate the hash of strings, find the algorithm used for generating a hash, give other equivalent hashes of certain hash input. You can also generate strong password by just searching on DuckDuckGo search engine.

 Here are some Cryptography  tricks using DuckDuckGo Search Engine


1.) Generating a Strong Password:
No password is foolproof, but by using a long, unique and strong password you can make your password complicated enough to slow down password cracking programs. DuckDuckGo provides you a feature of generating a strong password instantly.

 Search Term: password 15 strong
Where 15 is the password length.

 2.) Generating a Hash: Hashing makes it difficult for an attacker to retrieve the original plain text string back from the encrypted password and it lets sites keep a list of hashes, rather than plain text passwords.

Using DuckDuckGo's Handy option, you can generate a hash value of any string just by using the following syntax on the search engine.

 Search Term :
md5 blogmytuts
sha512 blogmytuts
sha blogmytuts
sha224 blogmytuts
sha256 blogmytuts
sha384 blogmytuts

Where blogmytuts is the plain text string and sha512 or sha is the hashing algorithm.



3.) Identifying Hash Algorithm: Manual finding of the algorithm used for generating the hash is a tedious task. DuckDuckGo provides you an inbuilt hash identification tool, which allows you to identify the hashing algorithm used for generating the hash string given as input.

Search Term :
hash 4d76e126896c73f3a51bb910dfc791a4d9fa5075
Where 4d76e126896c73f3a51bb910dfc791a4d9fa5075 is the hashes.

4.) Finding Plain text from Hashes: One more great feature provided by DuckDuckGo search engine is that it gives you plain text value and equivalent hash code in other algorithms. DuckDuckGo is not cracking hashes for you, but actually matches the hash value of the previously leaked database archive.


Search Term:

leakdb df2894fc405edfee0e0d506629cd9dfc


Where df2894fc405edfee0e0d506629cd9dfc is the hashing algorithm and leakdb the exploit keyword.

leakdb is basically a search engine for sensitive data disclosed by security breaches.Reverse hash search engine and automatic hash calculator - converts passwords to various popular hashes and vice versa, unknown passwords get calculated.



Friday, June 05, 2015

DISNEY IS ENTERING THE GAMING INDUSTRY WITH A STRANGE NEW PRODUCT PLAYMATION

Disney just announced what could be the hottest toy to hit shelves this Christmas. Playmation--Disney's attempt to get into the 'active play' play market that focuses heavily on wearable devices.

According to Tom Staggs, Chief Operating Officer of the Walt Disney Company, the product is, “play for the 21st century… physical play for a digital generation.”

Disney has used their partnership with Hasbro to help bring this product to life which, according to Staggs, "is a unique system of connected toys and wearables that combine the latest technology and Disney storytelling to inspire kids to run around and play using their imaginations.”



If you are still confused about what this product is, we all are, but to put it simply a kid will be able to put on Iron Man's repulser and be instantly linked with Jarvis, who will send them on missions.

These missions will require the kids to run around the house, jump behind furniture and dodge attacks. The repulser will be able to connect with other toys in the system too and will even be able to access power activators. It looks like Playmation will not be connected to a TV, and will force kids to use their imagination.

“Playmation takes the best the digital world has to offer and uses it to create supercharged, real world play." Said Leslie Ferraro, President of Disney Consumer Products.

"This is play updated for today’s kids," Ferraro continued, "bringing their imaginations to life as they go on active adventures alongside their favorite characters.”

Playmation will launch around October 2015, in the range of $120 dollars. Check out the trailer and demo below to get a little more info about what the Playmation is all about.

Are you ready to talk to JARVIS? Share this with your friends and start assembling your heroic team!

The Offical Trailer For Playmation



A Demo On How To Use Playmation

I think it needs costume here :v Ironman Armor


To learn more about Playmation visit the official site at http://www.playmation.com

For news and updates follow Playmation here:
Facebook: http://facebook.com/Playmation
Twitter: http://twitter.com/Playmation or @Playmation




Cybrary - The world’s first free and open, online IT and Cyber Security training platform

I will add this on my webwatch  because this website allow you to learned  more. http://www.cybrary.it/  offers  free and open, online IT and Cyber Security training platform.

Cybrary was created to provide an environment where everyone can do both. Learning should be free and accessible to everyone, not just for those who can afford it. In order to keep knowledge free, we need your help. We will provide the free IT and Cyber Security training classes, and you can contribute. 




AVAILABLE COURSE



Here is how Cybrary’s free IT and Cyber Security learning environment works:

1) Take IT and Cyber Security classes online and at your own pace.  Course Catalog
2) Engage, discuss, share and constructively contribute to everyone’s learning experience.  Engagement Resources
3) Spread the word so that together we sustain this community, and earn cybytes. – Cybytes
4) Contribute to the course and learning content.  How to Contribute Content


 REGISTER NOW!

How to install and configure Cafesuite client software on the workstations

I created this tutorial because someone message me, asking how to configure and install the cafesuite client ?. This is the proper way to install it on workstation.. You need to setup and configure or make your own client installer first.

 What should I do to configure client software?

Configuring client program should normally be done before installing it on client PCs.

First please go to main settings (menu Program/Options) and on Main/Connection page select correct server address. This should either be a main computer hostname or a fixed IP from local network.
TIPS: Make your server LAN STATIC ,para maiwasan yung pag change ng IP ng server.



Then use the Client setup command from the Program menu in CafeStation to open client software configuration window.
  1.         Make sure that the server address is correct - otherwise just click Update from server connection settings.
  2.         Set password which will protect client software from unauthorized uninstallation. Click the Set password to protect client software button to enter it. You'll be asked for this password when trying to uninstall client software from the workstation.
  3.         If you don't set the password, you'll be asked to do it after you press OK to save client configuration.
  4.         If you are going to use workstation lock, you should configure it on the Workstation lock page and the Lock look page. Check also all remaining pages and set relevant options for your cafe. You can read description of most settings by pressing F1 key.
  5.         Click the OK button to save client program configuration. Client configuration is saved in the Client directory in the application data folder (you can find a shortcut to Client folder in CafeSuite Start menu group). We recommend sharing this folder over network (read only) to make installation easier and quicker. The recent versions of CafeSuite can automatically share this folder for you.


NOTE: Recent versions of CafeSuite offer possibility of saving separate client configuration for each workstation group. You can select configuration template from the liston the bottom of the client setup window and use disk icon next to it to save configuration template. Configuration templates with name corresponding to workstation group define settings for all computers belonging to this group.


How to install client software on the workstations?

Remember to configure client software before installing it on the workstations. See topic: What should I do to configure client software?

Installing client software, after it's configured, is very easy:

YOUR CLIENT FOUND ON PROGRAMDATA FOR WINDOWS 7 USER






  1.         Log onto the client workstation as user with administrative access rights to the system (so that it is possible to install the software in the system).
  2.         Execute CafeAgentSetup.exe program from the shared CafeSuite\Client folder from the server PC or from where this folder was copied to (e.g. pendrive). Using network share is recommended for quickest installation, but it requires sharing files to be allowed on your network. In order to locate shared Client folder you should browse to the My computers/Network neighbourhood, open main PC, open Client folder and double click on CafeAgentSetup.exe. Please note that your Windows might not show file extensions - in this case just doubleclick on file named CafeAgentSetup.
  3.         It might be necessary to restart computer to install driver for disk restrictions. The program will ask you whether to restart now.
  4.         After installation computer will normally display lock screen with login window (if enabled) and show CafeAgent hourglass icon in the system tray.
  5.         Once CafeAgent is running on client PC, it automatically tries to connect to CafeStation running on the server PC (using the server address provided in client setup). CafeStation should ask you to confirm adding new workstation to the list (or add it automatically).
  6.         Please repeat this procedure for each of your client computers.


Important: Do not install client software on the main computer used by operators! siyempre server yun hahaha!

Website: http://cafesuite.net/




NASA IS TESTING A FLYING SAUCER TO SEND HUMANS TO MARS

Right now NASA is working on its low-density supersonic decelerator (LDSD) project. This project even includes a genuine flying saucer, which would transport astronauts from our blue planet to the surface of the red planet.

With interest in outer space starting to pick up again, NASA is doubling down its efforts to send humans to Mars by focusing on a BIG plan: have humans on the moon by 2035.

That might seem like a long way off, but considering NASA is going to have to build a ship larger than anything they have ever made, they still have a lot of work to do.

Many of you are probably thinking, why not use the same style of ship that landed the Curiosity on Mars? The truth is that this mission is much harder.

Transporting and landing humans on the red planet is a lot different than landing a robot. First off, the size of the spacecraft is vastly different. Second, the craft would have to land differently, basically...a lot slower.

Because of this, NASA is trying new technologies with their LDSD project to ensure the safest and best way of slowly landing a spacecraft after it has entered the red planet’s atmosphere.

This new technology is essentially is a flying saucer, or at least a body that is shaped like one that even includes a giant blow-up tube that surrounds the craft. This bizzarre looking contraption is called the Supersonic Inflatable Aerodynamic Decelerator (SIAD), and loks like something out of a Ray Bradbury novel.

With this new technology, it will only be a matter of time before we start seeing giant saucers flying through the sky. Only this time they won't be Unidentified Flying Objects, we'd know that it was us, the aliens that hope to live on Mars.

THE ACTUAL LDSD


The Team Behind The LDSD Project

Landing Projections For The LDSD

LDSD Preparing For A Test Flight

Updating decades-old technology

Last year, when the LDSD was tested for the first time -- also launched from the U.S. Navy's Pacific Missile Range facility in Kauai, Hawaii -- the deployment of the parachute was the only problem, when it didn't inflate as expected.

This time around, a new design is being tested: the Supersonic Ringsail parachute, which NASA says is the largest supersonic parachute ever tested for landing on Mars.

Current technology for the task -- decelerating from high speeds during re-entry into the atmosphere, to the final stages of landing on Mars -- dates back to NASA's Viking Program, which put two landers on the Martian surface in 1976.

The basic Viking parachute design has been used ever since. It was successfully used again in 2012 to deliver the rover Curiosity to Mars.

NASA will need new and improved landing technologies to handle the larger spaceships of tomorrow and land them on rocky surfaces, as well as at higher elevations.


ALL SOURCE  :NASA




BEWARE of the SCAM/ SURVEY WEBSITE "rewards-ph"

Puregold, SM, Robinsons Sodexo Followers, please BEWARE of the SCAM/ SURVEY WEBSITE:

To any e-mail message/s that you'll be receiving from business.news@horoscopefree.com
or from rewards-ph.com that tells you:

"Our system tells us that you may be a possible winner with the right to claim a prize:
P20,000 Puregold, SM and Robinsons Gift Certs!
rewards-ph.com - P10,000 Puregold, SM and Robinsons Gift Certs
Please verify your claim as soon as possible as all prizes that are not claimed will be entered into a new draw."




THIS IS NOT AN INITIATED PROMO OF PUREGOLD, SM, ROBINSON, AND SOSEXO

Please ignore this! The following company/store does not have this kind of promo and customers are notified via a call should they be winners in a promo then an email is sent after communicating with the winner.

May this be a WARNING to those who may receive the same type of e-mail message SCAM as what is shown in the pictures.

Please take the necessary precaution!  site is Germany-based and knowing Europe, they could easily get your identity online.When they get your identity they can use that to steal CREDIT CARD ACCOUNT.

According to Whois record of Rewards-ph.com, it is owned by Vincent Jouvin of Planet49 GmbH since 2014. Rewards-ph was registered with PSI-USA INC. DBA DOMAIN ROBOT on July 10, 2014. Vincent Jouvin resides in Sulzbach, Germany and their email is domains@spark5.de.

Almost 1 year na nag sscam etong website na eto, and Pinoy loves Promos they can easily hook up with this kind of scam.

THE BUGOS WEBSITE ALSO POSTED ON LEGIT ONLINE ADS MAKING IT SEEMS LEGIT.

PLEASE SHARE THIS INFO

PUREGOLD POSTED WARNING ABOUT THIS WEBSITE ON THEIR PAGE 2014:
https://www.facebook.com/puregold.shopping/photos/a.114627672151.119291.114161442151/10152681168402152/

source: https://whois.easycounter.com/rewards-ph.com





Thursday, June 04, 2015

JARVIS From Iron Man Rainmeter Theme (Windows 7/8/8.1)

JARVIS is the personal assistant of Iron Man, and you know it, of course!
The awesome JARVIS look, the responsive home screen, the voice response, converting your system into JARVIS from Iron Man. This folder contains all the necessary files you would need for the mission.

A Computer/Laptop having Windows 7 8 or 8.1. (XP or Vista won't work)

Microphone (If you don't have one, buy it! It doesn't cost much!)

  • Speech Recognition Setup.
Well well, you need to understand some basic commands your computer takes to execute certain actions. I have written another tutorial just for this thing. Click here to read it.(IMPORTANT)

  • Rainmeter Software.
This will constitute the base of the Iron Man theme. link http://rainmeter.net/

This is the theme and will work to make your computer look like JARVIS

  • Windows Speech Recognition Macros.
This is a software provided by Microsoft by which you will be able to add your own commands into the system.

Tutorial Setup http://www.blogmytuts.net/2015/04/windows-voice-recognition.html
Just follow all the instructions carefully and you shall succeed. Believe me, it's quite long and tedious but is very very easy!

  • Windows 7 Boot Screen Updater. 
This is to update the old look of your Windows Boot Screen.


                                                                Clean version (Blank)

https://drive.google.com/file/d/0Bx41Hy9aW5BaR3J3ZDJfUWFCM28/view?usp=sharing



 (BLOGMYTUTS READY VERSION)

http://q.gs/8Q90T


after install click LAYOUT select Ironman

You may also  wanna read  Microsoft Cortana  - Digital Assistant
Link : http://www.blogmytuts.net/2015/06/microsoft-cortana-digital-assistant.html



Wednesday, June 03, 2015

Microsoft has finally decided to bring OpenSSH client and server to Windows

The PowerShell team at Microsoft has announced that the company is going to support and contribute to OpenSSH community in an effort to deliver better SSH support in the PowerShell and Windows SSH software solutions.

Until now Unix and Linux system administrators have to download a third-party SSH client software like Putty on their Windows machines to securely manage their machines and servers remotely through Secure Shell protocol or Shell Session (better known as SSH).

For those who are unaware, SSH is basically designed to offer the best security when accessing another computer remotely. It not only encrypts the remote session, but also provides better authentication facilities, with features like secure file transferring and network port forwarding.

You don't need to deal with any third-party SSH client now, as Microsoft is working on supporting OpenSSH.



This is not first time Microsoft has planned to adopt SSH for its Windows platform, the company had tried to allow the secure shell protocol to be used within Windows twice but was unable to implement it.  Because this is the 3rd time the PowerShell team has attempted to support SSH.  The first attempts were during PowerShell V1 and V2 and were rejected. 

However, developers who are eager to use this new functionality in PowerShell still have to wait for some time, as the project is still in the early planning phase. So far, there isn’t any definite release date.

The PowerShell team will update more information:

Additional Information

For more information on SSH please go to http://www.ietf.org/rfc/rfc4251.txt

For information on OpenSSH go to: http://www.openssh.com/index.html




Run remote commands on a Cisco router from your PC Remote Shell (rsh)

Can you go to a Windows command prompt and run a command on your router? Usually, you would have to Telnet or SSH to the router first to run the command, right?

Did you know that you can run Cisco router commands without leaving the Windows command prompt? This can come in handy for scripting and automating router management.

While this approach works, you can also run router commands without leaving the Windows command prompt, which can come in handy for scripting and automating router management. Let's take a closer look.

What is remote shell (rsh)?

Remote shell (rsh) is a command-line program commonly found in UNIX and Linux systems. Using rsh, you can remotely execute command-line programs on a remote system. This could be another UNIX or Linux system, or it could be a Cisco router or switch. Rsh was part of the BSB UNIX operating system and included with rcp (remote copy) and rlogin (remote login).

While most Linux administrators are already familiar with rsh, some Windows administrators might not be. In fact, Windows XP and Windows Server 2003 both include rsh. Figure A shows a screenshot of using rsh at the command prompt.

Figure A

However, when working with rsh, it's important to remember that rsh is insecure -- it does not encrypt the communications between the remote device and the system. You should always configure rsh as securely as possible on the router by locking down the IP address of the management machine and the username.

However, even when taking such precautions, rsh is still very insecure compared to SSH. It's a good idea to use rsh only on a protected, secured, internal network. (By the way, if you're allowing rsh through a firewall, it uses TCP port 514.)

How do I configure rsh on my router?

To be able to run a command on a Windows PC, have it go to the router, execute the command, and then return the output to you, all you need to do is enter two commands. Let's walk through the process.

First, you need to enable the remote shell services on the router. The Cisco IOS calls the remote shell service ip rcmd. To enable this service, enter the following command when in Global Configuration Mode:
Router(config)# ip rcmd rsh-enable
Second, you need to configure the permissions for your workstation and your user to be able to perform these remote shell commands. Here's an example of this command:

Router(config)# ip rcmd remote-host root 192.168.1.45 ddavis enable
Let's take a closer look at this command. The ip rcmd remote-host part is required. Next, you enter the local username on this router of the user that the remote shell will log in under when it runs commands. In this case, we used the local user root. Next, 192.168.1.45 is the IP address of the management workstation that we want to allow to execute these remote shell commands -- in other words, the IP address of the PC. Next, you see my local Windows username: ddavis. In this case, that's the name of the user logged into the Windows XP machine as well as the user who will be executing the rsh command in Windows. If I were running a batch job script that executed the Windows rsh command, I would need to enter the Windows username of the user that the batch job was running under.
Finally, the command contains the enable keyword. This allows the remote shell user access to enable the mode on the router. I could take this a step further and specify the level of access allowed (i.e., levels 1 through 15).

Keep in mind that these two commands assume you already have the router configured and you already have a local user called root. If you don't have a root user, you can use the following command to do so:

Router(config)# username root privilege 15 password C1sCo!

How do I use rsh from my Windows workstation?

Once you've configured the above commands, you can easily run a remote shell command from the Windows command prompt. Figure B offers an example.

Figure B

Here's the actual command I used:

Z: rsh Router1 -l root sh ver

Here's how the command works:

The hostname is the first thing specified (in this case, Router1).
Next, I used -l (i.e., the letter L) to specify the remote username that I will use to log in. (Keep in mind that I still have to be user ddavis on the local Windows PC for the security to work. Also, I have to come from the IP address that I've specified -- in other words, this wouldn't work from another workstation.)
Finally, specify the command. In this case, I ran the show version command (or sh ver).
What can I do with the rsh command?
In addition to using the show version command, you can also run the show running-configuration (sh run) command or any other privileged level command. Here are some more examples:
show ip interface brief
show ip route
show ip ospf neighbors
show ip bgp summary
show log

What you can't do is run a Global Configuration Mode command, such as enabling an interface or configuring an IP address. This usually limits you to the show commands.

However, one very useful thing you could do is copy your current configuration to a TFTP server and do it inside a script initiated on the Windows server. For example, you would use the copy running-configuration tftp:/1.1.1.1 command.

What else can I do with remote commands?

If you check out the Cisco IOS documentation that covers remote commands, you'll find that there are a number of options you can use with the remote shell commands. One of the latest features in the Cisco IOS is that you can authenticate incoming rsh and rcp commands using a Cisco IOS access control list.

One of the more interesting variations is that you can use remote copy (rcp). So, I could copy a file using the Windows rcp command from my PC to the router or from the router to the PC -- without ever using TFTP or FTP. (You can enable rcp with the ip rcmd rcp-enable command.

Conclusion

The remote shell (rsh or rcmd) commands can be very useful for remotely administering your router. This is especially true if you want to create a Linux or Windows script that goes out to all routers on your network and performs some show command.





PHILIPPINE BANKS ROUTING NUMBER AND SWIFT CODES

I was updating may billing details  and I choose Wire and it needed routing number. I thought of sharing this info that might be of help as you needed.
These are Routing numbers and Swift codes for the Philippine banks. Very important to know when you need to send money to your family to their/your bank account.


PHILIPPINE BANKS ROUTING NUMBER


ALLIED BANKING CORP                           010320013

AUSTRALIA NEW ZEALAND                    010700015

ASIA UNITED BANK                                   011020011

BANGKO SENTRAL NG PILIPINAS          010030015

BANGKOK BANK                                        010670019

BANK OF AMERICA                                   010120019

BANK OF CHINA                                         011140014
 
BANK OF TOKYO                                        010460012

BANCO DE ORO (& EPCIB)                       010530667

BANK OF COMMERCE                               010440016

BANK OF THE PHIL ISLANDS                  010040018

CHINA BANKING CORP                             010100013

CHINA TRUST COMML BANK                  010690015

CITIBANK N.A.                                             010070017

DEVT BANK OF THE PHILS                      010590018

DEUTSCHE BANK                                       010650013

EAST WEST BANK                                      010620014

EXPORT & INDUSTRY BANK                   010860010

FUJI BANK                                                    010640010

HONGKONG AND SHANGHAI BANK      010060014

INTL COMML BANK OF CHINA                010560019

INTL EXCHANGE BANK                             010680012

JP MORGAN CHASE BANK                         010720011

KOREA EXCHANGE BANK                         010710018

INTL NEDERLAND BANK                           010660016

LAND BANK OF THE PHILS                        010350025

MAYBANK OF THE PHILS                           010220016

METROPOLITAN BANK & TRUST CO       010269996

PHIL BANK OF COMMUNICATION            010110016

PHIL TRUST COMPANY                                010090039

PHIL NATIONAL BANK                                 010080010

PRUDENTIAL BANK                                      010150018

PHIL VETERANS BANK                                010330016

RIZAL COMML BANKING CORP                 010280014

SECURITY BANK & TRUST CO                    010140015

STANDARD CHARTERED BANK                  010050011

UNITED COCONUT PLANTERS BANK        010299995

UNION BANK OF THE PHILS                        010419995

UNITED OVERSEAS BANK                            010270189
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------

PHILIPPINE BANKS SWIFT CODES

Allied Banking Corporation –                      ABCMPHMM

American Express Bank Philippines –          AMEXPHMM

Banco de Oro Universal Bank –                    BNORPHMM

Bank of China Manila Branch –                    BKCHPHMM

Bank of Commerce –                                     PABIPHMM

Bank of the Philippine Islands –                    BOPIPHMM

China Banking Corporation –                        CHBKPHMM

Development Bank of the Phil. –                   DBPHPHMM

East West Banking Corporation –                  EWBCPHMM

Equitable PCI Bank –                                     PCIBPHMM

Hong Kong and Shanghai Bank –                  HSBCPHMM

International Comm Bank of China –            ICBCPHMM

International Exchange Bank –                      INXBPHMM

Land Bank of the Philippines –                      TLBPPHMM

Maybank Philippines Incorporated –              MBBEPHMM

Metropolitan Bank & Trust Co. –                   MBTCPHMM

Philippine Bank of Communications –           CPHIPHMM

Philippine National Bank –                             PNBMPHMM

Philippine Veterans Bank –                             PHVBPHMM

Philtrust Bank –                                               PHTBPHMM

Prudential Bank –                                            PILBPHMM

Rizal Commercial Banking Corp –                 RCBCPHMM

Security Bank and Trust Corp –                      SETCPHMM

Standard Chartered Bank –                              SCBLPHMM

Union Bank of the Philippines –                      UBPHPHMM

United Coconut Planters Bank –                      UCPBPHMM

United Overseas Bank Philippines –               UOVBPHMM 









Tuesday, June 02, 2015

ODiN is the World’s First Laser Projection Mouse

Users who buy the product will receive a small projector that can sit on top of a table, and connects to a PC via its USB port. It works by displaying a virtual trackpad on a hard surface like a table. For users, this means they’ll essentially see a small box, made out of red light, with the right and left click buttons projected at the top of the trackpad.

ODiN is the world’s first laser projection mouse, claims its creator, Taiwanese company Serafim Technologies. The device was shown off on Monday, a day before the Computex trade show in Taipei.

To read the gestures, the projector has built-in sensors that can track a user’s finger movements over the trackpad. The company created the product as a way to meld together mouse and touchscreen functions together, said Serafim’s CEO GZ Chen.

For instance, the product’s virtual trackpad can read multi-finger gestures. When a user taps the trackpad with two fingers, and swipes left, the PC’s Internet browser will move back a webpage. By swiping right, the PC’s browser will move forward a webpage.


Users can also pinch the trackpad with two fingers to zoom in or zoom out.



ODiN is the World’s First Laser Projection Mouse
Posted by Blogmytuts.blogspot.com on Tuesday, 2 June 2015




Serafim’s CEO said it also developed the product, as a way for certain industries to do away with computer mouses that collect germs and dirt over repeated use. The company plans to continually offer software updates to the ODiN, as a way to optimize its functions.

The ODiN launches this month and will be priced at $69. It was also featured on Kickstarter.



Securing Email Communications from Facebook with PGP Key

It's very important to us that the people who use Facebook feel safe and can trust that their connection to Facebook is secure; for instance this is why we run connections to our site over HTTPS with HSTS and why we provide a Tor onion site for people who want to enjoy security guarantees beyond those offered by HTTPS.

However these technologies protect only the direct connections people make to Facebook. People also receive information from us over channels such as email. Whilst Facebook seeks to secure connections to your email provider with TLS, the stored content of those messages may be accessible as plaintext (with attachments) to anyone who accesses your email provider or email account.

To enhance the privacy of this email content, today we are gradually rolling out an experimental new feature that enables people to add OpenPGP public keys to their profile; these keys can be used to "end-to-end" encrypt notification emails sent from Facebook to your preferred email accounts. People may also choose to share OpenPGP keys from their profile, with or without enabling encrypted notifications.

Where encrypted notifications are enabled, Facebook will sign outbound messages using our own key to provide greater assurance that the contents of inbound emails are genuine.

You will be able to update your own public key, using a desktop browser, at:
https://www.facebook.com/me/about?section=contact-info


Technology

Created as PGP nearly 25 years ago by Phil Zimmermann, OpenPGP is one of the most popular available standards for protecting email with public key encryption. If you are unfamiliar with using OpenPGP technology, the Electronic Frontier Foundation offers an introduction:
...with installation guides for:
For our implementation we have chosen to use GNU Privacy Guard - “GPG” - a widely used and free implementation of the OpenPGP standard. Facebook is a supporter of GPG and we encourage others to support GPG as well.

Key Fingerprints & Roadmap

Facebook's OpenPGP key comprises a long term primary key with short term subkeys; this allows us to frequently rotate our operational keys whilst maintaining the web of trust and a consistent identity over time. As of the time of writing our primary key has the fingerprint:

31A7 0953 D8D5 90BA 1FAB 3776 2F38 98CE DEE9 58CF

…with the following operational subkey fingerprint:

D8B1 153C 9BE9 C7FD B62F 7861 DBF4 E8A2 96FD E3D7

Facebook notifications are encrypted with a version of GPG that supports encryption with the RSA or ElGamal algorithms; we are investigating the addition of support for GPG's newer elliptic curve algorithms in the near future. 

Finally: public key management is not yet supported on mobile devices; we are investigating ways to enable this.


How to use PGP to send encrypted emails?

In case if you want to send and receive encrypted email using PGP, you will first need to install some extra software given below:

  • GPG4Win: GNU Privacy Guard for Windows known as GnuPG
  • Enigmail
  • Mozilla Thunderbird

Using GPG4Win software, you can create your Public and Private PGP keys. Public Key is something that others will need to know before they can send you encrypted mail. However, Private PGP key will be used to decrypt emails you receive, which you need to keep secret from everyone.
The picture  is from : https://www.igolder.com/pgp/generate-key/

Source : Facebook  Protect the Graph





Google will turn your devices into your passwords - Project Vault microSD

Project Vault, designed by Google's ATAP (Advanced Technology and Projects) group, is a secure computer entirely packed onto a microSD card that can be plugged into any system whether it’s a desktop or a mobile phone.

That’s a really catching name announced on the second day of the annual Google I/O developers conference on Friday

The vault is technically a computer though it is not for regular computing. Rather it is a new and secure way to communicate and authenticate without entering passwords.

Today we often choose passwords that we find clever or easy to remember, but Google wants to make the password more personal than we think.

The tiny little chip can authenticate you even before an app or a website asks for your password. In short, Vault will make your primary authentication (which we currently do use passwords) a secondary one, without you having to do anything.



With Project Vault, Google will turn your devices into your passwords. It is capable to encrypt, or scramble, your app is chat messages and provide extra levels of authentication, so your device makes very sure that you are you.

While giving a demo, ATAP team showed how two users can securely chat with each other using Vault-equipped smartphones. Once the chip is installed, the chat application just opens the virtualized two-file system with the read/write I/O.

Vault encrypts the chat messages and then sends it as ciphertext through its encrypted channel, and never sends through the phone so that no one can snoop on you. The phone automatically decrypts the messages, but will never actually be able to see any keys or algorithms on either end.

The company says you will also be able to encrypt video with Vault.

Project Vault has:

  • An ARM-based processor
  • An antenna
  • A near-field communication (NFC) for communicating with nearby devices
  • 4 gigabytes of "isolated, sealed" internal storage
  • Its ultra-secure operating system focused on privacy and data security
  • A suite of cryptographic services


Vault runs a custom-built Real-Time Operating System (RTOS) with a suite of cryptographic services, including hashing, batch encryption, signing and a hardware random number generator, in order to keep your data and messages with friends secure.

Vault works with any operating system -- including Google's Android, Windows, Linux and Apple's OS X -- since essentially it is just a generic storage device to the host computer or phone.

I called the move smarter because here all the work is done by the host without the users having to deal with the configuration of the device, making it as user-friendly as possible.

Project Vault is still "very much in the experimental stage" and in process of being ready for users, but the source code for the system is available on GitHub under an open-source license so that developers can start delving into it.