Cursor— Page 2 — March 17, 2012 Continued from Page 2 • See for News and Tips About Windows 8

Total Page:16

File Type:pdf, Size:1020Kb

Cursor— Page 2 — March 17, 2012 Continued from Page 2 • See for News and Tips About Windows 8 TThheeCCuurrssoorr Monthly Newsletterofthe WashingtonArea ComputerUserGroup Meeting Location: Next Meeting: OLLI, 4210 Roberts Road March 17, 2012 Fairfax, VA Presidential Bits by GeofGoodrum President WACUG, president(at)wacug.org The February meeting, one of our best attended ever, featured excellent presentations about Digital Photography by Dan Feighery and TrueCrypt disk encryption software by Lorrin Garson. Dan characterized his session as plowing the digital photo field “a mile wide and an inch deep.” Dan covered the characteristics of Paul Howard (left) introduces digital cameras from inexpensive “point & shoot” models to high-end Dan Feighery (right) Digital Single-Lens Reflex (DSLR) models. Even the basic cameras have extensive manuals describing available features, displays, and controls of the camera, and Dan encouraged everyone who buys a Table of Contents camera to spend some time with the manual to understand the camera’s capabilities. One particular function is the histogram, which Useful Bits & Pieces.............2 can help you optimize your pictures. Dan also discussed color Linux News........................... 4 management, a somewhat involved end-to-end process that includes Sandboxie............................. 7 adjustment of video monitor, camera, and printer to ensure that the Using PowerPoint................9 colors captured by the camera are reproduced as accurately as Micro Center Clinics..........10 possible on screen and in print. Dan’s briefing slides are on the WAC Recent Meetings web page (http://www.wacug.org/recmtgs.html) as a 21 MB PDF file, and serves as an invaluable reference to the general Only in the Download concepts of digital photography. Edition: Lorrin Garson returned to talk about “Protecting Private Information with TrueCrypt” software, available as a free download for Microsoft Windows, GNU/Linux, and Apple Macintosh OS X systems. TrueCrypt ICE Your Cell Phone.......... 13 creates password-encrypted space on your disk for your sensitive Windows Live SkyDrive....13 financial, medical, and other personal data. Lorrin pointed out that Stellarium........................... 15 TrueCrypt “containers” (virtual disks that appear as files on your Invisible Shield...................16 hard drive) can be copied to portable media (e.g. flash drives) and even exchanged by e-mail securely as long as only the recipient has the password. Lorrin also noted that a secure file deletion utility (e.g. file shredder) should be used to delete sensitive files that are not kept in an encrypted container, as normal deletion utilities leave data on the drive that can be recovered and viewed. Although there are Continued on page 4 Useful Bits & Pieces by Lorrin R. Garson Washington Area Computer User Group NCTCUG Microsoft Warns About Ransomware Ransomware is malicious software inadvertently installed on Visit our “sister” user group. The your computer that extortionists use in an attempt to National Capital Technology and shakedown money. Recently Microsoft has issued a warning that Computer User’s Group meets the first about 25,000+ computers have been infected in Germany in and fourth Wednesday of the month. which crooks posing as the German Federal Police demanding They meet in Carlin Hall in Arlington payment of a fine because illicit material has been detected and at 5711 South 4th Street. Visit their your disk drive will be erased unless prompt payment is made to web site for more information, a map PaySafeCard or Ukash. This particular scheme has so far been and directions: limited to Europe, but its only a matter of time until it spreads. See http://blogs.technet.com/b/mmpc/archive/2011/12/19/disorde http://www.nctcug.org/ rly-conduct-localized-malware-impersonates-the-police.aspx for details. Also see http://www.microsoft.com/security/portal/ for general security warnings from Microsoft. Meetings start at 7:00 PM 12 Atoms to Store a Bit In storing information on todays disk drives, about one million atoms are used to store a single bit of information. Scientists at IBM have recently published an article in which one bit of information is stored using only 12 atoms. This remarkable bit of nanotechnology (sorry) does not mean we will see magnetic storage with 83,000 times the capacity of todays devices, but it is estimated this technology could lead to magnetic storage devices holding 100 times the information density we see today. Dont Washington Area User bother to place an order with Amazon.com quite yet. It will be Group Partners sometime before this comes to the marketplace. • See http://www- Working Together for 03.ibm.com/press/us/en/pressrelease/36473.wss for a press Our Members release from IBM describing this research finding. • See https://www.computerworld.com/s/article/9223396/IBM_s mashes_Moore_s_Law_cuts_bit_size_to_12_atoms for a summary in Computerworld. NCTCUG • The original research was published by Sebastian Loth, Susanne Baumann, Christopher P. Lutz, D.M. Eigler, and WACUG Andreas J. Heinrich, Bistability in Atomic-Scale Antiferromagnets, Science, 13 January 2012, 335 (6065), pp. 196-199). You can see an abstract at http://www.sciencemag.org/content/335/6065/196. OPCUG Abstract and supplemental technical information is freely available available at Continued on page 3 The Cursor— Page 2 — March 17, 2012 Continued from page 2 • See http://www.windows8news.com/ for news http://www.sciencemag.org/content/335/6065 and tips about Windows 8. /196/suppl/DC1. Oh No! The Blue Screen of Death • See http://www.zdnet.com/blog/microsoft/micros Yes, it happens to everyone eventually. Getting oft-previews-windows-8-app-store-launching- information from the blue screen that accompanies with-the-beta-in-late-february/11340 for a crash can be challenging. Help is available in the information about Windows 8 and Microsoft's form of BlueScreenView from NirSoft. See coming app store. http://www.nirsoft.net/utils/blue_screen_view.ht Acronis True Image 2012 ml for a description and to download the program. This application scans minidump files that are This application has been quite popular for a created during crashes and displays information in a number of years for backing up home computers. table. This information includes modules and The 2012 version is now available from Acronis (see drivers that may be responsible for the sad event. http://www.acronis.com/homecomputing/product Learning to make sense of the data provided takes s/trueimage/) for $39.99 for one PC or $69.99 for some effort, but if you have persistent crashes, this three PCs. You can get a better deal from Gene tool may be of considerable help. Barlow at http://www.ugr.com/index.html. Not Enough Space on Your Tablet or • See Smartphone? http://www.infopackets.com/news/software/r eviews/2011/20111216_acronis_true_image_201 These devices are quite limited in storage space, but 2_review.htm#details for a description of this you can add an additional 16 GB or 32 GB of storage product and its new features. to your iPhone or iPad using Kingston’s wireless • See USB flashdrive, the Wi-Drive. Currently http://www.softpedia.com/reviews/windows/A Amazon.com is selling Wi-Drives for $59.99 (16 GB) cronis-True-Image-Home-2012-Review- and $89.99 (32 GB). See 232888.shtml for a review from Softpedia. http://www.engadget.com/2011/07/09/kingston- wi-drive-wireless-storage-for-ios-review/ for a • See http://windows.microsoft.com/en- review of the Wi-Drive and other devices for solving US/windows7/products/features/backup-and- this capacity problem. restore for information about a viable, free Windows 8 is Coming! competitor to Acronis True Image, which comes with Windows 7. So you’ve been thinking about upgrading to Windows 7. You may possibly want to wait for Windows 8 which will probably be released the latter half of 2012. The beta version is scheduled to be released in late February. Windows 7 has been very well accepted in the marketplace. Windows 8 seems to be trying hard to compete with Apples outstanding user interface. Will Windows 8 be a success? Time will tell. Undoubtedly much will be written about this new operating system in the coming months. • See http://www.youtube.com/watch?v=p92QfWOw 88I for a video from Microsoft on Windows 8. The Cursor— Page 3 — March 17, 2012 several commercial products that have similar Privoxy is a non-caching web proxy with advanced capabilities (and Lorrin provides links to several of filtering capabilities for enhancing privacy, modifying them), Lorrin noted that TrueCrypt is all most web page data and HTTP headers, controlling access, people will need. Lorrin’s presentation, which and removing ads and other obnoxious Internet junk. includes step-by-step screen instructions for Privoxy has a flexible configuration and can be installing TrueCrypt, is also available as a 2 MB PDF file on the WAC Recent Meetings web page. customized to suit individual needs and tastes. It has application for both stand-alone systems and multi- At the March meeting, Abby Stokes, author of “Is user networks. This Thing On? A Computer Handbook for Late Bloomers, Technophobes, and the Kicking & As proxy server software that runs within the PC, Screaming,” will join us in person to talk about Privoxy intercepts and filters web-based Social Networking, participate in an interview, a communications after they get to the computer but book signing (her book will be available for before they get passed to the web-browser, and purchase), and a Questions & Answers session. therefore serves as a more general and consistent Check out Abby’s web site at solution regardless of the browser. Note that http://abbyandme.com/, and plan to see her in Privoxy is not designed to block malware attacks th person at the WAC meeting on March 17 . and is not a firewall, so your system still needs As last month, I am grateful for Lorrin Garson’s “Bits software for these functions.
Recommended publications
  • Citrix Netscaler Deployment Guide for Microsoft Exchange 2010
    Citrix NetScaler Deployment Guide for Microsoft Exchange 2010 Table of Contents Citrix NetScaler Deployment Guide for Microsoft Exchange 2010 ................................................................... 1 Introduction .................................................................................................................................................................. 3 Solution Requirements ................................................................................................................................................ 3 Prerequisites .................................................................................................................................................................. 3 Deployment Overview ................................................................................................................................................ 4 Network Diagram ................................................................................................................................................... 7 NetScaler Deployment ................................................................................................................................................ 7 Client Access Server ............................................................................................................................................... 7 Configuring NetScaler for Outlook Web App (OWA) ................................................................................ 9 Configuring NetScaler for
    [Show full text]
  • Download Windows Live Messenger for Linux Ubuntu
    Download windows live messenger for linux ubuntu But installing applications in Ubuntu that were originally made for I found emescene to be the best Msn Messenger for Ubuntu Linux so far. It really gives you the feel as if you are using Windows Live Messenger. Its builds are available for Archlinux, Debian, Ubuntu, Fedora, Mandriva and Windows. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger and Google Talk. While finding MSN Messenger for Linux / Ubuntu, I found different emesene is also available and could be downloaded and installed for. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger. A simple & beautiful app for Facebook Messenger. OS X, Windows & Linux By downloading Messenger for Desktop, you acknowledge that it is not an. An alternative MSN Messenger chat client for Linux. It allows Linux users to chat with friends who use MSN Messenger in Windows or Mac OS. The strength of. Windows Live Messenger is an instant messenger application that For more information on installing applications, see InstallingSoftware. sudo apt-get install chromium-browser. 2. After the installation is Windows Live Messenger running in LinuxMint / Ubuntu. You can close the. Linux / X LAN Messenger for Debian/Ubuntu LAN Messenger for Fedora/openSUSE Download LAN Messenger for Windows. Windows installer A MSN Messenger / Live Messenger client for Linux, aiming at integration with the KDE desktop Ubuntu: Ubuntu has KMess in its default repositories.
    [Show full text]
  • The Webmail Experience Gmail Versus Share
    RADBOUD UNIVERSITY NIJMEGEN The webmail experience Gmail versus Share A Bachelor Thesis in Information Science August 2012 Beau Verdiesen - 0813648 Supervised by: Dr. Louis Vuurpijl Contents 1. Introduction ......................................................................................................................................... 3 2. Theory .................................................................................................................................................. 4 2.1 Nielsen’s Usability Attributes ........................................................................................................ 5 2.1.1 Learnability ............................................................................................................................. 5 2.1.2 Efficiency ................................................................................................................................ 5 2.1.3 Memorability .......................................................................................................................... 5 2.1.4 Errors ...................................................................................................................................... 6 2.1.5 Satisfaction ............................................................................................................................. 6 2.2 User Experience ............................................................................................................................. 6 3. Method ...............................................................................................................................................
    [Show full text]
  • Legislators of Cyberspace: an Analysis of the Role Of
    SHAPING CODE Jay P. Kesan* & Rajiv C. Shah** I. INTRODUCTION ............................................................................................................................ 4 II. THE CASE STUDIES: THE DEVELOPMENT OF CODE WITHIN INSTITUTIONS.............................. 13 A. World Wide Web......................................................................................................... 14 1. Libwww............................................................................................................ 14 2. NCSA Mosaic .................................................................................................. 16 B. Cookies ........................................................................................................................ 21 1. Netscape’s Cookies .......................................................................................... 21 2. The IETF’s Standard for Cookies .................................................................... 24 C. Platform for Internet Content Selection....................................................................... 28 D. Apache......................................................................................................................... 34 III. LEGISLATIVE BODIES: SOCIETAL INSTITUTIONS THAT DEVELOP CODE ................................. 37 A. Universities.................................................................................................................. 38 B. Firms...........................................................................................................................
    [Show full text]
  • Downloadable Email Program for My Pc 32 Best Free Email Clients
    downloadable email program for my pc 32 Best Free Email Clients. Here are 32 best free email client software . These let you manage and access all of your email accounts in one single place easily. All these email client software are completely free and can be downloaded to Windows PC. These free software offer various features, like: can be used with IMAP, SMTP, POP3 and Gmail, keeps your emails safe and secure, lets you open various emails simultaneously, provide protection from spam, lets you view your emails offline, manage and access all of your email accounts in one single place, supports PH, LDAP, IMAP4, POP3 and SMPT mail protocols etc. So, go through this list of free email client software and see which ones you like the most. Thunderbird. Thunderbird is a free and handy email client software for your computer. It can be used with IMAP, SMTP, POP3 and Gmail. It will also work with email accounts provided by MS Exchange Server. The user interface of Thunderbird is tabbed. It lets you open various emails simultaneously. Thunderbird keeps your emails safe and secure. It also has special filters for filtering the mail. Windows Live Mail. Windows Live Mail is a free email client for your computer. It works with various email accounts. It lets you access Yahoo, Gmail, Hotmail and emails from different servers which supports POP3 and SMTP. Its security features are excellent it will also provide protection from spam. You can also view your emails offline in this freeware. Zimbra Desktop. Zimbra Desktop is a free email client.
    [Show full text]
  • Vol.11, No. 2, 2011
    Applied Computing Review 2 SIGAPP FY’11 Semi-Annual Report July 2010- February 2011 Sung Y. Shin Mission To further the interests of the computing professionals engaged in the development of new computing applications and to transfer the capabilities of computing technology to new problem domains. Officers Chair – Sung Y. Shin South Dakota State University, USA Vice Chair – Richard Chbeir Bourgogne University, Dijon, France Secretary – W. Eric Wong University of Texas, USA Treasurer – Lorie Liebrock New Mexico Institute of Mining and Technology, USA Web Master – Hisham Haddad Kennesaw State University, USA ACM Program Coordinator – Irene Frawley ACM HQ Applied Computing Review 3 Notice to Contributing Authors to SIG Newsletters By submitting your article for distribution in this Special Interest Group publication, you hereby grant to ACM the following non-exclusive, perpetual, worldwide rights. • To publish in print on condition of acceptance by the editor • To digitize and post your article in the electronic version of this publication • To include the article in the ACM Digital Library • To allow users to copy and distribute the article for noncommercial, educational, or research purposes. However, as a contributing author, you retain copyright to your article and ACM will make every effort to refer requests for commercial use directly to you. Status Update SIGAPP's main event for this year will be the Symposium on Applied Computing (SAC) 2011 in Taichung, Taiwan from March 21-24 which will carry the tradition from Switzerland's SAC 2010. This year's SAC preparation has been very successful. More details about incoming SAC 2011 will follow in the next section.
    [Show full text]
  • Windows Geknackt Die Besten Tools 2013
    ttbewerb Mit DVD Preise im Wert We 00001 www.onlinepc.ch Fr. 4.70 von Fr. 7‘154.– 985503 € 4,– Ultrabook, Digicam, WLAN-Bundles, 71422 iPhone-Hüllen und Software S.52 97 System verschlüsseln 51 DVD Zürich So geht‘s: Der wirksamste Schutz gegen Datenklau S.30 Auf 8051 D Nr. 1 – Januar 2013 16 Internet-Tipps Auf DV AZB Das Computer-Magazin Firefox-Befehle, Cloud verschlüsseln, Mails sichern... S.30 D Auf DV Total Mounter Virtuelle CDs und DVDs auf jedem PC brennen – ohne Brenner S.30 ▪ Der Schutz macht Windows unzerstörbar ▪ Nach jedem Neustart ist Windows wie neu ▪ Der Schutz lässt sich ein- und ausschalten S.22 Die besten Tools 2013 Das sind die beliebtesten Open-Source-Programme S.36 D D Auf DV Auf DV Windows geknackt So booten Sie jeden Sicherheit PC mit Windows 7 S.42 am PPaasswortsswort besten Abp Mon 9.0 50 Hammertipps Die Überwacht RAM, CPU, Die besten Tricks für vorbei S.16 Special Netzwerk… S.26 Windows 7 S.14 Mit Sicherheits-Tipps Anzeige EDITORIAL /INHALT INHALT 1/2013 PC am Passwort Schutzmodus für vorbei booten: Windows 7 Ein Trick überlistet Der Schutzmodus den Schutz von macht Windows Windows 16 unzerstörbar 22 Leserumfrage Top-100-Software Virenalarm, was tun? Mitmachen und eine Video-Soft- Aus den monatlichen Top 10 Downloads hat Keine Panik! So ware von Magix die Redaktion für Sie eine Auswahl getrof- werden Sie die gewinnen! 62 fen und die 100 beliebtesten Programme auf Schädlinge los 46 die Heft-DVD gepackt. Die Tools decken ein breites Spektrum ab – vom Browser bis zum E-Mail-Programm, von der Sicherheitssoftware bis zum Videoplayer und vom Backup-Pro- AKTUELL TEST & KAUFBERATUNG gramm bis zum Passwortmanager (Seite 36).
    [Show full text]
  • Windows Live Mail
    1. Adding the email settings on Windows Live Mail • Click on ♦ Add an e-mail account: (located on the left, refer image above) ♦ or go to Tools Accounts Add E-mail Account Add an E-mail Account ♦ Enter email address password display name ♦ Check "remember password" box (unless you are concerned about security and want to enter the password every time you access your account) ♦ Hit the "Next" button to continue. Here, you need to select your incoming mail server type POP3 or IMAP pop.bluetie.com Port: 110 or imap.bluetie.com Port: 143 login ID Full Email address (should already be there) Outgoing email server address. smtp.bluetie.com Port: 5125 The Windows Live Mail setup process is now complete. You have a choice of setting the new account as the default by checking the box. When a new email account is added on Windows Live Mail, the program creates 5 new folders - Inbox , Drafts , Sent items , Junk e-mail Deleted items For all you Outlook Express users - The Junk e-mail folder was included in Windows Mail Vista as a part of the automated junk email filter utility and carried forward to Windows Live Mail email client. Step 3 - Modifying the properties of the email account The last step is to modify the properties of the newly set up email account. ♦ Right-click on the account in the left panel ♦ select " Properties ". ♦ Advanced tab. ♦ Check "Leave a copy of messages on server " ♦ "Remove from server when deleted ..." .
    [Show full text]
  • Dissertation Docteur De L'université Du Luxembourg
    PhD-FSTC-2012-10 The Faculty of Sciences, Technology and Communication DISSERTATION Defense held on 30/03/2012 in Luxembourg to obtain the degree of DOCTEUR DE L’UNIVERSITÉ DU LUXEMBOURG EN INFORMATIQUE by Cynthia WAGNER Born on 2nd August 1982 in Esch/Alzette (Luxembourg) SECURITY AND NETWORK MONITORING BASED ON INTERNET FLOW MEASUREMENTS Dissertation defense committee Dr Thomas Engel, dissertation supervisor Professor, Université du Luxembourg-SnT Dr Chrisptoh Schommer, Chairman Professor, Université du Luxembourg Dr Vijay Gurbani, Vice Chairman Professor, Illinois Institute of Technology and Bell Laboratories Dr Radu State Dr. habil., Université du Luxembourg – SnT Dr Jean Hilger Banque et Caisse d’Epargne de l’Etat (BCEE) 2 Acknowledgments This doctoral thesis has been realized at the SECAN-LAB of the Interdisciplinary Centre for Security, Reliability and Trust (SnT) and the University of Luxembourg. Writing this doctoral thesis without help and support from kind people would not have been possible. First of all, I would like to thank my supervisor, Prof. Dr. Thomas Engel, for giving me the opportunity of being a member of his research team for the last four years. I owe sincere and earnest thanks to my supervisor Dr.hab. Radu State for his support and advice. I want to thank Prof. Dr. Vijay Gurbani for being part in my CET committee. I owe sincere thanks to Dr. Jean Hilger and Prof. Dr. Christoph Schommer for participating in the jury of this thesis. Furthermore, I would like to thank Dr. G´erardWagener and Alexandre Dulaunoy from the Computer Incident Response Centre Luxembourg for providing relevant research data and especially for their scientific cooperation and support.
    [Show full text]
  • Web Tracking: Mechanisms, Implications, and Defenses Tomasz Bujlow, Member, IEEE, Valentín Carela-Español, Josep Solé-Pareta, and Pere Barlet-Ros
    ARXIV.ORG DIGITAL LIBRARY 1 Web Tracking: Mechanisms, Implications, and Defenses Tomasz Bujlow, Member, IEEE, Valentín Carela-Español, Josep Solé-Pareta, and Pere Barlet-Ros Abstract—This articles surveys the existing literature on the of ads [1], [2], price discrimination [3], [4], assessing our methods currently used by web services to track the user online as health and mental condition [5], [6], or assessing financial well as their purposes, implications, and possible user’s defenses. credibility [7]–[9]. Apart from that, the data can be accessed A significant majority of reviewed articles and web resources are from years 2012 – 2014. Privacy seems to be the Achilles’ by government agencies and identity thieves. Some affiliate heel of today’s web. Web services make continuous efforts to programs (e.g., pay-per-sale [10]) require tracking to follow obtain as much information as they can about the things we the user from the website where the advertisement is placed search, the sites we visit, the people with who we contact, to the website where the actual purchase is made [11]. and the products we buy. Tracking is usually performed for Personal information in the web can be voluntarily given commercial purposes. We present 5 main groups of methods used for user tracking, which are based on sessions, client by the user (e.g., by filling web forms) or it can be collected storage, client cache, fingerprinting, or yet other approaches. indirectly without their knowledge through the analysis of the A special focus is placed on mechanisms that use web caches, IP headers, HTTP requests, queries in search engines, or even operational caches, and fingerprinting, as they are usually very by using JavaScript and Flash programs embedded in web rich in terms of using various creative methodologies.
    [Show full text]
  • A Client Honeypot
    MASARYKOVA UNIVERSITY FACULTY OF INFORMATICS A CLIENT HONEYPOT MASTER’S THESIS BC. VLADIMÍR BARTL BRNO, FALL 2014 STATEMENT OF AUTHORSHIP Hereby I declare that this thesis is my original work, which I accomplished independently. All sources, references and literature I use or refer to are accurately cited and stated in the thesis. Signature:............................................ i ACKNOWLEDGEMENT I wish to express my gratitude to RNDr. Marian Novotny, Ph.D. for governance over this thesis. Furthermore, I wish to thank my family and my girlfriend for their support throughout the process of writing. TUTOR: RNDr. Marian Novotny, Ph.D. ii ABSTRACT This thesis discusses a topic of malicious software giving emphasis on client side threats and vulnerable users. It gives an insight into concept of client honeypots and compares several implementations of this approach. A configuration of one selected tool is proposed and tested in the experiment. KEYWORDS client honeypot, low-interaction, high-interaction, malware, attacker, exploit, vulnerability, Cuckoo Sandbox iii TABLE OF CONTENTS 1 INTRODUCTION .......................................................................................................................... 3 1.1 MOTIVATION ........................................................................................................................ 4 1.2 CONTRIBUTION .................................................................................................................... 6 2 BACKGROUND THEORY ..........................................................................................................
    [Show full text]
  • Deep Web for Journalists: Comms, Counter-Surveillance, Search
    Deep Web for Journalists: Comms, Counter-surveillance, Search Special Complimentary Edition for Delegates attending the 28th World Congress of the International Federation of Journalists * By Alan Pearce Edited by Sarah Horner * © Alan Pearce June 2013 www.deepwebguides.com Table of Contents Introduction by the International Federation of Journalists A Dangerous Digital World What is the Deep Web and why is it useful to Journalists? How Intelligence Gathering Works How this affects Journalists 1 SECURITY ALERT . Setting up Defenses 2 Accessing Hidden Networks . Using Tor . Entry Points 3 Secure Communications . Email . Scramble Calls . Secret Messaging . Private Messaging . Deep Chat . Deep Social Networks 4 Concealed Carry 5 Hiding Things . Transferring Secret Data . Hosting, Storing and Sharing . Encryption . Steganography – hiding things inside things 6 Smartphones . Counter-Intrusion . 007 Apps 7 IP Cameras 8 Keeping out the Spies . Recommended Free Programs . Cleaning Up . Erasing History . Alternative Software Share the Knowledge About the Authors Foreword by the International Federation of Journalists Navigating the Dangerous Cyber Jungle Online media safety is of the highest importance to the International Federation of Journalists. After all, the victims are often our members. The IFJ is the world’s largest organization of journalists and our focus is on ways and means to stop physical attacks, harassment and the killing of journalists and media staff. In an age where journalism – like everything else in modern life – is dominated by the Internet, online safety is emerging as a new front. In this new war, repressive regimes now keep a prying eye on what journalists say, write and film. They want to monitor contacts and they want to suppress information.
    [Show full text]