Secure File Deletion: Going, Going, Gone

Total Page:16

File Type:pdf, Size:1020Kb

Secure File Deletion: Going, Going, Gone Volume 111 April, 2016 Secure File Deletion: Going, Going, Gone ... You Hope! Inkscape Tutorial: How To Create Melted Text Testimonial: I Always Stay Close To PCLinuxOS Inkscape Tutorial: Easy Patterns Using The Stamping Tool PCLinuxOS Magazine And more insPaidge 1... In This Issue ... 3 Welcome From The Chief Editor 5 Inkscape Tutorial: Easy Patterns Using The Stamping Tool The PCLinuxOS name, logo and colors are the trademark of Texstar. 6 Screenshot Showcase The PCLinuxOS Magazine is a monthly online publication containing PCLinuxOS-related materials. It is published 7 Game Zone: American Truck Simulator primarily for members of the PCLinuxOS community. The magazine staff is comprised of volunteers from the 9 Screenshot Showcase PCLinuxOS community. 10 Secure File Deletion: Going, Going, Gone ... You Hope! Visit us online at http://www.pclosmag.com This release was made possible by the following volunteers: 24 Screenshot Showcase Chief Editor: Paul Arnote (parnote) Assistant Editor: Meemaw 25 PCLinuxOS Recipe Corner: Slow Cooker Cheesy Mexican Chicken Artwork: ms_meme, Meemaw Magazine Layout: Paul Arnote, Meemaw, ms_meme 26 ms_meme's Nook: Putting On The Ritz With PCLinuxOS HTML Layout: YouCanToo Staff: 28 PCLinuxOS Family Member Spotlight: Bill Grubbs ms_meme loudog Meemaw YouCanToo 29 Screenshot Showcase Gary L. Ratliff, Sr. Pete Kelly Daniel Meiß-Wilhelm Antonis Komis daiashi Khadis Thok 30 Inkscape Tutorial: How To Create Melted Text Alessandro Ebersol Smileeb 31 Playing Eldevin In PCLinuxOS Contributors: everstart mr-roboto 33 Tip Top Tips: Changing The GRUB Menu For ANY PCLinuxOS Media 34 Screenshot Showcase The PCLinuxOS Magazine is released under the Creative 35 Testimonial: I Always Stay Close To PCLinuxOS Commons Attribution-NonCommercial-Share-Alike 3.0 Unported license. Some rights are reserved. 36 Screenshot Showcase Copyright © 2016. 37 PCLinuxOS Puzzled Partitions 40 More Screenshot Showcase PCLinuxOS Magazine Page 2 Welcome From The Chief Editor In my heart, I knew this day was coming. The only repository had more packages available, with certain question was “when?” I kept hoping that it would things missing from the 64-bit repository. Plus, the continue to be “put off,” as it had been for quite “speed gains” of the 64-bit version over the 32-bit Disclaimer some time. But now, it looks like my beloved 32-bit version are negligible. I really don’t have an idea of versions of PCLinuxOS are approaching end-of-life what I would possibly do with that extra 0.01 1. All the contents of The PCLinuxOS Magazine are only for general status (EOL), and I am sad. seconds I might gain every day by running the 64-bit information and/or use. Such contents do not constitute advice version over the 32-bit version. and should not be relied upon in making (or refraining from making) any decision. Any specific advice or replies to queries in I have always ran the 32-bit versions of PCLinuxOS, any part of the magazine is/are the person opinion of such even on my 64-bit computers. Until now, I couldn’t Yes, I have an eclectic mix of older computers, some experts/consultants/persons and are not subscribed to by The justify running the 64-bit versions. The 32-bit utilizing the 64-bit architecture, and others utilizing PCLinuxOS Magazine. versions ran perfectly and efficiently, even on my 64- the 32-bit architecture. To keep things simple, it 2. The information in The PCLinuxOS Magazine is provided on an "AS IS" basis, and all warranties, expressed or implied of any bit computers. Need to access more than 3.2 GiB of made sense to use only the 32-bit version of kind, regarding any matter pertaining to any information, advice memory? No problem! Just use the PAE kernel, PCLinuxOS. It prevented me from having to or replies are disclaimed and excluded. which made up to 64 GiB of RAM accessible to the remember which computer was capable of what, 3. The PCLinuxOS Magazine and its associates shall not be liable, 32-bit version. And up until recently, the 32-bit and having to remember the adjustments I might at any time, for damages (including, but not limited to, without have to make for each. limitation, damages of any kind) arising in contract, rot or otherwise, from the use of or inability to use the magazine, or any of its contents, or from any action taken (or refrained from being Now, I have no choice but to “upgrade” (I put that in taken) as a result of using the magazine or any such contents or for any failure of performance, error, omission, interruption, quotes because the 32-bit version runs so perfectly deletion, defect, delay in operation or transmission, computer on all of my computers) to the 64-bit version of virus, communications line failure, theft or destruction or PCLinuxOS. If I don’t, I’ll eventually lose access to unauthorized access to, alteration of, or use of information contained on the magazine. updates, with software that is forever frozen in time. My back is up against the wall, so to speak. 4. No representations, warranties or guarantees whatsoever are made as to the accuracy, adequacy, reliability, completeness, suitability, or applicability of the information to a particular I won’t be able to “upgrade” any time soon. Yes, I situation. All trademarks are the property of their respective have the 64-bit Live CD ISOs downloaded (my wife’s owners. computer went completely wonky, and a 5. Certain links on the magazine lead to resources located on reinstallation will be easier and faster than trying to servers maintained by third parties over whom The PCLinuxOS Magazine has no control or connection, business or otherwise. fix the current xorg issues). But with a remodeling These sites are external to The PCLinuxOS Magazine and by project that MUST be done relatively soon, due to visiting these, you are doing so of your own accord and assume the new baby coming in August, I just don’t have the all responsibility and liability for such action. time currently to sit down and do anything but the Material Submitted by Users periodic updates via Synaptic. A majority of sections in the magazine contain materials submitted by users. The PCLinuxOS Magazine accepts no responsibility for the In short, the EOL status of the 32-bit version could content, accuracy, conformity to applicable laws of such material. not have possibly come at a worse time for me. The three computers in my possession that I use the Entire Agreement These terms constitute the entire agreement between the parties with most are 64-bit. But with every ounce of free time respect to the subject matter hereof and supersedes and replaces all being dedicated to getting my long delayed prior or contemporaneous understandings or agreements, written or remodeling project finished (when I had the money, I oral, regarding such subject matter. PCLinuxOS Magazine Page 3 Welcome From The Chief Editor didn’t have the time, and when I had the time, I didn’t have the money … a real Catch 22!), coupled with trying to maintain and run this magazine, there isn’t any leftover time in the month to sit down and deal with this “upgrade.” Plus, all of my computers – 32 and 64 bit – purr happily along on the 32-bit version of PCLinuxOS that is currently installed on every single one of my computers. What I hate the most is the wanton waste of my computers with 32-bit architecture. These are perfectly fine computers, even if they are “old” by modern standards. They purr happily along, performing their tasks reliably. These computers are not yet ready for the trash heap. They have plenty of life still left inside them, and are still useful. Woe is me! Donate To PCLinuxOS Until next month, and still from the 32-bit version of PCLinuxOS, I bid you peace, happiness, serenity Community Supported. and prosperity. No Billionaires/Millionaires. No Corporate Backing Or Funding. Click here to make a one-time donation 2 through Google Checkout. It's easier than E=mc It's elemental Or, click one of the amounts down below It's light years ahead to make a monthly, recurring donation. A magazine just isn't a magazine It's a wise choice without articles to fill the pages. It's Radically Simple If you have article ideas, or if you It's ... would like to contribute articles to the PCLinuxOS Magazine, send an email to: [email protected] We are interested in general articles about Linux, and (of course), articles specific to PCLinuxOS. PCLinuxOS Magazine Page 4 Inkscape Tutorial: Easy Patterns Using The Stamping Tool by Meemaw We can expand on this. Remember that when you select your object, and click a second time, the rotate arrows appear, along with a little plus sign on We have created loads of really fun things over the the center of your object. Depending on where the past several years. Sometimes the creation design is plus sign appears, since it serves as the center of something that repeats or something that copies a rotation, you can make all sorts of different designs certain shape. We can duplicate or multiple duplicate just by changing the center of rotation. to get what we want, but maybe that’s too slow. I found this tutorial not too long ago, and it discusses If we leave it in the center, we get the following: Using the selection tool, move the plus sign to one the stamping tool. Let’s experiment! end (I actually moved it past the line end, as you can see), then grab the other end to rotate it.
Recommended publications
  • CERIAS Tech Report 2017-5 Deceptive Memory Systems by Christopher N
    CERIAS Tech Report 2017-5 Deceptive Memory Systems by Christopher N. Gutierrez Center for Education and Research Information Assurance and Security Purdue University, West Lafayette, IN 47907-2086 DECEPTIVE MEMORY SYSTEMS ADissertation Submitted to the Faculty of Purdue University by Christopher N. Gutierrez In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy December 2017 Purdue University West Lafayette, Indiana ii THE PURDUE UNIVERSITY GRADUATE SCHOOL STATEMENT OF DISSERTATION APPROVAL Dr. Eugene H. Spa↵ord, Co-Chair Department of Computer Science Dr. Saurabh Bagchi, Co-Chair Department of Computer Science Dr. Dongyan Xu Department of Computer Science Dr. Mathias Payer Department of Computer Science Approved by: Dr. Voicu Popescu by Dr. William J. Gorman Head of the Graduate Program iii This work is dedicated to my wife, Gina. Thank you for all of your love and support. The moon awaits us. iv ACKNOWLEDGMENTS Iwould liketothank ProfessorsEugeneSpa↵ord and SaurabhBagchi for their guidance, support, and advice throughout my time at Purdue. Both have been instru­ mental in my development as a computer scientist, and I am forever grateful. I would also like to thank the Center for Education and Research in Information Assurance and Security (CERIAS) for fostering a multidisciplinary security culture in which I had the privilege to be part of. Special thanks to Adam Hammer and Ronald Cas­ tongia for their technical support and Thomas Yurek for his programming assistance for the experimental evaluation. I am grateful for the valuable feedback provided by the members of my thesis committee, Professor Dongyen Xu, and Professor Math­ ias Payer.
    [Show full text]
  • Terms & Conditions
    Terms & Conditions “SCS Video Contest 2020” contest (“Contest”) is organized by SCS Software s.r.o. with its registered office in Jihlavská 1558/21, Praha, 14000, Czech Republic, Identification Number 28181301, entered into Commercial Register maintained by Prague City Court, Section C, Insert No. 131111 (“Promoter”). The Contest Page is https://blog.scssoft.com/2020/01/scs-video-contest.html. The Contest is open to individuals aged eighteen (18) years or older, except employees, agents, contractors or consultants of the Promoter and their immediate families, the Promoter's associated companies and anyone else professionally connected with the Contest (“Entrants”). This Contest is void where prohibited by local law. The Contest is only open for players of a legal Steam copy of the game Euro Truck Simulator 2 or American Truck Simulator with an unlimited Steam account. Definition of the Limited Steam User Account is available on https://support.steampowered.com/kb_article.php?ref=3330-IAGK- 7663. There is no entry fee and no additional purchase is necessary to enter the Contest. To participate in the Contest each Entrant shall make a video capturing their play of either (i) Euro Truck Simulator 2 game, DLC Road to Black Sea or (ii) American Truck Simulator game, DLC Washington or Utah (“Video”); Euro Truck Simulator 2 and American Truck Simulator cannot be combined in one Video, Washington and Utah can be combined in one Video. Only one Video per Entrant will be included in the Contest, should an Entrant send more videos, only the one first received will be considered and any subsequent ones will be disregarded.
    [Show full text]
  • File Scavenger User Guide
    File Scavenger® Version 3.2 Comprehensive Data Recovery Tool For Microsoft® Windows® 7, Vista, XP, 2008, 2003, 2000 and NT User’s Guide Revision: 4 Date: September 2010 QueTek® Consulting Corporation COPYRIGHT © Copyright 1998-2010. This document contains materials protected by International Copyright Laws. All rights reserved. No part of this manual may be reproduced, transmitted or transcribed in any form and for any purpose without the express written permission of QueTek® Consulting Corporation. TRADEMARKS Companies and products mentioned in this manual are for identification purpose only. Product names or brand names appearing in this manual may or may not be registered trademarks or copyrights of their respective companies. NOTICE Reasonable effort has been made to ensure that the information in this manual is accurate. QueTek® Consulting Corporation assumes no liability for technical inaccuracies, typographical, or other errors contained herein. QueTek® Consulting Corporation provides this manual “as is” without warranty of any kind, either express or implied, including, but not limited to the implied warranties or conditions of merchantability or fitness for a particular purpose. In no event shall QueTek® Consulting Corporation be liable for any loss of profits, or for direct, indirect, special, incidental or consequential damages arising from any defect or error in QueTek® Consulting Corporation’s products or manuals. Information in this manual is subject to change without notice and does not represent a commitment on the part of QueTek® Consulting Corporation. User Guide - ii LICENSE AGREEMENT AND LIMITED WARRANTY READ THE FOLLOWING TERMS AND CONDITIONS CAREFULLY PRIOR TO PURCHASING THE LICENSE CODE TO UNLOCK FILE SCAVENGER®.
    [Show full text]
  • User's Manual Undelete® for Windows
    User’s Manual Undelete® for Windows® Up-to-the-minute Data Protection® July 2007 This document describes the installation and operation of the Undelete file recovery solutions. It applies to the Server, Desktop Client, Professional and Home Editions of Undelete and is intended for Windows users and system managers. Revision/Update Information: This is a revised manual Software Versions: Undelete 5.0 Server Edition Undelete 5.0 Professional Edition Undelete 5.0 Home Edition Undelete 5.0 Desktop Client Operating Systems: Windows Server 2003 Windows XP Windows 2000 Diskeeper Corporation, Burbank, California ________________________ July 2007 _________ © 2000 — 2007 by Diskeeper Corporation The Software described in this document is owned by Diskeeper Corporation and is protected by United States copyright laws and international treaty provisions. Therefore, you must treat the Software like any other copyrighted material (e.g. a book or musical recording) except that you may either (a) make one copy of the Software solely for backup or archival purposes, or (b) transfer the Software to a single hard disk provided you keep the original solely for backup or archival purposes. You may not copy the user documentation provided with the Software, except for your own authorized use. RESTRICTED RIGHTS LEGEND The software and documentation are provided with RESTRICTED RIGHTS. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 or subparagraphs (c)(1) and (2) of the Commercial Computer Software-Restricted Rights at 48 CFR 52.227-19 as applicable.
    [Show full text]
  • USER MANUAL Welcome to American Truck Simulator
    USER MANUAL Welcome to American Truck Simulator American Truck Simulator takes you on a journey through the breathtaking landscapes and widely recognized landmarks around the States. American Truck Simulator puts you in the seat of a driver for hire entering the local freight market, making you work your way up to become an owner-operator, and go on to create one of the largest transportation companies in the United States. Getting Started System requirements Minimum System Requirements: Operating system: Windows 7 64-bit Processor: Dual core CPU 2.4 GHz Memory: 4 GB RAM Graphics: GeForce GTS 450-class (Intel HD 4000) Storage: 3 GB available space Recommended System Requirements: Operating system: 7/8.1/10 64-bit Processor: Quad core CPU 3.0 GHz Memory: 6 GB RAM Graphics: GeForce GTX 760-class (2 GB) Storage: 3 GB available space Installation To install American Truck Simulator insert the game DVD into your DVD-ROM drive. Follow the on-screen instructions to complete the set-up process. If installation fails to start automatically, proceed by following these steps: 1. Open My Computer 2. Select and open your DVD-ROM drive 3. Find setup.exe and execute it 4. Follow the on-screen instructions to complete the set-up process Launching American Truck Simulator Start by clicking the “American Truck Simulator” icon on your desktop Creating a Profile To play American Truck Simulator you have to create a profile – a virtual person that will represent you in the game. Choose your name, gender, picture, preferred truck design, a logo and name for your company, confirm and start playing.
    [Show full text]
  • (Electronic) Trash: True Deletion Would Soothe E-Discovery Woes
    Minnesota Journal of Law, Science & Technology Volume 7 Issue 2 Article 13 2006 Throwing Out the (Electronic) Trash: True Deletion Would Soothe E-Discovery Woes Andrew Moerke Mason Follow this and additional works at: https://scholarship.law.umn.edu/mjlst Recommended Citation Andrew M. Mason, Throwing Out the (Electronic) Trash: True Deletion Would Soothe E-Discovery Woes, 7 MINN. J.L. SCI. & TECH. 777 (2006). Available at: https://scholarship.law.umn.edu/mjlst/vol7/iss2/13 The Minnesota Journal of Law, Science & Technology is published by the University of Minnesota Libraries Publishing. MASON_FINAL_UPDATED 6/7/2006 6:39:12 PM Throwing Out the (Electronic) Trash: True Deletion Would Soothe E-Discovery Woes * Andrew Moerke Mason Electronic discovery (e-discovery) consumes time, money, and resources like few other aspects of modern-day litigation. Deleted data, metadata, backup data, and other intangible forms of information make e-discovery more complex and contentious than traditional discovery.1 Computer users generate and retain electronic documents with ease, leading to significantly greater amounts of data than in a paper-only world.2 E-discovery’s volume and complexity increase litigation costs and complicate discovery disputes between parties, draining both party and judicial resources. More vexing than other areas of e-discovery, e-discovery of deleted data demands expensive forensic techniques, dampens business productivity, and holds no guarantee of yielding evidence. Parties anguish over whether deleted files on a computer hard drive could contain information critical to a © 2006 Andrew Moerke Mason. * J.D. expected 2007, University of Minnesota Law School; B.S. 1999, University of California, Berkeley.
    [Show full text]
  • Data Erasure on Magnetic Storage
    “HENRI COANDA” GERMANY “GENERAL M.R. STEFANIK” AIR FORCE ACADEMY ARMED FORCES ACADEMY ROMANIA SLOVAK REPUBLIC INTERNATIONAL CONFERENCE of SCIENTIFIC PAPER AFASES 2011 Brasov, 26-28 May 2011 DATA ERASURE ON MAGNETIC STORAGE Mihăiţă IVAŞCU Metra, Bucharest, Romania Abstract: User data is left is left on the hard drives removed from computers and storage systems, creating a data security vulnerability that many users are unaware of. This is mostly due the fact that normal “delete” or “format” commands leave data intact on a user computer. The cardinal rule of computer storage design has been to protect user data at all costs. Disk drives supply primary mass storage for computer systems designed to prevent accidental erasure of data. Techniques such as “recycle” folders and “unerase” commands are common ways that operating systems try to prevent accidental sanitization of user data. Deletion of file pointers is standard to speeds data writing, because actual overwriting of file data is far slower. These measures taken to protect and speed access to user data can make that data vulnerable to recovery by unauthorized persons. There is an urgent need for a capability to reliably erase data and prevent access to data from retired computer hard disk drives for security and privacy reasons. Data sanitization needs arise differently depending upon user application. The current work presents standards for data erasure, most important methods of data sanitization of hard disk drives and presents how a customized method of data erasure can be implemented. Keywords: recycle, data sanitization, recovery, security vulnerability 1. INTRODUCTION 2. COMPLETE ERASURE OF USER DATA When a computer is lost or disposed of, active and discarded data typically remains 2.1 Known methods of “deleting” data.
    [Show full text]
  • Encase Forensic Version 6.18.0.59
    EnCase Forensic Version 6.18.0.59 Test Results for Deleted File Recovery and Active File Listing Tool (Revised) June 23, 2014 This report was prepared for the Department of Homeland Security Science and Technology Directorate Cyber Security Division by the Office of Law Enforcement Standards of the National Institute of Standards and Technology. For additional information about the Cyber Security Division and ongoing projects, please visit www.cyber.st.dhs.gov. June 2014 Test Results for Deleted File Recovery and Active File Listing Tool: EnCase Forensic Version 6.18.0.59 Revised Contents Introduction ......................................................................................................................... 1 How to Read This Report ................................................................................................... 1 1 Results Summary .......................................................................................................... 2 1.1 FAT ........................................................................................................................ 3 1.2 ExFat ...................................................................................................................... 3 1.3 NTFS ...................................................................................................................... 3 1.4 ext ........................................................................................................................... 3 1.5 HFS+ .....................................................................................................................
    [Show full text]
  • A Study of Hard Drive Forensics on Consumers' Pcs: Data
    A Study of Hard Drive Forensics on Consumers’ PCs: Data Recovery and Exploitation B. Dawn Medlin Appalachian State University Joseph A. Cazier Appalachian State University One of the first actions to take when getting rid of an old personal computer is to remove all of the files that contain identifying and personal information. Individuals can be surprisingly negligent in this effort. Many individuals may also believe that by simply moving their files to the recycle bin and then emptying that bin that all of their programs and files are permanently erased. If personal information is not totally deleted, acts of identity theft can easily occur. Our research study identified the types of information found and/or recovered from hard disk drives on computers that have been donated to charity, sold second-hand, or otherwise donated to other organizations for reuse. Of the fifty-five hard drives studied approximately 300,000 files contained identifiable information. Results showed the need for further training in relation to total file erasure from a hard drive as well as the negative results such as identity theft that can occur due to this lack of training or knowledge. INTRODUCTION Wiping a computer clean is not as easy as it may appear. Just deleting the personal files and emptying the recycle bin is essentially next to useless. The delete function only removes file names from a directory list and makes the sectors the files occupy on the hard drive available for future use. Meanwhile, these files actually continue to exist. To positively prevent data from recovery, disks can be removed from disk drives and broken up, or even ground to microscopic pieces.
    [Show full text]
  • Data Spillage Remediation Techniques in Hadoop
    Data Spillage Remediation Techniques in Hadoop Srinivas Jantali, Sunanda Mani College of Computer and Information Science Northeastern University Boston, USA {jantali.s, mani.s}@husky.neu.edu Abstract— Hadoop implements its own file system HDFS to different Hadoop clusters. A situation may arise where the (Hadoop Distributed File System) designed to run on commodity employee accidentally places a classified piece of data on the hardware to store and process large data sets. Data Spillage is a cluster meant for unclassified data. This situation is called data condition where a data set of higher classification is accidentally spillage and threatens the confidentiality of the classified data. stored on a system of lower classification. When deleted, the spilled Hadoop further augments the situation by replicating the data data remains forensically retrievable due to the fact that file across multiple data nodes, since it is designed to do so. The systems implement deletion by merely resetting pointers and spilled data is generally referred to as “dirty data” and the data marking corresponding space as available. The problem is nodes on which the dirty data resides are referred to as “dirty augmented in Hadoop as it is designed to create and store multiple nodes”. copies of same data to ensure high availability, thereby increasing risk to confidentiality of data. This paper proposes three approaches to eliminate such risk. In the first approach, the spilled data is securely overwritten with zero and random fills multiple times at the OS level, to render it forensically irretrievable. In the second approach, the Hadoop inbuilt delete function is enhanced to implement a secure deletion mechanism.
    [Show full text]
  • Bitraser for File User Guide for Version 4
    BitRaser for File User Guide for Version 4 Legal Notices | About Stellar | Contact Us 1. General Information 1.1. About BitRaser for File BitRaser for File is a complete solution to maintain your computer privacy by erasing worthless yet sensitive information from your computer. Erased data is beyond recovery. BitRaser for File can be used to erase files/folders, Unused space, and System traces. BitRaser for File erases files & folders completely from hard drive. You can select multiple files/folders at a time for erasure. Once files / folders from the Drive are erased using BitRaser for File no one will ever be able to recover that data. The software allows you to generate and save the certificate for the successful erasure process. In addition, it can erase unused space completely such that all traces of previously stored data will be completely removed. When you delete data from hard drive, the data content is not deleted entirely, instead the space occupied by the data is marked as unused space and the new data is written on that unused space. BitRaser for File also erases all the system traces. Operating systems store records of all activities such as browsing Internet and opening documents constantly. In addition, deleted or formatted data leaves traces on hard drive. Data recovery software use these traces to recover data, making the hard drive inefficient. Extremely secure algorithms which confirm to the US Government DoD standards are used to ensure permanent data deletion. BitRaser for File can use any of the algorithms for erasure process. The software is menu driven, simple to use with an intuitive interface, and requires no prior technical skill.
    [Show full text]
  • New 2021 Catalogue
    GTR Racing Simulator. There is no comparison. Since 2010, Abtivan has been offering professional grade GTR simu- lators at an affordable cost available to those in North America (USA, Canada, Mexico) Europe (UK, Germany, France, Italy, Spain) Austra- lia and Japan. Through our license with Microsoft, and financial backing from the Franz Collection, we seek to bring further innovative gaming periph- erals compatible with the GTR framework to market in the near fu- ture. We’d like to welcome you to the GTR family and hope to see you on the track, virtual or otherwise! RS30 Ultra Wheel and V3 Pro 4 GTSF Model / GTS Model ---- 10 Pedals GTM Model ------------------ 5 GT Model / Touring Model 11 GTA-F Model w/ CoolerMas- 6 GTA Lite Model -------------- 12 ter Special Edition - Limited GTA Pro Model -------------- 7 Office Chair ------------------ 13 GTAF Model ----------------- 8 CRJ Model ------------------- 14 GTA Model ------------------ 9 Wholesale Information ------- 15 2 Sold at the following .com retailers: 3 RS30-ULTRA-WHEEL and V3-PRO-PEDALS The Future of GTR Officially licensed by Microsoft, GTR Simulator has created a racing wheel and pedal set that only delivers victories on Xbox and titles such as Forza Motorsport, Forza Horizon, Project Cars, Need For Speed and any and all racing games. Whether you’re a casual gamer looking for that arcade feel or want to lay down some serious track time to compete against the best, GTR Simulator and Microsoft have your back. 4 GTM model It’s a driving experience unlike any other Specifications
    [Show full text]