The Busy Lawyer's Guide to Legal Technology, with Wellness

Total Page:16

File Type:pdf, Size:1020Kb

The Busy Lawyer's Guide to Legal Technology, with Wellness The Busy Lawyer’s Guide to Legal Technology, with Wellness featuring Barron K. Henley Friday, December 13, 2019 presented by The South Carolina Bar Continuing Legal Education Division http://www.scbar.org/CLE SC Supreme Court Commission on CLE Course No. 197138 The Busy Lawyer’s Guide to Legal Technology, with Wellness featuring Barron K. Henley Friday, December 13, 2019 This program qualifies for 6.0 MCLE Credit Hours, including up to 1.0 LEPR Credit Hour and 1.0 SA/MH Credit Hour. SC Supreme Commission on CLE Course #: 197138 8:30 a.m. Registration & Continental Breakfast 8:55 a.m. Welcome and Opening Remarks 9 a.m. A Lawyer's Guide to PDF Files 10 a.m. Ethical Legal Tech Security Measures Every Lawyer Must Take 11 a.m. Break 11:15 a.m. Microsoft Word Power Tips for Legal Users 12:15 p.m. Lunch (provided) Sponsored by the South Carolina Bar - Solo & Small Firm Section 1 p.m. Champagne Technology on a Beer Budget 2 p.m. 60 Legal Tech Tips, Tricks, Gadgets and Websites in 60 Minutes 3 p.m. Break 3:15 p.m. Stress and Anxiety and the Practice of Law Shannon Furr Bobertz, Esq. S.C. Department of Natural Resources – Columbia 4:15 p.m. Adjourn The Busy Lawyer’s Guide to Legal Technology, with Wellness Speakers Barron K. Henley, Esq. Affinity Consulting Group Columbus, OH BARRON K. HENLEY, ESQ. is one of the founding partners of Affinity Consulting Group, a legal technology consulting firm focused on automating and streamlining law firms and legal departments. He earned his B.S./B.A. (marketing and economics) and J.D. from The Ohio State University and is a member of the American, Ohio and Columbus Bar Associations, and the Worthington Estate Planning Council. He is a Fellow in the College of Law Practice Management, and a member of both the ABA Law Practice Management and the Real Property Trust and Estate Law ("RPTE") Sections. He's a former member of RPTE Futures Task Force, a former Board Member for the ABA TECHSHOW, and is the former Chair of the Ohio State Bar Association Law Office Automation & Technology Committee. Mr. Henley heads Affinity’s document assembly/automation and software training departments. Barron is also an expert in launching new law firms, overhauling existing firms, and documenting and re-engineering law firm processes. Finally, Barron teaches continuing legal education (CLE) classes throughout the U.S. and Canada covering a wide variety of topics related to law practice management, technology and ethics. Shannon Furr Bobertz, Esq. SC Department of Natural Resources Columbia, SC Shannon Furr Bobertz graduated from the South Carolina School of Law school in 2002, cum laude. While in law school Shannon was an Associate Articles Editor on the SC Law Review and a member of the Wig and Robe. After graduation, she clerked for Justice Costa Pleicones on the SC Supreme Court. After her clerkship, she went into private practice focusing on civil litigation and municipal law with a private firm, where she was a partner. Shannon joined SC Department of Natural Resources in 2013 and was appointed Chief Counsel in 2014. Shannon is a member of the American Board of Trial Advocates (ABOTA) and was chosen as a Rising Superlawyer in 2013. Shannon was awarded the Silver Compleat Lawyer Award by the USC School of Law in 2014. She was selected by The State Newspaper as a recipient of the “20 Under 40” award in 2015. She was also awarded the Meritorious Service Award in 2018 by the Director and Chairman of the DNR Board for her work for DNR. She served as a SCDNR Deputy Law Enforcement Officer from 2013-2019. Shannon completed the National Conservation Leadership Institute (NCLI) in 2019. She also served as a Bar Examiner and an Adjunct Professor at the USC School of Law. Shannon served on the SC Bar Wellness Task Force, and is a regular practitioner of yoga. She currently serves as a part time municipal judge for the City of Cayce. Table of Contents A Lawyer’s Guide to PDF Files .......................................................................................................5 Barron Henley Ethical Legal Tech Security Measures Every Lawyer Must Take ................................................101 Barron Henley Microsoft Word Power Tips for Legal Users .................................................................................135 Barron Henley Champagne Technology on a Beer Budget ....................................................................................333 Barron Henley 60 Legal Tech Tips, Tricks, Gadgets and Websites in 60 Minutes ..............................................391 Barron Henley Stress and Anxiety and the Practice of Law ..................................................................................501 Shannon Furr Bobertz SC Bar-CLE publications and oral programs are intended to provide current and accurate information about the subject matter covered and are designed to help attorneys maintain their professional competence. Publications are distributed and oral programs presented with the understanding that the SC Bar-CLE does not render any legal, accounting or other professional service. Attorneys using SC Bar-CLE publications or orally conveyed information in dealing with a specific client's or their own legal matters should also research original sources of authority. ©2019 by the South Carolina Bar-Continuing Legal Education Division. All Rights Reserved THIS MATERIAL MAY NOT BE REPRODUCED IN WHOLE OR IN PART WITHOUT THE EXPRESS WRITTEN PERMISSION OF THE CLE DIVISION OF THE SC BAR. TAPING, RECORDING, OR PHOTOGRAPHING OF SC BAR-CLE SEMINARS OR OTHER LIVE, BROADCAST, OR PRE-RECORDED PRESENTATIONS IS PROHIBITED WITHOUT THE EXPRESS WRITTEN PERMISSION OF THE SC BAR - CLE DIVISION. A Lawyer’s Guide to PDF Files Barron K. Henley, Esq. [email protected] Affinity Consulting Group LLC 1405 Dublin Road, Suite 100 Columbus, OH 43215 614.340.3444 www.affinityconsulting.com ©2019 Affinity Consulting Group LLC A Lawyer’s Guide to PDF Files Table of Contents I. Introduction ................................................................................................................. 1 A. PDF (Portable Document Format) Files ................................................................. 1 B. A Little History ....................................................................................................... 1 C. PDF Released As Open Standard ........................................................................... 1 D. What Is PDF/A? ...................................................................................................... 2 E. Why Lawyers Are Using PDFs ................................................................................ 2 1. Worldwide Standard .................................................................................. 2 2. Protect the Document ............................................................................... 2 3. Collaboration ............................................................................................. 2 4. Easy Creation ............................................................................................. 2 5. Easy Combination ...................................................................................... 2 6. Forms ......................................................................................................... 3 F. Microsoft Office and Acrobat Integration .............................................................. 3 II. Tools for Creating PDFs ................................................................................................ 3 A. Basic Types of PDFs ............................................................................................... 3 1. Image Only PDFs ........................................................................................ 3 2. Searchable PDFs ......................................................................................... 3 B. What Can Be Converted To A PDF ......................................................................... 3 C. Programs You Can Use .......................................................................................... 4 1. Adobe Acrobat Pro DC ............................................................................... 4 2. Adobe Acrobat Standard DC ...................................................................... 4 3. Kofax/Nuance Power PDF Advanced ......................................................... 4 4. Kofax/Nuance Power PDF Standard ........................................................... 4 5. Nitro Pro Included with Nitro Productivity Suite ....................................... 4 6. Foxit PhantomPDF for Business ................................................................. 4 7. Foxit PhantomPDF Standard ...................................................................... 4 8. pdfDocs Pro by DocsCorp .......................................................................... 4 9. PDF-XChange Pro ....................................................................................... 4 D. Acrobat Version Differences .................................................................................. 5 III. The Acrobat X and XI Interface ..................................................................................... 5 A. Main Window ........................................................................................................ 5 B. Main Functionality of Each Section........................................................................ 5 Page 1 C. Customizing
Recommended publications
  • What Is Threat Hunting?
    $whoami ◎ Apurv Singh Gautam (@ASG_Sc0rpi0n) ◎ Security Researcher, Threat Intel/Hunting ◎ Cybersecurity @ Georgia Tech ◎ Prior: Research Intern at ICSI, UC Berkeley ◎ Hobbies ◎ Contributing to the security community ◎ Gaming/Streaming (Rainbow 6 Siege) ◎ Hiking, Lockpicking ◎ Social ◎ Twitter - @ASG_Sc0rpi0n ◎ Website – https://apurvsinghgautam.me 2 Agenda ◎ Introduction to the Dark Web ◎ Why hunting on the Dark Web? ◎ Methods to hunt on the Dark Web ◎ Can the Dark Web hunting be automated? ◎ Overall Picture ◎ OpSec? What’s that? ◎ Conclusion 3 Clear Web? Deep Web? Dark Web? 5 Image Source: UC San Diego Library Accessing the Dark Web ◎ Tor /I2P/ZeroNet ◎ .onion domains/.i2p domains ◎ Traffic through relays Image Sources: Hotspot Shield, Tor Project, I2P Project, ZeroNet 6 What’s all the Hype? ◎ Hype ○ Vast and mysterious part of the Internet ○ Place for cybercriminals only ○ Illegal to access the Dark Web ◎ Reality ○ Few reachable onion domains ○ Uptime isn’t ideal ○ Useful for free expression in few countries ○ Popular sites like Facebook, NYTimes, etc. ○ Legal to access the Dark Web 7 Relevant site types? ◎ General Markets ◎ PII & PHI ◎ Credit Cards ◎ Digital identities ◎ Information Trading ◎ Remote Access ◎ Personal Documents ◎ Electronic Wallets ◎ Insider Threats Image Source: Intsights 8 Sites Examples 9 Cost of products? ◎ SSN - $1 ◎ Fake FB with 15 friends - $1 ◎ DDoS Service - $7/hr ◎ Rent a Hacker - $12/hr ◎ Credit Card - $20+ ◎ Mobile Malware - $150 ◎ Bank Details - $1000+ ◎ Exploits or 0-days - $150,000+ ◎ Critical databases - $300,000+ 10 Product Examples 11 Image Source: Digital Shadows 12 Image Source: Digital Shadows 13 What is Threat Hunting? ◎ Practice of proactively searching for cyber threats ◎ Hypothesis-based approach ◎ Uses advanced analytics and machine learning investigations ◎ Proactive and iterative search 15 Why So Serious (Eh! Important)? ◎ Hacker forums, darknet markets, dump shops, etc.
    [Show full text]
  • Automating Security Checks
    Mag. iur. Dr. techn. Michael Sonntag Automating security checks Institute for Information Processing and Microprocessor Technology (FIM) Johannes Kepler University Linz, Austria E-Mail: [email protected] http://www.fim.uni-linz.ac.at/staff/sonntag.htm © Michael Sonntag 2010 Agenda Why automatization? What can be automated? Example: Skipfish How reliable are these tools? Practical examples of searching for vulnerabilities: Information collection with NMap Password cracking (John the Ripper, Ophcrack) Exploit scanning with Nessus Michael Sonntag Automating security checks 2 Why automatization? Ensuring security is not that hard for a single system You know it in detail When something is discovered, it is implemented and tested But: Many sites with many configuration options? Do you know them all? » Are they identical everywhere (versions!)? Do you have time to change everything accordingly? » Or do you depend on automatic updates/roll-out? Are you sure you did not miss one option somewhere? » Testing the same thing several times is tedious Solution: Automatic testing whether a problem exists Professionals write tests You just apply them » No need to know exactly how the attack works! Regular re-testing is possible Ad-hoc & patchy testing Systematic & comprehensive Michael Sonntag Automating security checks 3 Overlap with monitoring Some overlap with system monitoring exists Failures are just a “different kind” of attack Some problems may occur accidentally or intentionally » Example: Blacklisting of mail
    [Show full text]
  • An Investigation Into the Security and Privacy of Ios VPN Applications
    An Investigation Into the Security and Privacy of iOS VPN Applications Jack Wilson Division of Cybersecurity School of Design and Informatics Abertay University, Dundee A thesis submitted for the degree of Bachelor of Science with Honours in Ethical Hacking 1st May 2018 Word Count: 11,448 Abstract Due to the increasing number of recommendations for people to use VPN’s for privacy reasons, more app developers are creating VPN apps and publishing them on the Apple App Store and Google Play Store. In this ‘gold rush’, apps are being developed quickly and, in turn, not being developed with security fully in mind. This paper investigated a selection of free VPN applications available on the Apple App Store (for iOS devices) and test the apps for security and privacy. This includes testing for any traffic being transmitted over plain HTTP, DNS leakage and transmission of personally-identifiable information (such as phone number, IMEI 1, email address, MAC address) and evaluating the security of the tunnelling protocol used by the VPN. The testing methodology involved installing free VPN apps on a test device (an iPhone 6 running iOS 11), simulating network traffic for a pre-defined period of time and capturing the traffic (either through ARP spoofing, or through a proxy program such as Burpsuite). This allows for all traffic to be analysed to check for anything being sent without encryption. Other issues that often cause de-anonymisation with VPN applications such as DNS leakage can be tested using websites such as dnsleaktest.com. The research found several common security issues with the VPN applications that were tested, with a large majority of the applications tested failing to implement HTTPS.
    [Show full text]
  • User Guide Contents
    USER GUIDE CONTENTS What's new 4 About Magnet OUTRIDER 5 Getting started with Magnet OUTRIDER 6 System requirements 6 Use Magnet OUTRIDER on a dongle 6 Use a trial license of Magnet OUTRIDER 6 Understanding changes made to the system 7 Detecting Bitlocker encrypted drives 8 Scanning a target 9 Scan a computer 9 Encryption screening 9 Scan an external drive 10 Scan a folder 10 Configuring scan options 11 Locate files and apps settings 11 Collect artifacts and scan browser history settings 13 CSAM Detection Technology settings 14 Scan options 15 Reporting options 16 Miscellaneous options 16 Adding keywords and NCMEC report data to a search 17 Import a keyword list or NCMEC report data 17 View a keyword list or NCMEC report data 17 Export a keyword list or NCMEC report data 18 Reviewing scan results 19 Mark a CRC CSAM hit as a false positive 19 Starting a new scan 20 Supported application categories 20 Viewing and exporting scan reports 22 View scan reports 22 Navigating your scan report folder 22 Contents of scan reports 23 View and export an error list 23 Exporting filename keyword hits and CRC CSAM hits 25 Export filename keyword hits or CRC CSAM hits 25 Export a list of saved hits 25 Updating Magnet OUTRIDER 27 Update Magnet OUTRIDER manually 27 Automatically check for updates 27 User Guide WHAT'S NEW VERSION DESCRIPTION 2.1.0 l Updated Configuring scan options with information about scanning connected networks, new supported operating system artifacts, and customizing case and report locations. 2.0.0 l Updated Reviewing scan results with information about new supported apps.
    [Show full text]
  • A Philosophy of Technology for Computational Law
    © Mireille Hildebrandt, draft chapter for OUP’s The Philosophical Foundations of Information Technology Law, eds. David Mangan, Catherine Easton, Daithí Mac Síthigh A philosophy of technology for computational law Abstract: This chapter confronts the foundational challenges posed to legal theory and legal philosophy by the surge of computational law. Two types of computational law are at stake. On the one hand we have artificial intelligence in the legal realm that will be addressed as data-driven law, and on the other hand we have the coding of self-executing contracts and regulation in the blockchain, as well as other types of automated decision making (ADM), addressed as code-driven law. Data-driven law raises problems due to its autonomic operations and the ensuing opacity of its reasoning. Code-driven law presents us with a conflation of regulation, execution and adjudication. Though such implications are very different, both types of computational law share assumptions based on the calculability and computability of legal practice and legal research. Facing the assumptions and implications of data- and code-driven law the chapter will first investigate the affordances of current, text-driven law, and relate some of the core tenets of the Rule of Law to those affordances. This will lead to an enquiry into what computational law affords in terms of legal protection, assuming that one of the core functions of the law and the Rule of Law is to protect what is not computable. Keywords: positive law, rule of law, legal certainty, justice,
    [Show full text]
  • The Future Is Bright Complicated: AI, Apps & Access to Justice
    Oklahoma Law Review Volume 72 | Number 1 Symposium: Lawyering in the Age of Artificial Intelligence 2019 The Future Is B̶ r̶ i̶ g̶ h̶ t̶ ̶ Complicated: AI, Apps & Access to Justice Emily S. Taylor Poppe Follow this and additional works at: https://digitalcommons.law.ou.edu/olr Part of the Legal Ethics and Professional Responsibility Commons, Legal Profession Commons, and the Science and Technology Law Commons Recommended Citation Emily S. Taylor Poppe, The Future Is Br̶ i̶ g̶ h̶ t̶ ̶ Complicated: AI, Apps & Access to Justice, 72 Oᴋʟᴀ. L. Rᴇᴠ. 185 (2019). This Introduction is brought to you for free and open access by University of Oklahoma College of Law Digital Commons. It has been accepted for inclusion in Oklahoma Law Review by an authorized editor of University of Oklahoma College of Law Digital Commons. For more information, please contact [email protected]. THE FUTURE IS BRIGHT COMPLICATED: AI, APPS & ACCESS TO JUSTICE EMILY S. TAYLOR POPPE* Introduction Women’s garments typically have buttons on the left side with openings on the right, opposite the orientation of men’s garments. The practice is clearly a historical relic, with the best explanation being the following: when clothing designs became standardized, the wealthy women who could afford buttons did not dress themselves.1 The servants who dressed them were more likely to be right-handed, so the buttons were positioned on the woman’s left to make it easier for servants to manipulate the fasteners.2 This “button differential” reflects the fact that at one point in time, for the wealthy female portion of the population, dressing was not a task one did for oneself.3 Today, the placement of buttons is all that remains of this history.
    [Show full text]
  • Blocked-Chain: the Application of the Unauthorized Practice of Law to Smart Contracts
    Blocked-Chain: The Application of the Unauthorized Practice of Law to Smart Contracts SARAH TEMPLIN* INTRODUCTION In the decade since the release of the Bitcoin white paper by Satoshi Nakamoto,1 computer scientists and crypto-experts are on the cutting edge of using the blockchain for a wide array of uses, including currency and contracts. These uses of the blockchain have been slowly encroaching into regulated areas, including areas that may be ethically left to professional lawyers as practices of law. Regulators are taking notice of smart contracts and the blockchain. U.S. Commodity Futures Trading Commissioner Brian Quintenz expressed his perso- nal opinion that code developers of smart contracts using the blockchain could be under the regulatory purview of the CFTC. 2 The U.S. Securities and Exchange Commission brought an enforcement action against a crypto token trading plat- form that used a smart contract to execute trades.3 With regulators taking notice of the use of smart contracts in the marketplace, it seems almost inevitable that the regulators of the legal profession, including the state bar associations and state courts, will take notice of the ethical implications of the use of smart contracts on the legal profession. This note will explore the application of the unauthorized practice of law doc- trine to smart contracts and the implications for the legal profession of this appli- cation. In Part I, this note will summarize the mechanics of the technology of smart contracts and the blockchain, which forms the basis for today's smart con- tracts. In Part II, this note will explore the development and divergence of state doctrines of the unauthorized practice of law.
    [Show full text]
  • 2016 February Montana Lawyer
    Montana State Bar of Montana LawyerFebruary 2016 | Vol. 41, No. 4 42% of Montana legal professionals who responded to survey say they have been targets of work-related threats or violence Also in this edition: > ABA TECHSHOW 2016 — State > Former longtime Lake, Silver Bow Bar of Montana members eligible for county attorneys pass away — page 27 heavily discounted registration — > Matt Thiel reflects on Magna Carta’s See page 20 for details 800th anniversary — page 3 > Montana Supreme Court orders committee to study decline in bar > Supreme Court set oral arguments exam passage rates — page 11 in Bozeman and Missoula — page 12 Montana Lawyer 1 The official magazine of the State Bar of Montana published every month except January and July by the State Bar of Montana, 7 W. Sixth Ave., Suite 2B, P.O. Box 577, Helena MT 59624. 406-442-7660; Fax 406-442-7763. INDEX E-mail: [email protected] State Bar Officers February 2016 President Matthew Thiel, Missoula President-Elect Bruce M. Spencer, Helena Feature Stories Secretary-Treasurer Survey: Threats, violence against attorneys common ................. 14 Jason Holden, Great Falls Immediate Past President Supreme Court Summaries ................................................................... 18 Mark D. Parker, Billings ABA TECHSHOW 2016 ............................................................................. 20 Chair of the Board Leslie Halligan, Missoula Essential Data Backup Practices for Your Office ............................. 21 Board of Trustees Optimize Your iOS Devices for the Enterprise ................................ 23 Elizabeth Brennan, Missoula Marybeth Sampsel, Kalispell Liesel Shoquist, Missoula Ellen Donohue, Anaconda Shari Gianarelli, Conrad Regular Features Paul Haffeman, Great Falls Kent Sipe, Roundup Member News ...............................................................................................4 Luke Berger, Helena Kate Ellis, Helena State Bar News ...............................................................................................7 J.
    [Show full text]
  • Online Legal Services: the Future of the Legal Profession
    Online Legal Services: The Future of the Legal Profession By: Richard S. Granat, Esq. President, DirectLaw, Inc. | Granat Legal Services, P.C. http://www.directlaw.com | www.mdfamilylawyer.com Introduction This statement discusses the delivery of online legal services over the Internet, and how rules of professional responsibility can function as a deterrent to innovation in the delivery of legal services. Certain ethical rules have the effect, in my opinion, of making legal services higher in cost than they should be, uneven in quality, and unresponsive to what the average consumer really wants. The legal profession is highly stratified, with the largest number of practitioners, who are either solo practitioners or who work in small law firms, serving consumers and small business. Our largest law firms generally serve large corporations and their interests. My experience has been primarily with solos and small law firms serving consumers and small business. I am also a solo practitioner, operating a virtual law firm in Maryland, where I am a member of the bar, from my home in Palm Beach Gardens, Florida. Thus my remarks should be understood from that perspective, although some of my analysis also applies to large law firm. ****** Background: Information Technology and the Legal Profession In general, the American Bar Association (ABA) has urged the legal community to get online. In 2000, ABA President William G. Paul established the "eLawyering Taskforce: Lawyers Serving Society through Technology" with the purpose of enabling lawyers to figure out how to deliver legal services online. At the time, President Paul observed that many industries were being transformed by the Internet and that consumers were conducting transactions online in such industries as the travel industry, the brokerage industry, the insurance industry, and the banking industry.
    [Show full text]
  • Chapter 5 Results
    CHAPTER 5 RESULTS 5.1 Results This chapter will discuss the results of the testing and comparison of the password cracking tools used. This chapter can be summarized as follows: • Research Data and Result Analysis (Locally) • Research Data and Result Analysis (Remotely) • Research Data and Result Analysis (Alphabets only) • Research Data and Result Analysis (Alphabets and a special character) 5.2 Research Data and Result Analysis (Locally) In Figure 16, Ophcrack was used to crack the local users' password with different combinations of password, alphabets, alphanumeric, alphanumeric special characters, english and non-english words. In Figure 17, Ophcrack was used to crack the same password, but excluding the 3 password that were not cracked in the previous attempt. In Figure 18, Cain was used to crack the local users' password. 35 36 Figure 16 - Ophcrack cracked 7 of 10 passwords Figure 17 - Ophcrack cracked 7 of 7 passwords 37 Figure 18 - Cain cracked 5 of 10 passwords 5.3 Research Data and Result Analysis (Remotely) First, the author scans the network for active IP address with NMAP (Figure 19). He used the command of "nmap -O 192.168.1.1-254" to scan the network, it would scan each IP address for active computer. The command -O enabled operating system detection. From the result of the scanning, there were few ports in the state of open and the services that were using those ports, 135/TCP, 139/TCP, 445/TCP and 1984/TCP. Another important detail was the OS details; it showed that the computer was running under Microsoft Windows XP Professional SP2 or Windows Server 2003.
    [Show full text]
  • Best VPN Services in 2017 (Speed, Cost & Usability Reviews)
    10/8/2017 Best VPN Services in 2017 (Speed, Cost & Usability Reviews) Best VPN Services VPN Reviews & In-Depth Comparisons Brad Smith Sep 18, 2017 With the help of John & Andrey (https://thebestvpn.com/contact-us/), we’ve put together a list of best VPNs. We compared their download/upload speed, support, usability, cost, servers, countries and features. We also analyzed their TOS to see if they keep logs or not and whether they allow P2P and work with Netflix. here’s a link to the spreadsheet (https://docs.google.com/spreadsheets/d/11IZdVCBjVvbdaKx2HKz2hKB4F Z_l8nRJXXubX4FaQj4/) You want to start using a VPN, but don’t know which software/service to use? In this page, we’ve reviewed 30+ most popular VPN services (on going process). In order to find out which are best VPNs, we spent some time on research and speed testing: 1. Installed 30+ VPN software on our personal devices, such as Windows, Mac, Android and iOS and compared their usability. 2. Performed Download/Upload speed tests on speedtest.net to see which had best performing servers. 3. Double checked if they work with Netflix and allow P2P. 4. Read their TOS to verify if they keep logs or not. 5. Compared security (encryption and protocols). That means we’ve dug through a large number of privacy policies (on logging), checked their features, speed, customer support and usability. If you know a good VPN provider that is not listed here, please contact us and we’ll test it out as soon as possible. 5 Best VPNs for Online Privacy and Security Here are the top 5 VPN services of 2017 after our research, analysis, monitoring, testing, and verifying.
    [Show full text]
  • Password Security - When Passwords Are There for the World to See
    Password Security - When Passwords are there for the World to see Eleanore Young Marc Ruef (Editor) Offense Department, scip AG Research Department, scip AG [email protected] [email protected] https://www.scip.ch https://www.scip.ch Keywords: Bitcoin, Exchange, GitHub, Hashcat, Leak, OWASP, Password, Policy, Rapid, Storage 1. Preface password from a hash without having to attempt a reversal of the hashing algorithm. This paper was written in 2017 as part of a research project at scip AG, Switzerland. It was initially published online at Furthermore, if passwords are fed through hashing https://www.scip.ch/en/?labs.20170112 and is available in algorithms as is, two persons who happen to use the same English and German. Providing our clients with innovative password, will also have the same hash value. As a research for the information technology of the future is an countermeasure, developers have started adding random essential part of our company culture. user-specific values (the salt) to the password before calculating the hash. The salt will then be stored alongside 2. Introduction the password hash in the user account database. As such, even if two persons use the same password, their resulting The year 2016 has seen many reveals of successful attacks hash value will be different due to the added salt. on user account databases; the most notable cases being the attacks on Yahoo [1] and Dropbox [2]. Thanks to recent Modern GPU architectures are designed for large scale advances not only in graphics processing hardware (GPUs), parallelism. Currently, a decent consumer-grade graphics but also in password cracking software, it has become card is capable of performing on the order of 1000 dangerously cheap to determine the actual passwords from calculations simultaneously.
    [Show full text]