1 Just the Basics DVD Contents

Total Page:16

File Type:pdf, Size:1020Kb

1 Just the Basics DVD Contents 1 Just the Basics DVD contents (revised daily) Presented by the Sequim PC Users group Compiled by Steve Solberg Updated: July 9, 2017 June 30, 2008 (original date for class & materials) These two DVDs have full courseware material for the Just the Basics class. All programs are Freeware or Open Source. Documents from past presentations are in separate folders according to the type of document. All programs updated to the latest versions as of this update. All programs come with a description or a user manual. Note1: Some programs have 32 bit and 64 bit versions then both programs are listed. Note2: There is a description inside each folder with a URL for reference and future updates. Note 3: This is a new layout using Tables from MS Word for easy reading. Note 4: All of these programs work with Windows 10 unless otherwise specified. Categories Programs Version Short Description Comments Anti-Virus MS Security 4.10.0219.0 Win Vista & Win 7 (32 & 64 bit) for Very Good Essentials Win XP use Avast Free MS Malicious 5.49 32 Bit and 64 Bit Good Software Removal Tool McAfee Stinger 12 .1 (Standalone) just click to run or burn to CD MS Defender 4.1 Built into Win 10 Excellent Avast Free Antivirus 17.5 Will work with WinXP and above Good Note: Win Windows Defender 4.5 Program built into Windows 8, 8.1 Excellent 8,8.1 & 10 & 10 Users SpyWare & CCleaner 5.31.6104 updated to work with Win7, Malware Win8/Win8.1/Win10 Removers CCleaner Portable 5.31.6104 CCEnhancer 4.4.2 Adds support for CCleaner Malwarebytes 3.1.2.1733 detects and removes malware Very Good SuperAntiSpyware 6.0.1244 Malwarebytes Anti- 1.08 protects popular applications from Exploit zero-day exploits Malwarebytes 6.047 Scan and remove unwanted AdwCleaner toolbars & Pop-ups 2 Meta Defender 3.12.5.777 Uses over 40 anti-malware engines Client to scan for malware. Cybereason 2.3.0.0 Protects against 99% of RansomFree ransomware strains eBook Readers, Editor & Library eBook Reader Calibre (32 & 64 bit) 3.3.0 Digital library and format Excellent & Converters converter (updated weekly) IceCream Ebook 4.53 EPUB, MOBI, and DJVU formats Good Reader Kindle for PC 1.20.47037 Read Kindle books on your PC Applications Essential PIM Free 7.5.1 Powerful and versatile personal information manager (PIM) RGS CardMaster 7.0.3 Contacts/address/phonebook program (PIM) BS1 General Ledger 2016.6 Accounting software Watch My Budget 2.53.0 software to Visualize, Plan and Lite Track your money Finance Explorer 7.3.1 Simple and easy to us Stock Stalker 2.5.7 Stock quote monitoring and tracking application Money Manager Ex 1.2.7 Portable Ableword 3.0 PDF Editor Notepad ++ Portable 7.4.2 Source code editor and Notepad replacement (Portable) Classic Shell 4.3.0 Make Win 8.1/10 look like XP or Very good Win 7 PortableApps.com 3.5 Take your favorite software with Excellent Installer you on a USB flash drive Portable Apps 14.4.1 collection of portable apps Excellent Platform VeraCrypt Portable 1.19 Excellent 3 Dog & Cat My Pets 1.30 Store any information related to Database pets Coding Geany 1.28 Lightweight IDE for C++ Internet TapinRadio 2.05 Listen and record internet radio Radio stations. Astronomy RegiStax 6.1 software for Alignment and stacking/processing of images PDF Reader Foxit PDF Reader 8.2.1 Tabbed; Better than Adobe reader Very good PDF Reader Sumatra PDF Reader 3.1.2 In addition to PDF’s this reads eBook formats ePub & Mobi QR Code Gen QR Code Generator V1.220 Program to generate QR codes Smartphone Samsung Kies 3.2.16044_2 Samsung phone manager, backup Very good & recovery Samsung Smart 4.1.17054.16 Transfer data from other phones Switch to Samsung MyPhoneExplorer 1.8.8 Manage and organize your smartphone. Office Suite Libre Office 5.3.4 Similar to MS Office (with manual) Very Good will open word perfect files SSuite Various small office programs Portable JPG to Word 1.0 JPG to Word is a free file converter PDF to Word 2.0 DSpeech 1.58.8 Text to Speech MS Onedrive 17.3 Desk Top client for OneDrive Java & Flash Java & Flash URLs Flash 16 For IE and other browsers MATH MS Mathematics 4.0 graphing calculator Calculatormatik 1.15.260 math tool that includes many calculators and converters Fx-Calc 4.8.6.2 Complex calculations 4 Gravity Nu 2.07 GRAVITY Nu for visualization of gravitational force effects between N objects. DPLS Scientific 2.8.0.1 20 functions, including math, Calculator triangle, vector, gas laws, angular motion, resistor code, statistical, half-life, molar mass and molarity calculators Education Mimosa Small School 7.0.3 Scheduling and course planning Edition software Internet Apps Skype 7.38 Video VoIP from MS Group Video Vuze 5.7.5.0 Bit torrent client with encryption Very nice Google Voice & Needed for Hangouts and voice Video Plugin calling BitTorrent Sync 2.3.6 Share files between multiple devices using P2P WordPress 4.8 Publishing platform VoIP TeamTalk 5.2.3 Internet based video & audio conferencing application Laptop Apps TouchFreeze 1.1.0 Automatically disables touchpad while you are typing text Win 10 Apps Windows 10 Final July 29, 2015 Shell Enhancement ShutUp10 1.5.1390 Portable, Privacy Controls Ultimate Windows 4.2.3 Win 10 only (Portable) Tweaker Win 10 Media 32 and 64 bit, download Win 10 Excellent Creation Tool ISO Hide or show Win 10 July 29, 2015 updates GWX Control Panel 1.7.4.1 Turn off the Get Win 10 app 5 Win10 Privacy 2.4.1.0 Windows 10 Privacy Never10 1.1 Disables upgrade to Win 10 Windows 10 Update Disable Updates, Turn off or Turn Switch On Windows updates easily Win 8 Apps Win 8 Apps Troubleshoot problems with an Troubleshooter App Win 8 Synaptic 16.3.15.1 touchscreen gestures Touchpad Driver Win 8 Upgrade Asst. Win 8.1 Upgrade Note: Will not work with Win XP or Assistant Win Vista, upgrade to 10 Win 8 Features 1.0 Fixes Windows 8 features Download Fix download errors Win 8 App Remover 0.55 Remove unwanted apps easily Windows WinApp_Manager 14.02.02 Manage and update Apps Apps CodeTwo Outlook 1.3.1 Easily export Outlook data to CSV Export files (office 97 to office 2016) Virtual Keyboard 3.0.1 WinXP,Vista,7,8,10 Win 10 Apps Win10 Privacy 2.1.5.2 Prevent Win10 from tracking Privacy Repairer 1.4.0.0 Virtualization VMware Player 12.5.6- Easily run any virtual machine on a Software 5528349 Windows or Linux PC VirtualBox 5.1.22 5.1.22.115126 Oracle Music and Audacity 2.1.3 Audio editor with manual Excellent Audio Editors Wavosaur 1.2.0.0 Audio editor, similar to Audacity Excellent ocenaudio 3.2.10 Free audio editor with advanced features OrDrumbox 0.9.19 drum machine software 6 Music2pc 2.2.2.239 free program to find and Good download MP3 songs Music Wire 2.2 Search by track, author or album Excellent name (Portable) MusicBee Portable 3.0.6335 Organize, find and play music files Excellent Deep Ripper 1.1 Convert music from audio CD’s Foobar 2000 1.3.15 Advanced audio player WinAmp Full 5.66 Last edition of this fine player MediaMonkey 4.1.4.1709 Also has program for Android Good Pocket Radio Player 06012017 Simple, small internet radio player Free Music & Video 1.97 Listen or download free music good Downloader Everyone Piano 2.0.3.10 Turn your computer into a piano K-Lite Mega Codec 13.3.3 With the K-Lite Codec Pack you Pack should be able to play all the popular movie formats and even some rare formats. (32 & 64 bit) Ultimate M4a to 1.04 MP3 Converter LameXP 4.14 LameXP is a graphical user- interface (front-end) for various audio encoders Internet TapInRadio 2.06 Internet radio stations Radio Radiola 2.0.5 listen to online radio stations 7 Mail Clients Thunderbird 52.2.1 Good POP & IMAP client replacement for Outlook Express GroupMail 6.0.0.29 Free Edition KLS Mail Backup 4.0.0.5 Back up and restore your Windows Mail, Windows Live Mail, Outlook Express, Mozilla Thunderbird, Firefox, Opera, Postbox, The Bat! and IncrediMail Browsers Mozilla FireFox 54.0 Latest and very good browser Excellent added 64 Bit version, one of three browsers that support HTTPS Everywhere Config Fox 1.0 Utility to manage Firefox advanced and hidden settings Opera 45.0.2552.898 Built in VPN, one of three Good browsers that support HTTPS Everywhere Google Chrome 58.0 Supports HTTPS Everywhere Good PaleMoon 27.3.0 Pale Moon aims to provide more freedom of choice than Mozilla Secure TOR Browser Bundle 7.0.2 TOR (The Onion Router) Excellent browsing (Windows) anonymous surfing Advanced Onion 0.3.1.2 Alternative for Tor+Vidalia+Privoxy Router bundle for Windows users. TOX, QTox Beta Skype with Privacy, encrypted bit Good torrent technology Video & Msg. I2P 0.9.29 I2P is an anonymous overlay network Simple DNSCrypt 0.3.7 Encrypts traffic between your Excellent computer and supported DNS servers DNS Crypt 0.0.6 This is an older version Excellent 8 Proxy Mask 3.4.4 Hide your IP address, Bypass Internet Censorship and Filtering E-Mail Enigmail 1.9.1 OpenPGP plugin for Good Encryption Thunderbird/Icedove GPG4Win 2.3.4 Encryption software for e-mails Good and files GPG4USB 0.3.3-2 Portable USB frontend to write, Good encrypt and decrypt your text- messages and files Photo Editing Gimp 2.8.22 Similar to PhotoShop Very good Paint.net 4.0.16 Similar to PhotoShop Elements Excellent Fastone Image 6.2 Image browser, viewer, converter, Viewer and editor PhotoScape 3.7.0 PhoXo 8.3.0 Tiny free image editing software Irfanview 4.44 With 16mb of plugins VuePrint Pro 8.0 Now free from hamrick.com good Merge 2.4 Overlay two images or text Photo Restoration 3.2.13 For lost or deleted pics on USB or Easy to Recovery media drive for WinXP use Data Wise Data Recovery 3.5.188 File recovery for several
Recommended publications
  • Windows 7 End of Life Is Coming: Don't Put Your
    WINDOWS 7 END OF LIFE IS COMING: DON’T PUT YOUR BUSINESS AT RISK BY NOT MIGRATING INTRODUCTION After January 14, 2020, Microsoft will no longer provide free security updates or support for Windows 7 and Windows Server 2008/ 2008 R2 operating systems (OS). This means there will be no more patches available and no more technical support from Microsoft’s support center. If you continue using Windows 7 and Windows Server 2008/R2 after that date, your systems will be at risk due to potential new vulnerabilities and cyber attacks, unless you plan on paying for Windows Extended Security Updates (ESU). With ESU support fees starting at 25~30€ per device and doubling each year after 2020, running Windows 7 and Windows Server 2008/R2 in your environment will quickly become very expensive. To avoid paying these high support costs and to enable successful migration, companies should begin planning for the inevitable upgrade to Windows 10. WHAT ARE THE MAJOR RISKS? Risk of Vulnerabilities and Cyberattacks In 2018, there were 499 Windows desktop OS vulnerabilities reported across Windows Vista, Windows 7, Windows RT, Windows 8/8.1, and Windows 10. Of these, 169 were considered critical vulnerabilities. During the same period, there were 449 Windows Server vulnerabilities, of which 136 were critical. While there was a slight drop in the number of Windows vulnerabilities from 2017 to 2018, over the past 6 years the number has nearly doubled.1 The infamous WannaCry ransomware attack, which infected over 200,000 computers worldwide in May 2017, was the result of an unpatched vulnerability that affected Windows OS.
    [Show full text]
  • Omegakey Manage Your Device at the Management Module
    Welcome to use our latest version of Lost Mode How to Start to Use it Bluetooth tracker. Detect the distance between the device and Bluetooth Tracker module your phone under the lost mode .Turn on the Step 1: Download the latest version App(version 1.6.0) from Apple App store. omegakey Manage your device at the management module. alarm at alert whether the device is lost, there Step 2: Open the Bluetooth and App. are two levels of lost alarm mode. Select the Thank you for purchasing omegakey Freely set and remove your device here. Step 3: Tap the Beacon for 3-5 times on hard surface, and the Beacon will be connectable when you Double-click the “call” button to find your device. alarm mode you want from the device. Phone hear a buzz. alarm, and both ends alarm. Step 4: Click the Beacon in the App which you want to configure and enter a name to connect it. Step 5: Now, you can configure and use the Beacon normally. NEXT Note: If you're having trouble with the Bluetooth, we recommend you completely remove the battery from the unit for 10 sec and reinsert it. There are many apps you can download some are better than others, we have linked just click on the apple / android icons on the first page Once you have selected the app you like download it and follow the on screen instructions ATTACH BLUETOOTH BEACON EXTERNALLY FOR MAX PERFORMANCE Found mode More View the alarm location or item's last location Find the device under the find mode according p.s make sure your Bluetooth is on and your phone is compatible with 4.0 Bluetooth to the strength of the signal.
    [Show full text]
  • For Those in Operating System Limbo
    By Merle Windler, Thoroughbred Systems, Inc. ComputerComputerCornerCorner TenTen TipsTips forfor WindowsWindows 10,10, PartPart 11 .. .. .. Ah,Ah, Yes,Yes, ThatThat MeansMeans FiveFive forfor Now,Now, FiveFive LaterLater y the time this issue of The Lifeline is delivered, the announced deadline of June 29, 2016 will have passed Bfor a FREE Windows 10 upgrade for those with qualifying versions of Windows 7, Windows 8, or Windows 8.1. Hopefully the information provided on this subject in an earlier Computer Corner article helped readers not only in making up their minds when or if to update within the "FREE UPDATE" period, but also aided those who did so in making those updates go smoothly and without data loss. Some of Microsoft's customers were taken by surprise at the boldness of that corporate giant. As the deadline date Tip 1: Classic Shell Windows XP or approached, many found Microsoft's tactics to be nothing Windows 7 Style Menus short of pushy. We received scores of morning phone calls First, If you are a "creature of habit" and prefer the "old in the past month when municipal and rural water district style" classic Windows Menu style of Windows XP and staff realized that computers left on overnight had Windows 7 over the new “Menu and Tiles” and "Metro automatically begun the Windows 10 upgrade process Style Apps" appearance of Windows 10, don't worry, and they were faced with a screen asking them to there's a very popular FREE program called "Classic Shell" continue the Windows 10 upgrade by choosing “Next”, or that'll fix you right up.
    [Show full text]
  • A Future-Focused Forensic Imager Designed to Streamline Evidence Collection Processes
    A Future-Focused Forensic Imager Designed to Streamline Evidence Collection Processes Extremely fast forensic imaging speed surpassing 50GB/min. Clone PCIe to PCIe at speeds above 90GB/min Image to/from Thunderbolt™ 3/USB-C external storage enclosures with an optional I/O card. Image and verify from up to 5 source drives up to 9 destinations simultaneously Create a logical image to capture only specific files needed Concurrent Image+Verify greatly reduces duration of image plus verification process Two 10GbE connections provide fast network imaging performance Network capture feature to capture network traffic, VOIP, internet activity Multi-task. Image from multiple sources simultaneously FEATURES n The Falcon®-NEO achieves imaging speeds when imaging directly to large capacity Thunder- n Image from a Mac® computer with USB-C ports surpassing 50GB/min and can clone PCIe to PCIe bolt 3 RAID storage enclosures for evidence data using a USB-C to USB-A cable and Target Disk at speeds at over 90GB/min. collection. The card connects to the Falcon-NEO’s Mode or use Logicube’s USB boot device to n Image and verify to multiple image formats; 2 write-blocked source I/O ports or 1 destination I/O image a source drive from a Mac computer on the native copy, .dd, dmg, e01 and ex01. The Falcon- port. The I/O card does not currently support imaging same network without booting the Mac computer’s ® NEO provides MD5, SHA1, SHA256, and dual hash in TDM from Mac systems, refer to the Falcon-NEO native OS. The Falcon-NEO supports imaging from ® authentication at extremely fast speeds.
    [Show full text]
  • Windows 8 Anpassen Mit Classic Shell: Fenster Statt Kacheln
    Windows 8 anpassen mit Classic Shell: Fenster statt Kacheln Experten und Anwender sind sich einig: Windows 8 ist keine richtig runde Sache. Zwar bringt das aktuelle Microsoft-- System viele technische Verbesserungen. Doch seine doppelte Nutzeroberfläche kann ziemlich nerven. Classic Shell bringt das Startmenü zurück. Doch wer einen neuen Rechner braucht, muss nicht auf Windows 8.1 oder gar auf Windows 9 warten. Schon jetzt kann er mit kostenloser Zusatzsoftware Windows 8 entkacheln, sich das Startmenü zurückholen und so auch auf einem nagelneuen Windows-Rechner zur gewohnten Arbeitsweise zurückkehren. Dafür gibt es verschiedene Möglichkeiten. Eine davon ist das besonders beliebte, quelloffene Programm Classic Shell. Damit lässt sich die Windows-Oberfläche sehr vielseitig den jeweiligen Nutzervorlieben anpassen. Achtung: Diese Anleitung richtet sich zwar nicht an Voll- profis. Aber ein wenig Grundwissen über Windows wird vorausgesetzt. Wer sich unsicher ist, lässt sich beim Einrichten besser vom PC-Experten seines Vertrauens helfen. Schritt 1: Classic Shell installieren Das Programm Classic Shell ist leicht zu installieren. Damit die Menüpunkte auch in deutscher Sprache angezeigt werden, ist ein weiterer Schritt nötig. Nach erfolgreicher Installation lässt sich die Windows-Oberfläche nach Belieben anpassen. Classic Shell installieren Auswahl zwischen Programmmodulen. Das englischsprachige Installationsprogramm lässt sich auf der Startseite des Anbieters herunterladen. Nach dem Start und dem Annehmen der Lizenzvereinbarungen fragt es zunächst, welche Programmteile der Nutzer installieren will. Für die Wiedereinführung des Startmenüs und das Überspringen der Kachelansicht reicht das Modul „Classic Start Menu“. Die Module „Classic Explorer“ und „Classic IE9“ ermöglichen weitere Anpassungen des Windows Explorers und des Internet Explorers. „Classic Shell Update“ meldet dem Nutzer, wenn es eine neue Programmversion gibt.
    [Show full text]
  • Mobiflage: Deniable Storage Encryption for Mobile Devices 3
    TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 1 Mobiflage: Deniable Storage Encryption for Mobile Devices Adam Skillen and Mohammad Mannan Abstract—Data confidentiality can be effectively preserved through encryption. In certain situations, this is inadequate, as users may be coerced into disclosing their decryption keys. Steganographic techniques and deniable encryption algorithms have been devised to hide the very existence of encrypted data. We examine the feasibility and efficacy of deniable encryption for mobile devices. To address obstacles that can compromise plausibly deniable encryption (PDE) in a mobile environment, we design a system called Mobiflage. Mobiflage enables PDE on mobile devices by hiding encrypted volumes within random data in a devices free storage space. We leverage lessons learned from deniable encryption in the desktop environment, and design new countermeasures for threats specific to mobile systems. We provide two implementations for the Android OS, to assess the feasibility and performance of Mobiflage on different hardware profiles. MF-SD is designed for use on devices with FAT32 removable SD cards. Our MF-MTP variant supports devices that instead share a single internal partition for both apps and user accessible data. MF-MTP leverages certain Ext4 file system mechanisms and uses an adjusted data-block allocator. These new techniques for storing hidden volumes in Ext4 file systems can also be applied to other file systems to enable deniable encryption for desktop OSes and other mobile platforms. Index Terms—File system security, Mobile platform security, Storage Encryption, Deniable encryption ✦ 1 INTRODUCTION AND MOTIVATION plaintext can be recovered by decrypting with the true key. In the event that a ciphertext is intercepted, and the Smartphones and other mobile computing devices are user is coerced into revealing the key, she may instead being widely adopted globally.
    [Show full text]
  • Easypacks - Your Easyinstall® Application Portal
    EasyPacks - your EasyInstall® application portal Pre-packaged software and applications for EasyInstall, ready for download. Why spend precious time to pack, update and test standard software and applica- tions when it is already done. With a few clicks you can download the latest soft- ware from EasyPacks. Errors and security vulnerabilities is constantly found in standard applications and the software supplier issues updates on a regular basis - we keep an eye on this for you .... It can be fatal if standard applications are not kept up to date. Hackers are unfor- tunately extremely talented to exploit these vulnerabilities. As an example, if Java is not updated, which in itself is a huge security risk, it can cause lack of access to banking and other public services. All software is packed, tested, virus free and quality assured by IXP Data. We have more than 150 updated application packages ready for you and more keep coming. We ensure that packets are continuously updated and we will send you an e-mail when new downloads are ready. On the EasyPacks website you can contact us with suggestion for additional standard applications for EasyPacks. EasyPacks is a subscription service which is settled by number of EasyInstall li- censes. The subscription runs for 1 year. System requirements: EasyPacks require EasyInstall version 5 or higher IXP Data ApS • Søndre Alle 9 • 4600 Køge • VAT 32749305 • 56275402 • [email protected] • www.ixpdata.com Selected application packages: Java, CutePDF, Adobe Reader, Adobe Flash Player, Apple QuickTime,
    [Show full text]
  • {PDF} Start to Win: the Classic Text
    START TO WIN: THE CLASSIC TEXT PDF, EPUB, EBOOK Eric Twiname | 240 pages | 26 Apr 2011 | Bloomsbury Publishing PLC | 9781408111987 | English | London, United Kingdom Start to Win: The Classic Text PDF Book Once the installer finishes, you will be greeted with the basic settings screen for Classic Shell. Skip to content. First Run Tasks are not available in LayoutModification. For Windows 10, version , Office Desktop Bridge Subscription is required on all devices where the screen is Thanks John! Absolutely works, no need for complicated malarkey. Devices that upgrade to Windows 10, version , will not experience a change to their existing Start layout. Hot Latest. Skip to main content. You can also set Windows to show a few extra tiles in each column. On the other hand, if you really like the tiles and miss the full-screen Start experience from Windows 8, you can have the Start menu always open full screen. Classics It Paperback Books. However, most users have moved on to Microsoft Edge , a more modern and robust web browser. Set the DesktopApplicationLinkPath to a path to a shortcut link. Eric Twiname was an active dinghy sailor, a keen team racer and a Laser National Champion. If you have a full HD monitor or screen with X resolution or higher then you will observe that all the icons and texts become so small that they are really hard to read unless you scale them up. Top charts. Paperback Eric Van Lustbader Books. Another option is creating a custom folder full of program shortcuts and using a toolbar that points at that folder instead.
    [Show full text]
  • Deep Web for Journalists: Comms, Counter-Surveillance, Search
    Deep Web for Journalists: Comms, Counter-surveillance, Search Special Complimentary Edition for Delegates attending the 28th World Congress of the International Federation of Journalists * By Alan Pearce Edited by Sarah Horner * © Alan Pearce June 2013 www.deepwebguides.com Table of Contents Introduction by the International Federation of Journalists A Dangerous Digital World What is the Deep Web and why is it useful to Journalists? How Intelligence Gathering Works How this affects Journalists 1 SECURITY ALERT . Setting up Defenses 2 Accessing Hidden Networks . Using Tor . Entry Points 3 Secure Communications . Email . Scramble Calls . Secret Messaging . Private Messaging . Deep Chat . Deep Social Networks 4 Concealed Carry 5 Hiding Things . Transferring Secret Data . Hosting, Storing and Sharing . Encryption . Steganography – hiding things inside things 6 Smartphones . Counter-Intrusion . 007 Apps 7 IP Cameras 8 Keeping out the Spies . Recommended Free Programs . Cleaning Up . Erasing History . Alternative Software Share the Knowledge About the Authors Foreword by the International Federation of Journalists Navigating the Dangerous Cyber Jungle Online media safety is of the highest importance to the International Federation of Journalists. After all, the victims are often our members. The IFJ is the world’s largest organization of journalists and our focus is on ways and means to stop physical attacks, harassment and the killing of journalists and media staff. In an age where journalism – like everything else in modern life – is dominated by the Internet, online safety is emerging as a new front. In this new war, repressive regimes now keep a prying eye on what journalists say, write and film. They want to monitor contacts and they want to suppress information.
    [Show full text]
  • Mobigyges: a Mobile Hidden Volume for Preventing Data Loss, Improving Storage Utilization, and Avoiding Device Reboot
    MobiGyges: A Mobile Hidden Volume for Preventing Data Loss, Improving Storage Utilization, and Avoiding Device Reboot Wendi Fenga, Chuanchang Liua, Zehua Guob,c, Thar Bakerd, Gang Wangb,c, Meng Wanga, Bo Chenga, and Junliang Chena aBeijing University of Posts and Telecommunications, 10 Xitucheng RD, 100876, Beijing, China bBeijing Institute of Technology, 5 Zhongguancun ST South, 100081, Beijing, China cUniversity of Minnesota Twin Cities, 117 Pleasant ST, 55455, Minneapolis, USA dLiverpool John Moores University, James Parson Building, Liverpool, L3 3AF, UK Abstract Sensitive data protection is essential for mobile users. Plausibly Deniable Encryption (PDE) systems provide an effective manner to protect sensitive data by hiding them on the device. However, existing PDE systems can lose data due to overriding the hidden volume, waste physical storage because of the \reserved area" used for avoiding data loss, and require device reboot when using the hidden volume. This paper presents MobiGyges, a hidden volume based mobile PDE system, to fill the gap. MobiGyges addresses the problem of data loss by restricting each storage block used only by one volume, and it improves storage utilization by eliminating the \reserved area". MobiGyges can also avoid device reboot by mounting the hidden volume dynamically on-demand with the Dynamic Mounting service. Moreover, we identify two novel PDE oriented attacks, the capacity comparison attack and the fill-to-full attack. MobiGyges can defend them by jointly leveraging the Shrunk U-disk method and multi-level deniability. We implement the MobiGyges proof-of-concept system on a real mobile phone Google Nexus 6P with LineageOS 13. Experimental results show that MobiGyges prevents data loss, avoids device reboot, improves storage utilization by over 30% with acceptable performance overhead compared with current works.
    [Show full text]
  • Plus: Website Basics, Hosting & Annoyances
    FEBRUARY 2014 • VOLUME 30 • ISSUE 1 Official Magazine of the MELBOURNE PC USER GROUP INC. Plus: website basics, hosting & annoyances www.melbpc.org.au MELB PC PURPOSES THE PURPOSES OF THE GROUP are to conduct, on a non-profit basis, activities aimed at the FEBRUARY 2014 • VOLUME 30 • ISSUE 1 effective utilisation of the personal computer EDITORIAL PANEL and to endeavour to achieve such effective Lance Lloyd, Charles Wright utilisation by means of: EDITOR • Advancing computer literacy Katharine Shade, CCE Design • Advancing the art and science of [email protected] information processing through ART DIRECTOR/DESIGNER education and interchange of ideas Katharine Shade, CCE Design • Keeping members abreast of developments in computing and information technology CONTRIBUTORS Stephen Lake, Harry Lewis, Lance Lloyd, and enabling members to exchange Craig Mattson, Katharine Shade, George Skarbek, information and experience Fleur Stephens, John Swale • Representing computer users in public SIG Coordinator: Norman Elliman debate and by acting and speaking on their SIG Reports: Faye Barkla, Stephen Tidswell, behalf where they would be affected by Jean de Neef, Susan Jensen, Kathy Rouse, proposed legislation or other regulatory John Sapsford measures Calendar and Maps: John Swann • Providing a forum for the exchange of views among computer users and between computer users and the computer industry • Co-operating supporting or joining with, PUBLISHED BY or in, other organisations with similar MELBOURNE PC USER GROUP INC. purposes Suite 26, Level 1, 479 Warrigal Road • Undertaking other activities beneficial to Moorabbin, VIC 3189 the Group Office hours 9am-5pm In order to further its purposes the Group shall Phone (03) 9276 4000 have the rights, powers and privileges of a Email [email protected] Office Manager Dianne Vogt natural person.
    [Show full text]
  • USER FRIENDLY INDEX June-Dec 2015
    USER FRIENDLY INDEX: July to December, 2015 MEETING REPORTS AND PRESENTERS Month Page June 9, 2015: Earthquake Threat in Southern California Margaret Vinci, Caltech July 2 July 14, 2015: Defending the Internet by Rate Limiting David Andrews, Verizon August 2 August 11, 2015: Windows 10 and Beta Testing Kathy and Bruce Jacobs September 2 September 8. 2015: Toward a More Open Internet Michael Epstein October 2 October 13. 2015: New Trends in Social Media Kathy Jacobs November 2 November 10, 2015: Common Core Standards Megan Faux and Mary Spruce December 2 NOTICES AND MATTERS OF INTEREST LACS Is On Twitter and Facebook July 3 2015 APCXUG International Computer & Digital Technol ogy Conference August 4 2015 APCXUG International Computer & Digital Technology Conference July 3 2015 APCXUG International Computer & Digital Technology Conference September 18 2015 S.W. Technology and Computer Conference August 6 2015 S.W. Technology and Computer Conference July 7 2015 S.W. Technology and Computer Conference September 5 APCUG Reports December 3 APCUG Virtual Conference August 3 Combined Holiday Party and Dinner October 3 Holiday Dinner Party November 3 In Memoriam: Todd Martin July 5 LACS Is On Twitter and Facebook Monthly 8 LACS's Future July 4 Nominations for Officers and Directors September 3 Officers and Directors October 3 O'Reilly User Group Program Discontinued October 3 Podcasts October 8 Replying to LACS Yahoo Gro up Email August 3 Social Media SIG July 3 Suggestion Box Nov. / Dec. 3 Surveys September 3 Oct. /Nov. / The Latest User Friendly Issues Dec. 3 YouTube Space L.A. Happy Hour July / August 3 YouTube Space L.A.
    [Show full text]