Online File Sharing & Cloud Backup Backup Never lose a file, folder or version again. Automatically back up the things you need, on your schedule. Sync SpiderOak creates an easy way to sync data between your various devices. You can select specific folders across devices and/or drag and drop files into your Hive. iRing - The first motion controller for all your music apps and more Take Control Now control your music apps and effects without touching your device with the iRing™ touchless controller for iPhone, iPad and iPod touch. The new iRing uses hand gestures to control parameters of effects and other items in your music apps, allowing you to create stunning and dramatic music in an incredibly fun way by simply moving your hands in front of your device.
gabrieleponti.com Send To Toys 2.7 Description Send To Toys is an enhancement of the Send To system menu. - Send To Toys Control Panel Applet allows you to manage the Send To system menu content, and configure the various Send To Toys settings. - "Add to Send To menu" and "Remove from Send To menu" allows you to personalize the Send To system menu for drives, folders, and programs. - Send To "Clipboard (as content)" copies the content of the file to the clipboard. Secure Mobile Apps To achieve our goal of a comprehensive, privacy- and security-focused communications solution, Guardian is driven both by internal development and the open-source community at large. In cases where a viable, vetted, and usable product already fills the communications needs of our target audience, we will recommend apps that work. Our Apps Our apps are available on Google Play, Amazon, our F-Droid Repository, or download the APK directly from us.
The Higher Learning Nicholas Rubin is a 16-year old self-taught computer programmer from Seattle, Washington. He is also the inventor of Greenhouse, a new browser plugin that let’s you know exactly where politicians get their campaign funding from. When the plugin is active, the names of House or Senate members on any given webpage are highlighted. All you have to do is hover your mouse over the name of a politician, and a box will pop up showing all the industries and groups that contributed funds to their campaign, as well as how much the politician got from each sector. How to Hide Files in JPEG Pictures If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else. I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe! Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file! You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else.
Anti-NSA Blackphone: Encrypted Smartphone Designed to Liberate Users From Total Surveillance www.rt.com Silent Circle – an encryption firm that has made it its mission to defy NSA snooping – is releasing what it says will be the world’s most secure smartphone. “What we are trying to do is to make a smartphone whose whole purpose is to protect users’ privacy,” said Phil Zimmerman, a renowned cryptographer and one of Silent Circle’s founders. Makers say that both the hardware and software of the device, dubbed the Blackphone, has been specially modified, and all communication services come pre-installed, meaning the handset has “no hooks to carriers or vendors.” The company has partnered with Geeksphone, a niche Spanish phone manufacturer that uses the Android platform for its mobile devices. A darkened photo on the Blackphone website is the only hint as to how the device will look, and no specifications have been announced, though the producers say the phone will be manufactured in security-conscious Switzerland.
Security scorecard finds messaging apps need more development. Only six out of 39 messaging applications have the features needed to guarantee the security of communications sent over the Internet, according to an analysis by the Electronic Frontier Foundation (EFF). The results of the analysis, published as a scorecard on Tuesday, found that popular messaging apps—such as Facebook Chat, Apple’s FaceTime and iMessage, Microsoft’s Skype, and Yahoo Messenger—failed to meet all seven criteria, such as whether the application implements perfect forward secrecy and whether the source code had been audited for security. The group did the analysis as part of its campaign to promote the development of secure and usable cryptography, which is necessary in a world where government surveillance has become more common, Peter Eckersley, EFF’s technology projects director, told Ars. The study is intended to help direct companies who are actively developing secure-communication software, he said. The EFF evaluated each application against seven criteria.
API Welcome to the iDoneThis API! A complete list of endpoints is below, but before all that some basics. Browserability You can explore the API by requesting any endpoint from a browser. The response will be a page describing the endpoint along with a sample response. You can interact with the various endpoints directly from this interface. Home-built "Bio Computer" runs Linux, grows wheatgrass We've seen the wacky homebrew projects of computer hardware hacker Mike Schropp before. Mindful Gizmag readers may recall his triple quad-core i7 LEGO PC housing that we looked at last July. But his latest project, the "Bio Computer," is rather more oddball, taking a turn distinctly towards the horticultural with a PC case adapted to ... grow wheatgrass.
The Nine Most Secure and Private Internet and Mobile Messaging Services. Kaspersky Daily. In the age of Internet surveillance, private and secure messaging is a necessity. The Electronic Frontier Foundation recently published a thorough analysis measuring the security and privacy of a long list of mobile and Internet messaging services. Some providers passed with flying colors, others struggled to make the grade and a number just plain failed. Today, we’ll run through the good. Next week, we’ll take a look at the bad.
SkyJack: The drone that hijacks other drones in mid-air Amazon's Prime Air announcement last week brought concerns about the use of commercial drones to the fore, but one programmer may have just muddied the waters even more. Notable hacker Samy Kamkar recently modified a Parrot AR.Drone 2 with his custom software, called SkyJack, allowing it to seek out the wireless signals of other UAVs and take control of them, even while in flight. If his name sounds familiar, that's because Kamkar is the same hacker-turned-legit security researcher that released a worm that took down MySpace back in 2005 and later went on to expose security weaknesses in several major credit cards. For his latest project, Kamkar rigged a Parrot AR.Drone 2.0 with a Raspberry Pi, a USB battery, and two wireless adapters, before uploading his custom programming. The SkyJack software is designed for Linux devices and runs a few supporting programs in sequence to effectively hijack any drones in the area.