background preloader

Mailvelope

https://www.mailvelope.com/

Related:  GeekTips

Raymond Wang: How germs travel on planes Close Help with subtitles Desktop / laptop users: please make sure you have the most updated versions of your browser and Flash player, and that Flash is enabled when you visit TED.com. Hacking the Internet - bringing down infrastructure Why should hackers try to disable computers when they might be able to set their sights higher? Routers can be just as vulnerable as servers, so why not bring down the entire Internet? The US Department for Homeland Security (DHS) was set up in November 2002 with the primary responsibility of protecting the USA and its territories from terrorist attacks, accidents, and natural disasters. However, its remit has slowly spread in recent years to cover the nation's Critical National Infrastructure, which includes the structure of the Internet itself.

Does listening to pure gamma brainwave entrainment everyday help overcome depression and improve memory? by angelica I've been listening for about four days (for about an hour each day) to a pure gamma brainwave video which I downloaded from the internet a few days ago -- thinking that it would improve my memory and cure episodes of depression (as this is the only reason why I am into it right now). I intended to use the same everyday for four weeks... only to find out here (in one of the comments posted here) that listening to one type of brainwave is not advisable.

Undocumented iOS Features left Hidden Backdoors Open in 600 Million Apple Devices A well known iPhone hacker and forensic scientist has unearthed a range of undocumented and hidden functions in Apple iOS mobile operating system that make it possible for a hacker to completely bypass the backup encryption on iOS devices and can steal large amounts of users’ personal data without entering passwords or personal identification numbers. Data forensics expert named Jonathan Zdziarski has posted the slides (PDF) titled “Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices” showing his findings, from his talk at the Hackers On Planet Earth (HOPE X) conference held in New York on Friday. Jonathan Zdziarski, better identified as the hacker "NerveGas" in the iPhone development community, worked as dev-team member on many of the early iOS jailbreaks and is also the author of five iOS-related O'Reilly books including "Hacking and Securing iOS Applications." EVERY SET OF INFORMATION OF iOS USERS IS AT RISK

VoIP: voicing security concerns Channelling voice calls over IP networks has brought many advantages to enterprise communications, but it also creates some security risks. Though Voice over Internet Protocol (VoIP) services are available for both consumer and business markets, it is from the latter that most enthusiasm for it has come; for this reason, it is also where most of VoIP's security issues occur. While the commercial sector has, of course, invested heavily in protecting their data networks from other cyber threats, IP-based voice has been somewhat overlooked. VoIP describes a set of services used to manage the delivery of voice transmissions over a broadband Internet connection instead of using time-division multiplexing (TDM) over a traditional public switched telephone network (PSTN). It works by transmitting analogue voice signals as digitised packets over the Internet allowing it to share the same connections as other digital technologies. Free calls for all?

How Can You Control Your Brainwave State? For many thousands of years spiritual sages, rishis, yogis, shamans, monks, whatever you would like to call them, have been perfecting the process of meditation to induce deep meditative states. They would have to spend many hours a day of quieting the mind and controlling their brainwave states. This is just not practical for most people to do in their hectic modern lifestyles. Meet KeySweeper, the $10 USB charger that steals MS keyboard strokes It sounds like the stuff of a James Bond flick or something described in documents leaked by former NSA subcontractor Edward Snowden. In fact, the highly stealthy keystroke logger can be built by someone with only slightly above-average technical skills for as little as $10. Called KeySweeper, it's a device disguised as a functioning USB wall charger that sniffs, decrypts, logs, and transmits all input typed into a Microsoft wireless keyboard.

Online Visual Traceroute Map Data Map data ©2017 Google, INEGI Map Satellite NuMeditationMusic The Native American Flute can transport one to a more relaxed and calm state, especially after listening for 10 minutes or more. This feeling is known as the ‘alpha’ state, a state during which your brain is pulsing at a lower rate than your mental and emotional fluctuations. (Price, Creating and Using the Native American Love Flute, 1994). One of the most impactful ways to develop this alpha state, is by focusing on the breath.

Stealthy malware targeting air-gapped PCs leaves no trace of infection Researchers have discovered highly stealthy malware that can infect computers not connected to the Internet and leaves no evidence on the computers it compromises. USB Thief gets its name because it spreads on USB thumb and hard drives and steals huge volumes of data once it has taken hold. Unlike previously discovered USB-born malware, it uses a series of novel techniques to bind itself to its host drive to ensure it can't easily be copied and analyzed. It uses a multi-staged encryption scheme that derives its key from the device ID of the USB drive. A chain of loader files also contains a list of file names that are unique to every instance of the malware. Some of the file names are based on the precise file content and the time the file was created.

Quantum cryptography: using photons to create secure keys It is essential that cryptography remains well ahead of the hackers, and that's precisely the motivation for a project that uses the quantum mechanical properties of photons to create tamper-proof keys. The future for the protection of sensitive data could be bright. Researchers have uncovered evidence that the quantum mechanical properties of photons (light particles) may be used to generate tamper-proof keys, and this represents a big leap forward in the fight against computer hackers and other cyber-security threats. Four and a half years ago, the EU-funded Secure Communication based on Quantum Cryptography (SECOQC) consortium successfully demonstrated long-distance, practical quantum-key distribution (QKD) in a fibre-optic network around the Austrian capital Vienna.

Related: