Create Blog

Technology Blogs (216)

Here is a list of Technology Blogs. A Blog is a journal you may enter about your life, thoughts, interesting experiences, or lessons you've learned. Post an opinion, impart words of wisdom, or talk about something interesting in your day. Update your blog on a regular basis, or just whenever you have something to say. Creating a blog is a good way to share something of yourself with others. Reading blogs is a good way to learn more about others. Click here to post a blog.

jarred1

Google is Watching you

Google is Watching you
Post Comment
peednama

LOVELY CHAT

yes ! this chat is between me and my heart.
he says there is no love in this world.
but i said that you are also in this world ! ! !
and it means you also have no love inside you.
So he gone some upset with me.
What to do now ?
Post Comment
jarred1

Internet Making Us Crazy?

Internet Making Us Crazy?
Post Comment
Baddabing66

Mingle2.com

Anybody know about a dating site call Mingle2.com? Two weeks ago I sign with that site and now I can't delete my account. The site is full of scammers and spammers.
Post Comment

Western Digital's hard drive encryption is useless

Totally useless

Rookie errors make it child's play to decrypt data

The encryption systems used in Western Digital's portable hard drives are pretty pointless, according to new research. It appears anyone getting hold of the vulnerable devices can easily decrypt them.

WD's My Passport boxes automatically encrypt data as it is written to disk and decrypt the data as it is read back to the computer. The devices use 256-bit AES encryption, and can be password-protected: giving the correct password enables the data to be successfully accessed.

Now, a trio of infosec folks – Gunnar Alendal, Christian Kison and "modg" – have tried out six models in the WD My Passport family, and found blunders in the software designs.

For example, on some models, the drive's encryption key can be trivially brute-forced, which is bad news if someone steals the drive: decrypting it is child's play. And the firmware on some devices can be easily altered, allowing an attacker to silently compromise the drive and its file systems.

"We developed several different attacks to recover user data from these password-protected and fully encrypted external hard disks," the trio's paper [slides PDF] states.

"In addition to this, other security threats are discovered, such as easy modification of firmware and on-board software that is executed on the user's PC, facilitating evil maid and badUSB attack scenarios, logging user credentials, and spreading of malicious code."

My Passport models using a JMicron JMS538S micro-controller have a pseudorandom number generator that is not cryptographically secure, and merely cycles through a sequence of 255 32-bit values. This generator is used to create the data encryption key, and the drive firmware leaks enough information about the state of the random number generator for this key to be recreated, we're told.

"An attacker can regenerate any DEK [data encryption key] generated from this vulnerable setup with a worst-case complexity of close to 240," the paper states.

"Once the DEK [data encryption key] is recovered, an attacker can read and decrypt any raw disk sector, revealing decrypted user data. Note that this attack does not need, nor reveals, the user password."

Drive models using a JMicron JMS569 controller – which is present in newer My Passport products – can be forcibly unlocked using commercial forensic tools that access the unencrypted system area of the drive, we're told.

Drives using a Symwave 6316 controller store their encryption keys on the disk, encrypted with a known hardcoded AES-256 key stored in the firmware, so recovery of the data is trivial.

It must be stressed that the flaws are in WD's software running on these microcontrollers, rather than the chips themselves.

Source:
Post Comment
Baddabing66

I closed my Plentyoffish Acoount

I recently closed my Plentyoffish account. I notice the other day when I was on that site; my computer warm me about potential virus on that site. Has this ever happen to any of you out there?
Post Comment
nonsmoker

3D printers

are a great bit of technology, For the past few years I have been seen some very creative fun uses for what I considered to be toys.
I was however amazed to see this article,


I personally think it to be one of the best uses to date seen to promote their use for anything other than toys.

A tribute to the ingenuity and spirit of Humanity yay

What was the last thing that you seen if ever, That made you proud to be part of the race. comfort ?

Have a great day My friends wave
Post Comment
Catfoot

Drinkable Water From Toilet To Tap.

Windhoek, the capital city of Namibia, is one of the few cities in Africa where you can safely drink tap water.applause

Though some residents still find it hard to swallow, they have been drinking the own waste since 1968. More than 25% of the water supply in Windhoek is reclaimed from municipal sewage water. In the 46 years since its inception, there had not been a single incident of bad water. The city is inhabited by 322,500 people.wow
Embedded image from another site

Namibia is one of the driest countries in the world. The average annual rainfall is around 370mm, while the average evaporation rate is 3400mm. The nearest perennial river is 700km from the city. With its growing population, the capital faced the choice of population control or looking at alternative water sources.help

While it seems not yet possible to extract edible proteins from sewage, water is a reality. Australia is looking into it and so is California. It is an expensive process, but expensive water is better than no water at all.hmmm
cats meow cats meow

You have a great day out there!wave
Post Comment
Lukeon

Google Play Apps

I'm just kind of curious if anyone has found any really useful apps( I know they all are useful) that can be downloaded on Google Play. If you have a teenage kid thats related to a lion then Life 360 is handy, and you can keep discreet tabs on him.uh oh (or maybe not)
cool
Thing is there are thousands available but which are really useful?dunno confused

Whats your personal favorite?
Embedded image from another site
Fuel Calculator?

Far too many to list...

confused
Post Comment
metaloona

Torrent Downloading Anonymity Lesson 2 Securing Yo

Hi People
Seen blogs about downloading Torrents?
Okay cool yeah get it for free But Alarm.
How to Stay Anonymous While Torrenting?

HOW TO MAKE VPNS EVEN MORE SECURE
From being a niche product used by the few, in the past few years VPN services have hit the big time. These days more and more Internet users see running a privacy enhancing service as a requirement rather than just a luxury. Today we take a look at a few tips and tricks that can enhance the security of any VPN.

While simple to set up and use out of the box, it may comes as a surprise that the security of VPN anonymity services can be improved. Of course, when things run absolutely to plan there’s little to worry about, but there are occasions where there may be a hiccup or where an extra level of security is needed.

SECURING YOUR PRIVACY WHEN YOUR VPN FAILS
Ok, so you’ve purchased your VPN subscription, enabled the service, and you’re enjoying your new found levels of privacy. Then – disaster strikes. While you were away from your machine somehow and for some unknown reason your VPN disconnected and now snoopers have a clear view of your IP address.
To protect against the event of VPN failure/disconnection, disable any internet access that does not tunnel through your VPN service provider,” Andrew from PrivateInternetAccess “This can be achieved using specific Firewall rules (Ubuntu) or by changing TCP/IP routes.

But of course, not everyone wants to spend time with these manual configurations that could potentially cause problems if they’re not done properly.
the creators of two free pieces of software that do the job more easily.
VPNETMON
“VPNetMon continuously watches the IP addresses of your PC. If the IP address of your VPN is not detected anymore, VPNetMon closes specified programs instantly. The program reacts so quickly that a new connection through your real IP will not be established by these applications,”
VPNetMon (Windows) can be downloaded.

VPNCHECK
“VPNCheck helps you to feel safe if your VPN connection breaks, this is done by shutting down your main network connection or programs of your choice and showing a notification box,” Jonathan from Guavi.com “Basically it constantly looks for a change in your VPN network adapter. You can connect to either PPTP or L2TP with VPNCheck.”
VPNCheck (Windows/Linux) can be downloaded

STOP DNS LEAKS
When using a VPN service one might expect that all of the user’s traffic will go through the privacy network, but on rare occasions a phenomenon known as “DNS leakage” might occur. This means that rather than using the DNS servers provided by the VPN operator, it’s possible that the user’s default DNS servers will be used instead or otherwise become visible.

“A DNS leak may happen whenever a DNS query ‘bypasses’ the routing table and gateway pushed by the OpenVPN server. The trigger on Windows systems may be as simple as a slight delay in the answer from the VPN DNS, or the VPN DNS unable to resolve some name,” explains Paolo from AirVPN.
A tool for checking for leaks can be found at DNSLeakTest.com
If you don’t trust your VPN provider 100%, use two VPNs
This way you are tunneling your already encrypted connection through another tunnel.

PAY FOR YOUR VPN WITH UNTRACKABLE CURRENCY.
When anonymity is a factor, pay with an un-trackable currency

ONLY USE VPN PROVIDERS THAT TAKE YOUR PRIVACY SERIOUSLY

To be Continued post 1 of 2
grin

From an Old X
DARKSIDE RG AND THE PIRATEBAY HELLRAZOR

NOTE:PLEASE DO NOT ASK FOR BEST SITES TO OBTAIN TORRENTS
FIND THEM YOURSELVES YOU HAVE THE INTERNETgrin
AND I've Disabled Comments on this blog
Post Comment
We use cookies to ensure that you have the best experience possible on our website. Read Our Privacy Policy Here