topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Wednesday November 12, 2025, 4:03 am
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 40 41 42 43 44 [45] 46 47 48 49 50 ... 264next
1101
Living Room / Re: good Videos [short films] here :)
« Last post by IainB on April 06, 2017, 07:18 AM »
^^ That Predator: Dark Ages looked like rather well done SF. A credible fictional extension from the original concept, and though it moves us through time, it seemed relatively consistent with the general theme of the Predator movies.    :Thmbsup:
1102
Living Room / Re: Interesting "stuff"
« Last post by IainB on April 06, 2017, 06:51 AM »
1103
General Software Discussion / Re: Trying to create Steam game shortcuts with AHK
« Last post by IainB on April 06, 2017, 03:40 AM »
^^ Well done and thankyou! I had exactly the same need, and you have just shown a useful solution.    :Thmbsup:
1104
^^ Thanx.
1105
Context is following on from this post:
...I was thinking about this - how one's mind can confuse itself - when I was helping my daughter with her "computer science" studies homework tonight. She's writing her first computer program - it's in Python 3, with which I was not familiar.    :o
I was having to learn the rules and syntax by implication, as she didn't have a reference manual and was just using an online Python code editor/interpreter on a trial-and-error basis. So it was edit, run, stop on error. It would spit out the errors progressively, incrementally and individually (one at a time), stopping at each error and waiting for you to correct that (edit) before it moved on to the next error (run again from the beginning), and so on. Painfully tedious and confusing, but potentially instructive if one understood the need to  to focus on being pedantic and trying to understand the hidden/implicit logic (grammar) of the language being parsed. ...
____________________________

So, I decided to build a self-contained Python environment for my daughter, on her laptop, to assist her to self-educate (with assistance from me).

I don't have a familiarity with Python, so to get myself and my daughter up to speed, I identifed some potentially useful resources, and downloaded Python 3.0.
These are the main resources I identified:
1. Documentation:

2. System:
  • From the main Python 3 website (), I downloaded and installed Python 3.0 Release:
https://www.python.org/ftp/python/3.0/python-3.0.amd64.msi
  • This was initially installed on my laptop so that I could have a "suck-it-and-see" trial.
    _____________________________________

- but I have a question: Which would arguably be the best or most useful approach:
  • (a) for my 15 y/o daughter (as a complete newcomer to programming)
  • (b) for myself (as a lapsed hacker of the "old school" wanting to assist his daughter's education)?

For example:
  • Would it be "best" to install 32-bit, or 64-bit, and why (under what circumstances) would that be "best"?
  • Are there any other versions/resources that I could probably find useful and should therefore look at, in addition to the main ones I outline above? (Maybe including things such as code snippets or examples in Python 3.)

Many thanks in advance for any help/advice proffered.
1106
Thanks for explaining the background to me. Interesting times you have seen.
Where you wrote:
I saw the cube/cubicle bit, but that seemed a kinda obvious and awkward pun
______________________
No pun is obvious, awkward, or stinky enough to escape being pressed into service when the need arises.  :)
______________________
I absolutely agree that, as you put it, "No pun is obvious, awkward, or stinky enough to escape being pressed into service when the need arises.", and I apologise if I seemed to be implicitly criticising the making of the pun. That was not the case - I wasn't intending to. The pun was perfectly valid as it stood and worth making. Punning humour is a highly desirable art form as far as I am concerned, and long may it live.   ;)

No, it was just my mind - always looking for interesting puzzles and patterns - that led me astray, insisting that there were probably additional implicit hidden humorous subtleties to be understood, but of course that was mistaken in this case.    :-[
That was what I meant by "How disappointing!"
(It's not the first time this sort of thing has happened, and it probably won't be the last.)

By the way, are you able to explain? As I wrote above "I still don't know what the "motion elements" and the accompanying little symbols were referring to, in the picture.".
I have to ask - what were they?    :tellme:   (Enquiring minds need to know.)
1107
Announce Your Software/Service/Product / Re: FrogTea
« Last post by IainB on April 06, 2017, 01:45 AM »
^^
@f0dder: Ah. I see. You must be right.
1108
Mini-Reviews by Members / Re: Talking Moose - Mini-Review
« Last post by IainB on April 06, 2017, 01:27 AM »
Cross-posted for info:
...Go to BAJ --> Settings and uncheck Allow Bad Ad Johnny voice prompts.
__________________________
Yes, thanks. I had known that. I like to have the audio stay enabled as it is quite amusing! (BAJ has "bad attitude".)
For much the same reason, I like to have Talking Moose running - see Talking Moose - Mini-Review
(If you follow the links, you will see that TM is alive and well, all-improved and supported and has gone "3D" now.)

Audio can be very useful: For example, I also have xplorer² use audio when it reports an error alert, as the alert itself is transient and appears as text in the Status Bar at the bottom of the xplorer² window and the visual cue is thus quite easy to miss if one is in a hurry. So the audio is a rather nifty ergonomically useful option.
1109
...Go to BAJ --> Settings and uncheck Allow Bad Ad Johnny voice prompts.
__________________________
Yes, thanks. I had known that. I like to have the audio stay enabled as it is quite amusing! (BAJ has "bad attitude".)
For much the same reason, I like to have Talking Moose running - see Talking Moose - Mini-Review
(If you follow the links, you will see that TM is alive and well, all-improved and supported and has gone "3D" now.)

Audio can be very useful: For example, I also have xplorer² use audio when it reports an error alert, as the alert itself is transient and appears as text in the Status Bar at the bottom of the xplorer² window and the visual cue is thus quite easy to miss if one is in a hurry. So the audio is a rather nifty ergonomically useful option.
1110
...I'm not a "coder" and the only thing I've ever built in my life was a garden wall with my late father many years ago. ...
____________________
Building a garden wall (one that actually stays up) is an exercise and a half in itself. Been there, done that. You were fortunate to have had your father helping you.
1111
@highend01:
(without SSD < 1 min)
That was correct. I was referring to the time the system needed to boot after
cleaning everything up but without installing the new ssd.
________________________
So, after the rectification/cleaning up of the hard drive and OS, and before replacing the hard drive with the SSD, bootup time was less than 1 minute?
That seems seriously quick - quite an impressive achievement.    :Thmbsup:
You write in the OP that the OS was "Either Vista or Windows 7".
What is the Windows version, and what is the CPU of that PC, please?

I'd like to know as I'm about to set up a friend's old laptop with Win7 x86 (32-bit) and would like to see if I could get things to a similar startup performance level as you managed to do. I'm installing it with a quicker and bigger 7200rpm hard drive (the old one had failed).
Learning from others' hard-won experience can often be better than finding out by trial-and-error.
Thanks in anticipation.
1112
OIC. Ruddy heck. You really were only referring to "cubicles" then!?
How disappointing!
Just shows how one's imagination can lead one astray when one starts looking for an assumed hidden meaning that might not actually be there in the first place.

I saw the cube/cubicle bit, but that seemed a kinda obvious and awkward pun, so I dismissed the idea that you were referring to that and I instead then focused on finding any obscured/hidden messages in the picture. (Oh good! A puzzle!)

The most obvious were the repetitive words displayed on a slant - "motion elements" - accompanied by the little cube/square symbols, visible through the ice blocks. What the heck were they? They were all quite unfamiliar to me. What did they refer to? Was the slant relevant? That all completely threw me. I just couldn't see the relevance or hidden meaning/significance in/of that. I was doing duckgo searches that came up with stuff that made matters worse and I started to think it was all very ambiguous and subtle.    :-[
 
So, in the end, I presumed that it must have been just too subtle for me to "get" because it was probably alluding to some important and peculiar American IT corporate-cultural cross-reference which I was ignorant of (had not come across before) - 'cos you had wrote "...when they moved us from 2 man offices to the cubicles..." and I thought that could have thus been referring to something that immediately pre-dated office cubicles in the US and that was beyond my ken (I saw nothing special/unusual in 2-man offices). So I just couldn't see the hidden meaning which I had imagined had to be there. I resigned myself to the fact that, obviously, I just "couldn't keep up" with the joke you were making.   :-[

Good job I don't take myself too seriously. I usually find my mistakes quite amusing, and educational - after I have finished kicking myself for going down the wrong path.

I was thinking about this - how one's mind can confuse itself - when I was helping my daughter with her "computer science" studies homework tonight. She's writing her first computer program - it's in Python 3, with which I was not familiar.    :o
I was having to learn the rules and syntax by implication, as she didn't have a reference manual and was just using an online Python code editor/interpreter on a trial-and-error basis. So it was edit, run, stop on error. It would spit out the errors progressively, incrementally and individually (one at a time), stopping at each error and waiting for you to correct that (edit) before it moved on to the next error (run again from the beginning), and so on. Painfully tedious and confusing, but potentially instructive if one understood the need to  to focus on being pedantic and trying to understand the hidden/implicit logic (grammar) of the language being parsed.

Though I learned from @cranioscopical's comment (above) that Vance Packard was perobably to blame for the invention of the office cubicle concept, I still don't know what the "motion elements" and the accompanying little symbols were referring to, in the picture.    :D
1113
@panzer:
Random User-Agent
___________________________
Nicely spotted - thanks!    :Thmbsup:
The random auto-change feature is rather nifty - seems better than the Firefox add-on that I had previously been using.
1114
This looked interesting at the opening post.
Is now beginning to look even more interesting ... but I don't believe in magic.
1115
Living Room / Re: File Encryption - now effectively outlawed in the US?
« Last post by IainB on April 05, 2017, 01:49 AM »
@f0dder
...This thread is about a political issue...
_______________________

Is it? Is that all it is? To be frank, I'm not sure what the heck it is.
I must admit, when I started this thread it was merely to describe a disturbing report:
Disturbing report from Falkvinge.net:
With shock appeals ruling, the United States has effectively outlawed file encryption
(Copied below sans embedded hyperlinks/images.) ...
________________________________

I didn't really know what to make of it.
To me, it seemed to be a legal issue where a US appeals court had apparently, by overturning a prior judgement, effectively outlawed file encryption by default.

I'm ignorant of US judicial processes, but from the report it seemed as though the appeals court had thereby stepped outside of their boundaries to make some kind of a new law - though lawmaking is not within the bailiwick of an appeals court.

As I wrote:
It looks like the report might be correct. File encryption has effectively been outlawed - just like that.
I didn't think that a judicial system could do that.

 - and that's the really worrying thing about this.

The thing is, if this decision/law sticks and does not itself get overturned, then not just Americans but people in other nations may find themselves to be affected by such a law, There could be potentially huge ramifications/consequences.
It's not a good look at all. It reeks of creeping statism.

This creep seems to have been going on for years, and it's not as though things aren't bad enough in that regard already, as @40hz puts it (above):
Got news... Under existing US laws, you already may be arrested and held indefinitely - without trial or charges, and at the discretion of the executive - if you are deemed a threat to US national security. The determination is solely that of the executive and applies (according to the wording of the law) to any person of any nation, anywhere in the world, and at any time. And such action is not subject to any form of judicial review or oversight in any real sense of either word.
__________________________

If one tried to respond to the situation as @c.gingerich put it:
I think I am going to have to start making file encryption apps.  8)
- then one may well discover that one risked being arrested for doing something illegal, or for inciting others to do something illegal, and it would be a federal offence. One could be putting a noose around one's neck. So that's not likely to help.

As the noose inevitably tightens, it may well be that the only recourse one has left is to impotently and passively rail against the state or its cruel laws, or impotently and passively make seemingly clever jokes and cartoon jokes about the very real predicament that citizens have been placed in by such laws. Which would be no recourse at all, of course, though at least in the latter case one could perhaps die with a smile on one's face, but by then that would probably have become a smile of happy release. The key word in all of this is probably the word "passively", as one well-known American thinker put it some time ago:
New pressures are causing ever more people to find their main satisfaction in their consumptive role rather than in their productive role. And these pressures are bringing forward such traits as pleasure-mindedness, self-indulgence, materialism, and passivity as conspicuous elements of the American character.
 -- Vance Packard
__________________________
He might have said that, but, not being an American, I couldn't possibly comment.
__________________________________________
"As lambs to the slaughter." - (Isaiah, Jeremiah)
1116
@MilesAhead:
When I worked at IBM we all sat in these:
_________________
Yo no comprendo. Sorry to seem obtuse, but what the heck is in that picture?
I have no idea what I am supposed to be looking at, or for in that picture - no cultural reference point.
1117
^^ Now that's rather helpful. I learned something there, too. Thanks @Lintalist.    :Thmbsup:
1118
Wayback Machine:
https://chrome.googl...adcjpehmlllkndpkmiak

Yes, and there are also:
WayBack Chrome - which I have been using for several months now, and which seems to work faultlessly.
Save To The Wayback Machine - which I have not needed to use much, so have no feel for its effectiveness, as yet.
Web Cache - ditto.

1119
Announce Your Software/Service/Product / Re: FrogTea
« Last post by IainB on April 04, 2017, 03:58 PM »
@fodder:
This seems to be talking at cross-purposes. I am not positioning myself as an advocate or supporter of FrogTea, about which I am relatively ignorant - don't even use it - but merely as a supporter of the innovative idea of the usefulness of something like FrogTea and which I had always considered a novel approach, though not one that I would necessarily advocate using under all circumstances.
In doing this, I am thus attempting to contribute something positive, constructive and potentially useful to DC Forum members, by extending and building on a discussion based on someone else's (@berry's) proposal regarding an encryption tool.

Sure, I can see some potential weaknesses in the use of FrogTea, but what puzzled me in your initial response was what seemed to be your outright damning of the whole thing in this thread - for no compelling, apparent, verifiable and substantive reason - as though it could not possibly be any kind of useful encryption tool. That would seem to be absurd.
In the other thread, you went further and even asked what use/purpose it had and were seemingly mistakenly implying/thinking that I was putting FrogTea forward as some kind of a proposed technological solution to address the issues/problems in that other thread (which I decidedly wasn't doing and which would have been an absurd thing to do in any case).

So you apparently couldn't see the purpose of FrogTea, and yet you effectively damned it as being entirely not fit for purpose, which would seem to be contradictory.
That all rather seemed to me as though you might be having an irrational outburst of some kind, as though you simply just didn't like the thing, nor any part of it, ignoring its potential - although it had what seemed to be a valid and clear set of some strong pros and fewer cons as an encryption tool filling a niche (QED).

You could be (say) largely correct in what you write above, but where you write:
...For academia, that is. Our friendly three-letter agencies haven't got the same resource constraints, nor a drive for public glory. ...
_____________________
- it seems to be based on requirements from your perspective that might be somewhat purist/stringent and thus a tad over-the-top for the kind of domestic situation that I postulated for the average Joe:
However, for the purposes of securely encrypting the typical user's portable bits of personal/private/confidential HTML and text-based data - e.g., to protect against (say) the event where the device holding the data is lost/stolen - with the ability to sync/share it across several devices (all having java and browsers), and between specific trusted people, it seems that FrogTea could potentially be rather useful.
_______________________
Indeed, it still does seem true that "...FrogTea  could potentially be rather useful" - in that niche.
I could be wrong, of course, but I don't see where HTConsulting were suggesting that the requirement was to lock out potential attacks from the likes of the NSA, or suggesting that it was even desirable to have such a high standard of security that one could lock out the likes of the NSA. Maybe if @berry was a habitué of the DC Forum, he would be able to enlighten us both on this matter, but meanwhile we shall just have to suppose.

That's why I made the joke about the unlikely extreme perspective - in the shape of my neighbour Dmitry - and pointed out the more likely relevance of a typical use case:
...If one wanted to explore this further, it could be interesting to know how xTEA has been broken, or something, and where that is documented, and how easy that might be to replicate for the average laptop/smartphone thief.
____________________
- because that is arguably likely to be the typical use case that could be most relevant/applicable for the average Joe. However, it would be incorrect to interpret that - as you seemed to do - as meaning that the requirement was necessarily a "...hard requirement of no other requirements than a browser (e.g. no executables)".
I was not touching on what the requirements really were or should be.
On the contrary, all I was attempting was to retrofit the features to suggest that FrogTea seemed to have the potential to be quite handy if one felt one could make use of such-and-such FrogTea features as it possessed.
This is always remembering that features are not the same thing as requirements, and vice versa.

If we were concerned with the objective of locking out the SS (Secret Services) of this world for ordinary domestic IT users like myself, then I would suggest that this objective is already infeasible and would be "p#ss#ing in the wind", self-defeating and a huge waste of effort.
The SS have already amply demonstrated their power and that they are unstoppable, and if they are blocked from covertly entering through the back door, then they will simply overtly break down the front door and enter that way, and then subject the user to methodical and excessively disproportionate violence (e.g., Kim Dotcom raid) and subsequent public and harmful, punitive treatment using an expensive and compliant state-controlled police and judiciary across nations. This makes extraordinary public examples of those who fail to obey, to dissuade others from disobeying in  future.
If I had thought that FrogTea was potentially that good, then I probably would not recommend its use. It would probably only provoke the SS. So "threat modelling" would be excessive and going over the top again - for most domestic security purposes.
1120
Announce Your Software/Service/Product / Re: FrogTea
« Last post by IainB on April 04, 2017, 03:10 AM »
Somewhat concerned after @fodder's comments above, that I might have inadvertently missed something about the functionality and security of FrogTea, I reread all the links that I had given above.
As far as I can see from the literature and references, xTEA (where TEA stands for "Tiny Encryption Algorithm") is the preferred foundation for FrogTea and is one of three TEA algorithms:
  • TEA
  • xTEA
  • xxTEA

At http://m8e.com/, it says:
(Text copied below sans embedded hyperlinks/images.)
Text encryption
  • This is a base64 enhanced version of the original encryption routine, found here. TEA
  • The strong encryption with JavaScript implementation of David Wheeler & Roger Needham's Block TEA (Tiny Encryption Algorithm) by Chris Veness is done only on the client computer browser with JavaScript. Information is not sent or stored anywhere during encryption or decryption.
  • The Tiny Encryption Algorithm is strong encryption. It is one of the fastest and most efficient cryptographic algorithm in existence. It's public domain. The code is lightweight and compact, which makes it practical for JavaScript implementation.
  • The JavaScript source code of this program can be easily viewed as the source code of this HTML page. Security specialists do not recommend using encryption for which source code is not available for analysis.
  • If the password is lost or forgotten, there is no practical way to recover the unencrypted text from the encrypted text.
  • Check the laws of your country to determine if you can use strong encryption legally.
  • This site is for illustrative purposes only and is not intended to be a TEA encryption service. There is NO warranty, expressed or implied as to the suitability for any purpose.

Furthermore, there is apparently no known/documented "best" attack for xTEA - refer Wikipedia - Cipher security summary

Well, that all looks pretty good, but some of the references here could be mistaken or out of date, I suppose. (I wouldn't know.) For those who are interested, there seems to be quite a lot of heavy academic documentation about it too, on the Internet.

Perhaps the potentially weakest link is the GUI provided by FrogTea.exe, and one would need to be able to verify the code for that too, I presume (in addition to verifying the Javascript for xTEA). I gather that the FrogTea.exe code is sourced by and copyright of HTConsulting.com.

If one wanted to explore this further, it could be interesting to know how xTEA has been broken, or something, and where that is documented, and how easy that might be to replicate for the average laptop/smartphone thief.

However, for the purposes of securely encrypting the typical user's portable bits of personal/private/confidential HTML and text-based data - e.g., to protect against (say) the event where the device holding the data is lost/stolen - with the ability to sync/share it across several devices (all having java and browsers), and between specific trusted people, it seems that FrogTea could potentially be rather useful. It could also protect against all but the most determined attacks from those pesky Ruskie, GCHQ and the NSA agents. That is, for those as might feel more secure with, and gain some "peace of mind" from such protection.

Come to think of it, I reckon that one of my neighbours might be a Ruskie - well, he calls himself "Dmitry" and walks around wearing a Russian Ushanka hat anyway, and sometimes sits in a deckchair in his garden drinking Vladivar and repeatedly pointing a revolver to his head and then spinning the cylinder around. He's a bit odd.
Hmm, maybe I should think of using FrogTea, just in case, like. Can't be too careful these days...
1121
Living Room / Re: File Encryption - now effectively outlawed in the US?
« Last post by IainB on April 04, 2017, 12:32 AM »
@fodder:
Don't use FrogTea - I've posted some reasons in the other thread.
What on earth is it supposed to help with, anyway? You're suggesting a product that's technically inferior to modern crypto, while not solving the issue at hand which is a politics based one.
__________________

As I commented on that other thread:
Oh, so its apparently not of much use then? I had not known that.

Where you write:
...What on earth is it supposed to help with, anyway? etc. ...
________________________

...I don't quite follow.
I'll have to take your word for it that it's apparently broken/of no use, or something, though I gather that the experience of others more experienced and knowledgeable than I, who have used this technology, is that it does have some definite use and has had use for some considerable time - e.g., for holding such things as bank account details, passwords, registration keys and other confidential data that they might wish to share/sync securely between devices and/or with other people.
However, that is their reported experience and as I have never used the technology, I couldn't possibly comment.

You also seem to have been expecting me to be addressing specific issues or providing technological solutions to what seem to be legal/political problems in this discussion thread (which I started), and ask what use could it be and how might it help address the issues in this thread.

Well, of course I was not intentionally attempting to address specific issues or provide technological solutions to what seem to be legal/political problems, and I don't think I could even if I had intended to.
It would thus be a digression to do that - that is, to start a discussion about technology/products like FrogTea in this thread - and thus I had no intention of introducing such a digression, which is why I wrote (above): (the important bit is emphasised by me)
Regarding the matter of what alternatives there might be to addressing some of the potential problems/issues raised in the context of this discussion thread, this might be helpful/useful
_____________________
...and in the FrogTea discussion, I obliquely referred to the potential illegality of such technology in some (unspecified) countries.
The last thing I would wish to do is recommend that forum members should unwittingly use what, for them, could be an illegal technology. They might get arrested for it. Indeed I might too, if I had (say) recommended it to them, or incited them to use it in contravention of a local law.
Eggshells all over the place.

So you can probably see that keeping the discussion on FrogTea separate was very much about maintaining relevance and context in this thread and not wishing to interrupt the discussion with a digression, other than to say ..."By the way, this also might be interesting information in this context...".

Having said that, I would add that I don't wish to seem rude or abrupt, but could I thus suggest that you try to contribute to the discussion in this thread?
I feel sure that we forum readers could all potentially benefit from what you might be able to usefully and constructively offer on the matters in this context. I mean, it is a discussion, after all, and anybody's input is potentially golden.
1122
Announce Your Software/Service/Product / Re: FrogTea
« Last post by IainB on April 03, 2017, 11:09 PM »
Oh, so its apparently not of much use then? I had not known that.
1123
Living Room / Re: File Encryption - now effectively outlawed in the US?
« Last post by IainB on April 03, 2017, 08:55 PM »
Regarding the matter of what alternatives there might be to addressing some of the potential problems/issues raised in the context of this discussion thread, this might be helpful/useful - I resurrected the old discussion thread: Re: FrogTea - strong encryption in an age when encryption may become illegal

04_300x242_BB6C25D1.png
1124
I resurrected this old thread from @berry (of HTConsulting, author of the Notefrog clipboard information manager), because of the issues being discussed in this discussion thread: File Encryption - now effectively outlawed in the US?

FrogTea is a portable GUI built around the text encryption algorithm/tool xTea.
There were 4 releases of FrogTea by HTConsulting, available from the Frog Tea webpage - the original link to which seems to be defunct: http://frogtea.com/index.html

However, that page is still in Wayback, and the latest captured is here: https://web.archive.org/web/20150508165332/http://frogtea.com/index.html
That page has a link to the latest downloadable version of FrogTea.

Bear in mind that only the interface was changed in the 4 different versions, and the xTea component was apparently unaltered.

NB: It may be that use of FrogTea (xTea) is illegal in some countries.

(The text of the FrogTea webpage is copied below sans embedded hyperlinks/images. Any emphasised or reorganised text or added images are my changes.)
FrogTea?
04_300x242_BB6C25D1.png

Frog Tea
A Proper Cup of Tea by Peter Merich

What is FrogTea? FrogTea is a free, Windows based, encryption utility which allows you to create a secure*, stand alone, self-decrypting HTML archive which may contain either html or plain text content. These self-decrypting archives may be decrypted on any device which has a javascript capable browser. see Wikipedia: xxTea

While it will be a feature of the next release of NoteFrog Professional, we're also offering a stand alone utility which enables you to create secure* "FrogTea" archives of any text/html content you wish.

The encryption and decryption is done on your computer or mobile device. None of your data is ever sent over the internet.

Since it's secure* you may share the encrypted file with others - only those who have the password will be able to access the data content. You may load your encrypted html file on any device having a web browser which supports javascript, and decrypt it anytime you wish by opening the HTML file in the browser and decrypting it - right there in the browser - no internet access is necessary - no data is ever transmitted over the internet.
(Note: Since the self-decrypting file is totally self-contained, any references to external files or data must be fully qualified. If your decrypted content contains links to external web-based locations, clicking on those links WILL attempt to access the internet, but the only data transmitted from your device will be the URL request. If your decrypted output fails to access links or external data, look for non-qualified references in your original input file.)

To see it in action select this self decrypting file and decrypt it using the key "A Proper Cup of Tea" - try other keys if you wish.
FrogTea User Guide
  • Start FrogTea, if it's not already running.
  • You may obtain the completely stand alone utility here FrogTea beta. There is no installation. No system changes of any sort. Just download to a folder and run. (It's beta only in the sense of the user interface. The encryption is tried and proven (corrected) "Block Tea" - see Block TEA Tiny Encryption Algorithm. )
  • tea window
  • You may either select an html or text file to encrypt or use the current text contents of the clipboard. If you are using the clipboard content, you may elect to have line feeds/ new lines replaced with an html linefeed, otherwise your text may appear as one long line.
  • Once you've selected an input option, click on the "Lock".
  • If you've chosen to select a file, you'll be asked to select an input file. We're going to use a NoteFrog self-publishing stack export.
  • Now assign a key. A key of at least 8 characters is recommended. Remember your key. It is not stored anywhere or available from the encrypted content.
  • Re-enter the key for verification.
  • You may enter an optional password "Hint", which will appear on the output HTML page.
  • Now, select an output filename and location.
  • The self-decrypting output file is created in the location specified. It is also opened in a browser window for verification.
  • You may enter the key and verify the resulting output.
    ______________________________

*How secure is xTea?
  • The published criticism is theoretical: http://eprint.iacr.org/2010/254.pdf - In fact, xTea has not been broken in practice. (The underlying data may be accessable if the user employed poor password technique, in which case ANY data encryption is vulnerable. Guessing a password is not breaking an encryption method. You should employ good password selection for all sensitive data.)

  • http://en.wikipedia....her_security_summary No demonstrated attack. Theoretical attack with 259 chosen plaintexts - that's 576,460,752,303,423,488 or half the size of all the printed material in the world.

  • Simon Shepherd, Professor of Computational Mathematics Director of the Cryptography and Computer Security Laboratory, Bradford University, England. and http://www.tayloredg...matics/TEA-XTEA.pdf- How secure is TEA? Very. There have been no known successful cryptanalyses of TEA. It's believed to be as secure as the IDEA algorithm, designed by Massey and Xuejia Lai. It uses the same mixed algebraic groups technique as IDEA, but it's very much simpler, hence faster. Also it's public domain, whereas IDEA is patented by Ascom-Tech AG in Switzerland. IBM's Don Coppersmith and Massey independently showed that mixing operations from orthogonal algebraic groups performs the diffusion and confusion functions that a traditional block cipher would implement with P- and S-boxes. As a simple plug-in encryption routine, it's great. The code is lightweight and portable enough to be used just about anywhere.

  • http://www.safemess.com/faq.php - How secure is the encryption? The encryption is secure enough for personal usage unless you have a government agency breathing down your neck.

  • http://derekwilliams...8-TEA-Encryption.pdf - In a practical sense, modified TEA (XTEA) with proper keys and adequate rounds is quite strong as an encryption algorithm. In an academic sense, as noted above, unmodified TEA has a published related key weakness that reduces the effective key length from 2128 to 2126 and could result in a partial attack with 234 chosen plaintexts. Unfortunately, this often gets misrepresented that TEA is inherently weak and should not be used.

  • My important passwords are stored online in an xTea encrypted archive at My xTea passwords - click the "random" button.

  • © htconsulting 2012

1125
I have found another replacement for a favourite Firefox add-on "Self-Destructing Cookies".
It's called: Cookie AutoDelete
Control Your Cookies! Auto Delete Unused Cookies From your Closed Tabs While Keeping The Ones You Want.
Control your cookies! This extension is inspired by Self Destructing Cookies. When a tab closes, any cookies not being used are automatically deleted. Prevent tracking by other cookies and add only the ones you trust. Easily import and export your Cookie Whitelist.

Main Features
- Auto Deletes Cookies from Closed Tabs
- WhiteList Support for Sites you want to keep Cookies
- Easily Export/Import your Whitelist
- Clear All Cookies for a Domain

Usage
1. Add the sites you want to keep cookies in the whitelist
2. Enable "Active Mode" in the popup or settings
3. Watch those unused cookies disappear :)

Some things to Note:
- This Extension can't clear LocalStorage yet
See:
https://bugs.chromiu...sues/detail?id=78093
- Even though third party cookies are cleared with this extension, it is better to disable third party cookies from the settings
__________________________________
Pages: prev1 ... 40 41 42 43 44 [45] 46 47 48 49 50 ... 264next