topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Tuesday December 16, 2025, 4:52 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 3 4 5 6 7 [8] 9 10 11 12 13 ... 364next
176
Another option: Fort File Encryption: protect individual files - gHacks Tech News
Note that a program like Fort is NOT a proper substitute for full-disk encryption! It requires you to work with a decrypt/modify/encrypt workflow, which leaves traces all over your harddrive.

It's probably OK for transferring moderately sensitive material to somebody else, but unless anonymity is involved, I'd personally prefer PGP/OpenGPG for that scenario. And this sentence from their website makes me cringe: "Well designed FortMachine.dll cryptography library available for developers" - you really shouldn't roll your own crypto primitives. Also, "Protect against keyloggers, supports on screen keyboard", while well-meaning, is security theatre - if you're at the point where you try to prevent keyloggers, you've already lost.

EDIT: I took a quick browse through the source code, and at least the FortMachine.dll is just some simple high-level wrappers around .NET crypto primitives, so it's not "rolling your own" level bad :)
177
Is this just their way of lashing out at Apple for not cooperating before?
Nope, it's because QT is a steaming pile of buggy code :)
178
General Software Discussion / Re: Business-oriented ecard service or software?
« Last post by f0dder on April 16, 2016, 04:37 PM »
Do you have a really specific use-case for this?

E-cards seems extremely 90'es, and security training generally goes "don't click links in emails, and don't open attachments unless you're specifically expecting it."

On top of that, as a customer, I'd feel kinda offended (or at the very best, indifferent) at receiving one of these. They're obviously designed to make people feel special, but they're also obviously templated and mass-mailed. I might value a hand-written physically-posted card, but something digital? Just another piece of spam fighting for my attention.
179
Living Room / Re: I am fed up with skype but is there an alternative?
« Last post by f0dder on April 16, 2016, 04:28 PM »
Is there a SIMPLE plug in and play software to videochat?
Skype or Google Hangouts.

Sorry, but that's it, really - you'll be hard pressed to find anything that works better. Video conferencing is hard to do well, there's a whole lot of non-trivial stuff involved... and since you're asking for "plug and play" (which, I assume, means no port forwarding and such), you'll be hard pressed to find something that works better than Google's and Microsoft's offerings :(
180
Announce Your Software/Service/Product / Re: Diskovery
« Last post by f0dder on April 09, 2016, 06:46 AM »
I use the drive for daily offsite backup (to take home) - as it is easy to loose I thought it adds a bit of additional security. If someone finds it, plugs it in, they might just think "OK then lets format it" :-)
Weeeeell, it doesn't really add security - that's what the encryption is for :)

The biggest risk is accidentally formatting it yourself (or a co-worker that finds the drive, or whatever) - removing the drive letter to get rid of the popup has to be done on every machine the drive is used on.
181
Announce Your Software/Service/Product / Re: Diskovery
« Last post by f0dder on April 07, 2016, 03:45 PM »

I have a USB 3 flash drive, formatted as a truecrypt volume/partition. If you connect it Windows thinks it is an unformatted drive, Diskovery will identity the brand and size correctly at that stage.
Small tip: instead of using raw volumes for TrueCrypt, create a single partition and set it's partition type to Linux - that will stop Windows from complaining about it.
182
EFS is best left to domain networks due to the level of complexity that is recovery key handling. So a third party solution is probably best for this.
This!

EFS is super easy to use, but it's also super easy to forget about key management, and then you suddenly have no way of accessing your files after a Windows reinstall.

I'll add a +1 for VeraCrypt. There's several ways to use it, the simplest being a container file on a FAT or NTFS partition. For my cold-storage drives, I use an alternative method, though: first I use fdisk (or some other partitioning tool) to create a partition spanning the entire external drive, then set its type to "Linux". This has the advantage of not wasting space for a filesystem that only contains a container file, and setting the partition type to "Linux" makes Windows not complain about unrecognized filesystem and offer to format it for you...

Another advantage of VeraCrypt is that it's cross-platform so your data isn't locked to Windows. Oh, and then there's the whole open-source and peer-reviewed aspect, which is also kinda nice.

Yes, you still need to remember passphrases, and there's a bit of hassle in mounting your containers - but you don't get any kind of sensible security entirely transparent.
183
General Software Discussion / Re: Run Bash on Ubuntu on Windows
« Last post by f0dder on April 04, 2016, 04:41 PM »
Just keep in mind that this sounds like it's running a lightweight VM of some sort - the bash window cannot run or interact with Windows programs.
I wonder what the technical reason behind this is - as far as I understand their approach, this is more of a syscall translation thingamajig than a lightweight VM like CoLinux. There's probably still some kernel object translation going on as well (like file handles) which might complicate windows<>linux communication, and probably some security concerns as well.

Would be interesting with some more implementation details, as well as a comparison to existing stuff like CoLinux.

I have no idea why Microsoft took the route it did when these tools are readily available.
Perhaps because it might be an easier route to running stuff than porting? Perhaps to be able to support closed-source linux binaries?

I personally can't think of any use cases where this would be better than using the MinGW binaries, but it's cool tech :)
184
General Software Discussion / Re: Raymond.cc roundup of ad blocking extensions
« Last post by f0dder on March 24, 2016, 06:47 AM »
So here's my question...why use a product like Adguard?  (I switched to this from ad muncher recently).
Don't - they can't filter HTTPS without either using a MITM proxy method (BAD BAD BAD), or doing API hooking (less bad, but still bad).

You really shouldn't be needing ad filtering other places than in the browser (if so: consider finding replacements for those applications), where you should use uBlock Origin.
185
Oh, and I wish there was something else than JavaScript for the web.
https://www.donation...ndex.php?topic=41135
Yeah but no - longer discussion, and I have a bus to catch :)
186
<rant>
Yeah, between "It's a joke" and "The author is absolutely bonkers", I used Occam's Razor and went with joke :)

I still find it worth to reflect on, though. And while C++ is (still) my all-time favorite, I'm pretty convinced that C and C++ are the two most dangerous widely-used languages, and in ways that leads to real-world problems. Java is pretty safe as a language, Ruby has a few nasties, and JavaScript and PHP has a bunch of issues (that are different from the issues of C/C++ - it's mostly about making it easy to write incorrect logic rather than summoning nasal demons).

Once you include implementations of the languages, the picture changes a bit. Once you include the standard libraries, it changes a lot (Java has some really funky attack vectors, deserilization attacks being oretty popular), and once you puddle standard frameworks on top it the game changes again, leaving PHP and Ruby pretty high on the exploitability lists (hello wordpress, hello rails).

But then again, expoitability isn't directly equatable to danger, one should probably also take severity of the system into account. "Plane falling" down is usually worse than "blog being hacked".

So if one really wanted to ban specific languages, one would have to think long and hard about what and why and how - and whether some languages are fine, whereas we might want to purge a ton of their frameworks. I'm pretty sure PHP should be purged. I'm not sure whether any new code should be written in C/C++, but I'm also not sure whether we have languages that can fully replace them for everything.

Oh, and I wish there was something else than JavaScript for the web. The language and stdlib has a bunch of flaws - that it's relatively small is the only reason it's not on the 100%-purge-with-fire list. At the same time the stdlib is a bit too small, though, leading to zillions of monkeys reinventing (broken) wheels. And the DOM and all the related browserstuff is too big and messed up.
</rant>
187
Found Deals and Discounts / Re: Spring & Easter Giveaway
« Last post by f0dder on March 23, 2016, 06:01 PM »
Adguard license claims Https filtering.  If that works on Youtube, this program might be a keeper.
-Midnight Rambler (March 22, 2016, 10:30 AM)
I wouldn't touch a standalone application doing HTTPS filtering with a 10-foot pole.

It requires either basically setting up a MITM proxy (and there's pretty much nobody that does that correctly, it adds tons of potential security holes, and makes it really hard to see your real protection status from the browser) - or it can be done via API hooking, which is somewhat better, but something that a lot of people get terribly wrong as well.

A browser extension doing the same thing can be fine, since it works at a different level.
188
Living Room / Re: Raspberry Pi's $35 Linux PC
« Last post by f0dder on March 23, 2016, 05:57 PM »
I just learned about ExaGear which allows you to run x86 applications on ARM devices. It's kind of like qemu but supposedly has much better performance.
Hm, there's claims of 5x the performance of QEMU - that sounds pretty incredulous. I was under the impression that QEMU used dynamic code translation and was pretty fast, but I guess the translation involved in x86-on-arm might be lacking.
189
Jonathan13: are you affiliated with Zotero? At first glance your post looks like some of the spam we usually get, but it doesn't have the Google hits that spam usually gives - also, Zotero seems to be free as well as Open Source, so it would be a weird form of spam... but it's always nice to know where people coming from.

Welcome onboard, by the way :-)
190
Mini-Reviews by Members / Re: OpenDNS + DNSCrypt - Mini-Review
« Last post by f0dder on March 23, 2016, 10:57 AM »
@f0dder: Yes, I'm inclined to agree with what you wrote there - though I don't have your level of knowledge, I'm sure.
Keep in mind that I'm just a (somewhat informed) layman - I am by no means an expert in these things, and haven't studied everything in detail :)

As I understand it, the improved security from using DNSCrypt is in the path between the PC and the OpenDNS node(s), with the ISP's node acting as a blind, passive pass-through in the middle. That potentially avoids a lot of government snooping which could take place (per statute) at that point, and avoids potential man-in-the-middle attacks and DNS leakage.
Well, yes, except the information leakage I mentioned in my post above.

A thing I forgot to mention, though, and a big advantage of DNSCrypt is that it prevent DNS forgery, because crypto. Given the leakage problems mentioned above, I'd say this is a bigger advantage than the privacy aspects, and it protects against very real and actually-happening attacks if you're out and about and connect to untrusted WiFi networks. (That's also one of the places a - trusted - VPN helps, since even plain HTTP will go through the encrypted VPN tunnel).

Deceit seems to be the norm in the area of surveillance and espionage, and that means you can't tell whose lying about what. Even Snowden could be a plant to put the targets of surveillance off the scent. How would we be able to know?
We can't know much for sure, especially considering that stuff that 5-10 years ago was labeled tinfoil-hat has been shown to be true. We know that NSA has tried to introduce backdoored crypto (Dual_EC_DRBGw), that unknown adversaries managed to insert a Linux kernel backdoor for a brief moment, that NSAs snooping and capabilities are worse than what people called tinfoil-hat when rumors of Carnivore (software)w first appeared.

The trick is to question everything, but keep a balance where you don't end up as a paranoid tinfoil-hat - which is easier said than done. Also, consider which threats you want to defend against (hint: even if current crypto algorithms are safe and NSA can't bruteforce or otherwise break AES256, none of us has a chance against nation-state adversaries). If you're doing illegal stuff, do educate yourself.

Note: I don't condone immoral behavior, but things that are indeed very moral (like, freedom fighting) are very illegal in some countries. Leaving the pure technological stuff and straying into ethics and politics is probably best done elsewhere, though, even if it's a very interesting discussion :-)
191
Living Room / Re: Raspberry Pi's $35 Linux PC
« Last post by f0dder on March 23, 2016, 10:16 AM »
Keep in mind that ARM is not just "ARM" - there's several revisions of the CPUs, including 32- and 64-bit versions, support of "Thumb" mode (running 16bit code alongside 32bit code), and then the pretty varied platforms because arm i usually system-on-a-chip (i.e., not just a CPU).

I'm not sure about the level of compatibility, but for e.g. native code in Android applications (where you don't get to systems-level with drivers and stuff, but only add some native usermode code because of performance), afaik you have to compile for some number of ARM architectures to be able to use native code across a wide range of Android devices.
192
Mini-Reviews by Members / Re: OpenDNS + DNSCrypt - Mini-Review
« Last post by f0dder on March 22, 2016, 07:55 AM »
DNSCrypt isn't foolproof.

A couple of notes:
  • It obviously only encrypts DNS requests, so it doesn't add security to non-HTTPS sites.
  • For hosts running one single site, it's usually trivial to find a hostname from the IP, and a MiTM obviously can see IPs of hosts you communicate with.
  • For multi-site hosts you'll either have wildcard certs, which gives some possibilities of what you're visiting, or,
  • SNI, which shows which site you're requesting, in unencrypted form. TLS handshake sucks.
  • You're placing all your DNS eggs in OpenDNS's basket. I'd be very surprised if at least the NSA doesn't have a tap.

I do use DNSCrypt myself, since Danish ISPs have stupid censored DNS servers, and I'd rather have NSA tap my activites than giving Google more information through their (otherwise pretty excellent) servers. You just have to know what security you're getting, and what you certainly aren't.

Also, VPNs do not give you any form of anonymity - the only thing they should ever be used for is getting authenticated and encrypted access to a remote network, never as a form of surveillance protection. If you do stuff that's questionable in the eyes of your government, you need TOR, and you need to be running off somebody else's wifi. (Oh, and you need to know what you're doing - there's a hell of a lot of ways to screw up using TOR and leak private information all over the place.)
193
Hummm, C and C++ are more of a threat to the safety of people than any of the three listed languages - given the mix of the domains where those languages are used, the exreme amount of undefined behavior in the languages, and the very few people who can get it right :)
194
General Software Discussion / Re: How to recover a MySQL Password?
« Last post by f0dder on March 22, 2016, 07:07 AM »
You're welcome :)
195
DC Gamer Club / Re: Alien: Isolation free with Humble Subscription
« Last post by f0dder on March 19, 2016, 06:47 PM »
I've been slowly working my way through this game, got it from the humble bundle as well.

My oh my.

I usually wear my Weyland-Yutani cap while playing it, which doesn't make it any less scary :)
196
Rumors around the 'net seem to indicate Microsoft is going for IBM and Oracle's jugular on this one.
And as mean and evil as Microsoft can be, they're like fluffy cuddle-rabbits compared to Oracle.

I wonder how much of a dent it will make, though. A lot of people "choose" Oracle because they need to run applications that are tied to their database because of specific feature use or shitty coding. For database-agnostic programs, sane people would be hard pressed to run on anything other than PostgreSQL.
197
General Software Discussion / Re: Windows 10 Tips
« Last post by f0dder on March 13, 2016, 05:34 PM »
Well, I guessed that if you only heard it from me, you would rightfully put it to anecdotal evidence or hearsay. So I added links to the finding of Fred Langa (a person with much more credibility than I have) and a link to a technet post, assuming those were credible enough.
On the contrary - if a thing like this had been reported by you (or some other DC member), it would be something interesting to look into. When a post with that level of lack of quantifiable comes from some relatively well-known source, I get suspicious ("You won't BELIEVE how much homegroups suck" probably gives ad revenue), and I also hold "well-known folks" to higher standards than normal individuals.

Langa's article is extremely weak in quantifiable data, has imprecise language and terms, and doesn't even try to present a likely explanation. IIRC the TechNet post just referred back to the Langa article, so it's not a reliable data point in and of itself. And even the MVPs there post questionable stuff from time to time, anyway :-)

The machines that do not use NetBios are much faster retrieving content from network accessible folders than the other ones.
Can you quantify "retrieving content"? Not necessarily a full detailed breakdown with graphs and stuff, but a "first connection to remote machine is slow" versus "file listing is slow" versus "transfer speed of one 10gig file is 6MB/s vs 10MB/s on <other tech>" are extremely different scenarios.

About the other part:
More often than not, 'Less is more'. Software and services/protocols that are not needed, you best get rid of to prevent Windows taking unnecessary actions. By 'getting rid of' I mean disable, not remove as there might be a future task for which you might need it again.
I agree with the "less is more" philosophy in general, but I don't really feel it applies to Homegroup. Caking layers upon layers on a protocol is bad, simplifying authentication isn't necessarily bad.

From your "workgroup vs homegroup" list, the only thing that should have any impact on throughput would be IPv4 vs IPv6. But if that's a 10% difference, something is very, very wrong on your LAN - the TCP headers are larger, but not that

Personally, I would not be surprised if the Homegroup requirement of IPv6 could be the cause for slowdowns in an IPv4-only network. The NIC in the computer could wait a millisecond or so, because of the incomplete/wrong IPv6 configuration before reverting back to the working IPv4 configuration, each time a TCP/IP packet needs to be ACKnowledged. This adds up when transferring (big) files. I would also have no problems imagining that the 'spanning over a subnet' introduces extra overhead in some network drivers.
Nope. You might have a delay at a broadcast "is there anybody OUT there?" level at IPv6, but it's not per-packet. Once you start communicating between hosts, you're on one protocol level. And if IPv6 is a requirement for Homegroups, you wouldn't have any connectivity on IPv4 anyway. "Spanning over a subnet" would only be relevant if you're actually doing that.

As most people only have access to IPv4-only networks, which I don't see changing any time soon, the unnecessary Homegroup slowdown will remain a problem.
Most people won't have IPv6 internet connectivity, but we're talking LAN connectivity here. If Homegroup is IPv6-only, you wouldn't see a a slowdown on IPv4 networks.

Now, if there really are slowdowns related to Homegroup, I'd like to know about it - and especially why. The stuff I've heard so far seems about as reliable as homeopathy, though.
198
Living Room / Re: Consider installing 2 x 8Gb RAM cards in your 64-bit laptop.
« Last post by f0dder on March 13, 2016, 03:56 PM »
If you do not already have them, you can purchase 2 x 8Gb RAM cards to go into those slots, replacing any smaller RAM cards. This potentially WILL make a difference to the speed/responsiveness of ALL memory-intensive operations - e.g., huge Excel spreadsheets, or when opening up several InfoSelect8 .WD2 databases simultaneously. The laptop will take it all in its stride, instead of pausing/choking on trying to manage and operate on too much data with too little RAM.
Gotta emphasize potentially - you either need (memory heavy) 64bit programs, running a lot of 32bit programs or stuff that can take advantage of a lot of filesystem cache. If you have a 8gig system that doesn't currently hit the pagefile often, there's a good chance that upgrading to 16gig won't give any noticable speedup (but will cause hibernation to be somewhat slower, especially on non-SSD systems).

There's also the single- vs dual-channel memory speed thing, but you should read up on that rather than blindly assuming it'll be a speedup for you (if you have a discrete GPU or don't run a lot of graphics-focused stuff, the increased memory bandwidth might not matter all that much).
199
General Software Discussion / Re: Firefox 45.0 released both x86 and x64
« Last post by f0dder on March 13, 2016, 03:28 PM »
Introduce a new preference (network.dns.blockDotOnion) to allow blocking .onion at the DNS level
Why would a person want to block .onion?
I wonder what that really means - the phrasing is somewhat ambiguous, and I haven't researched the feature.

But I sure wouldn't want .onion DNS requests going to an upstream DNS server outside of TOR...
200
General Software Discussion / Re: Comparative review of password managers
« Last post by f0dder on February 29, 2016, 02:16 PM »
Does it have sync, though?
The password database is one single file. No cloud crap necessary. Sync it in your preferred shared storage.  :D
Not good enough - for my use cases, I need something that actually syncs entries, not requiring me to copy a file around.
Pages: prev1 ... 3 4 5 6 7 [8] 9 10 11 12 13 ... 364next