As a matter of fact, people nowadays can easily spend >10 hours a day in front of a computer; wiggling the mouse, click and clacking the keyboard, those things are just inseparable part of our modern life.
Continue reading “FSOCIETY KEYBOARD”
>In Iron Helix the human race is locked in a cold war with an alien race, the Thanatosians. One of the human capital ships, the Jeremiah O’Brian is participating in a series of war games with other human ships.
PITTSBURGH—A multi-institutional team of new-media artists, computer experts, and museum professionals have discovered a dozen previously unknown experiments by Andy Warhol (BFA, 1949) on aging floppy disks from 1985.
The 80s Computer World I’ve Always Wanted To Live In
We tried to reach the Encryptdrop owners, but their Site righteoustech.com is gone.
Encryptdrop, as the name itself implies, is a program for encrypting and decryptipting files.
We saved the latest non-shareware version of this program (V9B),
which still keeps different methods of encryption, for example: Serpent, Twofish, Cast-256 and AES.
It’s a small powerful program for Win32 that makes it’s job perfectly and has a nice interface.
The Encryptdrop programmers never released it for Open Source,
we just hope that they change their mind and continue the development of this program.
Here is direct download of it and a skin made by us for the interface included.
Akamai Chief Security Officer, Andy Ellis, shares A Short History Of Cryptography :
Before the modern era, cryptography was concerned solely with message confidentiality (i.e., encryption)—conversion of messages from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely the key needed for decryption of that message).
Since before the time of Sun Tzu, communications has played an important role in the collection of intelligence. With the advent of effective portable radio technology in the 1930’s, it became feasible for an operative to send and receive information quickly and independently from within enemy territory.
The purpose of this research paper is to document facts, observations, anecdotes, and stories about clandestine radio equipment as used by the United States. The specific equipment presented here was chosen either because it had a major role in clandestine work, or because sufficient information was available to the author. Pictures and brief descriptions of additional equipment can be found in books by H. Keith Melton (see the Bibliography); and also at various sites on the World Wide Web.