As a matter of fact, people nowadays can easily spend >10 hours a day in front of a computer; wiggling the mouse, click and clacking the keyboard, those things are just inseparable part of our modern life.
Continue reading “FSOCIETY KEYBOARD”



>In Iron Helix the human race is locked in a cold war with an alien race, the Thanatosians. One of the human capital ships, the Jeremiah O’Brian is participating in a series of war games with other human ships.

Continue reading “IRON HELIX”

Reloaded Amiga Works by Andy Warhol


PITTSBURGH—A multi-institutional team of new-media artists, computer experts, and museum professionals have discovered a dozen previously unknown experiments by Andy Warhol (BFA, 1949) on aging floppy disks from 1985.

Continue reading “Reloaded Amiga Works by Andy Warhol”

The 80s Computer World I’ve Always Wanted To Live In

The 80s Computer World I’ve Always Wanted To Live In

Continue reading “The 80s Computer World I’ve Always Wanted To Live In”

3NCrypt10n Programs


3ncrypt10n Programs

We tried to reach the Encryptdrop owners, but their Site righteoustech.com is gone.
Encryptdrop, as the name itself implies, is a program for encrypting and decryptipting files.
We saved the latest non-shareware version of this program (V9B),
which still keeps different methods of encryption, for example: Serpent, Twofish, Cast-256 and AES.
It’s a small powerful program for Win32 that makes it’s job perfectly and has a nice interface.
The Encryptdrop programmers never released it for Open Source,
we just hope that they change their mind and continue the development of this program.
Here is direct download of it and a skin made by us for the interface included.

Continue reading “3NCrypt10n Programs”

A Short History Of Cryptography

Akamai Chief Security Officer, Andy Ellis, shares A Short History Of Cryptography :

A Short History Of Cryptography

Before the modern era, cryptography was concerned solely with message confidentiality (i.e., encryption)—conversion of messages from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely the key needed for decryption of that message).

Continue reading “A Short History Of Cryptography”

Spy Radio

Since before the time of Sun Tzu, communications has played an important role in the collection of intelligence. With the advent of effective portable radio technology in the 1930’s, it became feasible for an operative to send and receive information quickly and independently from within enemy territory.


The purpose of this research paper is to document facts, observations, anecdotes, and stories about clandestine radio equipment as used by the United States. The specific equipment presented here was chosen either because it had a major role in clandestine work, or because sufficient information was available to the author. Pictures and brief descriptions of additional equipment can be found in books by H. Keith Melton (see the Bibliography); and also at various sites on the World Wide Web.

Continue reading “Spy Radio”

Do NOT follow this link or you will be banned from the site!
%d bloggers like this: