Friday, December 07, 2001

BestCrypt data encryption software
Jetico, Inc. offers BestCrypt data encryption software and BCWipe data erasing software for Windows 95/98/ME/NT/2000/XP and Linux operating systems.

The BestCrypt software performs encryption using the USA Federal Standard DES in Cipher Block Chaining mode, the Russian Federal Standard GOST 28147-89 in Cipher Feedback mode, the Blowfish in Cipher Block Chaining mode and the Twofish in Cipher Block Chaining mode algorithms at the same time. The BestCrypt software allows translate encrypted data between any of these four algorithms.

BestCrypt data encryption systems bring military strength encryption to the ordinary computer user without the complexities normally associated with strong data encryption.

Jetico, Inc. offers also the BCWipe utility for Windows 95/98/ME/NT/2000/XP and Linux. It is a useful utility for secure file deleting and wiping free space on disk. BCWipe supports a correspondent U.S. Department of Defense recommendations (DoD 5200.28-STD).
CGIProxy-- HTTP/FTP Proxy in a CGI Script
This CGI script acts as an HTTP or FTP proxy. Through it, you can retrieve any resource that is accessible from the server it runs on. This is useful when your own access is limited, but you can reach a server that in turn can reach others that you can't. It can easily be configured for anonymous browsing, so you can set up your own anonymous proxy like The Anonymizer. It's very simple to install, and very configurable.

When an HTML resource is retrieved, it's modified so that all links in it point back through the same proxy, including images, form submissions, and everything else. Once you're using the proxy, you can browse normally and (almost) forget it's there.
Internet anonymity for Windows power users
Our previous article, "Do-it-yourself Internet anonymity" was targeted towards average Windows users. It generated a startling number of e-mail requests for some advanced tactics, which I'm happy to supply. However, power user or not, I'd recommend at least skimming the earlier article if you haven't read it, just to ensure that you're not forgetting something

Tuesday, December 04, 2001

ELECTRONIC WARFARE AND RADAR SYSTEMS ENGINEERING HANDBOOK
This handbook is designed to aid EW and Radar systems engineers in making general estimations regarding capabilities of systems. It is not intended as a detailed designer's guide, rather it covers a variety of subjects of general interest.

It was originally published by the Avionics Department of the Naval Air Warfare Center Weapons Division in 1992 under the report number TS 92-78. Since that time five editions were published before changing the document number to TP 8347
CryptoHeaven Secure Free Email, Online Storage, File Sharing
CryptoHeaven is developed to accelerate wide spread use of highest-grade cryptography and distributed without restrictions upon its further dissemination.

A user-friendly, no-compromise information-heaven crypto system is created, where no third party, including server administrators and others watching, have access to plain text version of transmitted information. Information is stored in encrypted form on the server as generated by the client, and only the sender and the recipient possess the keys to gain access to the information. Having the entire log of all transmissions made and all of the data stored on the server, does not give access to the plain text version of information.

We use only the finest in cryptography, including an AES symmetric cipher Rijndael with 256 bit symmetric key, public-key cryptography with 2048-4096 bit asymmetric keys and SHA-256 message digest function.
FBI software cracks encryption wall
The FBI is developing software capable of inserting a computer virus onto a suspect's machine and obtaining encryption keys, a source familiar with the project told MSNBC.com. The software, known as "Magic Lantern", enables agents to read data that had been scrambled, a tactic often employed by criminals to hide information and evade law enforcement. The best snooping technology that the FBI currently uses, the controversial software called Carnivore, has been useless against suspects clever enough to encrypt their files.
Anti-Virus Makers and FBI Dirty Secrets
Eric Chien, chief researcher at Symantec's antivirus research lab, said that provided a hypothetical keystroke logging tool was used only by the FBI, then Symantec would avoid updating its antivirus tools to detect such a Trojan. The security firm is yet to hear back from the FBI on its enquiries about Magic Lantern but it already has a policy on the matter.

"If it was under the control of the FBI, with appropriate technical safeguards in place to prevent possible misuse, and nobody else used it - we wouldn't detect it," said Chien. "However we would detect modified versions that might be used by hackers."