Category Archives: Open Source

Easily Recover Deleted Photos And More – Open Source TestDisk & PhotoRec

Summary: When it’s time to recover deleted files from an SD Card, Hard Drive, Flash Drive, etc., this powerful portable recovery application, (despite its command line type interface), makes deleted file recovery just about as simple as it gets.

In previous reviews, I’ve covered more than a few file recovery tools,  some of which have lived up to the developers’ claims – but, most have not. PhotoRec, part of the bundled package included in TestDisk – despite it’s name – is capable of recovering 390 types of files, according to the developer.

In the following review, I’ll describe how easy it was to recover deleted photos from my camera’s SD Card and, deleted music files from my iPod. As you’ll see, this application is not wizard driven – but, despite that, it’s still very easy to use.

First up was a recovery attempt on a camera.

On launching the application, the connected camera was immediately identified.

image

Selecting the drive was a simple matter of cursoring down, and pressing the Enter key.

image

In just a few minutes (under 3 minutes), PhotoRec identified and recovered 121* previously deleted photos.

image

* Much to my surprise, the application actually recovered 241 previously deleted photos. I’m not complaining.   Smile   All recovered files were saved to the recovery directory (a sub-directory of the directory the application is running from) – as shown below.

image

Here’s a recovered shot (August 2012), of my BlackBerry Playbook in its Bluetooth keyboard case. As an aside – Tablets are super duper consumption devices – but, for real work, a physical keyboard is a must for me.

image

Next up – music file recovery from my iPod.

image

In just a few moments (less than a minute), PhotoRec identified and recovered *105 previously deleted tunes.

image

* The application actually recovered 106 previously deleted tunes.

image

But, can they be played? You bet!

image

Fast facts:

Fix partition table, recover deleted partition.

Recover FAT32 boot sector from its backup.

Rebuild FAT12/FAT16/FAT32 boot sector.

Fix FAT tables.

Rebuild NTFS boot sector.

Recover NTFS boot sector from its backup.

Fix MFT using MFT mirror.

Locate ext2/ext3/ext4 Backup SuperBlock .

Undelete files from FAT, exFAT, NTFS and ext2 filesystem.

Copy files from deleted FAT, exFAT, NTFS and ext2/ext3/ext4 partitions.

System requirements: Windows (NT4, 2000, XP, 2003, Vista, 2008, Windows 7 (x86 & x64), Linux, FreeBSD, NetBSD, OpenBSD, SunOS and MacOS X. (Reviewed on Win 8 x32)

Download at: Cgsecurity.org

You may only need this application a time or two – but, wouldn’t it be nice to have it sitting in your USB toolbox when you do? The answer is – YES.   Smile

5 Comments

Filed under downloads, File Recovery Software, Freeware, Open Source, Windows

Beat Obama’s Bandits With TrueCrypt Free (Open-Source) Encryption

The so called “War on Terror” has long since lost its luster and should be appropriately reclassified as The War of Terror. The U.S. has been singularly impudent in terrorizing the terrorists but instead, it has managed to terrorize the rest of the world using a system of surveillance schemes that have gone off the board. Chalk one up for Al Qaeda – the only winners in this debacle.

In the meantime, Americans continue to live in fear – trading away freedoms for security in a war that is simple unwinnable. Obama, despite his assurances that he would “fight terrorism while maintaining our civil liberties” has been a principle mover in this assault on democracy.

And, the master of the reversal has more –

Obama, in a 2008 election sound bite, drew a sharp contrast with the Bush administration which he proclaimed, offered Americans “a false choice between the liberties we cherish and the security we demand.” And for good measure – for stooping “to spy on citizens who are not suspected of a crime.” It’s a surreal world we live in, is it not?

But why be satisfied with my ramblings? Here’s the video.

image

As America continues its slide into Fascism (eagerly joined in the venture by Canada, Australia, the U.K. and countless other self-advertised “democracies”), the justified expectation held by these governments is – you – yes, you – will take no active part in expressing your outrage at the escalating intrusions into your private life. Sadly, the undermining of democracy, or more to the point, democracy as we though we knew it, continues apace.

As a consequence (hardly the only consequence, of course), encryption technology is once again in the spotlight. And no, using encryption does not mean that one has something to hide.

Sophisticated and  aware computer users know, that financial data and other confidential information, can easily be subject to intrusive viewing by those not authorized to do so.

Putting Obama and his bad boys aside, here are some examples of how this might occur:

Internet malware attack: Increasingly, statistics reinforce the fact that financial data continues to be targeted by hackers/information thieves, for the purpose of identity theft.

Contrast that reality with these facts; there is no such thing as a totally secure Internet connected computer. All Internet connected computers are subject to attack and compromise.

Lost or stolen Laptop: How often have we read the following – 200,00 (insert your own number here), bank account numbers, Social Insurance Numbers, names, addresses and dates of birth were on a laptop stolen/lost earlier this week.

In too many of these cases, negligently, the data is unencrypted. Certainly Laptop theft or loss is not restricted to organizations; it can just as easily happen to you.

Lost or stolen USB drive: Since USB flash drives are so portable, you can take a drive virtually anywhere. Just like most items that are portable and that you carry with you, this type of drive can be lost, or stolen.

To reduce or eliminate the security threat of sensitive data exposure then, the most prudent course of action is data encryption. Essentially, data encryption is a secure process for keeping your sensitive and confidential information private. It’s a process by which bits of data are mathematically jumbled with a password-key. The Encryption process makes the data unreadable unless, or until, decrypted.

It happens to us all: Just this past week, I lost not only my house keys (first time ever) – but the USB key attached to the keychain. If you guessed that the drive was encrypted – take a bow.   Smile

TrueCrypt:

TrueCrypt is an outstanding free open source software application for establishing and maintaining an on-the-fly-encrypted volume. On-the-fly encryption simply means that data are automatically encrypted, or decrypted, just before they are loaded or saved – without any user intervention. The program automatically and transparently encrypts in real time.

No data stored on an encrypted volume can be read (decrypted) without the correct password/key file or correct encryption keys. The entire file system is encrypted (i.e., file names, folder names, contents, free space, Meta data, etc.).

Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). When you turn off your computer, the volume will be dismounted and files stored in the volume will be inaccessible and encrypted. You may of course, manually dismount the volume.

TrueCrypt offers a number of options – you can store your encrypted data in files, partitions, or on a portable storage device such as a USB flash drive.

Installation is simple and straightforward – no gotchas here. Lots of steps – but easy steps.

image

image

image

image

image

If you choose “Keyfiles”, be sure you understand the ramifications. This is an extra security step which has limited application for a home user. You do not need to select this option.

image

image

image

image

image

And – Win 8’s File Explorer reports that the volume has been setup successfully. If you expand the graphic below (click), you’ll also notice my first TrueCrypt volume on this HD from May 9, 2006.

image

Indicative of this application’s popularity is the fact that it is downloaded tens of thousands of times each day, across the Internet.

Fast Facts:

Creates a virtual encrypted disk within a file and mounts it as a real disk

Encrypts an entire hard disk partition or a storage device such as USB flash drive

Encryption is automatic, real-time (on-the-fly) and transparent

Provides two levels of plausible deniability, in case an adversary forces you to reveal the password – Hidden volume – No TrueCrypt volume can be identified (volumes cannot be distinguished from random data)

Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS

Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts

Pipelined operations increasing read/write speed by up to 100% (Windows)

I’ve been using TrueCrypt for a number of years, and I have developed a lot of confidence in this outstanding application. If you determine that encryption of your sensitive data is a priority, I highly recommend that you give TrueCrypt a try.

How effective is TrueCrypt? If you have any doubts as to how effective TrueCrypt really is, then read this article. FBI hackers fail to crack TrueCrypt:

The FBI has admitted defeat in attempts to break the open source encryption used to secure hard drives seized by Brazilian police during a 2008 investigation.

System Requirements: Win 8, Win 7, Vista, XP, Mac OS X, and Linux.

Download at: TrueCrypt

14 Comments

Filed under downloads, Encryption Software, Freeware, Interconnectivity, Open Source, Software, Utilities

Free Security Software Downloader – Download Multiple Security Apps And Tools In One Go

imageIf you’re into helping your less experienced friends/relatives deal with computer issues, then I think you’ll find that Security Software Downloader (SSDownloader) is a terrific way to help those less experienced users install the freeware security applications that you know, through experience, are a “must have”.

Talk about small!

Security Software Downloader is a tiny open source executable (669KB) – designed specifically as a bulk download manager which focuses on security applications and, security related specialty tools.

A quick walkthrough –

The tab based user interface – Free Antivirus, Security Suites (Trial Versions), Malware Removal, Firewalls, and Other Tools, is uncomplicated and checkbox simple.

In the first screen grab, referencing “Free Antivirus”, I’ve selected three popular applications for download. Notice the languages which are available, as well as the OS “auto detect” feature. According to the developer – changing the language will automatically download your selection/s in the chosen language.

image_thumb[6]

Total download time – 2:37.

image_thumb[10]

The default download location is the Desktop. You will however, have a chance to select an alternative location.

image_thumb[14]

For this test, I’ve bypassed the Trial Versions opportunity. Still, there’s a good selection of well know applications to choose from.

image_thumb[18]

In this screen capture, you’ll note that I’ve focused on two tools which, I know from experience, can get the job done with a minimum of fuss.

image_thumb[21]

From the “Other tools” menu, I’ve selected three more applications which have served me well in the past.

image_thumb[24]

As each download is completed, a system notification area popup, tells the tale – as illustrated below.

image_thumb[27]

Fast facts:

  • Download the most popular free and paid security software with only one click.
  • Don’t worry about OS or 32bit/64bit, the right version will be automatically downloaded.
  • Stay up to date, the newest versions of the selected software will be downloaded.
  • Choose what you want to download and you will see a notification as soon as your download/s finish.

System requirements: Windows XP, Vista, Win 7 (32 bit and 64 bit). Tested on Win 8.

Download at: Sourceforge

For those of us who are geek inclined, SSDownloader (especially given its small footprint), would make a nice addition to a Flash drive toolbox.

Download times will be system specific. In this case, I ran on a 1.7 MB/sec  connection.

10 Comments

Filed under 64 Bit Software, Anti-Malware Tools, downloads, Freeware, Geek Software and Tools, Open Source

Open Source BleachBit 0.9.3 – Deletes HTML5 Cookies

imageI considered just giving up – but, I’ll be damned if I will. I take every precaution I can to guard against the invasive parasitic practices of data collectors who are persistent in their attempts to collect “anonymous” data on my personal browsing habits. But, it’s never enough.

Despite my precautions – despite the tools I use in an attempt to respond to the insidious nature of web tracking – I find myself fighting a constant rear guard action. No sooner do I reach a plateau from which I can exert a functional level of control over the “behind closed doors nature” of Internet tracking – than I’m forced to deal with an even more insidious method of personal data collection.

Let’s spin back for a moment, to the time when the so called LSO (Flash Cookie) was introduced as a response to users gaining control over standard HTTP cookies. Control which allowed for the acceptance, the rejection, and the wiping of private data – including wiping cookies.

The Flash Cookie changed all that. By design, a Flash Cookie (Super Cookie)remains active on a system even after the user has cleared cookies and privacy settings. BetterPrivacy – a free Firefox add-on, stepped into the battle to address this issue, and gave users an opportunity to identify, and delete, Super Cookies.

When a Tracking Cookie is not obvious to a casual Internet user and, when that cookie cannot be deleted without the aid of a specialty cleaner, then Internet tracking has been taken to a level that borders on deception. Hell, let’s call it what it really is – crooked, immoral, fraudulent, illegal, ……..

When I first wrote on Super Cookies in September 2009, I made the following comment –

“……….with little resistance being offered by the “sheeple”,  and a failure by regulatory authorities to enact appropriate consumer protection laws, we can expect privacy intrusions , like this, to accelerate.”

It’s hardly surprising then, that we are now faced with the Evercookie (HTML5 Cookies)

From Wikipedia:

An Evercookie is not merely difficult to delete. It actively “resists” deletion by copying itself in different forms on the user’s machine and resurrecting itself if it notices that some of the copies are missing or expired. Specifically, when creating a new cookie, Evercookie uses the following storage mechanisms when available:

  • Standard HTTP cookies
  • Local Shared Objects (Flash cookies)
  • Silverlight Isolated Storage
  • Storing cookies in RGB values of auto-generated, force-cached PNGs using HTML5 Canvas tag to read pixels (cookies) back out
  • Storing cookies in Web history
  • Storing cookies in HTTP ETags
  • Storing cookies in Web cache
  • window.name caching
  • Internet Explorer userData storage
  • HTML5 Session Storage
  • HTML5 Local Storage
  • HTML5 Global Storage
  • HTML5 Database Storage via SQLite

Hold on – there’s more:

The developer is looking to add the following features:

  • Caching in HTTP Authentication
  • Using Java to produce a unique key based on NIC information.

We’re not quite finished.

With this tool it is possible to have persistent identification of a specific computer, and since it is specific to an account on that computer, it links the data to an individual. It is conceivable this tool could be used to track a user and the different cookies associated with that user’s identifying data without the user’s consent. The tool has a great deal of potential to undermine browsing privacy.

I don’t know what your definition of hacking, or illegal access encompasses – but, in my view, the placement of an Evercookie steps over the line into the realm of cybercrime. I suggest to you, that if a government were to penetrate a user system to plant an Evercookie as a matter of course – the outrage would be immediate. But, private enterprise does it – and the “sheeple” happily bow to what they consider the inevitable.

The tracking industry (a multi-Billion dollar industry), has gone too far on this one. I predict the litigation lawyers, and privacy advocates, will run out the big guns in a justifiable attempt to eradicate this spyware.

Personally, I believe that criminal charges should be laid against the executives of those organizations currently using Evercookie. I see no difference between these yahoos, and Russian cybercriminals.

Additional statistics on which web sites are currently using Evercookies can be had by reading an eye opening article by one of my favorite Tech writers Ed Bott – here.

In the meantime, you might consider installing BleachBit – an open source application which will delete Evercookies from your system.

In the following screen capture I have focused on a Firefox cleanup – including wiping HTML5 cookies.

image

In this screen capture the focus is on deleting Flash cookies ((Super Cookies).

image

Lets take a look at a preview of what’s going to be deleted –

image

Choosing the same parameters using CCleaner (a Flash and Firefox cleanup), leads to a considerable difference.

image

Fast facts:

BleachBit quickly frees disk space and tirelessly guards your privacy.

Free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn’t know was there.

Designed for Linux and Windows systems, it wipes clean 90 applications including Firefox, Internet Explorer, Adobe Flash, Google Chrome, Opera, Safari,and more.

Beyond simply deleting files, BleachBit includes advanced features such as shredding files to prevent recovery, wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster.

Better than free, BleachBit is open source.

System requirements: Window, Linux.

Languages: This application is available in 56 languages.

Download at: SourceForge

BleachBit is a powerful application; I recommend that you spend some time becoming familiar with its operation and capacity, before using for the first time.

You should consider viewing a tutorial video available here.

30 Comments

Filed under downloads, Evercookies, Flash Cookies, Freeware, Open Source, Privacy, Software

Bite Back Against Banking Bandits With Puppy Linux

image

Woof, Woof! That’s the sound of Puppy Linux as it starts. A good sound as it turns out; it reminds me as to why I’ve just booted my computer from this amazing little Linux distro – safety, security, and a substantially increased chance that I’ll hang onto the paltry funds in my bank accounts.

Puppy Linux is not a one trick pony – although, I tend to use it for one thing only (at the moment) – Online Banking. More on this in a moment*.

This is a very well trained Puppy:

Easy – Just use a CD or USB flash to boot a PC. Puppy Linux is downloadable as ISO, an image that can be burned to CD or DVD.

Fast – Because Puppy is small, it can live in your PC’s memory and be ready to quickly execute your commands, whereas in other systems, programs are first read from drive storage before being executed.

Save Money – Even if your PC has no hard disk (ex, broken hard disk), you can still boot Puppy via CD or USB and continue working. Old PCs that no longer work with new systems will still work good-as-new with Puppy.

Do More – Puppy boots in less than a minute, even in old PCs, and it does not require antivirus software. Administering Puppy is quick and minimal. With Puppy, you just have to take care of your data, which you can easily save to USB flash (Then forget about your operating system!). Your data can be read by other computers.

Do Magic – Help your friends suffering from computer malware by booting Puppy and removing malware from their PC (use antivirus that is built-in or can be installed in Puppy). Example – bad Autorun.inf is easily removed by Puppy (Just delete it as well as its companion exe program). If your friend thinks that she has lost data from her corrupted hard disk, boot Puppy and try saving her data!

Carry Anywhere (Portable) – Because Puppy is able to live in CD/DVD or USB flash, as well as save data to these same devices, you can carry your programs and data with you.

The Puppy Desktop – Not flashy; not eye candy – but functional and efficient.

image

In the following illustration, I’ve clicked on the Browser icon (SeaMonkey is the native Browser), to open this site. I considered showing my online banking connection – in a moment of madness.   Smile

image

*Not to be argumentative – wait, I will be argumentative. The Internet, and its related technologies (connected devices, and so on), has become a massive playground for outrageous hype and sheer BS. It’s like listening to a used car salesman. Nowhere, is this more evident than in the orbit of security technology.

Outrageous claims of “total protection” based on stale data; ranking security suites as if # 1 was truly more effective than # 2……

As if the premise is – system security is a static environment in which knowledgeable users operate in their own best interests.

As if cybercriminals are sitting still, and not releasing highly sophisticated attacks on a daily basis.

As if application vulnerabilities are not discovered virtually on a daily basis.

So, am I being argumentative just for the sake of it? Not bloody likely.

Qualys Inc. releases a Consensus Security Vulnerability Alert @RISK Newsletter on a weekly basis (to which I subscribe), that sets out the most recent vulnerabilities for which exploits are available in the cybercrime marketplace.

Here’s a small sampling of the latest –

Title: Trojan uses new C&C obfuscation technique
Description: The Polish CERT has observed a new Trojan spreading in the
wild via a number of different social media techniques. While not
particularly novel in that regard, this particular piece of malware is
interesting in the way that it contacts its command and control servers.
Instead of using the address provided in a DNS query response, the
malware takes that value and transforms it into a different IP address,
which is then used to contact the C&C. This technique, if it becomes
widespread, has interesting implications for malware detection at the
network level.

Title: Symantec PcAnywhere 12.5.0 Login and Password Field Buffer Overflow
Vendor: Symantec
Description: The host-services component in Symantec pcAnywhere 12.5.x
through 12.5.3, and IT Management Suite pcAnywhere Solution 7.0 (aka
12.5.x) and 7.1 (aka 12.6.x), does not properly filter login and
authentication data, which allows remote attackers to execute arbitrary
code via a crafted session on TCP port 5631.

Title: Banking trojan spreading via phishing attacks
Description: The Sourcefire VRT has discovered a new Trojan being
dropped on users via a large-scale UPS-themed phishing attack. The
Trojan, which attempts to steal credentials for several major financial
institutions
, also drops other malicious binaries on the infected
system. Its C&C communications are of particular interest, as its
authors chose to use the hexadecimal string “0xDEADBEEF” – which is
commonly used by attackers and researchers alike as a way to follow user
input through system memory – as a protocol marker of sorts.

Note: input through system memory.

It’s this last type of vulnerability (though not exclusively), which drives my need to logon to my banking site via a self-booting Linux Live CD – in this case – Puppy Linux. Since Puppy is read-only media, the environment (running entirely in RAM), will be much more secure than Windows.

Yes, I admit that it’s a pain (occasionally) to shut down and reboot just to complete an online financial transaction but, I’d rather be safe than sorry – I’m into an ounce of prevention.

Since the majority of malware is Windows specific, banking online through a Linux Live CD is my ounce of prevention. It should be yours as well.

Minimum Hardware Requirements for Puppy Linux 4.2.1:

500MHZ processor
128MB RAM
512MB free hard drive space to create an optional save file
No hard drive required to boot a Live Disc.
CD-ROM any speed

Download at: Puppy Linux

More information is available on the publisher’s site.

20 Comments

Filed under Don't Get Hacked, downloads, Freeware, Linux, Live CDs, Online Banking, Open Source

NoSleepHD Keeps Your External HD Spinning

imageWe all have those “damn, that drives me crazy” moments with computing, I expect. My particular “damn, that drives me crazy” moment, repeated throughout the day, day in and day out is, waiting for the auxiliary Hard Drives (non-OS drives) on my system, to spin up.

Most Hard Drives feature a firmware auto spin down function, independent of the OS, that shuts down the drive after 10 minutes, or so, of inactivity. A primary Hard Drive, of course, can be controlled by adjusting power options in the OS’s advanced power settings menu. But, not auxiliary Hard Drives.

So, dealing with a repetitive non-responsive time lag of 3/5 seconds while my D, or E drive spins up – short though it may be – is annoying. Particularly, since I need to save my work periodically to drive D, or drive E – and, it’s generally outside the 10 minute spin down window.

I found a small (22 KB) free (open source) application, NoSleepHD, which I hoped might solve this annoyance. Despite the fact, that this small application is designed specifically to keep external Hard Drives from entering sleep mode, I gave it a try. Alas, it was a “no go”. So, I’m on the hunt for a freebie application which will solve the “damn, that drives me crazy” daily refrain.

Still, NoSleepHD is a simple, but nonetheless impressive little application, that writes a blank text file every few minutes (selectable 1 to 15) to an external Hard Drive (which effectively prevents the drive from entering sleep mode), which might come in handy for those who run with external Hard Drives.

Here’s a quick overview:

A simple GUI.

image

Click ‘Info’ tab to view drive information.

Monitor multiple drives by selecting, more drives in ‘Configuration’ tab. (Up to 5 External Hard Drives).

Hard drive monitoring can be stopped if necessary. (Which would allow the drive to go to auto-sleep).

Application can sit in the System Tray or simply minimized.

Auto-run at start-up can also be enabled.

System requirements: All versions of Windows.

Download at: Softpedia

4 Comments

Filed under downloads, Freeware, Open Source, Software, System Utilities

Time For Tor? – An Open Source Anonymous Surfing Application

imageOver the years, I’ve posted more than a few articles on anonymous surfing and the applications, generally free, which makes that possible.

I’ve noted, over that time, that the majority of readers of these article have a Middle East IP – particularly Iran. Little wonder, when one considers the human rights violations committed by this regime. Remaining anonymous online in Iran, could literally be the difference between life and death.

A typical email from an Iranian reader:

Dear Bill

I live in Iran – I need to know news about my hometown, but in Iran we are faced with filtering…very hard filtering. It makes me depressed, but one of my friends introduced your website to me and told me you can help me.

If you think that the crazies who rule Iran, and Syria – just 2 of these Middle East dysfunctional societies), where Internet usage is scrutinized on an individual basis – are the only unhinged and delusional nutters Internet users have to deal with – you’re wrong.

The erosion of fundamental rights and freedoms, including the right to surf the Internet without government oversight, seems to be happening at an ever increasing pace – everywhere.

In a previous article on anonymous Internet surfing tools (October, 2010), I wrote – “Thankfully, I live in a part of the world where Government censorship of my Internet activities is a non-issue; the Canadian government does not restrict my access to any part of the Internet.

I wish I could go on to say, that I live in a part of the world where the Government has NO interest in my Internet activities, But that, unfortunately, would be like wishing on a star – and, equally as effective.

While I have no faith whatsoever, that those in power will continue to use the gathered information in a restricted, and appropriate fashion – it’s not something that I dwell on. After all, there is nothing I can do about it – so, I’m forced to slot it into my comfort zone.

In the past week however, I’ve been ripped out of my comfort zone, as have most other Canadians, who have revolted against legislation proposed by the quasi-fascist Conservative Party of Canada – the current political party in power (a government elected by only 26% of eligible Canadian voters) – led by Stephen Harper, a fundamentalist Christian, and his minion Vic Toews – another fundamentalist Christian .

In 2008, Toews was divorced by his wife of 30 years, after it was discovered that he had fathered a child with a younger woman – who may have been his child’s babysitter. Just one more example of the “moral right” practicing its favorite pastime – hypocrisy.

Public Safety Minister Vic Toews faced a fierce online backlash over Bill C-30, which would require internet service providers to turn over client information to law enforcement agencies without a warrant.<br />
Public Safety Minister Vic Toews faced a fierce online backlash over Bill C-30, which would require internet service providers to turn over client information to law enforcement agencies without a warrant. (Fred Chartrand/Canadian Press)

The proposed legislation would create  a mandatory surveillance regime. Simply put – unfettered government surveillance directed at Canadian Internet users.

The backlash against this perverted legislation was both immediate, and overwhelming. Canadians have made it clear – they will not allow themselves to be figuratively handcuffed. Frankly, I’ve never seen a political backlash remotely like it. The typically mild mannered and polite Canadian is angry, disgusted, and hell-bent on ensuring this abomination of a legislative bill – never sees the light of day.

Still, until Harper and his gang of throwbacks to the Cro-Magnon era, are thrown out on their asses in the next general election, you might consider adding an anonymous surfing application to your toolbox.

The use of anonymous surfing applications is not restricted to breaking through obstructive Internet barriers of course. There are more obvious reasons, you may have for anonymous surfing, including – surfing in internet cafes, public terminals in libraries, or hotel business centers.

In fact, you may want to surf anonymously on any PC where you don’t want to leave traces of your private surfing activities to ensure protection from snooping web sites, annoying advertisers, employers, rogue police services, or curious family members.

One of the most popular anonymous surfing applications  (with good reason), is TOR – a VPN (a virtual private network) that encrypts via an SSH tunnel, in order to safeguard your Internet connection and, protect your anonymity properly.

In this post I won’t review Tor, since I’ve done so a number of times previously. Instead I’ll direct you to the following.

From the site:

What is Tor?

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

Overview 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor’s hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they’re in a foreign country, without notifying everybody nearby that they’re working with that organization.

Groups such as Indymedia recommend Tor for safeguarding their members’ online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers.

Tor is suitable for installation on Windows, Mac OS X, Linux, BSD, Unix, and Android.

For more information and download, visit the Tor Home Page.

12 Comments

Filed under Anonymous Surfing, downloads, Freeware, Interconnectivity, Open Source, Personal Perspective, Surveillance

Free Linux Live USB Creator – Run Or Boot Linux From A Flash Drive

imageIf you’re looking for a painless way to run Linux without having installed any one of 200+ distributions to your Hard Drive, or without having to boot from a Live CD, then open source Linux Live USB Creator could be the perfect tool. In a very simple process, Linux Live USB Creator will install any one of a huge range of Linux distributions to a USB drive.

After installing your chosen Linux distribution, either from an existing ISO on your HD, or exercising the option to download an ISO through Linux Live USB Creator, you will have several available options.

Option 1 –  Run LinuxLive USB directly within Windows in a virtual environment.

Option 2 – Boot directly from the LinuxLive USB key.

The following screen captures illustrate how a previously complex process has been streamlined, so that a competent average user should be able to breeze through the installation. For this review, I installed PCLinux from an ISO, previously stored on my HD, to an 8 GB Flash Drive.

Launching Linux Live USB Creator will take you to a colorful, “follow the bouncing ball” simple interface.

image

In less than 5 minutes the process is complete and I’m off to the races!

image

Well, sort of. In fact, immediately upon installation completion, you will be taken to the developer’s site for a quick heads-up on using Linux Live USB Creator.

image

As per the developer’s instructions, using Windows Explorer, I navigated to the newly installed VirtualBox folder on the USB drive, clicked on Virtualize_This_Key.exe, and sat back as PCLinux launched inside Windows in VirtualBox.

image

Now, how cool is that! No fuss, no muss, no knowledge of running a virtual system required.

image

As stated earlier, you have a huge selection of Linux distros to choose from. For this review I choose PCLinux since I had it hanging around on my HD – one of those “I’ll get to it when I can” downloads.

image

Fast facts:

Free and Open-source – LinuxLive USB Creator is a completely free and open-source software for Windows only. It has been built with simplicity in mind and it can be used by anyone.

No reboot needed – Are you sick of having to reboot your PC to try Linux? No need with LinuxLive USB Creator. It has a built-in virtualization feature that lets you run your Linux within Windows just out of the box!

Supports many Linux distributions – Ubuntu, Fedora, Debian, OpenSUSE, Mint, Slax, CentOS, ArchLinux, Gentoo, PCLinuxOS, Sabayon, BackTrack, Puppy Linux …

Persistence – Having a Live USB key is better than just using a Live CD because you can even save your data and install software. This feature is called persistence (available only on selected Linux).

SmartClean & SmartDownload – SmartClean uninstalls properly any previous Live USB installations and SmartDownload lets you download any supported Linux in 2 clicks automatically selecting the best mirror to download from. SmartClean also lets you clean your USB key in 1 click.

Intelligent processing – LiLi works with many Linux, even if they are not officially supported.

Hidden installation – LiLi hides the Linux installation, your USB key stays clean.

File integrity – tells you if your ISO is corrupted.

Keeps your data on your USB device.

Intelligent formatting – can format disks bigger than 32 GB.

Auto-update – automatic updates when new Linux distributions are available.

System requirements: Windows 7, Vista, XP

Download at: Linux Live USB

User’s Guide – This tutorial will show you how to create a Linux Live USB very easily.

Tested on Windows 8 (developer).

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

11 Comments

Filed under downloads, Freeware, Geek Software and Tools, Linux, Live CDs, Open Source, Operating Systems, Portable Applications, Software, USB, Virtualization, Windows 8, Windows Tips and Tools

Is Linux Only For Techies?

Currently, I’m running a dual boot system – Windows 8 Developer and Ubuntu Linux – so much for the rumor that Microsoft has locked out dual booting Linux on Windows 8.

In fact, I’ve been running dual boot systems for years – various flavors of Windows, and Linux. I wouldn’t, for example, do my online banking in any OS other than Linux. So, I’m comfortable with the idea that I can offer my opinion on how “hard” or how “easy” it is, to run with Linux.

I like to think that my opinion is an “educated” opinion. An opinion based on long term usage and direct observation. So, it definitely burns my ass when I read fluff from Windows bloggers who pass judgment on Linux and who, without the benefit of personal knowledge, go into a “let’s trash Linux” mode.

In 30+ years of real world computing,  I have met only a handful of techies who have an accurate understanding of how a typical user computes – how a typical user experiences computing. An understanding based on – here’s that terrible word again – observation.

Instead, the “I just know” phrase, as to how a typical user computes, is often offered in place of evidence based opinion. A follow up query such as “OK, but HOW do you know?”, invariably leads to a shake of the head and an “I just know that’s all” rapid response.

This throwaway response puts me in mind of the years I spent in management consulting, when a “how would your customers rate your service delivery” query for example, would invariably be met with a “Oh hey – terrific, terrific”, comeback.

We’ll skip ahead to  the inevitable “How do you know?”, and I’m sure you can guess the answer – “we just know”. More often than not, a series of customer centric focus groups would reveal that a company had a massively misplaced perception of how customers really viewed service delivery. I refer to this only to illustrate the point that perception does not always line up with reality – despite the often quoted “perception is reality”.

One particular “I just know” statement, I hear repeatedly from fellow techies is – Linux is only for techies. But, is it? Nor from where I sit it’s not. I suspect that this fallacy is based on (amongst a host of misperceptions), the mistaken view that Linux is primarily a command line driven operating system. Something it decidedly is not.

Sure, if a user is a command line fanatic in Windows (as a DOS 1 veteran, I understand the attraction), then that preference can easily be carried over into Linux. But, that’s not how a typical user interacts with an operating system – not in Windows and not in Linux.

Ubuntu Linux for example, is built around an intuitive point and click user interface which is similar in layout, and function, to Windows – including Windows XP. Certainly more instinctive, and vastly more functional, than the new Windows 8 Metro GUI shown below.

image

To be fair – the classic Windows Desktop is accessible through the Metro GUI in Windows 8. Here’s a screenshot of my classic Desktop running in Windows 8.

image

Contrast the Windows Desktop shown above, with the following OLD Linux Desktop layout (March 2007). Point and click simple – similar in layout and functionality to the previously shown Windows Desktop.

image

Here are a couple of Ubuntu Desktops I currently run. Simple, functional, and efficient.

image

image

Alternative Linux Desktops are readily available, so that a transition to a Linux based operating system can be more or less, a seamless move for an average user. Admittedly, there are some issues new Linux users will encounter in making a change from Windows. But, these are essentially “where do I click” issues – not issues that require techie based skills.

A number of alternative Desktops are shown below.

Enlightenment

image

Fluxbox

image

KDE

image

There’s no doubt Windows and Linux are not the same operating system under the hood. But, average users don’t look under the hood of an OS – not in Windows – not in Linux.

Average users simple want to point and click, and Linux based operating systems, by and large, allow them to do just that. To propose otherwise is disingenuous and suggests an uninformed basis for comparison.

If you’d like to get an handle on just how easy it is to run Ubuntu, you can download Ubuntu and run it alongside your current Windows system – just as if it was a normal Windows application. It’s a fabulous way to get a taste of Linux. Did I mention that it’s free?

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

29 Comments

Filed under 64 Bit Software, downloads, Freeware, Linux, Open Source, Operating Systems, Ubuntu, Windows 8

Download Multiple Security Apps And Tools With Free Security Software Downloader

imageSecurity Software Downloader (SSDownloader) – now in it’s second version – is a tiny open source executable (669KB) – designed specifically as a bulk downloader which focuses on security applications and, security related specialty tools.

A quick walkthrough

The tab based user interface (Free Antivirus, Security Suites (Trial Versions), Malware Removal, Firewalls, and Other Tools) is uncomplicated, and checkbox simply.

In the first screen grab, referencing “Free Antivirus”, I’ve selected three popular applications for download. Notice the languages which are available, as well as the OS “auto detect” feature.

image

For this test, I’ve bypassed the Trial Versions opportunity. Still, there’s a good selection of well know applications to choose from.

image

In this screen capture, I’ve focused on two tools which, I know from experience, can get the job done with a minimum of fuss.

image

From the “Other tools” menu, I’ve selected three more applications which have served me well in the past.

image

In testing this neat little tool, I choose a total of 10 applications for download –  and, the task was completed in just over 5 minutes.

image

As each download is completed, a system notification area popup, tells the tale – as illustrated below.

image

Note: The default download location is the Desktop. You will however, have an opportunity to select an alternative location.

Fast facts:

Download the most popular free and paid security software with a single click.

OS auto detection.

The latest version of the selected applications will be downloaded.

System requirements: Windows XP, Vista, Win 7 (32 bit and 64 bit). 

Download at: Sourceforge

In my estimation SSDownloader is a terrific portable tool – although, I don’t see much of a need for it unless one is geek inclined. But, for those of us who are geek inclined, SSDownloader (especially given its small footprint), would make a nice addition to a Flash drive toolbox.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

Comments Off on Download Multiple Security Apps And Tools With Free Security Software Downloader

Filed under Anti-Malware Tools, downloads, Freeware, Geek Software and Tools, Integrated Solutions, Open Source, Software, Utilities, Windows Tips and Tools