2017-07-15T14:09:07Z http://pcfullversion.com/wp-content/uploads/2017/07/Reimage-Repair-PC-Crack-KeyGen-Full-Free-Download.png. Download: Richardson Software Razorsql 8.3.4 Macos, Found: 5 Results, Updated: 05-Aug-2021. RazorSQL 8.3.4 + crack (license key gen).. RazorSQL is an intuitive database administrators & query tool that allows you to Download.
watch the videoComo ativar o EaseUS Data Recovery Completo+Ativador Final (Instalação e Ativação Fácil) 2020
RazorSQL 9.4.8 Crack With Activation Key Full Free Download Latest 2022
RazorSQL is an intuitive database administrator and query tool that allows you to work with various databases through JDBC or ODBC connections. RazorSQL allows you to connect to dozens of databases from one tool, you can easily view, navigate, create, edit, restore, execute SQL queries – from simple to complex procedures and even allow you to work with different databases.
WITH RazorSQL Full You can work with various databases and execute SQL scripts, ranging from simple statements to complex procedures. This program offers a complete solution for database administrators, allowing them to easily create, edit, execute, and delete database records such as views, updates, indexes, and execute stored procedures and functions. In addition, it also allows you to compare data from different tables, views, queries, and more.
Because it stores connection information in ‘connection profiles’, you need to make a new profile. Once it is created, it can be used to connect to whatever database you want. Once the connection is established, the left panel displays all of the identified data, thus allowing you to edit it the way you want. The main window enables you to execute as many SQL scripts as you want, while the Console section retrieves all the necessary data. Besides, if you want to import data from delimited files, Excel spreadsheets, fixed-width files windows data recovery stellar phoenix the current database, you can use the proper option from the main toolbar.
In case you want to run one SQL query at a time, you can choose the ‘Execute SQL (One Statement)’ option, otherwise, you can access the other features such as ‘Execute SQL – Fetch All Rows’ or ‘Execute SQL (All Statements)’.
RazorSQL Crack With License Key
Another important feature of RazorSQL is that you can compare data from multiple tables, views, or queries, whether they belong to the same database or they are from different ones. By accessing the ‘Compare Tool’ option from the File menu you are able to set up the connection parameters, select all the data you are interested in, then compare it. However, a downside of this option is that you are required to manually write each table’s name and since it does not come with auto-completion features, nor displays a drop-down list from where you can choose the available tables, you need to pay attention when writing their names.
By accessing the Results menu you are able to filter and sort all the query results the way you want, edit the selected cells, as well as generate INSERT, SELECT, UPDATE and DELETE statements with ease. To sum things up, RazorSQL comes bundled with visual tools and useful features that help you to manage multiple databases, execute SQL statements, and export data to XML, HTML, and Excel spreadsheets.
RazorSQL Crack working with different databases and executing SQL scripts ranging from simple SELECT statements to complex procedures, RazorSQL proves to be an intuitive and steady solution specially designed for database administrators who need to create, alter, describe, execute and drop database objects such as tables, views, indexes, stored procedures, and functions. Irrespective of the database you choose to work with, be it Oracle, MS SQL Server, MySQL, PostgreSQL, Firebird, Interbase, Apache Derby, Salesforce, SQL Azure, SQLite, MongoDB, Front base, or JavaDB, the application helps you to edit SQL scripts, gather information from multiple tables, create indexes and views.
RazorSQL Crack 2022 All Platforms Free Download
RazorSQL Full Cracked inserts mass processing data in one call. This can be useful if you have a slow or potential network connection to the database. You can choose how many instructions to group each time you call. The higher the number of instructions, the fewer network calls. If an error occurs while importing in this mode, it is difficult to determine the exact location where the error occurred, because there may be instructions in the batch. If you are worried about errors, it might be advisable to use the “Execute instructions” option at once.
The RazorSQL Activation Key allows you to connect to dozens of databases from one tool, you can easily navigate, navigate, create, edit, repair, run SQL queries ranging from simple to complex procedures and even allows you to work with different databases. With RazorSQL Full, you can work with different databases and run SQL scripts, from simple instructions to complex procedures directly. RazorSQL Keygen offers a complete solution for database administrators, enabling them to easily create, edit, execute, and dispose of database records, such as views, updates, indexes and run stored procedures and functions. In addition, this also allows you to compare data from various tables, views, queries and more.
- visual tools for creating, editing, describing, altering, dropping, and viewing database objects
- tools for importing and exporting data
- a database browser for the viewing of database objects and structures
- a robust programming editor with support for SQL, PL/SQL, Transact-SQL, SQL PL, PHP, Java, XML, HTML, and twelve other programming languages
- Built-in drivers, tools, and system
- A built-in relational database engine
- Connect to other databases and more.
- Edit: import and export data
- Manage all major (popular) databases
- Reliable program editor and query tool
- SQL Editor and Professional Database Browser
- Supports Derby, MySQL, Oracle, etc.
- Comparison tool: table, data, and file
- Multiple displays of query results
- Supports PHP, Java, XML, HTML, etc.
- Syntax Highlighting and Autocomplete
- View and unzip Zip and Jar files
- Universal tool for database queries and much more.
- tools for creating, editing, and executing stored procedures
- triggers and functions
- a tool to compare table data and/or query results, and SQL history
- adds functionality with the API plugin
- New DB2 Table Conversion Support
- New ability to enable SSL encryption
- Other bug fixes and improvements.
- Ingres: If pdf creator crack - Crack Key For U in a query cause an error, RazorSQL will strip them
- Added support for Java 10 and Java 11 to the Java compiler
- Registration Screen now provides more information about license eligibility, upgrades, and archived downloads.
Minimum format factory full - Crack Key For U 2000 / XP / Vista / 7/8 / 8.1 / 10 or Server 2003/2008/2012/2016 (32-bit or 64-bit version – all editions)
How to install?
- Disconnection from the Internet (most important)
- Unpack and install the software (run the installer)
- Or just unpack
- run the portable version.
Bartels Media免費軟體評價 70 分檔案下載PhraseExpress 消除重複鍵入並管理可定制類別中經常使用的文本片段。樣板模板可以與位圖和 RTF 或 HTML 文本格式一起存儲。獨特的文本預測功能注意到重複的文本模式，並提供自動完成這樣的短語。智能算法分析和學習你的寫作模式，並建議完成短語和句子最相關的方法。自動圖文集功能允許將經常使用的文本（例如您的地址，簽名或常用短語）分配為更簡短的縮寫。每當您輸入所分配的縮寫 PhraseExpress 時，將自動將其替換為原始文本。例如，“ty”將被擴展為“非常感謝你，現有的 MS Office 自動更正條目可以導入在任何 Windows 程序中使用，而不僅僅是 MS Office。PhraseExpress 自動識別不需要的自動文本，並在下一次禁止文本替換輸入自動圖文集.
剪貼板緩存通過記住複製到剪貼板的所有項目並存儲它們以供以後粘貼，從而增強了本地 Windows 剪貼板功能 PhraseExpress 可以選擇性地從剪貼板內容中刪除任何文本格式強大的宏功能可以添加動態內容靜態短語，如當前的日期，計數器或額外的手動輸入短語可以鏈接或嵌套宏也可以啟動程序或打開由快捷鍵觸發的文件進入 'calc' 可以打開 Windows 計算器程序或敲擊熱鍵 CTRL-F8 可能會提供一個突出顯示的文字的 Google 搜索查詢
Text Sn ippets Manager
PhraseExpress 通過將文本縮寫擴展為全文片段來保存擊鍵。例如。輸入 'sig' 可以將您的簽名插入到任何程序中.
PhraseExpress 包括系統範圍的拼寫更正，包含 7 種語言的 10,000 多個拼寫更正。
雖然標準 Windows 剪貼板只保留最後復制的數據，PhraseExpress 剪貼板管理器保留最近複製的剪貼板內容，以便快速訪問和插入到任何應用程序中.
當您處理文檔時，手頭沒有計算器嗎？ PhraseExpress 可以執行計算，您鍵入.
Launch 程序只需輸入一個文本快捷方式。例如，鍵入“word”啟動 Microsoft Word 或“exc”以打開電子表格。
PhraseExpress 可以管理您的電子郵件簽名模板以用於任何郵件程序，例如 Outlook，Lotus Notes 或 Thunderbird。動態內容可以從 ActiveDirectory / LDAP 中嵌入.
Change is in the air
I take this opportunity to convey best wishes for a very happy, prosperous and safe new year to you and your family from Team Digit. In the new year, we at Digit look forward to bringing you all the latest excitement in the area of technology, computing, gadgets and a lot more. In my last letter to you, I had asked you for feedback and suggestions to talk to us and let us know how your favourite publication could serve you even better. A lot of you responded and reached out through letters, emails, the ThinkDigit web site Aomei Backupper Crack personal calls. It became quite clear to us that you are not just readers of Digit, but rather a part of a vibrant, well-knit community of RazorSQL 8.3.0 Download - Crack Key For U enthusiasts who not only care for Digit a lot, but are also highly demanding in terms of quality. It has, therefore, been our constant endeavour to raise the standards and justify your trust which has made Digit the No. 1 Technology Magazine in India. We have been constantly investing in strengthening our editorial team. Last month Ahmed Shaikh joined us as Editor-at-large and Online Architect for Personal Technology. With Robert as Editor of Digit, Edward as Editor-in-chief for Personal Technology and now Ahmed, I can say without doubt that you are being served by the most formidable tech-editorial team in this country.
In keeping with our endeavour to bring more value to you, we are increasing the number of dual-layer DVDs to two from this issue onwards, thus giving you even more content to enjoy every month. We are also enhancing the Fast Track content. As we were entering the new year, we were faced with an important question: should we keep raising the quality and value of what you get, even if it means adjusting the price a little, or should we maintain the price and the offering? Over the last few months, we have implemented all possible cost-reduction and austerity measures to help hold the price, while enhancing the magazine. However, this was not enough to allow us to continue our innovations and enhancements. Based on your feedback and inputs, we came to the conclusion that we could stay true to our commitment to innovate, and to our communitys expectations, only by increasing the price. Although Digit will now be available on stands for a slightly higher cover price, the subscription price will remain the same as before. I am confident that we can continue to count on your support and goodwill. In the coming months, you will see several innovations in the magazine, as well as online at ThinkDigit.com. Assuring you of our best efforts, I once again wish you a very happy 2009. email@example.com
Publishing Director, Digit
It has been our constant endeavour to raise the standards and justify your trust which has made Digit the No. 1 Technology Magazine in India
YO U R T EC H N O LO GY N AV I G ATO R
January 2009 Volume 9 Issue 1
Sales and Marketing VP Sales and Marketing Naveen Chand Singh Product Manager Navneet Miglani Assistant Brand Manager Arpita Ganguli National Marketing Manager Vikram Duggal Marketing Communication Thomas Varghese Co-ordinator, Scheduling, MIS and Ad-sales Aatish Mohite Production and Logistics Senior GM - Operations Shivshankar Hiremath Production Executive Vilas Mhatre Logistics M P Singh, Mohd. Ansari, Shashi Shekhar Singh Circulation and Subscription Sales GM Circulation Milind Prabhughate Co-ordinator Pramod Patil Customer Service Prerana Panchal, Vrushali Londhe Customer Service: 022-40789612/13/14 Head Office: Editorial, Marketing and Customer Service Nine Dot Nine Interactive Pvt. Ltd C/o KPT House, Plot 41/13, Sector 30 Near Sanpada Railway Station, Vashi, Navi Mumbai 400703 Phone: 40789666 Fax: 022-40789540, 022-40789640 Cover Design Andre Rodrigues
Managing Director Dr Pramath Raj Sinha Printer and Publisher Kanak Ghosh Publishing Director Asheesh Gupta Editorial Editor-in-Chief Edward Henning Editor Robert Sovereign-Smith Writer Aditya Madanapalle Test Centre Manager - Test Development and Sourcing Michael Browne Manager - Testing and Processes Rossi Fernandes Reviewer Kumar Jhuremalani Product Co-ordinators KP Nambiar, Yogendra Bagle Design Creative Head Kabir Malkani Art Director Rohit A Chandwaskar Senior Designers Vijay Padaya, MV Sajeev, U Ravindranadhan Illustrators Shrikrishna Patkar, Ashwini Baviskar Sr. Photographer Jiten Gandhi Multimedia Project Head Robert Sovereign-Smith Content Co-ordination Aditya Madanapalle
South Sanjay Bhan E-mail: firstname.lastname@example.org Mobile: +91 9341829285 Phone: (080) 25546370-73 Fax: 41518330 Phone: (044) 28235186/88 Fax: 28230731 Phone: (040) 27894167/ 55221051 Fax: 27720205 West Arvind Ambo E-mail: email@example.com Mobile: +91 9819904050 Phone: (022) 40373636/ 40373626/24494572/24467130/1 Fax: 24482059/24481123 East Jayanta Bhattacharyya E-mail: firstname.lastname@example.org Phone: +91 9331829284 (033) 22317344/46 North Pranav Saran E-mail: email@example.com Phone: +91 09331829284, (011) 41608655/56/57/58 International Navin Chand Singh E-mail: firstname.lastname@example.org Mobile: +91 99013 00772
Client Canon Cricket Today Dell Epson Fortune Gigabyte HP i-Ball Iomega Kingston Page No Inside front Cover 59 15 Inside back cover 115 Back cover 04 11,77 99 27 Client Microsoft Microworld MTNL Nvidia Ricoh Rx -Tech Seagate Texonic Top-Gun Wyse Page No 17 25 109 33 23 117 19 31 57 31
Tell us what you feel about Digit
Each month, Digit walks through the technology maze to bring you the most relevant, and the most researched stories. If you have an opinion about anything published in Digit, or about technology in general, please write to email@example.com
Products reviewed this month
Business Laptops Test. .97 Dell Latitude E6400 HP Elitebook 6930P Lenovo T400 Lenovo X300 Sony Vaio VGN-Z13GN Bazaar. . .60 Billion BiGuard 30 Brother MFC-7840N Canon Pixma MP198 HP Photosmart C4588 Intex IN 2266 Motorola Motozine ZN5 Nikon D90 Norton Internet Security 2009 Sony Ericsson W595 Thermaltake Xaser VI Zebronics Air Gear GPS Test. .54 Garmin Mobile 10 Garmin Nuvi 350 MapmyIndia 430 Classic Navigator MapmyIndia A-MAX 06GP5A Satguide Bluetooth Receiver Satguide Mio C230 Satguide Mio P360 Motherboard Comparison Test. . .66 ASUS M3A79-T Deluxe ASUS P5E3 Premium ASUS P5E64 WS Evolution ASUS P5Q Premium ASUS P5Q3 Deluxe ASUS Rampage Extreme ASUS Rampage Formula ASUS Striker 2 Formula ASUS Striker 2 NSE BioStar T-Power I45 ECS P45T-AD3 EVGA 132-CK-NF78 EVGA 132-CK-NF79 Gigabyte EP43-DS3L Gigabyte EP45-DQ6 Gigabyte P45-DS4P Gigabyte X48-DQ6 Intel DX48BT2 MSI K9A2 Neo2 MSI P43 Neo MSI P45 Platinum MSI X48c Platinum XFX MB-N780-ISH9 XFX MB-N790-IUL9 ZOTAC NF-780i Supreme ZOTAC NF-790i Supreme
Want your product reviewed by Digit? Contact our Test Center at firstname.lastname@example.org
Software on DVD/CD
To submit and suggest software for inclusion in the Digit DVD or CD, write to email@example.com
For subscription or copy-related issues, send an e-mail to firstname.lastname@example.org
Endorsements / reprints
Interested in ordering article reprints, or using our logos? Contact email@example.com
For any business-related enquiries, contact firstname.lastname@example.org
News and new product launches
To announce new product launches, and press releases, email us at email@example.com
Disclaimer: For every Digit contest, there will be only one winner, unless specified otherwise. In the event of a dispute, the Editors decision shall be final.
Printed and Published by Kanak Ghosh, for Nine Dot Nine Interactive Pvt. Ltd. C/o KPT House, Plot 41/13, Sector 30, Near Sanpada Railway Station, Vashi, Navi Mumbai 400703 Editor: Sujay Nair, C/o KPT House, Plot 41/13, Sector 30, Near Sanpada Railway Station, Vashi Navi Mumbai 400703 Printed at Silverpoint Press Pvt. Ltd, Kohinoor Estate, 165, Tulsi Pipe Road, Lower Parel, Mumbai 400 013
DIGIT JANUARY 2009
Let Big Brother watch
ALL OF US pored over the papers and were glued to the TV, as reports updated us on the sophistication of the Mumbai attacks. GPS devices, Russian re-mailer servers and Blackberry devices were used by the terrorists. It must have been infinitely easier to find someone to teach them how to use a GPS device or a Blackberry, than to fire an AK-47 even if they are, allegedly, from poor families in little villages. Thats the beauty (or the horror, in this case) of technology today absolutely anyone can learn to use it (for good or evil), with very little in terms of a formal education required. While most of us have lambasted our politicians and intelligence agencies, and played armchair Prime Minister for a few days, the real question that remains to be answered is what are we willing to lose to make sure that our country and our way of life is more secure? After events like 26/11, people are generally more accepting of security measures, and patiently wait in line to be scanned and patted down at public places. Unless youre a criminal, and are carrying drugs, guns or explosives, you have an air of acceptance about you when your privacy is being violated by these checks. Its for the greater good, you say to yourself, and move on. So why is it that you dont feel the same way about your online activities being monitored? Why is the world so paranoid about Big Brother, and the techniques he may employ to keep us in check? I, for one, couldnt care less if my mails and social networking profiles were being monitored personal IDs of course. Monitoring work communications might not be such a good idea, because most businesses survive on privacy and secrecy of intellectual properties, and leaks could ruin them. So, companies
could always choose to secure and encrypt their work mail, and not use free email services. I expect people to brand me insane for welcoming the idea of Big Brother into my life, but I think its only logical given the times we live in. Id rather some government computer network pick out a billion innocent messages that we send, than let even a single mail from a terrorist go unnoticed. What have we really got to hide? Im sure the government or its computers will not care about how much porn you surf for unless its underage nonsense, in which case you deserve life imprisonment or worse. A government computer will not care about your affair with your secretary, or what you were up to on your last holiday either. Besides, with a billion people online world-wide, which government is really going to have time for irrelevant rubbish? Youve probably heard the phrase, The internets biggest flaw is also its biggest draw. This refers to the lack of a governing body for the net, and the freedom and anonymity it offers. Like little children in a fancy dress competition, we don different costumes online, and always wear a mask. However, terrorists, paedophiles, stalkers and other sick people do exactly the same thing. Isnt it time we started to realise that without some form of governance, chaos rules? How is it a good thing that just anybody can Google How to make a bomb or homemade bomb and get over 4.4 crore and 4.5 lakh results, respectively? How can we shout about privacy and freedom, when some innocent eight-year old is being made to act out sick fetishes on film, by some of the same people who stand next to you in this selfrighteous picket line?
Robert Sovereign-Smith, Editor
Id rather some government computer network pick out a billion innocent messages that we send, than let even a single mail from a terrorist best windows 7 activator unnoticed.
YouTube videos that spread hatred, terrorists who use sat-phones, BlackBerry services, and Google Earth, paedophiles that lurk in chat rooms waiting to prey on your kids, and vengeful, lovelorn idiots making indecent profiles of their exes on networking sites; how much more idiocy do we really need to see before we welcome a change that will stop allowing the law to throw up its hands in helplessness whenever tech is involved in a crime? In this day and age, we need more preventive than reactive measures. I dont think my desire for online privacy is stronger than my desire to never again bear witness to a sorrowful candlelight vigil at the Gateway of India.
DIGITAL PASSION DIGITAL BUSINESS
Tech Talk. 12 Security Watch. 13 Hot Not. . 13 Digital World. 14 Stat Attack. . 18 Buzzword Of The Month. 18 W5H. 20 Q&A. 80 Tips & Tricks. 89 Tech Quiz. . 111 Whatever Happened To. . Google Earth Pro 126.96.36.19986 Crack + License Key .. 112 People Who Changed Computing. 113 Bluff Your Way Through. . 114 Wild Wild Web. . 114 Blogwatch. RazorSQL 8.3.0 Download - Crack Key For U.. 116 Digit Diary. . 116 Inbox. . 118 The Last Word. . 120
Business Laptops Test
The tech that powered evil
As we recover from the horror of the Mumbai attacks, we are now horrified by another thought: how did this gang get the technological one-up on our forces? And how must the good guys fight them?
Suited and booted
We test a very select bunch of the most elite business notebooks around.
New attack vectors threaten the business network. We take a look at the evolving security landscape and chart out a new paradigm for defence against these threats
Digital rights management
A necessary evil or an evil thats not necessary?
A well-drafted plan for bomb threats tested and evaluated with trained staff will enable your organisation to respond promptly and minimise loss
Watch out for those millions of dollars from Nigeria waiting for you.
How secure are you?
Beware: enticing email subjects and images could lead your system and security to peril.
46 maal Drool
Headphones with bling, a keypad for smileys, and more
Who is Google?
War on piracy ver 2.0
No more jobs
Undersea cables cut again
Microsoft launches BizSpark
GPS Devices Tested
Now, getting lost is also a thing of the past.
Chrome vs. IE8
New lease of life for Windows XP
We test the latest hardware and software products available in the market
3Gs are better than one
Left 4 Dead
YouTube made me famous
Gmail stops you from drunk mailing
Brick and mortar
High-end rigs, multi-GPU systems and world-record beating benchmarks need the best boards. Weve tested them.
Need For Speed - Undercover
NY Gov proposes iPod tax
Linux joins the OS advertising battle
CCTV focuses on Google and Yahoo!
kids take traffic policing system for a ride
Where on earth am I?
The answer to that question lies in technology we call GPS.
Far Cry 2
China courts rule against dead womans friend and blogging site
JANUARY 2009 DIGIT
DIGIT JANUARY 2009
communicate with users of AOL, MSN, Yahoo and ICQ instant messengers from a single program. I 1st MP3 Torrent Downloader 2.8 I Aardvark Desktop Creator 1 I Avanquest Connection Manager Free Edition 2.0.3 I Avant Browser 11.5.16 I BitTorrent I Camfrog Video Chat 5.1.127 I Earthstationv 1.0 I FlashCatch 188.8.131.52 I Free Phone 2.0 I Free Webcam Watcher 1 I Full Speed 3.0 I Gigaget Download Manger 184.108.40.206 I HomeCamera 4.3 I IP Hider 3.4 build 57 I Java Desktop SMS 1.0 I Lphant Plus 1.00 I Monesafe 2006 I Mozy Free Remote Backup 1.6 I Ozum 5.00 I Paessler Site Inspector 220.127.116.114 I Web Services Accelerator 2.00 I WeFi 18.104.22.168 I Zultrax P2P 4.28
authorPOINT Lite for PowerPoint 2.0
Audioblast is a sound editor for WAV and MP3 files that supports all the standard editing features as well as several special effects and offers a choice of graphic schemes.
Lego Digital Designer 1.21
Lego Digital designer lets you model complex lego models in a virtual design studio.
authorPOINT Lite converts and uploads presentations to authorSTREAM and WiZiQ, the only services that retain PowerPoint effects on the web like PowerPoint animations, rehearsed timings, iZotope VocalSynth 2.2.0 Crack Full Version Free Download [Mac + Windows] 2021 and gifs. Angel Writer 3.0 BeamYourScreen 2.0.5 I CHM Owner Guard 8.3.0 I CopyWriter 3.00 I cVue 0.7 I Diagram Designer 1.21 I docPointer Visual ReadMe 2.0 I InfoRapid KnowledgeMap 2005e I Natural Word from Software Theories 1.0.0 I NetViz 7.0 I NoteMagic Lite 22.214.171.124 I nPowered Presenter 3.20.1437 I numberGo Publisher 1.4 I PDF Action Free PDF Reader 1.6 I Strategy Map Balanced Scorecard 2.1 I The Presentation Launcher 1.0 I WhiteBoard 2.0 I WordBase4ME 4.05 I 3D Graph Generator 2.4.0 I Ability Spreadsheet 4.14 I Antechinus Draw Magic 2.2 I Atlantis Word Processor 126.96.36.199 I ClassDraw 1.01 I ClearBoard 1.3.0 I ConceptDraw VI 6.0 I DiagramStudio 5.2 I DoneEx XCell Compiler 1.9.3 I EDGE Diagrammer 6.04.2020 I Flow Diagrams 1.0 I IntroCreator 2.46.00 I Killink CSV 1.2.1 I Liquid Media 2.01
World of Goo
Arc Aether Anomalies War Rock 040808 I Harvest Massive Encounter I Lost Planet: Extreme Condition
Far Cry K-9 Vision v1.1 Mod I Naruto Little Fighter I True Combat: Elite I Unreal Tournament 2004 Red Orchestra v3.3 Full Install
World of Goo is a physics-based puzzle / construction game. The millions of Goo Balls who live in the beautiful World of Goo dont know that they are in a game, or that they are extremely delicious.
Afro Samurai Black Mesa Source I Chronicles of Spellborn I Mirrors Edge I Ninja Blade I Soldner-X I Star Ocean: The Last Hope
Star Trek, featuring a young, new crew venturing boldly where no one has gone before. I 2012 I Astro Boy I Local Color I New in Town I Nobel Son I Nothing But the Truth I The International I The Reader I Yonkers Joe
Design Xpress 11 I AmitySource UserBar Generator 2.2 I AnimatorDV Simple 9.02 I Audioblast I Beneton Movie GIF 1.1.2 I Bryce 5.5 I DAZ Studio 188.8.131.52 I DesignPro Limited Edition 5.2.1201 I Desktop T Shirt Creator 1.1 I Diagram Designer 1.21 I DVD Identifier I DynamicFactory 4.1 I Lego Digital Designer 2 I Master-Design Art-Shop X-Lite 17.4.36 I OrangeCD Player I Photobie Design Studio 2.2.1 I Quick Media Converter I Soundflavor DJ I Synfig Studio 0.61.05 I The GodFather I trakAxPC I ACDSee Photo Manager 10 I Corel PhotoImpact X3 I Magic Photo Editor 4.64 I MAGIX Xtreme PhotoStory on CD and DVD 7.0 I Real Player Gold 11 I SnagIt 9.0.2 I StillMotion PE 2 2.0.3875
Ad-aware 2008 Advanced WindowsCare 2.00 I Amanda Community Edition 2.5+ I bScreen 1.0 I CachemanXP 1.5 I Comodo Registry Cleaner I Doctor Alex Antispyware I EMCO Malware Destroyer 3.14 I HDClone Free Edition 3.6+ I Instant Memory Cleaner 7.1+ I Rambooster 2.0 I RegXcrub VistaXP I Roadkils Raw Copy I Spyware Terminator I Super Fdisk Bootable CD I X-Setup Pro 6.5
Logicity - Crystal Reports Viewer MuSQL 2.51 I MYdbPAL for MySQL 184.108.40.206 I MySQL 6.0 Enterprise I Scribes Report Tool 220.127.116.11 I SQL Studio Query eXecutor 1.1 I SQLCreator 2.0 I Access-to-MySQL 3.1 I AdeptSQL Workshop 1.01 I Advanced Database Query 1.1 I Advanced Database Query Automaton 1.1 I Advanced SQL Recovery 1.0 I Advanced SQL To HTML Table Converter 1.1 I Advanced SQL To PDF Table Converter 1.1 I AlligatorSQL 1.15 I blueshell Data Guy 2.02.0004 I CASE Studio 2 2.22 I DAC for MySQL 2.6.3 I Database Design Studio Lite 2.21.0 I DBExplorer 2.2.2 I DBF Comparer 2.34 I DBSurveyor for SQL Server 1.0.1 I MyCon Professional MySQL GUI 2005.2.9.0 I RazorSQL 4.2.9 I SQL Weaver 2.50 for ODBC With XML 2.500h I SQLStomper 1.0 I Survey Power 6.10
Fast Track I PHP Source Files I Fast Track Video
TigerCad is a simple technical drawing software (CAD). Ideal for garden design, mechanical engineering drawings, elecPHP TOOLS
.net Framework 2.0 .net Framework 3.5 I Torrent 1.8.1 I Avast Home Edition 4.8 I Comodo Internet Security Pro 3.5.55810.432 I Foxit Reader 3.0 I Free Download Manager 2.5 build 758 I Irfan View 4.20 I Java(TM) 2 Runtime I K-Lite Mega Codec Pack FULL 4.2.5 I Opera 9.6 I Silverlight I Spybot Search and Destroy 1.6.0 I VLC Player 0.9.4 I WinRAR 3.80
trical / electronic, building and room plans, and general diagramming. Output in PDF format for the Web. Copy and paste graphics. Create standard symbols to re-use. Scale, mirror and rotate. AutoCAD Drawing Viewer 2.1.9 CadStd Lite 3.5.9 I DesignBots 1 I Diagram Designer 1.21 I DWG Search 2.3 I DwgSee Plus 1.2 I eDrawings 2008 SP01 18.104.22.168 I FreeCAD 8 I jDraft 22.214.171.124b I Live DXF2BMP 1 I LiveSwif Lite 2.1 I MyCAD Viewer 1 I PCB Artist 1.2 I PowerDraw 3 I Sweet Home 3D 1.4 I WinTopo 1.61 I AutoCAD 2009
Designer 2007 - Personal 5.0.2 I EasyPHP 2.0 beta 1 I PHP Generator for MySQL 7.10 I PHPTriad 2.2 I Source Edit 4.0 revision 3 I Php Database Wizard 0.3 I Notepad++ 4.7.5 I Firebird PHP Generator 7.10
for PHP 1 I Easy PHP Highlighter 2 I DSV PHP Editor 2.3 I MS SQL PHP Generator 7.4 I Oracle PHP Generator 7.4 I PostgreSQL PHP Generator 7.10 I CodeLobster PHP Edition 1.4.1 I SQLite PHP Generator 8.1 I StarPhP 126.96.36.199 I Smilehouse Workspace Small Business 1.10
XAMPP is a very easy to install Apache Distribution for Linux, Solaris, Windows and Mac OS X. The package includes the Apache web server, MySQL, PHP, Perl, a FTP server and phpMyAdmin. Active Query Builder Free Edition 1.7.9 DaFT 1.0 I eva3 Universal Database Converter 1.2 I Firebird - Relational Database 1.0 I FlySpeed SQL Query 1.1 I Free SQL Compare 1.1 I Idera SQLcheck 2.0
UPDATES AND ADD-ONS
Adobe Flash Pro CS4 Adobe AfterEffects CS4 I Adobe Illustrator CS4 I Adobe Indesign CS4 I Adobe Lightroom CS4 I Adobe Photoshop CS4 I Adobe Premiere Pro CS4 I Adobe Acrobat Pro CS4
Acoo Browser 1.90.966
Acoo Browser is a powerful multitabbed Internet browser based on the Internet Explorer engine.
From director J.J. Abrams (Mission: Impossible III, Lost and Alias) and screenwriters Roberto Orci and Alex Kurtzman (TRANSFORMERS, MI: III) comes a new vision of the greatest space adventure of all time
Dream I Man in Man I O Grande Ditador (The Great Dictator) I The Terror I Voyage to the Prehistoric Planet
Integrity Messenger 4.11
Integrity Messenger allows you to
Adobe Shockwave Avast Update I AVG Update I Java runtime update I Kaspersky definition Update I Norton Internet security update I Spybot updates
Ashampoo ClipFinder Ashampoo Core Tuner I Ashampoo Burning Studio 2009 I Ashampoo Internet Accelerator 2 I Ashampoo Photo Commander 6 I Ashampoo Photo Optimizer 2
DIGIT JANUARY 2009
For any queries regarding the CD or DVD, e-mail firstname.lastname@example.org with CD/DVD as the subject. If the subject is not mentioned, your mail might not reach the right person.
DIGIT JANUARY 2009
Online taste technology at
YO U R T E C H N O L O G Y N AV I G AT O R
Download only the best software on the Net
A quick and easy registration process that gives you access to all the goodness on offer
Read the best tech blogs and submit and share your own blog with others
Experts at the Tech Q&A section answers all those niggling problems
Find the best product reviews online, from the Digit Test Centre
Indias largest and most influential tech community can be found on our forum
Buy older issues of your favourite technology magazine online
Interesting and exciting videos from across the globe
Buy and sell tech products to people from all over India at our Digital Marketplace
FEATURED REVIEW FROM THE DIGIT FORUM (www.thinkdigit.com/forum)
Just bought HTC P3400i.
The first thing anyone notices in the P3400i are its looks. I was surprised that it looks pretty good when you have it in front of you. The touchscreen is responsive in most cases but the stylus is not comfortable enough for my taste. I am currently using an empty pen with a big tip and this is much better for navigation as well as writing on-screen. The user interface is a bit erratic. It isnt slow at all times but sometimes it slows down erratically. Once I learned it; the erratic-ness has gone. Still the overall speed is not anything to talk home about. It is always somewhat slow. Memory usage is high with no programs running. Very little free memory is left at startup (just 33 per cent) Camera is just okay for posting photos to blogs and for for emergency uses. Despite the 2MP sensor, quality is not much better than my age-old Nokia 6600s VGA camera. Music quality through the single speaker on the phone is fair for soft numbers, it just isnt the thing for heavy metal stuff. The treble is more emphasised through the external speaker, as is the case with many mobiles. Music quality through the provided headphones is pretty good for a PDA but the mids are overemphasised. I used Metallicas Nothing Else Matters as the test track. I hate the propietary jack. A 2.5-mm jack would have been tolerated. You can buy extensions which plug into the phones jack and give you with 3.5mm jack. The phone allows creating, viewing and editing Word and Excel files. Viewing PowerPoint files is supported but is sluggish. The Adobe PDF Reader also makes an appearance. For all practical purposes, it isnt very usable because of the slow processor. The games that come along advanced systemcare pro 188.8.131.520 crack - Free Activators pretty nice, but one can install more games as it supports Java as well as Windows Mobile applications. I definitely am in love with this device. It may be because of my first experience with Windows Mobile. I have used Symbian 7.1 and Symbian 9.0 on some of my earlier smartphones. There are differences but I have adapted to them in a short duration of one day. The only major advantage the HTC Touch has over this is the WiFi but that isnt so important yet as there is a lack of WiFi hotpots to use this feature. In short, if you are thinking about buying this one, dont hesitate.
IronMan Forever Join Date: Jun 2008 Location: Metal City Posts: 721
DIGIT JANUARY 2009
Another one for production key for microsoft office 2010 Eee PC
Eee PC the ultra-light, ultra-portable and ultra-cheap Netbook from Asus just bagged itself another award. Its now crowned Forbes Asias Product of the Year for 2008. The product was chosen for its Innovation and Market Disruption.
Search may become pass
Contextual browsing may become movavi video converter crack patch new avatar of search. With browsers and web sites becoming increasingly aware of what you are looking at, all your web content needs will be custom delivered to you in the future.
Security Watch Critical security flaw in IE (again) The problem
Microsoft recently issued a critical security warning regarding a malicious code that is making the rounds and attacking vulnerabilities in Internet Explorer 7. The infection had the potential for wide-spread damage since IE 7 is the latest non-beta version of Microsoft's browser and is bundled with XP service pack 3 and also Vista. The code, infects a users' system with a Trojan horse. It may even start downloading other malicious elements into the users system. Microsoft says that the code can creep in even through legitimate websites in which the script has been inserted to run in the background. Earlier versions of IE are also vulnerable. It is being said that Microsoft Corp.'s developers missed the bug because they didn't have the right testing tools. Microsoft's testing tools including fuzzers, which are automated tools that drop data into applications, file formats or operating system components to see if and where they fail also missed the bug.
WHY IS ANDROID?
Who is Google?
Eugene V. Kaspersky CEO, Head of Antivirus Research, Kaspersky Lab One of the worlds leading experts in antivirus protection
What were you thinking of doing after your degree, how did you think your career would go, had you thought of going into this kind of work or were you planning on doing something else? I have done my degree in Cryptology. I think I was planning on doing something else, I didn't enjoy myself, it was just antivirus systems, it was just my hobby. I got into it by accident. My computer was infected back in 1989 with a cascade virus, back when there was such a virus. Thats why Im here. How do you tackle human gullibility, which is one of the greatest vulnerabilities out there when it comes to internet security? There are three things you could do against cyber terrorism, cyber criminals and against all threats education, law enforcement and protection. We have a special education system for kids and students about this. We do it and we do it for free, because we take it as part of our mission to spread the news. We have presentations given by about 80 experts and this method works. Isnt it difficult to make people sit up and listen and take notice for such a thing to work? The problem is that they dont pay enough attention in social networks. They think they trust everyone in a community, and give out data, some personal information, which is enough for to see some serious repercussions. It is one of the greatest threats, probably one of the most serious because there are millions of people who are in this network.
o theres no grammatical error there. Well, although there is, its intentional. Think about it. Since the time Google announced its open source android operating system for mobiles, people have wondered why is Google launching a product that has no apparent revenue model? The question has come to the forefront once again with the launch of T mobiles HTC G1. The phone is pretty nifty and we especially like the flip-slider opening keyboard. Android works fairly smooth too. But coming back to what Google is upto perhaps its recent announcement that the iPhone and TMobile G1 can now show Google search ads sheds a little light on the question. Is Google then going the Microsoft way? Monopoly being the name of the game. For instance, reports suggest T-Mobiles G1 works fine with many online services, but it works especially well with Googles. It delivers a lot of the basic core functions and of course, tight integration with Googles products, including Gmail, Google Maps, and Google Calendar.
Having said that, there is also a lack of basic features like video recording. Is it a miss out, or more like an opportunity for independent app developers? Google has
come up with a mobile application store of its own, called Android Market ala iPhone. Besides, some of Googles latest antics include asking broadband carriers to create a special fastlane exclusively for its content. This would be done by placing Google servers in the ISPs technical facilities. Another somewhat alarming warning sign is the removal of Firefox as the default browser in the
Google code pack. In a recent US survey of the top 20 most trusted companies, Google has fallen off the list entirely from its spot at 10 on last years list. Googles fall is probably due to the big company syndrome, where people just start trusting big companies less. Perhaps Google should treat these signs as early warnings. Besides this, there is a lot of fuss being kicked up about Google Maps post the Mumbai terror attacks. An Indian lawyer filed a petition in the Mumbai High Court, arguing that Google Earth and similar services aid terrorists in plotting attacks. The petition is demanding a removal of Google Earth satellite images of India, or at the very least, blur images of sensitive places in the country, such as Indian nuclear plants and defence establishments. And its not just Indians. A group of Japanese lawyers and professors have also asked Google to stop providing detailed streetlevel images of Japanese cities. Google provides this through its Street View service, which offers
ground-level, 360-degree views of streets in 12 Japanese cities and is also offered for some 50 cities in the United States and certain areas in Europe. As for the Android, well wait and watch. At the time of going to print, Kogan Agora Pro, the second Android phone was launched in Austrialia for $399 AU (Rs. 13,000). Unlike T-Mobiles G1, this phone comes unlocked for use on any carrier. WHAT WILL APPLE DO?
No more Jobs
id December news wires are abuzz with the hullabaloo of Steve Jobs quitting Macworld and Apple opting out of the event altogether, after the January installment. Mac fanboys cried themselves to sleep speculating whether Jobs health is behind the move, but the more plausible reason is that, like many companies, Apple is getting tired of trade shows. For many companies, the expense and complexity of exhibiting at huge shows,
then having to compete with hundreds or thousands of other companies for press and industry attention, are making the shows less and less compelling. Goes to show that the trade show biz isnt exactly a growth industry these days and, with tough economic times ahead, luxuries like your precious keynote are the first to go. Apple now probably plans to go in for its own exclusive product launches. Although Mac and Apple are synonymous, it is worth mentioning here that the Macworld Expo is run by IDG World Expo. Knowing Apples penchant for control, chances are that Macworld Expo didnt offer Apple enough control. Also interesting is what these expos do to the share price of Apple Inc. A prelude to all of Apples media events is crazy rumor mongering and speculation. The result is that almost every Apple extravaganza since Macworld 2007, no matter what news comes out of it, has triggered a massive sell-off of Apple stock. Initial reports suggest that Apple stock may have dropped nearly 7 per cent on the news that Steve Jobs
BBC allows YouTube to carry content
Small sections of programs and promotional segments of BBC videos have been allowed to stay on YouTube in exchange for a share of the advertising revenues of the video sharing web site.
Viacom removes content from YouTube
Viacom and subsidaries MTV, Nickelodeon and Comedy Central have pulled more than 100,000 clips from YouTube. The lawyers are unsure of the website is actually giving a boost to the content owned by Viacom or dealing it a blow.
is quitting Macworld. For Mac enthusiasts what Steve Jobs departure means is that there will be no more jazzy stunts in the Keynote, which Jobs was famous for. During the launch of the iPhone he pulled out the phone from his jeans pocket and called the local Starbucks Caf for 4000 Lattes to go. But realistically speaking, Maclovers can probably rest assured Apples not going to come apart cheap the minute Jobs leaves. NO MORE RECORDS
Microsoft has released an emergency update patch MS08-078 which addresses the vulnerability. The patch fixes a flaw in the databinding function of all available versions of the popular browser. Users who have automatic updates turned on will receive the patch automatically while others can access it via a download from Microsofts web site.
ost 26/11, security measures and privacy issues are much talked about. So the news that search companies are cutting down on searchdata retention time, is of much relevance. Search companies keep the IP addresses of their users for a period before making them anonymous. Until they anonymise the
I China blocks access to New York Times I Dell to launch ultra thin laptop to compete with Macbook Air
I Snowboarder Shaun White and swimmer Michael Phelps to feature in video games I Lawyers use Facebook to serve legal papers
DIGIT JANUARY 2009
DIGIT JANUARY 2009
Enter The Digital World
A Round-up Of Technology News From Across The Globe
CHINA Lenovos oPhone handsets to have OS developed by China Mobile US Apple TV sued for patent infringement by EZ4Media
EGYPT The first Nuclear power plant in Egypt contracted to Bechtel, a US company INDIA Lok Sabha passes bill to improve the Information Technology Act
JAPAN Panasonic and Sanyo announce a capital and business partership
AUSTRALIA Authorities to curtail P2P and torrent access across Australia
identities of its users, the information is used alongside other data, such as search queries, to improve relevance of search results and target advertising to the user, among other reasons. The most recent announcement came from Yahoo!, saying it would cut down data retention to three months in most cases, from the prior norm of 13 months. This was our attempt to put a stake in the ground Anne Toth, Vice President of Policy and Privacy Chief at Yahoo said on the issue, thus making its retention policy the shortest among peers. It is reserving the right to keep data for up to six months if fraud or system security are involved. Earlier this year, industry leader Google Inc halved the amount of time it stores personal data to nine months, while earlier in December Microsoft Corp had said it will cut the time to six months if its rivals did the same. The spate of
reduction in retention times is a response to pressure from the European Commissions data protection advisory group, the Article 29 Working Party, and other data protection officials to do more to protect the privacy of users. The commission is also pushing for the sector to adopt an industry-wide standard. Currently, there is disparity in the method companies are adopting in the process of anonymisation. Microsoft said it welcomed the move, but made a distinction between the timeframe and the method of making data anonymous. Yahoo! will delete the final segment of the IP address, which it said makes it no longer unique or identifiable. Microsoft is deleting all of the Internet address, which it said will break any potential link to a particular set of search queries. With its nine-month anonymisation, Google intends to change some of
the bits in the user IPs stored on its servers. But thats it. The plan would leave cookie data alone. Lets leave search companies and privacy issues alone for a minute and look at what risk Data retention could pose smadav crack zip download - Activators Patch National Security. Even Internet service providers can retain certain data. Back in 2006, this very issue was being debated in the US. A major concern was that the ISPs retaining data would also retain traffic information of federal, state and local governments. Classified federal systems, which generally dont use the Internet, may be the exception. What problems could arise if commercial ISPs hold detailed records of all the communications to and from government agencies? Data retention may increase the risk of the exposure of undercover police or confidential informants. And this is just one example.
WHO WILL WIN?
Chrome v/s IE 8
oogle recently went away from its perpetual beta convention by finally bringing Chrome out into the real world. Googles notorious beta label on their products is a great umbrella cover for them to receive forgiveness when things go awry. Unfortunately, the same practice can be a major problem when looking to gain serious market share. OEMs wont touch you with a 10-foot pole if your product is still in beta. And once OEMs preinstall any product, its market share is exponentially upped. Consider IE 8 it is currently not bundled with any version of Windows. The only way to get it is by download, so market share is sure to drastically change
I Ecofont, a TrueType RazorSQL 8.3.0 Download - Crack Key For U designed to save ink and toner launched I Warner Music pulls down its content from YouTube
DIGIT JANUARY 2009
once Windows 7 is ready for consumers. A quick look at some numbers online reveals that in this sort of level playing field, Chrome is doing better than IE 8 in terms of market share. (Though to be fair we must consider that IE8 is still in beta.) The battle which will now ensue to become the next browser of choice will definitely be interesting. Coming to the question of whether Chrome will be adopted by the masses, it all depends on user preference. Users tend to get pretty attached to the little niche utilities that each browser has. The noticeable lack of add-on support in Chrome is one of the many items people who havent made the switch typically cited. But regardless of how ready the browser is in the nonbeta avatar, this latest move puts them in a good position to take advantage of OEMs. Having Chrome pre-installed on machines will quickly boost its usage stats. INDIA GETS 3G data charles download, and if so, would it be ridiculously low thereby defeating the whole point of 3G. For the uninitiated, 3G will allow operators to offer high-end services such as faster downloads of video clips, movie trailers and music files, video calls, interactive gaming and even streaming video. The existing telecom services in India operate on the 2G spectrum. The process for the auction of 3G licences in India kicks off in January 2009. But before we get on to the nitty-gritties, two issues must be addressed. First, of the 300 million mobile users in India, how many have 3G phones? These high-end phones cost more than Rs. 11,000 at the least. And out of all the things 3G enables you to do, how much of it will you really use? Perhaps the average Indian mobile user may want to watch a T20 match on the go rather than video call someone. In any case, 3G users will still be a small minority, at least initially. The second issue is shortage of spectrum availability in many circles at peak times. Service, is after all, as good as the calls it allows you to make, so we dont want any lagging issues there. Coming back to the licence auctioning, under existing guidelines, the successful 3G auction bidders will have to pay Rs 1,651 crore for a UASL licence that entitles them to offer all communication services. The 3G hype also brings up the longstanding battle between 3G and WiMax technologies. WiMax stands for Worldwide Interoperability for Microwave Access. It can also be used to provide voice services and rivals 3G as both the platforms are used for similar applications. According to the Department of Telecom (DoT), the 2.1-GHz band will be used for 3G, while 2.3 GHz and 2.5 GHz have been earmarked for WiMax. Ericsson the biggest supporter and equipment vendor of 3G is laying claims on the 2.3 GHz spectrum band, which is meant for WiMax. BAD BOYS - WHATCHA GONNA DO? listening to copywrited content, why not try to squeeze some ads in there. Accordingly, all such content on Myspace and YouTube wasnt necessarily pulled down. Instead, the original owners could just choose to put ads on it. Now in its latest installment against piracy, the Recording Industry Association of America (RIAA) has announced that it will work with internet service providers to sever abusers net connections. Just to clarify, abuser here means you. Yes, you with the 20 GB MP3 collection! Under the new plan, RIAA will send notices to ISPs that identify the IP addresses of suspected file sharers. ISPs will then send warnings to their customers and then cut them off if the users fail to curb their illegal downloads. Details are still being worked out, but most reports said downloaders might lose their net connection after the third notice. The termination could last anywhere from three months to a year. But it
War on Piracy v2.0
3Gs are better than one
t seems the bigwigs at RIAA are ready to try out just about anything to stem the piracy biz. First they began by suing people who downloaded music. That meant suing just about every person on planet earth right? They managed to sue 30,000 accused file sharers in the last five years. Clearly it wasnt working, so the music industry said hey wait a minute, since so many people are downloading, viewing and
TNL recently announced the launch of 3G services in Delhi. Interestingly enough, it was inaugurated by Prime Minister Manmohan Singh by receiving a video call from Telecom Minister A Raja. We wouldve expected one of the private players to be the first one off the block, but what is important is the reaction the announcement has evoked. Message boards were actively speculating what kind of plans would be available, whether there would be a
Cisco Claims About 90 per cent of All Email is Spam I Electronics Arts will sell Spore DRM Free
DIGIT JANUARY 2009
coast at Alexandria and go on to connect to Asia, were probably damaged either by a ships anchor or a minor earthquake, officials say. So if your online gaming experience has not been up to the mark, lagging away to worlds end, then this is probably why. Initial reports suggest as much as 70 per cent of internet and telephone traffic between the continents has been affected by the outage affecting millions across the Middle East and south Asia. International telephone calls, which have also been affected, were being re-routed to work around the problem. A somewhat corny outcome of the outage is that people have been getting less spam! Inboxes which were being bombarded with hundreds of spam mail a day now get only a few. Despite widespread wireless internet and satellite connections, and contrary to popular belief, global communications still rely largely on the vast webs of fibre optic cables that cover the planet. The lines take years of planning to install. To repair them is even more of a challenge. As part of damage control for this recent incident, a 64-crew French maintenance boat arrived on site, off the coast of Sicily, following a two-day journey from southern France. An underwater robot was sent down to locate the cables, which may have been dragged several kilometers off site in the incident and lift them to the surface where they will be repaired fibre by fibre. Some trivia: 1. The crack about sharks at the beginning wasnt entirely unfounded. It seems that the very first small diameter fibre optic cables laid were indeed damaged by sharks chewing on them on the ocean floor. Scientists found that sharks were attracted by the magnetic fields formed around the cable, produced by the electrical current supplying power to the amplifiers which are placed periodically. To
70% of all porn access on the net occurs during office hours 70% of all
security breaches are caused by insiders In the year 2008, $865 Billion was invested in IT products and services
seems identifying culprits isnt so easy. There is the Catch-22 of fair use and besides, many of the law suits by the RIAA resulted in grandmoms being dragged into court, based on sometimes specious evidence. To many, internet connections are essential lifelines to school, work, and other important parts of daily life that we will not mention. Considering these, many of RIAAs detractors will certainly put up a fight. Oh! by the way, the Motion Picture Association of America is eset internet security 12 crack - Crack Key For U in discussion with ISPs to adopt the same strategy.
Only 33% of households actively protect their children from the internet
63% of parents using
SMS services feel this improves communication with their children
50% of all returned
IT products work, but cant be figured out by buyers
SHARK INFESTED WATERS?
Undersea cables cut again
o its not the poor lil sharks. At the outset of 2008, a badly dropped ship anchor had damaged an undersea Internet provisioning telecom cable in the Mediterranean, disrupting Internet service throughout India, Sri Lanka, Pakistan, and the Middle East. And this year its deja-vu all over again. The lines, which emanate from the Egyptian
n a world gripped by the fears of a disasterous Ibio-system, Green-washing fallout of a degenarating refers to the undue exploitation of enviornmentalistm by companies. For example, if a particular product does not perform as well as its competitors, the product is simply positioned as being eco-friendly and put on the market. Vague, untrue and irrelevent product features are highlighted as being good for the enviornment. This practice is known as green-washing, which is a combination of green and white-washing.
I India won't levy admin tax on 3G spectrum I Windows 7 scheduled for late 2009 launch I EA titles to be available nik collection 2 review - Free Activators through Steam
DIGIT JANUARY 2009
reduce these problems, the cables are buried in the floor of the ocean using special under sea ploughs. However, in rocky bottoms and over undersea cliffs, the cables are still exposed. 2. Cables with 10 Gbps bandwidth were laid at a cost of $27,000 per km in 1999. Do the math. DOWN WITH OPEN SOURCE basically undercutting that advantage. Besides this, the program will also provide access to technical support and marketing visibility from Microsoft, as well as support through a select group of network partners industry associations, government agencies, university incubators and investors chartered with advancing entrepreneurialism. In India, these partnerships include The Indus Entrepreneurs (TiE), NEN, Proto, NASSCOM and IDG Ventures, a venture capital firm. Other VC firms supporting the initiative include Draper Fisher Jurvetson (DFJ), Helion Venture Partners and Accel Partners. Virtually everything a startup needs to build a web service (many of the tools and software They first begin by pulling the plug on sales and then eventually stop support. January 31, 2009 was listed as the last day that anyone could buy XP, but Microsoft has told its system builder partners that they will be allowed to continue to sell XP after cut-off date. In what is being called the flexible inventory programme, distributors can place their last orders for Windows XP OEM licenses by January 31, 2009, and take delivery against those orders upto May 30. Until then, distributors would have to buy as many XP licenses as they could afford before the cut off date and sell them after the deadline. Apparently distributors are quite happy with the new arrangement as they dont have to hand over cash for the new licences until they have already sold them. Software companies are still softies when it comes to phasing out older products. Take the case of processor manufacturers Intel does not manufacture its Pentium II and III lines anymore. Even if you were to say hey I use my comp only as a word processor, I dont need quad core speed. Can I get a Pentium II for cheap? Well no you cant. Not from the manufacturer at least. About discontinuing support Microsoft says this on its web site, Microsoft is retiring support for these products because they are outdated and can expose customers to security risks. We recommend that customers who are still running Windows 98 or Windows Me upgrade to a newer, more secure Microsoft operating system, such as Windows XP, as soon as possible. I
What is Universal Memory? Universal Memory approaches memory storage in a radicaly different way. Universal Memory is the term given to the next wave of storage solutions that are about to hit the world. Why do you need Universal Memory? The next generation of memory devices plan to replace the current generation by outperforming current storage solutions in two basic aspects of memory storage. The first aspect is power consumption, and the second aspect is the density of memory. This generation of low-power, high density memories will probably be able to store memory even without electricity running through them. Which companies are involved? The list is pretty long. IBM, HP, Motorola are all researching different universal memory strategies. Samsung and Toshiba are also in the race. Companies that specialise only in memory solutions like Everspin and Hynix are obviously involved. A company called Nantero has developed promising wafers with 10 billion bits of memory. How will it be done? Current research have different approaches in different labs. One approach is to use the nanoscale structures on the silicon wafers themselves. Other approaches include molecular memory and magnetic random access memory. When will we see it? Predictions vary from 2011 to 2020. Will it be any good? Portable devices stand to benefit the most. The memory promises to store all the data in any DVD ever made in a single laptop sized box.
Microsoft Launches BizSpark
hey say all big things begin with an idea. And when it comes to successful technology ventures, some of the biggest have their roots in India. Microsoft is now eyeing this very potential
market with the launch of BizSpark. The program targets early stage software startups, with resources including access to Microsoft platform software and development tools with no upfront costs. As youve probably figured the program is a bid to keep the open source mafia at bay. It is no secret that startups are very cost-conscious. Given the relative lack of costeffective software solutions, they often tend to veer towards open source. Microsoft understands the price-attraction of open source, and hence, it is
compete with open source alternatives, such as MySQL) is being offered to startups for free for three years. The idea, they say, is to create a vibrant startup ecosystem in India. STILL KICKING
New lease of life for Windows XP
ig technology corps often phase out their older products to make way for newer ones.
I Martian bedrock analysis shows that life was once possible on the red planet I Rumors emerge of G2 following up on G1
DIGIT JANUARY 2009
The tech that powered evil
Digital Rights Management
Fuelling The Pursuit Of Technology Knowledge
secure are you?
Enticing email subjects and images could lead your system and security to peril.
Related story on pg 35
DIGIT JANUARY 2009
Digital Passion l Cover Story
describes computer systems as having some kind of vulnerability that is then exploited by an attacker. However, the most important vulnerability is human gullibility and lack of understanding. Conversely, the most important form of defence is a reasonable understanding of security issues combined with care and vigilance. If you received an email from some unknown source, telling you to click on a link to See Britney Spears naked, would you click on that link? Most people nowadays know the danger involved and that clicking on such a link is likely to lead to computer infection of some kind. Unfortunately, there are still some who do not. But what if the email at least appeared to be from a known source, and one that you knew had your email address. What if it appeared to be from your own bank, and included all the right graphics, logos and everything? You may be much more likely to click on the link in order to reset your PIN or password, as suggested. What if the link led you to a web page, apparently with the correct URL, that looked exactly like your banks correct page, complete with Verisign security certificate logo (the little lock in the bottom right of the window frame). Would you then enter your existing user name and password, thereby allowing the attacker to empty your bank account, or purchase goods online and send them to Africa? Such attacks are more rare than offers of naked Britneys, but the attackers are getting this sophisticated, and making increasing efforts to make money from such attacks. They continue to do so only because previous and less sophisticated attacks have proved successful. People have clicked on the links, entered personal information, and lost money as a result. In the following pages, we will describe the most likely types of security problems that you will encounter and give you some advice on how to behave on the internet what to do and what not to do. Software can also of course help considerably, as long as you do not allow yourself to become complacent you may have the best known antivirus and anti-spyware software installed, but you still need to take care. form of con-trick, and any such trick stands a better chance of working the more believable it is. The simplistic attacks seem to be falling in number, presumably because people are increasingly aware of the problem, and so attackers are becoming more sophisticated. Perhaps the most common form of attack used in phishing is known as cross-site scripting (XSS). In this method an attacker will insert code in the embedded link not the link that you will necessarily see that will attempt to manipulate a web application, usually so that some code is inserted into the page that will be displayed in your browser. This doesnt change anything on the server, but your browser will receive an amended form of the page, and will execute the malicious code as if it had come from that server. What you see will be the correct page of, say, your bank, but it will behave and perhaps appear differently usually it will send you
Dangers on the internet
The method of attack we described earlier, of an email purporting to come from your bank and asking for personal information, is known as phishing. Basically, phishing is a
This partial screenshot is of a RazorSQL 8.3.0 Download - Crack Key For U email from a UK utility company presenting a link allowing the user to pay a bill. The link is of a known and correct URL, and the actual link that would be followed which is displayed in the window frame at bottom left matches correctly the link in the text. Even though this is clearly correct, it it better practice never to use such a link, but use your bookmarked link to your utility company in order to pay such a bill. Even a small difference in the actual link might take you to a spoofed site
to another page that will have been crafted by the attacker. In an extended form of this attack, known as persistent XSS, the manipulated URL is stored on a server in some form or another in a database, forum content, and so forth and is then accessed by unsuspecting users. In this case, you do not have to click on a manipulated URL in a phishing email, but it exists in some other source that you might stumble upon innocently. Another variant on this kind of attack is known as frame-spoofing, which can also be triggered by a manipulated URL in an email. Frames have long been considered to be insecure by security experts, and their use is slowly fading away, but there are still a great number out there. In frame spoofing first recognised by Microsoft back in the days of Windows 3.1 an attacker is able to insert their own window as a frame within the
DIGIT JANUARY 2009
Digital Passion l Cover Story
window of a legitimate website. This means that, again, the page you are viewing is the correct one, with the correct URL and with the security icon visible, if relevant. But, part of it has been RazorSQL 8.3.0 Download - Crack Key For U with malicious purpose. This can be very difficult to spot. In these types of attack, the malicious code is inserted in such a way that it runs in your browser the server of the bank or other service has not been compromised. However, there is a form of attack known as remote code execution in which the web application is itself tricked into executing the attackers code. Very often, this results from weaknesses in PHP, one of the most common scripting languages used for creating web sites. Again, the relevant scripts can be triggered from within manipulated URLs. Many programmers have simply assumed that their program will always receive valid input data at all times, and do insufficient validation of such the last year, is security certification. If you are online to an e-commerce site and are about to enter your credit card information, the window you are working in should have a little lock icon in the bottom right corner of the frame. This is the security certificate, and strictly speaking, you should click on the icon, and check that the certificate is genuine and was issued to the right organisation. This is a pain, and there must be very few people who actually bother to do this, or even know that it might be a wise thing to do. Such checks are being introduced into browsers, but this has been very slow in coming. You may think these security certificates are rock solid and reliable, but earlier this year, the commonly used OpenSSL package in Debian used to generate the keys for this kind of encrypted communication was found to have contained a bug since 2006. This resulted in the creation of weak keys. This makes the keys more predictable and the communication therefore open to attack; the communication over which your credit card or other details might be passed. Finally, although our list of security vulnerabilities is going to be far from comprehensive, we should mention keyloggers, which are a particularly pernicious form of infiltrated software. You might pick up a keylogger in much the same way as a virus, trojan or worm. Once it is inside your system, it will do nothing to give away its presence, but it will sit there noting the keystrokes that are made and sending these off across the internet to the attacker. Of course, it will be looking for the tell-tale signs of credit card or banking information and the relevant PINs and passwords. It is because of attacks such as these that some banks have started supplying virtual keyboards when you enter your password. With these, instead of using your physical keyboard to enter the password you use the keyboard on screen, pressing keys with the mouse. The keylogger is blind to this activity at least up until now! It should be clear by now that the complexity of modern computer systems carries with it a vast number of possibilities for attackers to infiltrate systems and gain access to confidential data. The increasing trend towards such concepts as cloud computing and Web 2.0, involving more private data being hosted on the internet and ever more code and transactions being passed across the internet, is only likely to make the situation worse. In the following pages we describe the steps you can take to protect yourself in that dangerous online world, and the software that can help you on the way. I
data: URLs, form data, and so on. Many, if not all, of the websites with which we are likely to have online transactions are backed by large SQL databases. Again, problems occur when data that a user might input is not filtered and checked properly by the web site. If this data has been manipulated in some way, a skilled attacker can make use of special SQL characters (typically, the comment and end-of-command characters) and infiltrate his own commands in order to execute an attack. With this kind of total av antivirus serial key - Crack Key For U, it is the web service that is the target, rather than the user directly. However, there have been instances where attackers have been able to compromise an SQL database and access customers credit card and transaction details. Another component in online transactions that is supposed to safeguard such details, and that has attracted attention in
This second partial screenshot is from a phishing email, pretending to come from PayPal. Notice that the actual link that would be followed in the window frame is very different from the one in the email text. This would for certain lead to a spoofed site of some kind, with a request to enter personal data. Always check the actual link when following a link in an email, and if it is for a site involving financial transactions, never click on such a link
DIGIT JANUARY 2009
Digital Passion l Cover Story
Cyber crime The new age menace
I Install a personal firewall and anti-spy ware to protect your PC. I
n the current age of the IT revolution, more and more people are getting hooked into the cyber world for their various needs. There is a distinct reliance on computers and the internet now for email, entertainment, shopping (online shopping), airline and rail tickets, banking, trading and the list goes on. While it does make our lives simpler and convenient, it also poses dangers to us in an unprecedented way by exposing their identity in the public domain. Details of our personal information, such as name, addresses, passwords and bank accounts are in the process of being attacked by various fraudsters, hackers, terrorists and criminals freely roaming the cyber world. It makes perfect sense for users to understand the online security threat they are exposed to while surfing the web. Just what are those risks and threats that we are talking about? Among dangers are hostile viruses, hackers accessing your system and stealing vital information like credit card details and committing fraud, unsecured wireless networks, spyware on your system, and identity theft. As a user, how can you enhance your online security? In the following section, we will discuss the kind of risks that you are exposed to and the ways in which you can tackle those risks. There is no fool-proof system, but it doesnt hurt to be a little careful while on the internet.
Periodically change your online movavi video editor user guide pdf - Crack Key For U Check your credit card and bank statements regularly and report any irregularities to the relevant authorities. I
Modify Internet Explorer or other browser security settings to limit the amount of information you are willing to accept from a web site. Microsoft recommends to set the security settings for the internet zone to medium or higher.
The need to update your browser
When you use the internet, you view web sites in a browser. A browser is a program that accesses and displays files and other data available on the internet and other networks. Browser programs are frequently updated to add functionality and address problems. If you are using an older version, there could be security issues (someone could hack into your computer).
How to do it?
Download the latest or updated browser you are using from the companys web site over the internet. It might ask for information about your computer such as what operating system it uses Vista or Windows XP. Then follow the instructions on your screen.
How to protect personal and work data
it to your computer, it will be saved as an executable file. Once the download is complete, go to the file where you saved it, and double click on it. This will automatically install the new browser on your computer.
Protect yourself with relevant software from viruses and trojan horses that may steal or modify data on your own computer. A trojan horse program is software that claims to do something genuine, but does exactly the opposite. For example, a program that claims it will speed up your computer may actually be sending personal PC information to a hacker.
Be careful while doing online shopping
I Update your PC with the latest anti-virus software and operating system patches. Make sure these updates happen automatically.
DIGIT JANUARY 2009
Digital Passion l Cover Story
Digital Passion l Cover Story
sure your data is encrypted. Many sites use SSL, or secure sockets layer to encrypt information. Indications that your information will be encrypted include a URL that begins with https: instead of http: and a lock icon in the bottom right corner of the window.
I In case you doubt the legitimacy of the certifi-
cate, refrain from entering any personal information. If the site does not require you to enter sensitive information, it probably wont display the lock icon.
I Use a credit card instead of a debit card, because credit cards have pre-defined limits and in case your credit card details are compromised this will minimise possible losses. Use credit cards with a low credit line.
Criminals with malicious intent could take advantage and access your computer and steal vital information or use your internet connection to commit acts of fraud or terror
Tips to secure wireless networks
Change the default passwords as most network devices have a pre-configured default password and these are easily found online.
secure connection, the address displayed should begin with https.
Install a firewall directly onto your wireless devices (a host-based firewall). Attackers who directly intercept your wireless network may be able to by-pass your network firewall and so this does not offer sufficient protection.
Spoofing attacks are as common as phishing frauds. The spoofed site is usually designed to look like the genuine site, using a similar look and feel to the legitimate site. The best way to verify whether you are at a spoofed site is to verify the certificate.
Check your statements to keep an eye on any unusual transactions
While you browse the internet, information about your computer may be collected and stored fraudulently. To increase your level of security, adjust your privacy and security settings to block or limit cookies in your web browser. Make sure that other sites are not collecting personal information about you without your knowledge by choosing only to allow cookies for the web site you are visiting. Block or limit cookies from any third-party. If you are using a public computer, you should make sure that cookies are disabled to prevent other people from accessing or using your personal information. In such a case, if you had been using Firefox, press [Shift] + [Ctrl] + [Del] and use the dialogue box that pops up to clear all personal data and history. It is not so straightforward in Internet Explorer, but, depending on the version, you can do the same thing under the menu Tools > Internet Options.
Restrict access only allow authorised users to access your network. Each piece of hardware connected to a network has a MAC (media access control) address. Restrict or allow access to your network by filtering MAC addresses. The MAC address is a unique identifier for networking hardware such as wireless network adapters. A hacker can capture details about a MAC address from your network and pretend to be that device to connect to your network. MAC filtering will still protect you from majority of the hackers. Find the MAC address for your network adapters on your devices by following these steps: 1. Go to Start > Run 2. Type command and press [Enter] 3. Type ipconfig /all in the command prompt window and press [Enter] 4. You can view the physical access address in the information displayed.
I I Check
Lock icon check for the lock icon in the lower-right of the browser window. This tells you that the web site uses encryption to protect sensitive personal information credit card number, ATM PINs, Social Security number, etc. The lock only appears on sites that use an SSL connection, which is typically used only on sites where you enter sensitive information. The secure site lock icon when closed means that the site uses encryption. Double-click the lock icon to display the security certificate for the site. This certificate is proof of the identity for the site. While checking the certificate, the name following Issued to: should match the site you are on. In the event of the names not matching, you are on a spoofed site and should quit.
you can prevent active content from running in most browsers resulting in limiting some functionalities and features of some web sites. Therefore, before clicking on a link to a web site that you are not familiar with or do not trust, disable active content
menus. These scripts are used by hackers to download or execute viruses on a users computer. However, you can prevent active content from running in most browsers resulting in limiting some functionalities and features of some web sites. Therefore, Character Creator Free Activate clicking on a link to a web site that you are Bandicam 184.108.40.2067 Serial Key familiar with or do not trust, disable active content.
Safeguarding online trading
The risks involved in online trading are high. Brokerages have information about you and this information is under attack by fraudsters. To gain access to these databases, attackers may use trojan horses or other types of malicious code.
Tips to safeguard online trading
You should thoroughly check the brokerages you are trading with.
I Check through offline methods about broker-
privacy policies of the site you are trading with.
What is 128-bit SSL?
SSL stands for Secure Sockets Layer. It is a protocol designed to enable applications to transmit information back and forth securely. SSL is accepted on the world wide web for authenticated and encrypted communication between the computer and servers. Identity theft could result from both offline and online fraud. Offline frauds occur as a result of theft of your mails, credit cards, debit cards, and cheque books. You should be cautious while receiving, storing and disposing information pertaining to cheques, ATM / debit and credit cards. Identity theft can happen even to those who do not shop, communicate, or transact online.
about the legitimacy of the web site by checking their certificates.
the user documentation to get specific information about the MAC Filtering process if you have any more queries.
I Check your accounts regularly for any suspicious or unusual transaction.
Counterfeit Web sites
Often you are guided to fraudulent web sites via email and pop-up windows in order to collect your personal information. You can detect such web sites if you type the said URL into a new browser window. If it does not take you to a legitimate web site, or you get an error message, it is a fake web site. Never click on a link in an email to a site involving financial transactions. Either enter the URL by hand, or you will likely already have your bank, eBay and other such sites bookmarked. Use those links instead.
Encrypt the data on your network. Encrypting the data would prevent anyone who might somehow be able to access your network from viewing your data.
I I Protect your SSID (Service Set Identifier An SSID is the name of a WLAN). The SSID on wireless clients can be set either manually, by entering the SSID into the client network settings, or automatically, by leaving the SSID unspecified or blank. A network administrator often uses a public SSID that is set on the access point and broadcast to all wireless devices in range. You can disable the automatic SSID broadcast feature to improve network security. I
Unsecured wireless networks
These pose a real security threat as seen from the recent misuse by terrorists to send email warnings about imminent terror attacks. Wireless networks allow criminals or hackers to intercept an unprotected connection. Wardriving involves individuals equipped with a computer, a wireless card, and a GPS device driving through areas in search of wireless networks and identifying the specific coordinates of a network location. Criminals with malicious intent could take advantage and access your computer and steal vital information or use your internet connection to commit acts of fraud or terror.
Can others on the internet access my information?
Only if a secure session is established and the information is encrypted during transmission, are you safe. However, some web browsers store information on your computer even after you have finished surfing. This phenomenon is called caching. Close your browser once you have finished surfing, especially secure sites to conduct financial transactions.
Some Downloading tips
Download programs from legitimate and trustworthy sites. Enter the program in a search engine to check whether the program has been reported for spyware issues.
To avoid outsiders from easily accessing your network, avoid publicising your SSID. Consult user documentation to see if you can change the default SSID to make it more difficult to guess.
Be cautious when downloading free music, movies, software, and surfing file sharing sites.
Disable active content Secure your web page
Normally, when browsing the web, URLs begin with the letters http. However, over a
Read the privacy statements and licensing agreements of the software you download Never enter financial information in pop up windows. I
Web sites use scripts that execute programs within the web browser. This active content can be used to create splash pages or drop-down
DIGIT JANUARY 2009
DIGIT JANUARY 2009
Digital Passion l Cover Story
Digital Passion l Cover Story
as &, @, %, where permissible. You also need to be protective of your password once you are satisfied that it is strong and have memorized it. In 2004, a survey was conducted at a London railway station in which people were asked for their password presumably in the interests of scientific enquiry in return for a chocolate Easter egg. 71 per cent cooperated. Of course, we cannot know how many lied, but even so this is a disturbing figure. It had been 90 per cent the year before, but Dragon Age: Inquisition 1.12 Crack With Keygen [Game Free Download 2021] the gift had been an obviously more attractive cheap pen. There is no reason why you should ever give your password to anybody that defeats the whole object of having a password in the first place. Some companies utility companies have been known to do this, for example ask for passwords over the telephone. Always refuse to comply. Never tell your password(s) to anybody. It is well worth taking the trouble with financial sites to memorize a couple of passwords that are specifically difficult to remember without any common phrase or letter combination. But what if you need to remember more than just a couple? Many banks nowadays are requiring two passwords one for login and one for transactions you also may well have more than one bank account, perhaps also a credit card account or two, and then there are shopping sites like eBay. It can soon become quite a list of sites that require strong passwords, and the last thing you want to do is write them down. The present writer was once asked to help a colleague with a problem concerning his laptop. This was a senior executive in a publishing company; such people often consider technical writers to be extensions of the IT department. This chaps password for his email system was written in indelible ink on the outside of his laptop. That is the worst example, but also writing passwords down any where is a bad idea; a small piece of paper kept under your mousemat, or maybe in your wallet, and so on. Never write them down. Never. One possible way of recording a multiplicity of strong passwords is in an encrypted file, produced with software such as WinRAR. With compression and archiving software such as WinRAR you have the option to password protect the file so that only somebody with the password can open it and view the contents. However, you need to use a strong password. A useful exercise to go through is to download password cracking software and try it out. This is software that is usually described as helping people who have forgotten their password. It will run through all possible combinations using the character sets and password lengths that you define. Try one of these out with a file protected by a weak password; once you have seen how quickly this can be done, you will take much more care to use strong passwords in future. One further point with this method is that when you view the file, do just that and only that, and do not extract to disk unless you need to edit it and add something new. If you do have to do that, also make sure not only that you delete the file after it has been rearchived, but that you immediately create a new file of the same name and at least the same size in the same directory this can simply consist of rubbish, and should ensure that the information in the file will be removed from the hard drive. You can immediately delete it. There are also utilities that you can download that will do this for you, when you wish to delete a sensitive file; they are probably more certain to delete all data, but the method just given should work on most occasions. And one final point, do not name your archive my_passwords.rar or anything even remotely similar! I
Pass the word around
lthough its demise has long been predicted and wished for by many the password is still the most common form of identity authentication in use. At first sight, the use of a password for authentication seems straightforward and secure; but in practice the RazorSQL 8.3.0 Download - Crack Key For U has many limitations and inherent problems. We are forced to continue to use them for the foreseeable future, so in this article we will have a look at some of the problems and suggest some solutions. The single most important problem, of course, is memorability. One person known to us, well call him John, can illustrate the worst way to use passwords. Until recently, he used exactly the same user name and password for any internet site that required registration. One day he wanted to look something up on a specialist knife site in the US. It required registration, and he used his usual login. Luckily for him, he very quickly discovered that orders were being placed using his eBay account for items to be dispatched to Africa. Also luckily for him, Ebay responded quickly in freezing his account and preventing any real harm from being done. What had happened appears to have been this: the knife site had some kind of automated system that would collect user names and passwords and then try them out, against eBay, Amazon, banks and other such online stores. Once it found a hit, it then started making orders probably by alerting one or more humans with the successfully stolen login information. The first rule with passwords clearly has to be to differentiate between sites that involve financial transactions and any other kind of important personal information, and all others. For example, you may well need to register to access some newspaper sites, or other general information sites. These organisations request registration in order to keep a check on the number and types of people visiting their sites in order to give a better service. It hardly matters if you use the same login and relatively simple, easy to remember, passwords with these sites. There is usually no risk of loss of personal information that might lead to theft of goods or money. However, the situation is very different with sites that involve financial transactions. These need to have strong passwords that subject will be discussed shortly and preferably a different password for each site. These
passwords should also be changed at reasonable intervals. Make sure that you do not use the same password that you have for a transactional website for any other website news, email, and so forth. Keep them secure, and do not write them down. Ever. A strong password is one that is difficult to guess or search for automatically. The problem, of course, is that the stronger and more random a password is, the more difficult it is to remember. Simply using long words from your natural language is not good enough. You count this in different ways, but it is commonly considered that the English language consists of between one and two hundred thousand words. It does not take a modern computer very long to go through such a list. One email company had a reasonable attempt at improving on natural language passwords about 20 years ago: each password issued to users consisted of eight letters in pairs, forming four syllables. The structure was like this: gedovozu. This was relatively easy to remember and was not part of any natural language set. Such passwords are suitable for use with low risk websites, but are not really strong enough for financial sites. The strength of a password lies in its entropy, or randomness. A similar method to the one just described that produces much stronger passwords involves the use of mnemonic phrases these tend to be relatively easy to remember, and highly entropic. For example, the phrase Robert likes to have two sugars in his coffee would yield Rlth2sihc. That has nine characters, one is upper case, and one other is a numeral. This is much stronger than the more simple gedovozu. The entropy of a password depends on the number of possible combinations. If you just stick to lower case letters, a four character password has a total of 26^4 (26 to the power 4) combinations: 4,56,976. This seems like a large number, but a computerised search could zip through these in little time, and anyway, most combinations would be difficult to remember, and so would end up not being used. You increase the entropy by increasing both the number of characters in the password and the number of character sets from which they are drawn. So, a strong password should include at least eight characters, drawn from both upper and lower case letters, numerals and other characters, such
DIGIT JANUARY 2009
DIGIT JANUARY 2009
Digital Passion l Cover Story
Theres flexibility and security and we are somewhat in between.
Eugene Kaspersky is a leading expert in information security and the founder of Kaspersky Lab, a company producing anti-virus and other computer security products. He visited India recently, and Digits Edward Henning caught up with him at his hotel in Delhi. EH: You have described the situation with modern aeroplanes where the onboard networks can be attacked. The passengers network which can connect to the internet is also physically connected to the pilots network. How aware are the aeroplane manufacturers of this threat? And do they care? K: We got this news about this mistake in the Dreamliner, the Boeing 787, and the first person who came to my office was our lawyer. I said, Do you know of this news? and I explained that there was a certain mistake and whatever. And he said I cant believe it; this network has to be physically disconnected so our lawyer understands security more than these guys. EH: You have described how operating systems are flexible and functional and therefore as a result are not secure. If you go out in the physical world, because of the threats of terrorism thats on everybodys minds here in India right now we are now prepared as members of the public to accept greater restrictions on our freedom in order to protect ourselves. Do you think a tipping point will come where well say OK, stop Microsoft, we want really secure operating systems, we dont care if theres less functionality, we need security above and beyond everything else? K: Actually there are two sides; theres flexibility and security and we are somewhat in between and if the situation is getting more aggressive, if there are more attacks, such as terrorist attacks with airports for e.g., with more attacks they are getting less flexible and more secure. Like now to enter this product key of windows 7 youre not flexible at all. EH: And thats a good thing K: And the same is happening with operating systems. If you see that there are more cyber criminals, I think there will be not so much attention from the public. There is a cost to business, but others just dont recognise it as a serious problem. But if it comes to cyber terrorism, I think we will be forced to use more secure operating systems. But it doesnt mean that Microsoft will leave because by (using) default configurations you may make the Microsoft Windows secure, it will just not accept any other application but Microsofts. EH: Well, they have been trying to move in that direction for many years anyway. K: There are companies that share our business, they configure their desktops, their windows desktops at enterprises in a secure way. But it is not possible to install any application EH: So, what OS do you personally use? K: MS Windows XP SP3. I even use Internet Explorer, but I have a final cut pro bittorrent - Activators Patch configuration for security, so I am safe. EH: So many people are just complacent, they think it will happen to somebody else, it wont happen to them, its very difficult to make people sit up and listen and take notice, is it not? K: Now its better because now people, they see, they know that at least some friend or friend of a friend lost some money or was badly affected, so now they pay more attention. The problem is that they do not pay enough attention in the social networks. They think in a community, they trust everyone in a community, they give out some data, some personal information sometimes its enough to develop a very dedicated attack or to have some serious affects on the person. EH: But the whole idea there is to make your personal information available to as a wide an audience as possible. K: Again, there has to be some kind of balance. If everyone is friends, you can publish anything you want. If there are criminals around, you dont publish any data. So you have to find a balance. I am not registered in any social network. Well, actually, I am registered in one, but when I came to publish some personal data, I just stopped and then I never used it. I dont even have my picture on it. Just the year of birth. Its dangerous. Its very useful for people who live in cities because people just feel alone. So they need to have some community and this is the place for them. But at the same time EH: On another subject, correct me if Im wrong, cloud computing as described by many
DIGIT JANUARY 2009
Digital Passion l Cover Story
companies seem to be a huge increase in security risk. Have all my data, my processes, my applications and put it out there in the big wide world, it strikes me as crazy, what is your opinion on this? K: If there is some expensive application which you dont need regularly, just rent it. It will work. e.g., taxation software once a year. Last year there was a very curious story, a Microsoft patch upgrade which had a bug and which stopped financial taxation software in Germany. And that happened just before April 1st, the last day of taxation, and after that there is penalty. The most popular software stopped working and that was a very, very big scandal in Germany. There were many complaints about Microsoft. Some services will be online and some will be end point. EH: One service that has to be online is regular updates. Now, is that not a vulnerability in itself? K: Actually this service is not; I dont want to call it online, because you download anyway, so its stored locally. You send some data there and they report to you if its dangerous or not. So the decision maker is offline. Not offline is remote. And about the updates, if they are a risk or not, there was an incident with some anti-malware product when there was a fake update and there was a serious problem with a company which infected computers through the update. EH: The risk is always there. If you step out of your front door, you are always at risk. K: Especially if you do it regularly! K: I read that your mobile security now incorporates functionality to wipe the phone if its stolen or something like that. Now, does that not include some risk of you know if I am using my phone and suddenly it goes wrong and it gets wiped? K: There is a password which you can set yourself so you can use it as complicated a password as you like and if you use a secure password its very unlikely that someone will it will take like 1 billion SMS messages to brute-force the password. Thats impossible. EH: You mentioned in your response there the use of a password as an authentication device. Its getting increasingly difficult for people out there even to know what a strong password is and then to remember them; you know you have your bank, banks now want two passwords, one for logging in and one for
I use MS Windows XP SP3. I even use Internet Explorer, but I have a special configuration for security, so I am safe
transactions you make. You may have two banks, a credit card, its getting increasingly difficult for people to manage it without writing the wretched thing down, which I think is the biggest security risk you can make with a password. Do you have any particular advice on password management? K: What I do, the numbers, like pin codes, its hidden somewhere in my address book of my mobile phone. So its just some contact; its built in and its quite secure, I mean if its stolen or lost they cant recognize which contact is real and which is not and where these digits are located. Thats secure . I think thats secure. So they have to steal at the same time, mobile phone and your card. But in this case you can call bank to ask someone to help you. For the passwords, make it in such a way: if something really important has happened in my life especially if I need to create a new password; Id like to add some name of a place or name of a person which I will remember for sure; some digits like the date it happened but put in a different position. Its easy to remember, so even if the password is lost, you forgot it, just remember the place you were the moment you developed the password and in which way you use digits and other letters. Its easy to remember. EH: Unfortunately, regarding these methods, many banks are now using a virtual keyboard which only allows lower case and only allows numerals, this is introducing restriction and forcing passwords to be less entropic. K: What the malware does; it makes a snapshot of the screen. EH: So you like to have a long password, that has meaning to you? K: At least 10 to 12 letter/digits. Then also I have another way for the non-Latin alphabets; in India do you have two alphabets? Latin one and Indian. So just hear some phrase in Indian and type it on the keyboard. Probably one of the best ways to write passwords is to type a sentence which is not English, using the second alphabet, but having the keyboard switched to English. It will be a mess. It will be a very, very strange combination of letters and digits. For example, if I type my name (types on keyboard) it will be (more typing) Im just typing my name in Cyrillic, and switch the keyboard. Its easy to remember but this is a mess. And the best way to protect your credit card or to protect your computer just have a sticker with the wrong password on it. Or write a wrong number on your credit card. Let them try. I
DIGIT JANUARY 2009
Digital Passion l Main Story
tech that powered
Related story on page
As we recover from the horror of the Mumbai attacks, we are now horrified by another thought: how did this gang get the technological one-up on our forces? And how must the good guys fight them?
Agent 001 ts been all over the news Mumbai attacks reveal sophisticated use of technology, Gunmen used technology as tactical tool, Mumbai terrorists more tech-savvy than the police but while the mainstream media winds up portraying these terrorists as the evil geeks you only see in movies, or saying that the technology is to blame, the reality is that these terrorists just got creative. What they really did was to combine some simple tech, and use it to deadly effect.
however, this is considerably more complex. Firstly, it isnt the satellite that is calculating the receivers position, its the receiver itself. Secondly, GPS doesnt need a satellite, it needs at least four. There are around 32 satellites in orbit dedicated IsoBuster Pro Free Activate GPS, so finding four usually isnt a problem. Your receiver monitors the four strongest signals that it receives signals that contain information about the satellites own orbit, and the rough orbits of other satellites. It then uses the time it took for each message and calculates its distance from the satellite. Finally, using a method called geometric trilateration for which it uses the orbital information for the satellites it calculates its position on Earth. Google Earth uses photos of the Earth taken by satellites, and slaps them on a virtual sphere. The result, as youve already seen, is a virtual world that you can tour on your desktop. Want to see a top view of Everest? Its there.
GPS and Google Earth
What they used it for:
Navigating their way to India, planning the attack, getting around Mumbai (likely).
Its safe to expect that the Google-Earth-national-security issue will be dredged up again, and we wouldnt be surprised at a few demands to ban the software itself. There might even be a similar outcry against GPS, but that wont last long. The bottom line is that both these technologies have caused more good than harm, and it would be a crying shame to limit them in any manner. GPS is an important tool on aircraft, ships, cars, and now even cell phones. And because a GPS device doesnt send any personal information to the satellites, its impossible to tell whos using which device. The smarter plan? Master both and use them to plan counter-terrorist activities.
How it works:
In concept, the Global Positioning System (GPS) is pretty simple. You ask your GPS receiver where you are, the receiver asks a satellite, the satellite sends back an answer, and there you go. In reality,
DIGIT JANUARY 2009
Digital Passion l Main Story
Niagara Falls? The Pyramids? The Taj Mahal? There, there, and there. It also has GPS coordinates, so if you were to feed them into your GPS receiver, itll give you directions on how to get there from where you are.
Digital Passion l Main Story
tion involved, and the recipient can even reply to the e-mail, which will reach you through the remailer. And of course, because its so simple, its easy to tell where an e-mail really came from. For more secure e-mail, you need a cypherpunk remailer, to which you send an encrypted email, which the server then decrypts and sends to the recipient. Its more sophisticated than just hiding your name and IP address, and to make your e-mail even harder to trace, you can have it go through two, three or four remailers. Anyone whod want to trace your e-mail would have a formidable (though still not impossible) task ahead of them. And RazorSQL 8.3.0 Download - Crack Key For U theres the mixmaster remailer, which adds to the goodness of the cypherpunk, and even needs you to have special software installed on your computer. But Recovery Explorer Professional Free Download isnt entirely anonymous either, but was designed to make it really difficult and time consuming for anyone to trace e-mails.
Why its evil:
GPS and Google Earth are powerful technologies on their own, but when combined, make for an excellent planning tool. A GPS receiver will give you directions to your destination, and Google Earth shows you what youll see when you get there. While youre on your way, GPS receivers cant show you visual landmarks, but Google Earth can. And most importantly, when youre on a little boat on its way to Mumbai, and dont really know the way, GPS will let you navigate there easily. Google Earth has long been criticised by several world leaders former President A. P. J. Abdul Kalam, among others for revealing the locations of important military installations across the world. In the US, Google has been asked to obscure important locations such as the White House, and mysteriously, the residence of former vice-president Dick Cheney. The argument was that Google Earth could potentially be, well, a tool in the hands of terrorists.
your data to reach you as fast as possible, through as many routes as necessary, and your phone will take care of converting all the lohels to hellos. When you request data over your mobile network, your provider sends it to your phones on all the frequencies your phone can access, but not in order. This is called packetswitching each antenna on the network decides the best route for each packet, so each packet takes the fastest possible route to your phone.
What they used it for:
Coordinating with each other, tracking news via GPRS
Thankfully, this isnt hard once the authorities know the offending number, they can shut it down, tap its calls, even track the phones position. They can also see which sites the phones user is visiting, and block them if necessary. As for the news, sites could stop reporting live news especially if that news talks about the polices plans. Then again, stopping live news means that nobody knows whats going on, which means rumours, panic, and all the nastiness that comes with it. As for the e-mail issue, soon after the dispute arose, RIM allowed Indian security agencies to monitor the BlackBerry network, and in July 2008, the service was cleared by the telecom ministry.
Why its evil:
How it works:
General Packet Radio Service (GPRS) is another technology thats been around for ages, and is relatively simple in concept. It uses the same signal that your voice travels on when youre on a call, only with a few variations to make data transfer faster. When youre talking with someone (or exchanging voice information), all the data that comes and goes from your phone is circuitswitched all the packets of data travel in sequence, and on the same frequency. This is important, because you want people to hear you say hello and not lohel. When youre surfing the Internet, however, this isnt as important you want
It isnt. But you know that already. Having an Internet connection on your phone is about as evil as having a computer at home. Some sites have emphasised the BlackBerry, as if it were a deadly tool in the wrong hands, but really, its just an innocent device with its name being dragged through the mud. It could just have easily been Nokias or Sony Ericssons in that boat. There have, however, been concerns regarding the BlackBerry e-mail service. In India, communication technologies are required by law to allow for lawful interception if the government suspects you of unsavoury activities, it needs to be able to monitor your phone, e-mail and other means of communication. The BlackBerry service, however, doesnt allow for such interception, which is why security agencies wanted to ban it. An e-mail service that cannot be monitored could be a great tool in the hands of terrorists, they said. Supposed security risks aside, there is no evidence that suggests that Mumbai terrorists used their BlackBerrys for e-mail.
When you dont want Fighting it the recipient of an eRemailers are actually being fought mail to know where it against even as you read this. Unless you came from, you first have your own remailer server, you send it to a remailer, never know when one will be taken which strips the e-mail down. However, sitting back and hoping of all your informafor remailers to vanish is silly at best. tion, and then sends it Our forces need better experts, and on its way, complete more importantly, time, if they are to with dud reply-to trace e-mails through remailers. So even address. Theyre supposed to make your if the Deccan Mujahideen wasnt e-mail anonymous, but really responsible for the attacks, tractheres no such thing ing their e-mail can lead us to tomoras purely anonymous rows attackers. on the Internet theres just harder to track. And depending on how hard-to-track you want your e-mail to be, you can use one of three types of remailers. The pseudonymous remailer is the simplest it replaces your e-mail and IP addresses with its own and sends your e-mail. No complex encryp-
Why its evil:
All right, so this one might qualify as a little evil. People use remailers to cover their tracks, and any activity that involves track-covering cant be good.
What you used
While those three days showed us terrorists can use simple technology for evil, we also saw people attempt use technology for good.
What they used it for: The Tech: Twitter
What you used it for: Telling your friends you were all right, asking people to go donate blood, telling the world whats going on How it helped: Reassured friends and family, covered news that the agencies werent reporting How it didnt: Fostered conspiracy theories, added to the confusion, possibly kept terrorists updated when news channels stopped broadcasting live news Phoning home and getting orders from their handlers
How it works:
Voice over Internet Protocol (VoIP) telephony has been around since the first days of the Internet, and its simple enough too it uses your Internet connection to transmit voice between people. The problem with the Internet, however, is that its a packetswitched network, which means that packets of data dont reach their destination in the right sequence. With voice, of course, this will not do at all which is why several technologies had to be developed to ensure that voice travelled the pipes without any problems.
What they used it for:
Telling the media that they were responsible, without being traceable.
The Tech: Flickr
What you used it for: Documenting the carnage How it helped: Some photos especially by Vinukumar Ranganathan surpassed what the mainstream media could get How it didnt: Apart from conveying information, pictures arent much use
How it works:
DIGIT JANUARY 2009
DIGIT JANUARY 2009
Digital Passion l Main Story
Skype, for instance, uses its own proprietary technology to make sure that voice reaches you fast and clearly. VoIP for their activities, and a report in October last year highlighted that the Taliban was using Skype to keep in touch. The problem? To ensure that your voice calls arent overheard, VoIP providers build secure, proprietary technologies that make it very difficult for hackers to eavesdrop on your calls. Naturally, it also becomes difficult for the law to tap these calls.
Why its evil:
Several governments, including our own, already hate VoIP for robbing the telecom sector of all the money they could make on international calls. But thats hardly the point. Fighting it The real probWhile VoIP calls are difficult to trace and tap, lem with VoIP is they arent impossible. Unfortunately, these that its considcan be time-consuming processes, and in a erably more situation like Mumbai, we cant afford that secure than cell time. To make its job easier, the FBI is pushing phones. Calls for a law that will require VoIP service made from VoIP providers to build backdoors in their software, phones can only which law enforcement agencies can use to tap be traced to the calls when necessary. The same laws already point where exist for telecom providers since 1994, when they get the FBIs surveillance activities were thwarted converted from by new technologies like call forwarding and regular voice cell phones. data to Internet The only good thing that emerged from the data. Once the terrorists using VoIP phones was that the digidata enters the tal trail could potentially lead the authorities Internet, it to their handlers. If the group was more relucbounces around tant to use phones while they conducted the servers across attacks, the trail would have ended at the last the globe before terrorist alive. it reaches its destination. Worse, even if you find out which number the call was made to, determining its position can be a pain. The recipient of a call could have a New York phone number, but could still be in the room next to the caller, which is why terrorists seem to love it. For a few years now, the FBI has been issuing warnings that militants have been using
With prior terrorist attacks, finding the perpetrators was a matter of some old-fashioned police work. It was slow, but lets admit it a few days after the blasts, it was only the police who were frustrated. We just returned to our daily lives a little rattled, but our shock swiftly gave way to the stress of everyday existence. These attacks, however, were different. For three days, we sat glued to our TVs, horrified, helpless, frustrated, angry, imprisoned. After watching so many movies and shows where the good guys use sophisticated technology to overcome terrorists in minutes, we were shocked that our police force was so ill-equipped. While the terrorists knew the hotels in intimate detail, our forces didnt even have night vision goggles to navigate the dark corridors. While the terrorists kept in touch with each other and their handlers using cell phones and VoIP, our forces didnt even use walkie-talkies to coordinate their counter-attack. The snipers stationed outside the Taj couldnt open fire, because they couldnt tell whether they were looking at terrorists or hostages. Because their rifles didnt have telescopes. If youve played realistic games like Counter-strike and Rainbow Six, you probably thought that you and your clan could have done a better job with the situation. Quite likely, but youd have to consider that youd be using real guns, and theres no starting from a save point. But we digress. Now, home minister P. Chidambaram has announced a massive overhaul of our security system, though we still dont have details on what that will be. We are assuming (and hoping) that this overhaul includes updating our forces tools, and training them on all the technology theyll need to take down any terrorists. As for the technologies themselves, the debate still rages. Even if you were to believe that technology was the villain here, where do we go from here? Will we see bans on mobile phones and GPS receivers? We must face the fact that even innocuous, everyday technology can be used for malicious purposes, and focus instead on using that same technology against the terrorists. I
Related story on page
Open source terrorism
The Mumbai attacks are part of a disturbing trend that experts are calling open-source warfare. Unfortunately, it doesnt mean that terrorists are releasing their plans to the public theyre using technology and the philosophies of open source software to wreak havoc. The scary thing about this scenario is that terrorist outfits neednt start with the big organisations like the Al Qaeda all it takes is a single terrorist. The open source philosophy: release often, even if the software is buggy The terrorists corruption: attack often, even if there isnt a concrete plan The open source philosophy: recruit as many developers as possible The terrorists corrpution: recruit as many warriors as possible The open source philosophy: use solutions that have worked with other projects The terrorists corrpution: find out how other outfits are bypassing security
DIGIT JANUARY 2009
Digital Passion l Main Story
Digital Rights Management
A necessary evil or an evil that's not necessary?
Terry Relph-Knight igital Rights Management (DRM) refers to any scheme used to protect the copyright of digital content using a system of encryption that often includes remote monitoring and control by the copyright owners. The development of the various forms of DRM has largely been driven by the large media companies as a response, they say, to the effect of large scale copying on their revenues. Rather than rely on the passive protection of copyright law these companies have gone on the offensive with active digital rights management. DRM encompasses a range of embedded https www xmind net xmind8 pro - Free Activators and hardware measures for all digital media that attempt to physically stop unauthorised use and copying. Since DRM at least appears to be a method of enforcing copyright, any discussion of DRM must include a discussion of copyright itself. The advantages and disadvantages of DRM for the copyright owner and the consumer and the legal, ethical and ideological issues surrounding DRM are by no means clear. In this feature we explore the ins and outs of DRM as they stand today.
The history of information protection and copyright
It may seem that only in the digital age has the protection of data become a problem, but means have always been sought to protect valuable information. The ancient Greeks formed groups that protected their knowledge of physics and geometry by keeping it secret. Secrecy was enforced by ritual and the threat of punishment. In Europe, in the middle ages, the knowledge associated with various crafts such as gold working was treated as being of great value and was kept secret by organisations known as guilds. These trade guilds flourished between the 11th and 16th centuries, although some of them have survived in attenuated form until today. Similar guilds, known as Shreni and Benin, operated in India as long ago as 300 C.E. This simple principle of secrecy is still a part of the protection of information today and it ranges from the secret keys used in encryption to proprietary methods and information. At least until the invention of the moveable type printing press by Gutenburg in 1439, books, paintings and musical performances could be copied, but almost as much knowledge, skill and effort was required as was needed to create the originals. This difficulty in itself provided a fair degree of protection. This illustrates that very often just making something difficult enough to copy provides enough protection, at least for economic purposes. The first UK laws on copyright on books and other writings were laid down in 1710 with the Statute of Anne, apparently prompted even then by the piracy of printed books. Copyright law in India was first introduced in 1847 under the East India Companys regime. Relatively recently actions have been taken to attempt to bring copyright laws up-to-date, so they are better able to deal with the issues raised by digital technology. In 1998
Ashwini Baviskar Photograph: Jiten Gandhi
DIGIT JANUARY 2009
Digital Passion l Main Story
America passed the Digital Millenium Copyright Act (DMCA), an act that apparently criminalises the DVDFab 220.127.116.11 Crack With License code Free Download 2020 of DRM protection, even when there is no infringement of copyright itself. In 2001, the European Parliament passed the European Union Copyright Directive, which addresses some of the concerns of the US DMCA, but leaves one of its principle issues, that of limiting the liability of ISPs to prosecution, to the separate Electronic Commerce Directive. The original form of the DMCA, which illustrates just how convoluted such things can become, appeared to make cryptographic research illegal. In 2006, the Indian Copyright office posted proposals to amend the Copyright Act of 1957 (last amended in 1999) on its website. One of the proposed amendments seeks to introduce the issue of Digital Rights Management (DRM) into Indian copyright law along the lines of the DMCA. All of these methods of protection are primarily passive and defensive. Digital technology has finally made it relatively easy for copyright holders to protect their property by active and offensive means. At their most extreme, these measures make it possible to automatically punish anyone who exceeds the limits of the copyright and may no longer adhere to legal, but to almost arbitrary limits, chosen at the whim of the copyright holder and further, to analyse, manipulate and control its customer base. A further difficulty for the international media companies is that copyright law varies from country to country. In some countries it is perfectly legal to make multiple copies for personal use. The term fair use, it seems, is often mis-quoted; in the US it refers to the right to quote short exerts of a copyrighted work for the purposes of commentary, criticism, news reporting, research and other similar purposes. The Digital Millennium Copyright Act (DMCA) has actually reduced the scope of fair use. Prosecution of the owners of web sites supporting peer-to-peer networks offering access to illegal music downloads is hampered by the imprecision of current copyright law. Peer-to-peer technology itself is not illegal and the argument centres around whether simply making copyright material available, in a way that makes it easy to copy, can be deemed an illegal act. This has led in some cases to big media making highly publicised prosecutions of Google Nik Collection 3.3.0 Crack + Activator Latest Version Free they suspect of having made large numbers of illegal downloads. The arguments over copyright oscillate between two extremes: making any copies of any kind of a copyright work is an infringement of copyright, or copying of a copyright work by an individual who has paid for a copy, into different formats in order that that individual may make use of the work, is reasonable and permissible. The problem with the first position is that digital technologies routinely make copies as part of their function, for example when reading a web page, the page is copied or cached. with the content providers that iTunes downloads should not be easy to copy. Some music download sites use license validation servers which validate a users right to play tracks they have downloaded. There have been several recent 4ukey iPhone Unlocker 3.0.0 Crack+ Activation Code Free 2021 of music download sites closing down with the result that many users are left with tracks they have paid for but can no longer play because the validation servers are no longer available. DRM adds complexity and expense to products that implement it. Although adding encryption to individual protected copies costs little, after all a necessary requirement from the replicators and copyright holders, it does affect both hardware, in the form of media players and software in the form of operating systems. A considerable amount of Microsofts development effort for the Vista OS went in to implementing DRM to the big media companies satisfaction. Vista incorporates what Microsoft call a Protected Environment (PE) to protect High Definition content. This creates a corridor through the operating system called a Protected Media Path (PMP), which, in theory, cannot be broken into. Device bus communications (which are accessible to users) associated with this process, are encrypted. DRM has a negative effect on open source development, particularly on projects that are dedicated to pure open source, because all DRM involves proprietary methods and code. At present, playing protected Blu-ray content on a Linux box requires use of a device or player key, none of which have been issued for open source software players. However the keys for the X Box 360 and all of the popular Windows software players are now public knowledge and can be used by Linux players. Open source opponents of DRM are often the most rabid. The Free Software Foundation (FSF) runs Defective by Design campaigns and recently launched such an attack on Apple because the new MacBooks incorporate Apples DisplayPort connector, which includes the use of the optional DisplayPort Content Protection. Mac owners connecting an older Apple Cinema Display to view an iTunes movie will see an unauthorised display message. Perhaps the biggest disadvantage of DRM to the media companies that implement it is the alienation of customers and the bad publicity it has so far caused.
Digital Passion l Main Story
distributed via terrestrial transmission, satellite or cable. Video is appearing on the internet, but for high quality video download or streaming to become a viable reality, a huge increase in bandwidth and capacity will be required. ISPs are already complaining that streaming services, such as the BBCs iPlayer, are causing network congestion. It has been said that, despite trumpeting the high quality of CD Audio when it was first introduced, some elements of the music business always felt nervous about providing the public with studio quality recordings that could be copied digitally with absolutely no loss in quality.
Piracy and the big media companies
The big media companies seem to refuse to believe that falling sales are anything to do with natural market cycles, or changes in society, or to accept that just possibly their own reactionary business practices diminishing interest in developing new artists, reliance on a few guaranteed high return headliners and re-selling old back catalogue as re-mastered on new media have caused loss of interest. Instead, they say, it has to be piracy thats bleeding the life blood out of the already moribund industry. Around eight years ago music industry analysts noticed increasingly sharp drop offs in sales, following the release of a new CD. In the nineties, second week sales would typically fall by less than 25 per cent. In 2002, second week sales were dropping by over 40 per cent. The music industry took this as a clear sign that small scale piracy people making copy CDs for their friends was responsible. This is despite the fact that the same argument that sales of vinyl LPs were suffering because people were copying them to tape had been used to raise an indiscriminate blanket tax on blank cassette tapes, back in the 1970s at a time when the music industry was experiencing rapid growth. In India it seems the cassette tape actually created a booming market for pop music. As we reported in a previous feature (February 2007 issue) on peer-to-peer technology, it has been suggested that DRM should be abandoned and a similar tax or rather levy (to be accurate, a tax is imposed by government, while an industry administered surcharge is more properly called a levy) be placed on broadband connections and recordable CDs, DVDs and BDs. As with many such taxes, or levies, this might be seen as unfair to those who do not indulge in the taxed behaviour.
Music downloads Apple iTunes
Apples iTunes is one of the most well known and arguably most successful, of the digital music download sites. It exists mainly to act as the service site for the various versions of Apples portable music player devices, such as the iPod and iPhone. iTunes client software is bundled with every iPod sold. Apple iTunes uses the Advanced Audio Coding (AAC) format for its downloadable audio files. AntiBrowserSpy Pro 2021.4.06.49 Retail Crack + License Key Free 2021 is a lossy compression format intended as the successor to MP3, that has been standardized by ISO and IEC, as part of the MPEG-2 & MPEG-4 specifications. The MPEG-2 standard contains several audio coding methods, including the MP3 coding scheme. Apple iTunes is an application designed to run on an internet-connected PC running either MS Windows or an Apple Mac OS (note there is no version for Linux, although it can be hacked). Apple uses a version of AAC that includes its proprietary DRM extensions it calls FairPlay. This puts iTunes subscribers in the peculiar position of downloading AAC files, with FairPlay DRM extensions, which will only play on their registered version of iTunes on their computer, on an iPod or on an iTunes capable phone. However it is possible to burn the AAC files to a CD-R as MP3 files. The
What's wrong with DRM?
If DRM was always completely transparent to the end user, was not intrusive, protected copyright in a fashion that all agreed was fair and did not add cost to media hardware, perhaps no-one would find it objectionable. Various media companies have already applied almost draconian measures A further problem with DRM is that of interoperability, that agreeing on and using a standard form of DRM is not always in the media companies interest. For example, this is true of Apple iTunes because of Apples agreements
DRM in action
The exact form of DRM used depends on the media format and even on the distribution method. Music distribution is moving towards compressed audio file download over the internet, although audio CDs still form a large part of sales. Movies are still mainly sold on disk, either DVD or Blu-ray, and broadcast video is
DIGIT JANUARY 2009
DIGIT JANUARY 2009
Digital Passion l Main Story
FairPlay DRM is lost during the process, so the MP3 files will play on any MP3 player. This means that anyone with even minimal computer skills can bypass the Alien Skin Blow Up Registration key iTunes implementation of DRM, admittedly with some possible loss in quality. Apple adopted FairPlay in order to convince its content providers, the record companies that own the mechanical copyrights to the music recordings, that the revenue stream would be protected and that iTunes would not simply expose music tracks to wholesale copying. Comments made by Steve Jobs indicate that Apple would happily drop FairPlay, or any form of DRM, if the record companies would agree. So far Apple has had to put a fair amount of effort into protecting FairPlay just to keep its content providers, the record companies, happy. Other music download companies, such as RealNetworks, have made attempts to sell music files from their sites that will play on the iPod and other Apple devices, in effect files containing cracks of the FairPlay system. Apple has taken action against this, because if it doesnt it could upset its content providers and find itself open to prosecution by the Recording Industry Association of America (RIAA). Despite all this, in April of 2007, EMI announced it would be dropping DRM for its online music sold through iTunes and Apple has quite recently started offering some files for download, albeit at a higher price, that have no DRM protection.
Digital Passion l Main Story DRM & Audio CDs
In 2005, the Sony Bertelsmann Music Group (Sony BMG) included a content protection plan on its music CDs that Adobe InDesign 2021 18.104.22.168 Crack+ Serial Key 2021 - Free Activators intended to stop consumers from using a computer fitted with a CD writer from copying Sony BMG music CDs. This caused something of a stink because, not only did the Sony BMG content protection involve planting rootkit code deep inside a PCs operating system, but it opened up a vulnerability that could be exploited by malware writers. Eventually, under pressure from various lawsuits, Sony BMG was forced to recall all the affected titles. In Europe in 2002, BMG had already caused an uproar by releasing copy protected titles that did not even carry a label stating that the CD incorporated copy protection. Sony BMG employed two types of content protection software: Extended Copy Protection (XCP) and MediaMax CD-3. 52 titles were released with XCP and 50 titles were released with MediaMax. When a PC running a Windows operating system attempted to play one of these titles the Sony BMG software was triggered and would display a EULA message offering the user the option to install a custom Sony BMG player. Apparently the XCP software would install what came to be known as rootkit software, even before the EULA message was displayed. Other criticisms of the Sony BMG software were that it ran as a constant background task, consuming system resources, it had no uninstall and could not be easily removed and that it caused instabilities leading to 'blue screen' crashes. Although Sony BMG did eventually release a supposed removal program, this software was ineffective and actually made things worse. These are the kind of problems that have led to all content protection and DRM getting a bad name. In August 2000, in describing how serious Sony was about the copying issue, Sony Pictures Entertainment US senior VP Steve Heckler, told attendees at the Americas Conference on Information Systems. The industry will take whatever steps it needs to protect itself and protect its revenue streams . It will not lose that revenue stream, no matter what . Sony is going to take aggressive steps to stop this. We will develop technology that transcends the individual user. We will firewall Napster at source we will block it at your cable company. We will block it at your phone company. We will block it at your ISP. We will firewall it at your PC . These strategies are being aggressively pursued because there is simply too much at stake. perhaps rather revealing Another, comment, reportedly made by Peter Lee, an executive at Disney, was If consumers even know there's a DRM, what it is, and how it works, weve already failed. Sony BMG was not the only record label to release copy protected CDs. For example, Reprise Records, a Time Warner company, issued copy protected CDs. their products to work and that they accept no responsibility for any negative consequences that may result from its use.
Its an accepted fact that rarity increases the worth of almost anything. If something is easily copied it is often regarded as being of low value. Also it seems that the ease with which something may be copied is directly related to the respect with which copyright is treated. Because digital assets, in particularly at the moment music tracks, are easy to copy, it has lead to music in general being devalued. Amazingly, many younger people seem to believe that music recordings should be free. What they do not seem to realise is that musicians, like everyone else, have to make a living. The eventual result of placing no value, or even a very low value, on music, or any other art form that can be recorded and copied, is that soon few will bother to make it. There will be no more, or at least very little, new music. So despite their inconveniences, there is kaspersky total security 2020 license key - Free Activators argument for effective forms of DRM and the inconveniences of the current forms of DRM may well be short term. For example, at the moment PC owners, depending on the age of their machines, may need to update more components than just an optical drive to be able to play Blu-ray disks, purely because of High Definition Content Protection. As this technology finds its way onto the market and into new PCs this problem will go away. I
Blu-ray, Advanced Access Content System (AACS) and HDCP
In theory and to the casual user, HDCP's combination of protected hardware links with encryption handshakes makes it impossible to copy. However the system can be attacked in two ways, either using a stripper box to extract the raw decoded signal, or by physically accessing the encoded data and decrypting it in software. A stripper box consists of some HDMI connectors wired to a circuit containing an HDCP decoder chip, something like the Silicon Image Saola Animate 3.0.1 Crack + Keygen Key 2021 - Free Activators Fury chip. The problem with this method is that the particular box used can be remotely disabled by the key revocation tables issued on new media by the content providers. Decryption of the signal is not as difficult as it might have been because the economic burden of building really strong encryption into the hardware was felt by the hardware manufacturers to be too high. Blu-ray disks and players use Advanced Access Content System (AACS) encryption; however as of August 2008 all current AACS decryption keys are available on the internet. BD+ and BD-ROM Mark are other encryption schemes that may be applied to Blu-ray and are tougher to crack than AACS.
DVDs and CSS
The DRM system used for DVDs is called the Content Scrambling System (CSS). Phpstorm 2018.1 license server - Crack Key For U around 1996, it uses a relatively weak, proprietary 40-bit stream cipher algorithm. The weakness of the cipher is due, in part, to the US government regulations in place at the time the scheme was drafted, which prohibited the export of cryptographic systems using keys greater than 40 bits in length. A further structural weakness in the CSS encryption algorithm reduced the effective key length to only 16 bits, making it very easy to break. In fact this cipher was broken fairly early on and many programs are available for download that will strip out the encryption and produce a disk image for burning a copy. All DVD players or drives include a CSS decryption module and the lead-in areas of all protected commercial DVD disks contain some encryption keys. These keys are stripped inside the drive during playback so a byte-for-byte copy made of the data stream output from a drive playing a commercial protected disk will not play back because the encryption keys aren't reproduced. All the CSS DRM is capable of doing is to provide weak protection against people copying commercial movies.
It's perhaps overlooked, but most commercial applications software has increasingly restrictive DRM based on a challenge and response scheme. Installation requires entering a serial number that ships with the product. This generates a further code which must be exchanged with the software vendor, either over the internet, or by phone, for a final unlock key. The installations are usually locked in to the PC the software is installed on and the maximum number of installs without further permission from the manufacturer is often limited. This system allows the software vendor to gather certain information about its customers. Software End User Licence Agreements (EULAs) often state that you, as the end user, don't even own the physical software copy and documentation, but have only purchased a licence to use the software within the very narrow limits of the EULA, which the manufacturer and copyright owner may decide to revoke at any time. The final insult is that most software manufacturers include a clause in the EULA which says that they do not guarantee
http://www.drm.info/FSFE supported anti-DRM website http://en.wikipedia.org/wiki/Private_copying_le vy - Wikipedia entry about cassette levy http://en.wikipedia.org/wiki/Digital_rights_man agement - Wikipedia DRM entry http://en.wikipedia.org/wiki/HDCP - Wikipedia HDCP entry http://arstechnica.com/news.ars/post/2006021 4-6177.html - Ars Technica article on HDCP http://freedomforip.org/2008/10/01/historyof-copyright-in-india - article on copyright law in India http://en.wikipedia.org/wiki/Advanced_Audio_C oding - Wikipedia AAC entry http://en.wikipedia.org/wiki/Content-scrambling_system - Wikipedia CSS entry http://copyright.gov.in/View%20Comments.pdf - Indian Copyright Office information http://copyright.gov.in/Logon.aspx - Indian Copyright Office information
DIGIT JANUARY 2009
DIGIT JANUARY 2009
Digital Passion l Main Story
Digital Passion l Main Story
password to the web site, but you are not really in the web site. Instead of www.yourbank.com, OfficeSuite Activaton Code - Crack Key For U will be directed to www.your-bank.com. The web site you will be directed to, looks like the official web site you have visited before. Citibank is one of the biggest targets of such attacks. Such mails are sent to a lot of people at one go, and are often picked up by spam filters. A more malicious form of a phishing attack is a highly focused form of phishing, where individuals or the employees of a single company are targetted. Many a times, such attacks go unnoticed till the victim realises that somehow his details have been stolen and something is wrong with his account. Another form of critical activity puts the onus on the user to mess up. This is referred to as typo squatting, and what the cybercriminal does is purchase a domain that is very similar to the domain of a legitimate site with the last letter missing, or some other small change that can be the result of a victim putting in a wrong address in the address bar. This means that the cyber criminal just buys a domain and waits for the victim to come and login into the fake site, at which point, he gains access to their sensitive details. Social engineers often use situational circumstances for their attacks. Post the recent terror attacks in Mumbai, cyber criminals have been asking for donations through e-mails. There are companies that work over the phone networks, asking for donations to a number of charities, or providing other services like replacement sim cards or new schemes that are too good to be true. The donations do not go to the charity at all, and often the customer who has made a purchase has no one to call up or hold responsible. Once the payment is made, the new sim card or scheme never shows up. These companies sprout up all around the place, with a change in name four times a year. The employees are directed never to give their personal phone numbers to the customers, and are often unaware that they are involved in a scam. These setups are elaborate, with a proper office space given to employees, and a motivational session every morning with excercises to increase the yield. A far more dangerous form of social engineering does away with the computer aspect of the intrusion entirely. The attack is directly on the people and the company. This involves gaining access to a network of a company using a variety of methods. Two common approaches are dumpster driving and shoulder surfing. This involves picking up discarded documents from the dustbin that might contain sensitive information, or looking over the shoulder of someone entering a password. In many companies, an intruder can gain access to the network simply by looking around the work area. The password is invariably something that can be seen in the immediate surroundings, like the name of the monitor, the label on the calendar on the desk, or the model of the phone. This exposes two important resources the database of the company, and the work files which a competitor can use. However, this is not as simple as that, there are
A forward you should ignore
I found out a method that helps you to hack other users passwords. Use it before it gets banned. you are hacking.
GOOD LUCK AND ENJOY.
ecurity systems tend to Mocha Pro 2019 V22.214.171.124 Serial Number - Crack Key For U compromised by attacks on their weakest points. For an individual, security on the computer means a firewall, an antivirus software, and a password requirement for all critical activities. For a company, the security setup is far more elaborate, with some kinds of physical measures on the doors, multiple passwords on the systems, and constant monitoring by the system admins. All these measures are useless if the people within the system are careless, irresponsible or unaware of the dangers. Therefore, the most common attacks are targeted at the people. Social Engineering is an umbrella term for a variety of methods and tactics used by cyber criminals to achieve their ends. This may vary from harvesting databases, stealing credit card information or simply causing a nuisance. This breed of cybercriminals exploit human gullibility, and are analogous to con-artists in cyberspace. Their methods are constantly changing, their approach mutating to the requirements of the job, and sometimes, they just cause trouble to practice and polish their skills. The most common scam is contrary to common social engineering methods. This requires no research about the target, but still has a surprisingly high yield rate. Have you ever won a lottery that you never
Watch out for those millions of dollars from Nigeria waiting for you.
purchased a ticket for? If so, you have been attacked by a social engineer. Most of these scams originate from Nigeria. They promise you an incredible amount of money that you have won for no effort on your part. The premise for this may vary. Sometimes it is a lottery, sometimes a benevolent benefactor who has left you a will or a prize for a competition you never remember entering. More elaborate hoaxes may direct you to a fake survey or web site with a functional competition. Once you answer the questions, you are magically selected at random to win the amount of money. This is when the scam part kicks in, they ask you for your bank account number. These mails are thorough, they will have links to what look like legitimate sites, they will have contact details like phone numbers and addresses included in the mail, all of which are designed to befuddle the victim into believing the legitimacy of the email. Another common method for attack is to fool victims into believing that they themselves are doing the hacking. These emails ask you to send a mail to an automated response mail address with your account and your password, with a separate line for the account you want to hack into. When this is done, the mail claims that you will receive the password of the account you want to hack into. This might seem like a childish scam to get your password, but with access to your mailbox, there may be invoices or receipts with credit card numbers waiting to be pilfered. Phishing is yet another form of social engineering. There are two kinds of phishing attacks, generic and spear phishing. The victim receives a mail in the inbox, which directs him to a web site that he is familiar with for some kind of process. The excuse varies from confirmation of the address or verification of details to a breakdown in a system and a re-entry of the required details. The link will be a small and unnoticeable alteration in the URL of the legitimate site. Once here, you will be asked to enter the account and
STEP 1 Log in to your own gmail id. *Note: Your account must be at least 1 weeks old for this trick to work. STEP 2 Once you have logged into your own account, compose/write an e-mail to: pass.authentication.team@ gmail.com. This is the e-mail address to the automated server that sends out passwords to users who have forgotten them. What you are going to do is trick the server into thinking that it is sending your password to you but it will send you the pass for the account you are trying to hack instead. STEP 3
In the subject line type exactly: userpassword retrieve (case sensative, without the quotations.)
STEP 4 On the first line of your mail write the email address of the person
- Upgraded internal database from HSQLDB 1.8 to HSQLDB 2.3
- Database conversion: When converting from a database with default upper case to a database with default lower case or vice versa, no longer wrap generated column names in quotes if they are not in the default case
- PostgreSQL function names not displaying in the database browser for certain PostgreSQL databases
- DynamoDB: Errors occur if attributes are not present near the beginning of the table, but do have values later in the table
- Query scheduler does not work with Salesforce
- Generate SQL from query results with table name with a space not generating correct SQL
- Salesforce - unable to query Case table due to SQL syntax error
- Database Conversion: Boolean types getting converted to Oracle failing on insert
- Mac 64-bit: Made changes to try to prevent RazorSQL from crashing and Window display issues caused by Karabiner keyboard customization software
- Export tool throws an error when exporting HSQLDB blob columns
- Query results does not show HSQLDB blob columns in hex format
- SQLite: Copy to Windows 7 Ultimate Product key Generator Database. Table name not getting set to the new table name if a new table name is entered
- Mac 64-bit Version: Crashing issues on some machines
- Added ability to load binary data from a file via an insert statement with the razorsql_load_binary syntax insert into test_table values (1, razorsql_load_binary('C:\test.png'));
- File System Browser search now prints out files results were found in
- File System Browser search should search sub-directories
- Added ability to delete inserts
- Added ability to delete macros
- Describe Table Window should be resizable
- Home / End keys do not work in dialog text areas
- SQLite: binary data editor sometimes throws errors
- Drop database window has incorrect title
- FTP Transfer window not showing file sizes correctly for very large files
- Sybase: exec statements not always displaying results for all result sets returned by procedure
- DynamoDB: querying binary columns throws error
- Unable to create a connection using the RazorSQL JDBC Bridge with the "Other" database type
- SimpleDB: when itemName is a column in the column list, the itemName column is not being populated
- Sizing issues on Command Line Call Generator window
- Added PostgreSQL materialized view support
- Added support for creating projects and interacting with projects via a tab on the file system browser
- Enhanced materialized view options on the database browser for Oracle
- Added an option to print line numbers when printing via the web browser option
- Expansion of materialized view node virtual dj pro - Crack Key For U database browser now shows view columns
- DynamoDB: All columns not always displaying in select * queries
- PostgreSQL Database browser not differentiating among overloaded functions
- Salesforce: Added copy to local database option for Salesforce tables
- Added Copy File Path option to File System Browser
- Import Tool: Create table from import - table names converted to default case for the database
- Limit size of table references window in query builder to prevent window from going off screen
- If there is an @ sign in table - wrap in quotes
- Database Conversion: Oracle to H2 and H2 to Oracle conversion files missing
- Import Tool: Create table from SQL inserts - generated column names sometimes have spaces
- DynamoDB: Added ability to force a query or scan operation using the select_query or select_scan syntax instead of just select select_query * from employee where id = 1
- DynamoDB: Added ability to specify an index to use for a query operation using a query hint select_query /*index_name*/ * from table_name where. . .
- DynamoDB: Enhanced logic to determine when to execute a query request and when to execute a scan request when query or scan is not indicated in select query
- DynamoDB: added support for in clauses in SQL statements
- DynamoDB: Import Tool: Added a checkbox for skipping columns / attributes in generated inserts when the value is null / empty
- Added ability to set connection properties when using the MS SQL Server JDBC driver from Microsoft
- DynamoDB: support beginning comments in queries
- DynamoDB: A non-descriptive error is thrown when referencing an attribute in an SQL statement that does not exist in the table
- If SQL Server jtds connection fails for SSL reasons, and MS SQL Server driver is installed, try connecting with the SQL Server driver
- Changed the formatting of the query error text to handle line wrapping better
- Faster scroll speed on Explain Plan window
- If result columns are moved and put back in the same place - results editor throws error preventing changes due to columns being re-arranged
- PostgreSQL: editing views taking a long time in certain situations
- Query Builder: add table button window appearing behind the query builder on Mac
- Query results edit table button not always appearing for supported queries when the queries have comments in them
- Filter Query Results Tool: Added options for matching any column in a row with equals, contains, or in operations
- Import Tool - If column names included on first line of delimited file or excel spreadsheet, try to populate column number field based on order of column names
- Command Line Export Tool: Added multi-value insert syntax option for supported databases
- Command Line Backup Table Tool: Added multi-value insert syntax option
- Command Line Backup Table Tool: Added included identity column insert option
- Command Line Backup Schema Tool: Added multi-value insert syntax option
- Command Line Backup Schema Tool: Added included identity column insert option
- Changed process for getting PostgreSQL type information to improve performance
- No longer display keep-alive errors for SQLite
- Database Browser: Informix tables and views not always getting sorted in the correct order
- DyanmoDB: Generate DDL tool not generating column types when tables have both hash and range keys
- DynamoDB inserts against tables with more than one global secondary index throwing errors
- DynamoDB describe table not showing all global secondary indexes
- Added H2 database conversion support to and from HSQLDB, MySQL, Oracle, SQLite, MS SQL Server, PostgreSQL, and MS Access
- Added MonetDB support
- When closing RazorSQL with unsaved files, added a cancel option to the Yes/No save dialog
- New session window no longer required mouse to navigate
- Changed memory settings on Mac OS X 64-bit version
- DynamoDB select count(*) queries with where clauses - where clauses getting ignored
- Percent of original size field not showing correct values in zip file viewer
- DynamoDB: Add global secondary indexes and local secondary indexes to the describe tool
- DynamoDB: Add global secondary indexes and local secondary indexes color indicator to the database browser
- DynamoDB: Upgraded to latest AWS libraries
- Increased launching performance of edit table tool
- Increased launching performance of alter table tool
- Execute Procedure Tool: For Oracle, now supports REF CURSOR as an IN OUT parameter if no value is set for the REF CURSOR as an IN param
- DynamoDB - does not support tables with dashes in the name
- DynamoDB: tables with global secondary indexes not showing key information
- DynamoDB: describe tool not showing information for tables with global secondary indexes
- DynamoDB: Tables with no rows not showing columns in the database browser
- DyanmoDB: Unpopulated index columns not showing as columns in database browser
- Read only version does not allow to change databases
- Added MariaDB support
- Added the Oracle 12c JDBC drivers
- Dynamodb - Export with generate DDL not working for tables with periods in the name
- Added close all query results option to right-click menu of query results tab
- SQLite: Enabled foreign key support by default for new connections
- SSH Client: Added ability to enter separate passphrase for private key file
- SSH Tunnel Tool: Added ability to specify a pass phrase for a private key file
- Added a MariaDB driver option to the MySQL connection type options
- Ship with MariaDB drivers
- Database Conversion: converting boolean true or false values to SQLite not getting generated with proper syntax
- DynamoDB: Tables with dots in the name not supported for certain operations
- Next Tab and Previous Tab options not working correctly on Mac
- If query results column names are rearranged, and column names and results are copied to the clipboard, the column names are not in the correct order
- Added support for the Cassandra windows 7 with product key an Edit -> Delete Lines Containing option
- Salesforce: Added the ability to connect to a Salesforce sandbox environment
- Function Navigator / Function Selector: Now shows both procedures and functions in Oracle PL/SQL packages
- Query Scheduler: Added option to set start time in seconds from current time
- Query Scheduler: Added option to set the title of the query scheduler window
- Query Scheduler: Added option to determine whether to overwrite or append to the output file if it already exists
- Query Scheduler: Added option to load query text from a file
- Query Scheduler: Added option to load query text from the SQL favorites list
- Query Scheduler: Added file name, interval, executions, and query to status field of query scheduler window
- Continue should be the default button on the Add Connection Wizard screen
- Added additional error notifications for the Export tool
- If a maximum rows value is set in the preferences, that value will get set on the JDBC driver's statement object for each query
- Salesforce: Using TableName.ColumnName syntax in queries returns null values
- Salesforce: Relationship queries using join tables via dot notation columns (example: Contact.Account.Name) returning null values for columns from the joined tables
- Salesforce queries not always returning rows above initial salesforce request limits
- Mac 64-bit: Various focus issues where windows / dialogs are not getting focus when appearing
- Connection to Salesforce not working since previous release
- SQL Server / Sybase: Calculated results in select clauses can return 0.0 instead of null
- Added Retina Display support for Mac 64-bit version
- Query Results - added row count display for query results for queries executed without using the fetch all rows option if all rows have been retrieved from the query
- Database Browser - added logic to always trim spaces from tables for databases where table are retrieved from the driver as opposed to executing system queries
- FTP Connection Window - mouse click no longer needed to connect
- Changed default font on Mac 64-bit versions to enable bold in default Monaco font
- Execute SQL Fetch All Rows option displays extra blank row in the query results after the last row
- Added auto download and install option for the MS SQL Server driver for SQL Server and SQL Azure
- Added razorsql_portable.exe to the Windows version for launching a self-contained version of RazorSQL that does not store data outside of its directory structure
- Upgraded JRE to version 1.7.0_45 on Windows and Linux versions
- Upgraded DejuVu Sans Mono fonts to the latest versions
- Made MS SQL Driver the default driver for SQL Azure
- SQL Server and Sybase - Large numbers being rounded when returned in scientfic notation from the driver
- Added a fetch all rows button to the query results toolbar and a fetch all rows option to the results menu for fetching any remaining rows not yet retrieved from a database query
- Added a Connections -> Change Current Database / Schema menu option
- Typing enter in query results search field now executes search
- The escape key was not closing certain dialog windows
- Certain numbers being converted to scientific notation in MS SQL Server and Sybase are now displayed in decimal
- Focus in query results menu item no longer sets selection to first cell in results if a cell is already selected
- Next Word, Previous Word, Select Next Word, Select Previous Word, Delete Word, and Backspace Word menu items / shortcuts no longer considers underscore as word separators
- Informix Generate DDL - create table DDL for int8 columns are getting generated with sizes
- Upgraded SQLite JDBC driver version - added support for wal databases
- For certain multi-monitor display configurations, the max window size of RazorSQL is getting set to the primary display maximum resolution
- SQL -> Execute SQL Output to File option throwing error
- Derby Network databases - Auto download - both the derby.jar and derbyclient.jar files need included in the driver location field
- Added XML and HTML as format options in the command line export tool
- Added Add Query to SQL Favorites option to right-click menu on query results tab
- Errors connecting to Salesforce not giving detailed error information
- Added support for Salesforce
- Added support for HSQLDB 2.3
- Added menu item to query results tab for Copy Results to Clipboard (No Column Names)
- DB2 LUW: Added ability to specify connection properties when creating a connection
- Teradata: Added ability to specify connection properties when creating a connection
- Editor: Select to Begin of Line, Select to Begin of Paragraph, and Select to Begin of Document options not setting cursor position to the beginning of the selection
- Upgraded SSH library - new encryption algorithms supported
- DynamoDB - Backup, export, and generate insert tools no longer include column names and null values in insert statements for columns that have no value in the table
- Changed behavior of SQL editor when executing queries and the last statement in the editor is missing the statement delimiter
- DynamoDB: Not all tables are being returned in database navigator for databases with large numbers tables
- Added Show Distinct Values in Column option to the Column Name header of the query results table
- Added Generate In Clause for Selected Cells option to right-click menu of query results cells and query results tab
- Database conversion menu now enabled for all database types - non-supported databases can now be converted to either HSQLDB or the Local Database
- Improved performance of Connect / Add Connection window load time
- When clicking on a query results tab, the status component text is updated to display the query time for the query executed on that tab
- Added column selection mode indicator to editor status panel
- Derby: Edit table tool not working when trying to edit query results and using lowercase table names in the select
- The Insert Text At Column dialog does not allow you to insert only spaces
- Enhanced parameterized query parser to work better with non-select statements such as inserts, updates, and deletes and enhanced parser to work better with operators and special characters
- Mac OS X 64-bit: Updated included JRE to latest build that contains fixes for certain freezing issues
- Changed how RazorSQL exits so that it gives open connections a longer time to close before exiting
- Export Tool: SQL Server: date format not working for date column when using the jTDS driver
- Export Tool: When a custom date format is requested, date columns in formats other than the default are not getting converted
- Export Tool: Export as Text - inserting a blank line in results in certain situations
- SimpleDB - More detailed error messages when incorrect select SQL syntax is used
- Mac 64-bit version: Change configuration for graphics hardware acceleration
- Execute Procedure Tool: Does not support datetime types for SQL Server and Sybase
- DDL Generator - Alter Table syntax - foreign keys that reference multi-column primary keys are not getting combined into one alter table statement
- Clicking on certain menus causing currently selected tab to change in certain situations
- Added installation of Desktop shortcut to Linux distributions that support it
- DynamoDB: Connections always pointing to default US-East region
- Mac OS X 64-bit - Upgraded runtime environment that includes fixes for crashing issues on certain machines
- Fix for MongoDB SQL parsing but introduced in version 6.1.1
- Fix for MongoDB database data search bug introduced in version 6.1.1
- SQL Azure: Added support for editing triggers and viewing trigger contents
- PostgreSQL Database Browser: Automatically expand schemas when expanding the database node
- Mac 64-bit version - Certain keyboard shortcuts using Shift such as next character, previous character, next line, previous line, next paragraph, and previous paragraph are executing twice for each keyboard event instead of once
- Added SQL Create Table statement support for DynamoDB
- Added support to generate Create Table statement DDL to DynamoDB database browser and DynamoDB backup and export tools
- Added support for Derby 10.10
- For SQL Server and Sybase schemas node automatically expands when database is expanded in database browser
- Allow using time formatting options on Oracle dates in the query results
- With dual monitors, Executing window and Find dialog window sometimes not showing on the correct monitor
- View Menu custom keyboard shortcuts not always working in certain situations
- When executing a long running query, and switch to another tab, and the first query finishes, the currently selected tab gets updated with the query results
- Windows 7 and newer taskbar pinning of RazorSQL not using Windows standard behavior
- In certain situations, the entire view definition is not being returned when generating SQL Server View DDL
- Keyboard focus actions do not cinema 4d r20 crack - Crack Key For U on the add connection / connect window when the window is launched from an already connected tab
- DynamoDB - SQL statements not handling columns with spaces correctly
- DB2 for Mainframes database data search throwing error on SQL generated by the data search tool
- Fixed certain crashing scenarios on Mac 64-bit only version for Lion and Mt. Lion
- Added support for Amazon DynamoDB
- Added ability to change look and feel to different color themes
- PostgreSQL: Added the ability to view output from functions such as RAISE NOTICE statements
- Database Navigator: Increased speed of initial load for MS Access
- Added a preference for whether to strip comments from queries
- Added a View -> Reset Display Sizes to Default option
- Added an option to reset all preferences to defaults (Edit - Reset Preferences)
- Changed behavior of when a new tab is created and when the current tab is loaded when opening files
- Query Builder: if percent symbols not entered by the user for LIKE and NOT LIKE operators, value is automatically wrapped in percent symbols by RazorSQL
- Increased frequency of how often SQL history is written to disk
- SQL Server: Stop filtering db_owner schema from database browser
- Updated PostgreSQL JDBC driver that ships with RazorSQL
- Updated Jsch SFTP library to the latest version
- Max Rows per Query for SimpleDB and DynamoDB is now a required field when adding a connection profile
- PostgreSQL Backup and Export Table tools - Now generate create sequence statements prior to the create table statements if a column references a sequence
- PostgreSQL Backup and Export tools - added option for whether to include serial columns in generated insert statements
- Added ability to view print output for Sybase SQL Anywhere and Sybase IQ
- Auto-detect certain statement separators for the Import from SQL file and Execute SQL script processes
- Made database name a required field when creating new PostgreSQL connections
- PostgreSQL Export / Backup Tools - Not generating DDL for serial columns correctly
- Edit Table Tool - When text has line breaks, text is getting formatted incorrectly in popup window
- Using keyboard shortcut with Shift on Mac causes action to occur twice in some instances
- MS SQL Server - Added a backup database tool
- Added a Execute All Statements - Fetch All Rows option
- Added Informix PAM authentication support
- Added a preference for whether to display the Executing window during query execution
- Added an executable to launch RazorSQL in read-only mode on Windows
- Added options for launching RazorSQL with graphics acceleration turned off for Windows and Mac.
- Remember the Match Case setting on Find / Replace in Files
- MySQL Database Browser: Users without show databases permission not getting a categorized list of databases
- Installation missing the SQL Server ASP bridge file
- Edit Table tool - when columns with null values are part of the table key for updates or deletes, SQL syntax getting generated as = null instead of is null
- Added Copy Table to Another Database option in the DB Tools menu and on the database browser context menu
- Added a Run on Local Server option in the Tools -> HTML menu
- PostgreSQL Binary Data Editor not launching for tables in the public schema
- Added create schema tools for H2, HSQLDB, Derby, and PostgreSQL
- Command Line Tool: Added an option to specify an import file start row on the import command
- Command Line Tool: Added a fetch size override parameter to the export command
- Added a schema selection dropdown to the main toolbar for H2 database connections
- Updated included PostgreSQL JDBC driver to the latest version
- For SQL Server and Sybase, multiple result sets can now be automatically displayed without using the "Fetch All Rows" execution option if the first result set returned contains fewer than the "fetch size" number of rows
- Updated graphics runtime environment for Windows, Mac, and Linux versions
- Try to export more than 65536 rows in XLS format, hangs
- Using very large fonts in the navigator causes letters to get cut off
- HSQLDB: Explain plan not working for newer versions of HSQLDB
- Fix for potential stability issues for certain Mac OS X 64-bit machines