View allAll Photos Tagged encryption
Vera Wilde, artist-in-residence at Hack42. Because Art & Science!
Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting.
The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.
Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.
This is our second photo-shoot together. We have great chemistry and it's loads of fun to shoot with her.
We got to play with a few props, listen to some music and experiment with light and posing.
The HP EliteBook Folio 9470m brings the benefits of a commercial Ultrabook without compromising enterprise features and starts at 3.5 pounds, measures 0.75 inches thick and features a 14-inch screen
The HP EliteBook Folio 9470m offers safeguards for security-conscious businesses with an embedded TPM security chip, an integrated smart card reader, security lock slot, full volume encryption and a security screw for bottom access door.
For more info, visit h10010.www1.hp.com/wwpc/us/en/sm/WF05a/321957-321957-6429...
Rhondella Richardson of WCVB interviewing Noelani Kamelamels, Massachusetts Pirate Party First Officer
Reporting the news creates unique security risks. Protecting sources and sensitive documents is vital to a free press, but challenging due to Internet surveillance and widespread data collection. This event covered how to securely manage sensitive information by using encryption software.
I believe this is a rotor used in a "bombe" that was used to decrypt codes during World War II.
Seen at the National Security Agency’s National Cryptologic Museum, Fort Meade, Maryland.
An observation from someone who is not an expert in cryptography: Cryptography is about converting order (a written or spoken message) to disorder (an encrypted communication with no clear patterns) and vice versa. Thus, I find it interesting that a number of tools for cryptography—especially prior to the digital age—have a physical order or pattern.
Congressman Jim Himes (D-Conn.), Ranking Member on the NSA and Cybersecurity Subcommittee on the House Permanent Select Committee on Intelligence
DCT:SYPHONING. The 1000000th (64th) interval.
Conceived by Rosa Menkman
About the work
A modern translation of the 1884 Edwin Abbott Abbott roman "Flatland", explains some of the algorithms at work in digital image compression.
Inspired by Syphon, an open source software by Tom Butterworth and Anton Marini, in DCT:SYPHONING, an anthropomorphised DCT (Senior) narrates its first SYPHON (data transfer) together with DCT Junior, and their interactions as they translate data from one image compression to a next (aka the “realms of complexity”).
As Senior introduces Junior to the different levels of image plane complexity, they move from the macroblocks (the realm in which they normally resonate), to dither, lines and the more complex realms of wavelets and vectors. Junior does not only react to old compressions technologies, but also the newer, more complex ones which ‘scare' Junior, because of their 'illegibility'.
Every image plane environment is made in a 3D Unity Level, and per level, artefacts from another realm of compression form the textural basis of the chapter.
Background of the work (DCT, 2015):
In 2015 Menkman developed DCT for the exhibition "Design my Privacy" commissioned by MOTI museum, Breda, Netherlands, which won a shared first price in the 2015 Crypto Design Challenge. The work DCT (2015) formed the basis for "DCT:SYPHONING. The 1000000th (64th) interval" (2015-2016).
cryptodesign.org/winners-crypto-design-challenge-2015/
The basic premise of “DCT” (2015):
The legibility of an encrypted message does not just depend on the complexity of the encryption algorithm, but also on the placement of the data of the message.
Discreet Cosine Transform (DCT) is a mathematical technique, that has been used since 1973, but only became widely implemented in 1992, when the JPEG image compression technology started using it as a core component. In the case of the JPEG compression, a DCT is used to describe a finite set of patterns, called macroblocks, that could be described as the 64 character making up the JPEG image, adding lumo and chroma values (light and color) as ‘intonation’. If an image is compressed correctly, its macroblocks become ‘invisible’, while any incidental trace of the macroblocks is generally ignored as artifact or error.
Keeping this in mind, Menkman developed DCT, a font that can be used on any TTF supporting device. DCT appropriates the algorithmic aesthetics of JPEG macroblocks to mask its 'secret' message as error. The encrypted message, hidden on the surface of the image is only legible by the ones in the know.
Production of DCT:SYPHONING.
DCT:SYPHONING was first commissioned by the Photographers Gallery in London, for the show Power Point Polemics.
This version was on display as a powerpoint presentation .ppt (Jan - Apr 2016).
thephotographersgallery.org.uk/powerpoint-polemics-2
A 3 channel video installation was conceived for the 2016 Transfer Gallery's show "Transfer Download", first installed at Minnesota Street Project in San Francisco (July - September, 2016)
transfergallery.com/transfer-download-minnesota-street-pr...
The final form of DCT:SYPHONING will be in VR, as part of DiMoDA’s Morphe Presence.
risdmuseum.org/art_design/exhibitions/211_dimoda_2_0_morp...
DCT:SYPHONING. The 1000000th (64th) interval is dedicated to Nasir Ahmed and Lena JPEG Soderberg.
A Spomenik for Resolutions (that would never be)
A warm thank you go out to Transfer Gallery (Kelani Nichole) and DiMoDA (William Robertson and Alfredo Salazar-Caro)
Vera Wilde, artist-in-residence at Hack42. Because Art & Science!
Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting.
The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.
Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.
This is our second photo-shoot together. We have great chemistry and it's loads of fun to shoot with her.
We got to play with a few props, listen to some music and experiment with light and posing.
Fortune Brainstorm TECH 2016
WEDNESDAY, JULY 13TH, 2016: ASPEN, CO
8:00 AM–8:45 AM
BREAKFAST ROUNDTABLES
ENCRYPTION AND SECURITY FOR THE THREAT-SET
Ask any board chairman or CEO—the most pressing issue by far at any corporation this year is cybersecurity. Have you been hacked? (Yes.) Will you be hacked again? (Yes.) What can you do about it? Attend this session and hear from top industry experts about what to look for and what to do about it.
Steve Herrod, Managing Director, General Catalyst Partners
Paul Judge, Chairman, Luma
Lara J. Warner, Chief Compliance and Regulatory Affairs Officer, Credit Suisse Group
Michelle Zatlyn, Head of User Experience, CloudFlare
Moderator: Robert Hackett, Fortune
Intelligence track hosted by KPMG
PHOTOGRAPH BY Stuart Isett/Fortune Brainstorm TECH
You may be asking yourself, why you would want to do that. Then again, you may be asking yourself, "what are bitcoins?"
My bitcoin address:
1H76GsGpfkyg2PtwnsZnTYgED3NinWgsG6
Bitcoins are a new kind of electronic money. You can trade money for them, use them to pay for things, and trade them for money. This is one technology, that in the late 90's many people speculated about, but which had not manifested until recent years.
I am studying computer programming, but I'm only the barest beginner, so I'm not qualified to explain every detail about how bitcoin works. But I've been aware of it for some time, at least several months, and I've had some time to watch it go from being unknown, to being relatively valuable against the US Dollar, and accepted as a form of payment worldwide.
Bitcoin is described as a crypto-currency, but as far as I can see, encryption is not really the main reason why it works and is secure. The real strength of bitcoin is its distributed ledger. While most electronic funds rely on a central, highly trusted institution to keep a ledger of transactions, like a bank, to ensure that people don't spend the same dollar twice, for instance, bitcoin instead relies on a peer-to-peer network to verify transactions, and keeps a ledger distributed across the network. This means that if someone tries to spend a bitcoin twice, the second transaction will not be recognized by the network. This system is secure enough that it enables people holding bitcoins to make a backup file of them, so that if their computer went down they would not lose their money. This backup can even be kept on permanent portable media, like a flash drive or cdROM. Ledgend has it the identifiers for your bitcoins can even be printed out on paper, and buried in the backyard in an old shoebox. I haven't been using bitcoins long enough to know if that is true or not, so if some folks will send me some, I plan to try it out.
There are two other keys to the value of bitcoins, that the amount of them is capped at 21 million. Therefore they remain scarce. Unlike the US Dollar, which can be created at will as electronic bank entries, they will not become worthless, through over-production.
However, note this well, so that you don't appear foolish in arguments on your favorite web forums: Even though the quantity of bitcoins is fixed, bitcoins are divisible into extremely small fractions. This means that the quantity of bitcoins in existence, and the value of each "bitcoin unit" is irrelevant to their ability to function as a medium of exchange. If one bitcoin were worth 1 cent, or if it were worth a million dollars, you would still be able to use them both to buy a house in a lump sum, and also buy a cup of coffee.
One caveat about bitcoins, followed by an observation of why it is of limited relevance: To date, the price of bitcoins has either been very low per unit, or has swung wildly between $40 per Bitcoin up to $266. per Bitcoin. The lesson here is that we should be cautious about considering bitcoins to be a stable store of value, which is one of the functions we are used to thinking of as necessary for our money. However, note that with a little creative pricing and wary understanding of common risks in the market, this need not prevent bitcoin from serving the other major function of a currency; its role as a medium of exchange.
Since bitcoins are no more intrinsically valuable than any other monetary unit, the only way they have value is if people want them. (And I DO!) So, in that sense nothing is backing them but people's desire to have them, either to keep or to use. The same is true of Gold, Seashells or Dollars. The price of any commodity, even those commodities we decide to use for money, always tends to fluctuate relative to other commodities. In your RPG you may be able to exchange silver for gold at a fixed rate. You may exchange Euros for Dollars at a fixed rate during your vacation abroad, but if you look at the finance pages you'll notice that the exchange rate is always changing. Slightly if you're lucky, perhaps in your favor. But which is more true? That the dollar is falling or rising? Or that the Euro is falling or rising? Is Gold falling or rising, or is it the dollar? Did the price of gas go up at the local station, or did the Dollar go down relative to the world economy? I think it is accurate to say that most of the time it is at least a little bit of both, or all of these. And so it is with bitcoin.
But so long as people are willing to trade you bitcoin for dollars or vice versa, you can use bitcoin to facilitate transactions without having to hold onto it as a store of value. You could see an item for sale on the internet, its price is listed in dollars, but bitcoin is given as the preferred method of payment. You convert your money to bitcoin, at whatever the current rate is, pay in bitcoin, and perhaps the person on the other end does the reverse, converting bitcoin to their local currency, and neither of you take any losses (or gains!) due to the fluctuating price of bitcoin. Someone out there, however, will be willing to risk those losses or gains, just as there are with any commodity or currency in the world. They are sometimes willing to hold payments in escrow, ensuring both parties to a transaction are pleased with the bargain.
In these ways it is possible to separate the unit of account (store of value) function of a currency from its function as a medium of exchange.
Bitcoin is valuable because it is useful. It is useful for some of the same reasons that email is useful, or web publishing is useful. Because it helps things move more quickly, with less friction, at a lower cost, and makes things that in the past only a few people could do, something that many people can do.
Its adoption is being fueled by the fact that it is the native currency of the internet. And like the internet it flows wherever information flows. It crosses borders frictionlessly. It helps people build small things, and it helps small things become big things.
At last we have a realization of a mechanism that allows those long dreamed-of micropayments, because bitcoin is extremely divisible, and because transaction fees in it are extremely low, or sometimes absent. Merchants who are used to credit card processing fees are quickly taking notice of the gains that can be made by switching to a payment method without fees. Not to mention that it is a payment method without reverses or charge-backs.
This is the currency you can send someone in an e-mail, or pay in person using a smartphone.
One other benefit of bitcoin is that it enables anonymous transactions. The astute reader will realize from my earlier description of the strengths of bitcoin's workings that all bitcoin transactions leave a trail that is retained in the distributed network, so great caution should be used before one assumes that their transactions are safely anonymous. However, with the ease of creating bitcoin addresses, the fact that they need not be associated with any identifying information, not even email, that they could potentially be purchased from any Joe with bitcoins that you meet by chance at the park, psudonymity is a very real, very strong possibility.
So I hope that I've piqued your curiosity, and that you will try Bitcoins. And if you want to give me some, that's cool too. The above QR code should work out to my newly created bitcoin address:
1H76GsGpfkyg2PtwnsZnTYgED3NinWgsG6
And if you would rather exchange value for value, give me bitcoins only if I give you something, well, I am a pretty good logo designer, I know lots about 3D animation, can sculpt in ZBrush and import meshes and textures into SecondLife. I can create custom seamless textures, I'm a decent photographer, and enjoy portrait work, and sports photography, and would love to do weddings. I'm also learning Java, and have a slew of other interests.
Vera Wilde, artist-in-residence at Hack42. Because Art & Science!
Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting.
The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.
Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.
Vera's third photo-shoot, in which we get to play with some theatrical props and explore extreme opposites.
LET’S GO TO MONOPOLY SLOTS GENERATOR SITE!
[NEW] MONOPOLY SLOTS HACK ONLINE REAL WORKS 100% GUARANTEED: www.generator.mosthack.com
You can add Coins up to 999,999,999 and Diamonds up to 999 each day: www.generator.mosthack.com
Free and added instantly! This method 100% works for real: www.generator.mosthack.com
Please Share this working hack online method guys: www.generator.mosthack.com
HOW TO USE:
1. Go to >>> www.generator.mosthack.com and choose Monopoly Slots image (you will be redirect to Monopoly Slots Generator site)
2. Enter your Username/ID or Email Address (you don’t need to enter your password)
3. Select Platform and Encryption then click “CONNECT”, Popup Success alert click “OK”
4. Select Resources then click “GENERATE”, after that click “VERIFY”, finish verification process and check your account!
Try Another Free Safe and Secure Hack Online Generator Cheat Real Works 100% Here: www.mosthack.com
#generatorgame #onlinegeneratorgame #mosthack #generatormosthack #monopolyslots #monopoly #monopolydeal #monopolymoney #monopolyatmaccas #monopolyempire #monopolyman #monopolygang #monopolynight #monopolytime #monopolyjunior #monopolyguy #monopolygame #monopolymillionaire #monopolyjr #monopolyvision #monopolycity #monopolyking #monopolyhotels #monopolychamp #monopolym #monopolymonday #monopolypubcrawl #monopoly2015 #monopolyboy #monopolylife
HACK MONOPOLY SLOTS NOW!
Reporting the news creates unique security risks. Protecting sources and sensitive documents is vital to a free press, but challenging due to Internet surveillance and widespread data collection. This event covered how to securely manage sensitive information by using encryption software.
Faux Disk Encryption: Realities of Secure Storage on Mobile Devices
by Daniel Mayer & Drew Suarez
Black Hat Europe 2015
Vera Wilde, artist-in-residence at Hack42. Because Art & Science!
Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting.
The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.
Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.
This is our second photo-shoot together. We have great chemistry and it's loads of fun to shoot with her.
We got to play with a few props, listen to some music and experiment with light and posing.
Mobile software application, workflow collaboration framework, Cloud Services, Backup / restore Contacts, Migrate Contacts, Transfer Contacts, File Manager, Push File, Send receive SMS, Locate your Phone, Wipe your Mobile Device, Encryption, Multi Factor Authentication, Digital certificate, Android, Windows Mobile, Symbian, Blackberry, RIM, iPhone, Windows PC Client, Access manage your mobile device
Colossus, the world's first electronic, programmable digital computer. Developed by Tommy Flowers to break the German Lorenz cipher, Colossus' existence was kept top secret for many years after the war.
One story says that after the war Tommy Flowers left Bletchley Park and wanted to develop his own successor to Colossus. He applied for a bank loan but was turned down - the bank manager unwilling to believe that such a computing machine could ever be created. Having signed the Offical Secrets Act, Flowers was unable to tell him that not only was it *possible* to build a computer, but that he had already done it once - and helped the Allies win the war.
Other stories even claim that British intelligence sold "secure" Lorenz-style machines to foreign governments and then used Colossus to secretly decode their messages!
Read more about codebreaking at Bletchley Park
Excellent condition, minimal use
$145.000
Size and weight
Length: 7.7 inches (197 mm)
Width: 7.7 inches (197 mm)
Height: 1.4 inches (36.3 mm)
Weight: 3.5 pounds (1.6 kg)1
Security
Wi-Fi Protected Access™ (WPA/WPA2)2
Wireless security (WEP) configurable for 40-bit and 128-bit encryption
MAC address filtering
NAT firewall
Support for RADIUS authentication
802.1X, PEAP, LEAP, TTLS, TLS, FAST
Time-based access control
Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting. The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.
Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.
I was asked to shoot a couple of photos of Vera. We connected really well and it turned into a two hour photo-shoot in which we had great fun driving around the hackerspace and Buitenplaats Koningsweg compound looking for shooting locations during golden hour.
Recent Document Leak from Justice.Gov unveils Attorney General William Barr and 3 other Ministerial powerhouses requesting to intervene in Facebook's End2End Encryption to install a backdoor prior to launch.
www.flickr.com/photos/65906464@N03/6464971463/
Encrypting your files is the most secure protection available. In legal cases where people are required to use their password to access an encrypted file forgetting their password means no access.
idOnDemand delivers a standards-based, single trusted identity and smart card solution. Using the idOnDemand managed identity service, organizations can simply and cost effectively grant trusted access for employees, customers and partners to information and assets such as IT systems, remote access, data encryption, secure email and buildings.
Authorized users no longer need to carry multiple tokens, ID cards, building access cards or remember multiple passwords.
Affordable, pay-as-you-go
Our simple ‘pay-as-you-go’ model offers one fixed price so you pay only for the users you need, as you need them.
Eliminate the complexity and operating costs associated with managing and deploying an internal smart card identity project. Experience significant savings by avoiding upfront capital and ongoing management costs of replacing, installing, maintaining and managing onsite servers and systems.
the work on my file server never stops, or so it seems. this is now the third incarnation of my encrypted file server. somehow it starts to look like the original one again ;-)
yesterday i bought some extra disks, 2x 750GB (seagate), so now officially, my encrypted file server passes the one terabyte mark. more than a terabyte of on-the-fly raid-i-fied encrypted goodness that is. although after this weekend it'll be less, because i'm gonna use the 2x 320GB for replication with the data center.
LET’S GO TO MONOPOLY SLOTS GENERATOR SITE!
[NEW] MONOPOLY SLOTS HACK ONLINE REAL WORKS 100% GUARANTEED: www.generator.mosthack.com
You can add Coins up to 999,999,999 and Diamonds up to 999 each day: www.generator.mosthack.com
Free and added instantly! This method 100% works for real: www.generator.mosthack.com
Please Share this working hack online method guys: www.generator.mosthack.com
HOW TO USE:
1. Go to >>> www.generator.mosthack.com and choose Monopoly Slots image (you will be redirect to Monopoly Slots Generator site)
2. Enter your Username/ID or Email Address (you don’t need to enter your password)
3. Select Platform and Encryption then click “CONNECT”, Popup Success alert click “OK”
4. Select Resources then click “GENERATE”, after that click “VERIFY”, finish verification process and check your account!
Try Another Free Safe and Secure Hack Online Generator Cheat Real Works 100% Here: www.mosthack.com
#generatorgame #onlinegeneratorgame #mosthack #generatormosthack #monopolyslots #monopoly #monopolydeal #monopolymoney #monopolyatmaccas #monopolyempire #monopolyman #monopolygang #monopolynight #monopolytime #monopolyjunior #monopolyguy #monopolygame #monopolymillionaire #monopolyjr #monopolyvision #monopolycity #monopolyking #monopolyhotels #monopolychamp #monopolym #monopolymonday #monopolypubcrawl #monopoly2015 #monopolyboy #monopolylife
HACK MONOPOLY SLOTS NOW!
Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but
Certainly!
Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.
The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.
In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.
In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.
Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting. The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.
Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.
I was asked to shoot a couple of photos of Vera. We connected really well and it turned into a two hour photo-shoot in which we had great fun driving around the hackerspace and Buitenplaats Koningsweg compound looking for shooting locations during golden hour.
Reporting the news creates unique security risks. Protecting sources and sensitive documents is vital to a free press, but challenging due to Internet surveillance and widespread data collection. This event covered how to securely manage sensitive information by using encryption software.
Folder Protector(www.kakasoft.com) password protect folder, file, document, media, USB flash drive, hard disk with advanced encryption technique. It's portable and free for download. Produced by KakaSoft. Protect a folder
HARD DRIVE
Product Name: WDBTYH0010BCG-NESN My Passport Ultra Anniversary Edition 1 TB – premium storage w/ style
-Sleek, stylish aluminum design
-Automatic, local and cloud backup
-Password protection and 256-bit hardware encryption
-Premium storage with up to 2 TB capacity
-USB 3.0 connectivity
sierracomponent.com/product/wd-wdbtyh0010bcg-nesn-my-pass...
#WDBTYH0010BCG-NESN #WD #HP #catalyst #cisco #3560#24-port#Fiber#Sm#computers #laptop #desktop #50shadesofgray #tracymorgan #chevychase #paulsimon #thebachelor #cindycrawford #philhartman #sale #onsalenow #Foster #SanMarino #Montgomery #Phoenix #Sacramento #Hartford #Denver #Boston #Tokyo #Beijing #Jackson #Lincoln #OklahomaCity #Columbia #Austin #AbuDhabi #Abuja #Beirut #BuenosAires #Caracas #Dhaka #Doha #Dublin #Harare #Havana #Islamabad #Helsinki #Jakarta #Jerusalem #Kabul #Kiev #Kingstown #KuwaitCity #Lima #MexicoCity #NewDelhi #Montevideo #Ottawa #PortMoresby #Pyongyang #Rome #Colombo #Taipei #Vienna #Tunis #Tripoli #SantoDomingo #Saipan #Rome #VaticanCity #Yaren #Victoria #Stanley #Sofia #GovernmentShutdown #GulfofMexico #ABCproject #CoffeeThursday #Pumpkin #HongKong #Hummingbird #ThirstyThursday #NationalFootballLeague
...hopefully I'm now finished for a while concerning my file server. This weekend I put all of it in another case, an Antec Titan 650, I was able to buy one with minor damage and without the PSU (hence, I hardly paid anything ^_^).
Since the motherboard (Asus P5CR-VM) and the OS (OpenBSD) allow serial communication, I thought I'd hook'er up to this HP Secure Webconsole I already have for ages, and that seems to work!
Now with the Antec I can go up to 6 drives (and with some kits to go from 5.25" to 3.5" I could go to 8) so for now, I guess this is a nice enclosure.