View allAll Photos Tagged encryption

All local companies in Karlsruhe that are in the frontline of IT security have shown up united at the Anti-PRISM-Party www.anti-prism-party.de/programm/programm.html, providing educational contents to protect unauthorized access to citizens’ emails, browser searches and social media interaction. The bottomline answer is encryption.

Geheimschreiber

 

Although the ENIGMA remains the best know German cryptographic machine of World War II, in the early 1940's the German military introduced several new cryptographic teletypewriters known under the name Geheimschreiber - sometimes translated as "private secretary", sometimes as "secret writer".

 

These machines offered on-line encryption and decryption, that is plain test could be typed directly into the machine, automatically converted to encrypted text, and sent directly to the transmitter. In addtion to security, these "secret writers" provided the Germans with the ability to encrypt large volumes of test at high speed.

 

Learning that the Germans had named an early version of these machines SWORDFISH, the British and Americans bestowed nicknames associated with fish on the machines and the communications links in which they were used. The two most famous are TUNNY and STURGEON.

 

Just as they developed the Bombe to assist decryption of ENIGMA , the British developed data processing to attack the fish family of machine ciphers. (I must add: This was a whale of a job!) This led to the construction of the COLOSSUS which British historian F. H. Hinsley is "justly claimed as a pioneer programmable electronic digital computer."

The 40 (SZ40) when first encountered in 1940 was nicknamed TUNNY by the British - after a fish better known to Americans as TUNA.

 

The Schlüsselzusatz SZ40, manufactured by the German firm Lorenz, was used by the German Army for high-level communications, generally between Army groups. It provided on-line encryption and decryption and was capable of handling large volumes f traffic at high speed. The TUNNY depended on wheels for encryption and decryption but unlike ENIGMA it did nut substitute letters but insted encrypted elements of the electrically generated Baudot code used in normal telegraphic transmissions.

 

Source: National Cryptologic Museum 13 February 2009 with some hyperlinks added

 

Link to report on TUNNY

 

A modern day COLLOSSUS

i09_0214 086

 

I just got a television with an HDMI hookup, a new Series 3 Tivo, and I already had a Slingbox. This is what I see through my Slingbox now when I try to view it. Why? DRM, Digital Restrictions Management.

 

www.defectivebydesign.org/what_is_drm

Vera Wilde, artist-in-residence at Hack42. Because Art & Science!

 

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting.

The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

Vera's third photo-shoot, in which we get to play with some theatrical props and explore extreme opposites.

 

Special thanks go to Moem for mixing up a batch of red paint and for producing the mad-mad-mad bloody special FX on the baseball-bat.

Star Trek, First Contact (Paramount, 1996).

youtu.be/wxyZQR2d6yw Trailer

 

youtu.be/GTQzusrfCxc?t=3s

Star Trek - 'Beyond First Contact' The Borg - Making The Movie.

 

Starring Patrick Stewart, Jonathan Frakes, Brent Spiner, LeVar Burton, Michael Dorn, Gates McFadden, Marina Sirtis, Alfre Woodard, James Cromwell, Alice Krige, Neal McDonough, Robert Picardo, and Dwight Schultz. Directed by Jonathan Frakes.

 

Captain Jean-Luc Picard awakens from a nightmare about his Borg assimilation experience to an incoming message from Admiral Hayes. Hayes informs Picard that Deep Space Five reported that a colony has been destroyed. Completing the Admiral's sentence, Picard realizes who destroyed the colony — the Borg.

 

Picard calls a meeting and informs his senior officers that their ship has been instructed to patrol the Neutral Zone. Their orders are to protect the area from any possible Romulan uprising during a Borg attack. Despite protests from his officers, Picard remains faithful to his orders and the U.S.S. Enterprise NCC 1701-E begins to patrol the area. Later, Picard regretfully tells Riker that it is his own fault they are stuck in the Neutral Zone. Starfleet believes Picard to be too emotionally involved with the Borg because of his previous assimilation to tactically complete a mission against them.

 

The men return to the bridge to learn that Starfleet has engaged in combat with the Borg. Intercepting messages between the starships, the crew learns that the Federation is losing. Picard, with his Borg experience, knows he can help the fleet. He informs his staff that he will make a decision directly in opposition to Starfleet commands. With no objections from his crew, Captain Picard gives the order and the starship Enterprise sets a course for Earth and the attacking Borg cube.

 

A massive battle ensues and it appears that the Federation will lose the fight. Despite serious structural damage to the Borg cube, their strength does not weaken. Even the U.S.S. Defiant, commanded by Worf, does not appear to be able to turn the tides of the battle. As the starship Defiant is about to ram the Borg ship on a suicide run, the U.S.S. Enterprise beams aboard its crew, including Worf. Picard, having an inside perspective of the Borg and their vessel, focuses the firepower of the fleet on coordinates he knows to be critical. Just as the main ship is destroyed, a spherical escape pod flies out. The sphere creates a temporal vortex, catching the starship Enterprise in its wake. Immune to the paradoxes created by the time travel, the starship's crew learns that Earth at the present time appears to be inhabited entirely by the Borg. The commanding officers realize that the Borg have gone into the past and assimilated Earth, so they follow them back in time to repair the damage the Borg have done.

 

On Earth, over three centuries earlier, a somber Lily Sloane accompanies a stumbling, drunk Zefram Cochrane out of a bar after a night of revelry. Then, Lily notices a fast moving light. She hardly has time to ask what the object is, when the Borg vessel attacks. Back aboard the Enterprise, Picard demands that Data tell him the exact date and location the Borg ship is attacking. The location: central Montana. The date: April 4, 2063 — the day before First Contact. Realizing that the Borg have come to prevent first contact between alien life forms and humans, the crew knows they must stop the Borg and facilitate this exchange. They destroy the Borg sphere, and Dr. Crusher, Captain Picard, Commander Data, Commander Riker, Counselor Troi and other U.S.S. Enterprise crew transport down to Earth to survey the damage.

 

At the Borg attack site in Montana, the crew finds destruction and chaos. They split into groups to search for Cochrane. Data and Picard hunt for Cochrane's warp ship, the Phoenix. There they encounter a very angry and confused Lily, who believes Data and Picard to be members of a coalition that broke the cease-fire after World War III. She shoots at them in a rage, but impervious to bullets, Data approaches Lily. Overcome by fear and radiation, she falls to the ground. Dr. Crusher diagnoses Lily with radiation sickness caused by the damaged Phoenix, and inoculates the entire crew. Against Picard's better judgment, Crusher takes Lily to sickbay. Geordi is called to help repair the warp vessel and Picard becomes intrigued by its historical significance. In this vessel began the future as the world would know it, and the past as Picard remembers it. He reaches out to touch the ship. Data, curious about the human need for tactile reinforcement, attempts to create the same feelings he observes in Picard, but is unsuccessful in duplicating this aspect of humanity.

 

Aboard the ship, two crewmembers are sent to examine unexplained maintenance problems, and both disappear. Picard is called to the ship and discovers that the survivors from the Borg sphere have transported onto the ship and are taking over Deck 16. While Picard arranges teams to fight them, the Borg manipulate the climate of the deck to suit their needs and begin to spread throughout the ship. When the Borg attack sickbay, Crusher, her staff, and Lily escape through a Jeffries tube, thanks to a distraction by the ship's Emergency Medical Hologram. While Crusher leads the group down the passageway, Lily steals away in a different direction.

 

On Earth, Riker finds Troi and Cochrane drunk in a bar. Troi justifies that the only way she could get Cochrane to talk to her was by shooting Tequila with him. Denying her drunken state, Troi offers her professional opinion on Cochrane. She explains, "He's nuts."

 

Picard and his team are tracking the Borg through the starship. As Crusher and her staff find Worf's team, Picard's team encounters the Borg, who have begun to assimilate U.S.S. Enterprise crewmembers. Worf's team engages the Borg in combat, but the enemies adapt to the crew's weapons too quickly to make any difference. The teams are ordered to regroup on Deck 15, but Data is captured. Picard cannot save him, so he quickly crawls into a Jeffries tube to escape. Face to face with Picard, Lily steals his phaser and demands an explanation and escape route. Picard agrees.

 

Geordi shows Cochrane the starship Enterprise through a large telescope on Earth and tries to convince him to launch his vessel the next morning. Geordi glorifies Cochrane by explaining that his ship will make first contact with alien life forms. Humanity will be saved if Cochrane launches his ship. Still drunk, Cochrane agrees.

 

Aboard the ship, the Borg Queen introduces herself to a bound Data, claiming that she is the Collective. Reactivating Data's emotion chip, the Borg begin to graph organic, human skin onto the android's arm. As Data is overcome by this new human sensation of touch, something he never thought possible, the Borg continue their work.

 

Lily and Picard wander through the service deck as the captain attempts to explain what has happened between Lily's time and his own. She begins to calm down until they suddenly run into a Borg-infested area. Quickly escaping in the Holodeck, Picard activates a Dixon Hill program. At a dance, he and Lily try to blend in without being noticed by the Borg. Following the Holodeck's story, Picard searches for Nicky the Nose and takes his machine gun. Killing the Borg with the gun, Picard retrieves the memory chip that contains all of the information the Borg has received. Lily then notices that the two dead Borg were once crewmembers of the U.S.S. Enterprise.

 

Back on Earth, Cochrane keeps hearing what an amazing historical figure he is and begins to question whether or not he wants to go through with the launch. He doubts his own nobility and flees the launch site. Geordi and Riker attempt to catch up with Cochrane in the woods and are forced to stun him with a phaser to return him to the Phoenix.

 

Lily and Picard join the rest of the surviving crew and discover that the Borg are outside of the ship. The retrieved memory chip reveals that they are reconfiguring the main deflector in order to contact the Borg of this century, calling them to Earth to assimilate the planet. Picard, Worf and Lieutenant Hawk put on space suits and venture onto the surface of the starship to stop the Borg.

 

Aware of Data's desire to become human, the Borg Queen offers him the chance to be entirely covered in human flesh and join the Borg, in an attempt to get the encryption codes from Data so she can obtain total control over the U.S.S. Enterprise. Outside the Enterprise, Hawk, Worf and Picard attempt to unlock the deflector dish. Attacked by a Borg, Worf's suit begins to depressurize. Two Borg are killed and Hawk is attacked. As the dish is released, a now-assimilated Hawk attempts to kill Picard. Worf saves the captain, but Hawk is killed. Picard and Worf then destroy the free-floating deflector dish.

 

On Earth, Cochrane explains to Riker that his only motivation for inventing warp travel was money. He never expected to save mankind, become a hero, or be instrumental in the founding of a new civilization. He simply wanted to retire in peace.

 

An argument ensues aboard the Enterprise as the majority of the senior officers believe that they should evacuate the ship, destroying it and the Borg. Picard won't give up, and insists they stay. Challenged by Worf, Picard orders him off the Bridge. Lily follows Picard into his ready room and demands that he explain his obsession with fighting the Borg. Picard declares he won't sacrifice the starship, and swears to finally make the Borg pay for all they've done. Lily quietly and calmly compares Picard to Captain Ahab, forever fighting his white whale — the Borg. Realizing that this fight could only destroy himself and his crew, Picard decides to evacuate the ship. Worf, Picard and Crusher activate the ship's self-destruct sequence. The countdown begins, and the crew leaves in escape pods. Picard surveys his ship and prepares to leave when he hears Data calling him.

 

Meanwhile , the earth-bound crew and Cochrane begin takeoff. Cochrane, Geordi and Riker take off in the Phoenix, and with music blaring, the three men launch successfully into orbit.

 

On the ship, Lily and Picard say good-bye and the captain goes to save Data. Entering Engineering, Picard confronts the Borg Queen, whom he knows from his experience with the Borg. The queen reminds Picard that it was not enough that he was assimilated, but that he needed to give himself freely to the Borg — she wished him to stand by her side as an equal to further the power of the Collective. Picard offers himself in exchange for Data, but the android does not comply. He refuses to leave, and at the queen's command, disarms the self-destruct sequence. He quickly enters the encryption codes, offering full control of the Enterprise to the Borg.

 

As Cochrane's ship nears warp, Data arms the U.S.S Enterprise's weapons and aims them at the defenseless Phoenix. At the Borg Queen's order, Data fires, but the missiles fail to hit the Phoenix. His deception of the Borg complete, Data smashes a conduit, releasing a gas that floods engineering, killing all organic material. As the Borg are destroyed, Picard climbs to safety and the Borg Queen falls into the deadly gas. With the Borg threat gone, Cochrane safely completes humanity's first warp flight.

 

Celebrating the flight back on Earth that night, Cochrane and the Enterprise crew see an alien ship land nearby. The doors open, and Zefram Cochrane makes Earth's first contact with an alien race — the Vulcans. Picard and his crew beam out, having witnessed this historic event, and the U.S.S Enterprise NCC 1701-E returns to the 24th century.

 

Taken at the National Cryptologic Museum, NSA.

 

Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.

Example of a Linux 'shadow file' that contains the encrypted passwords for the users.

Telecomix Crypto Munitions Bureau works for the benefit of cipherspace. Cipherspace is the state of crypto anarchy. This means that your identity is anonymous as long as you stay protected. There are no identities or authorities in cipherspace, and it is not possible to enforce laws where there is no identity, or where there are no authorities.

 

Today there are several threats to the inhabitants of the internet. The politicians of oppressive regimes in the east and in the west, in north and south, are imposing surveillance. Surveillance of the entire networks. What people say to each other, what information is transmitted between bots and humans alike.

 

This aggression must be met with the strongest encryption algorithms available to modern computers. With onion and garlic routing it is possible to erect the fractal cipherspace. With distributed hash tables it is possible to create networks that has no central node. There is no one that controls the fractal cipherspace. Internet as we know it, turns into darknet.

 

Telecomix Crypto Munitions Bureau recommends that you use the following software: i2p, for anonymous and secure communications, Gnu Privacy Guard, for direct and verified communication. The onion router, TOR, to access the internets.

 

Telecomix Munitions is a defense bureau.

 

You can change the future of the internets by joining us in defending the networks and creating cipherspace.

 

You can help defending yourself and your friends, yes, all inhabitants of the networks.

 

By learning a few skills you can take control over technology.

 

Telecomix munitions are currently developing and promoting advanced security devices, which can endure even the harshest forms of government or corporation surveillance.

 

Your personal computer is an encryption device. Modern hardware can transform plain text to ciphertext with ease. So rapidly you barely notice the difference between unencrypted and encrypted data.

 

The laws of mathematics are infinitely stronger than the laws of nations and corporations, as the human laws are really only ink on paper. The laws of mathematics, on the other hand, are the laws that define our very universe. With the use of modern crypto algorithms we can use this fact to defend free speech and the integrity of both bots and humans. Information is nothing but numbers, numbers governed not by human laws, but by the laws of mathematics.

 

Networks that utilize the power of cryptography already exist. It will not be possible to stop the spread of the fractal cipherspace.

 

To find out more, come to telecomix.org or visit us in cipherspace on telecomix.i2p.

Feel free to visit my works on Deviant Art: xp0s3.deviantart.com/

Telecomix Crypto Munitions Bureau works for the benefit of cipherspace. Cipherspace is the state of crypto anarchy. This means that your identity is anonymous as long as you stay protected. There are no identities or authorities in cipherspace, and it is not possible to enforce laws where there is no identity, or where there are no authorities.

 

Today there are several threats to the inhabitants of the internet. The politicians of oppressive regimes in the east and in the west, in north and south, are imposing surveillance. Surveillance of the entire networks. What people say to each other, what information is transmitted between bots and humans alike.

 

This aggression must be met with the strongest encryption algorithms available to modern computers. With onion and garlic routing it is possible to erect the fractal cipherspace. With distributed hash tables it is possible to create networks that has no central node. There is no one that controls the fractal cipherspace. Internet as we know it, turns into darknet.

 

Telecomix Crypto Munitions Bureau recommends that you use the following software: i2p, for anonymous and secure communications, Gnu Privacy Guard, for direct and verified communication. The onion router, TOR, to access the internets.

 

Telecomix Munitions is a defense bureau.

 

You can change the future of the internets by joining us in defending the networks and creating cipherspace.

 

You can help defending yourself and your friends, yes, all inhabitants of the networks.

 

By learning a few skills you can take control over technology.

 

Telecomix munitions are currently developing and promoting advanced security devices, which can endure even the harshest forms of government or corporation surveillance.

 

Your personal computer is an encryption device. Modern hardware can transform plain text to ciphertext with ease. So rapidly you barely notice the difference between unencrypted and encrypted data.

 

The laws of mathematics are infinitely stronger than the laws of nations and corporations, as the human laws are really only ink on paper. The laws of mathematics, on the other hand, are the laws that define our very universe. With the use of modern crypto algorithms we can use this fact to defend free speech and the integrity of both bots and humans. Information is nothing but numbers, numbers governed not by human laws, but by the laws of mathematics.

 

Networks that utilize the power of cryptography already exist. It will not be possible to stop the spread of the fractal cipherspace.

 

To find out more, come to telecomix.org or visit us in cipherspace on telecomix.i2p.

Feel free to visit my works on Deviant Art: xp0s3.deviantart.com/

Cards and padlock

 

online banking, credit card transactions, trading, protection, fraud, identity theft, etc.

Vera Wilde, artist-in-residence at Hack42. Because Art & Science!

 

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting.

The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

Vera's third photo-shoot, in which we get to play with some theatrical props and explore extreme opposites.

Star Trek, First Contact (Paramount, 1996).

youtu.be/wxyZQR2d6yw Trailer

 

youtu.be/GTQzusrfCxc?t=3s

Star Trek - 'Beyond First Contact' The Borg - Making The Movie.

 

Starring Patrick Stewart, Jonathan Frakes, Brent Spiner, LeVar Burton, Michael Dorn, Gates McFadden, Marina Sirtis, Alfre Woodard, James Cromwell, Alice Krige, Neal McDonough, Robert Picardo, and Dwight Schultz. Directed by Jonathan Frakes.

 

Captain Jean-Luc Picard awakens from a nightmare about his Borg assimilation experience to an incoming message from Admiral Hayes. Hayes informs Picard that Deep Space Five reported that a colony has been destroyed. Completing the Admiral's sentence, Picard realizes who destroyed the colony — the Borg.

 

Picard calls a meeting and informs his senior officers that their ship has been instructed to patrol the Neutral Zone. Their orders are to protect the area from any possible Romulan uprising during a Borg attack. Despite protests from his officers, Picard remains faithful to his orders and the U.S.S. Enterprise NCC 1701-E begins to patrol the area. Later, Picard regretfully tells Riker that it is his own fault they are stuck in the Neutral Zone. Starfleet believes Picard to be too emotionally involved with the Borg because of his previous assimilation to tactically complete a mission against them.

 

The men return to the bridge to learn that Starfleet has engaged in combat with the Borg. Intercepting messages between the starships, the crew learns that the Federation is losing. Picard, with his Borg experience, knows he can help the fleet. He informs his staff that he will make a decision directly in opposition to Starfleet commands. With no objections from his crew, Captain Picard gives the order and the starship Enterprise sets a course for Earth and the attacking Borg cube.

 

A massive battle ensues and it appears that the Federation will lose the fight. Despite serious structural damage to the Borg cube, their strength does not weaken. Even the U.S.S. Defiant, commanded by Worf, does not appear to be able to turn the tides of the battle. As the starship Defiant is about to ram the Borg ship on a suicide run, the U.S.S. Enterprise beams aboard its crew, including Worf. Picard, having an inside perspective of the Borg and their vessel, focuses the firepower of the fleet on coordinates he knows to be critical. Just as the main ship is destroyed, a spherical escape pod flies out. The sphere creates a temporal vortex, catching the starship Enterprise in its wake. Immune to the paradoxes created by the time travel, the starship's crew learns that Earth at the present time appears to be inhabited entirely by the Borg. The commanding officers realize that the Borg have gone into the past and assimilated Earth, so they follow them back in time to repair the damage the Borg have done.

 

On Earth, over three centuries earlier, a somber Lily Sloane accompanies a stumbling, drunk Zefram Cochrane out of a bar after a night of revelry. Then, Lily notices a fast moving light. She hardly has time to ask what the object is, when the Borg vessel attacks. Back aboard the Enterprise, Picard demands that Data tell him the exact date and location the Borg ship is attacking. The location: central Montana. The date: April 4, 2063 — the day before First Contact. Realizing that the Borg have come to prevent first contact between alien life forms and humans, the crew knows they must stop the Borg and facilitate this exchange. They destroy the Borg sphere, and Dr. Crusher, Captain Picard, Commander Data, Commander Riker, Counselor Troi and other U.S.S. Enterprise crew transport down to Earth to survey the damage.

 

At the Borg attack site in Montana, the crew finds destruction and chaos. They split into groups to search for Cochrane. Data and Picard hunt for Cochrane's warp ship, the Phoenix. There they encounter a very angry and confused Lily, who believes Data and Picard to be members of a coalition that broke the cease-fire after World War III. She shoots at them in a rage, but impervious to bullets, Data approaches Lily. Overcome by fear and radiation, she falls to the ground. Dr. Crusher diagnoses Lily with radiation sickness caused by the damaged Phoenix, and inoculates the entire crew. Against Picard's better judgment, Crusher takes Lily to sickbay. Geordi is called to help repair the warp vessel and Picard becomes intrigued by its historical significance. In this vessel began the future as the world would know it, and the past as Picard remembers it. He reaches out to touch the ship. Data, curious about the human need for tactile reinforcement, attempts to create the same feelings he observes in Picard, but is unsuccessful in duplicating this aspect of humanity.

 

Aboard the ship, two crewmembers are sent to examine unexplained maintenance problems, and both disappear. Picard is called to the ship and discovers that the survivors from the Borg sphere have transported onto the ship and are taking over Deck 16. While Picard arranges teams to fight them, the Borg manipulate the climate of the deck to suit their needs and begin to spread throughout the ship. When the Borg attack sickbay, Crusher, her staff, and Lily escape through a Jeffries tube, thanks to a distraction by the ship's Emergency Medical Hologram. While Crusher leads the group down the passageway, Lily steals away in a different direction.

 

On Earth, Riker finds Troi and Cochrane drunk in a bar. Troi justifies that the only way she could get Cochrane to talk to her was by shooting Tequila with him. Denying her drunken state, Troi offers her professional opinion on Cochrane. She explains, "He's nuts."

 

Picard and his team are tracking the Borg through the starship. As Crusher and her staff find Worf's team, Picard's team encounters the Borg, who have begun to assimilate U.S.S. Enterprise crewmembers. Worf's team engages the Borg in combat, but the enemies adapt to the crew's weapons too quickly to make any difference. The teams are ordered to regroup on Deck 15, but Data is captured. Picard cannot save him, so he quickly crawls into a Jeffries tube to escape. Face to face with Picard, Lily steals his phaser and demands an explanation and escape route. Picard agrees.

 

Geordi shows Cochrane the starship Enterprise through a large telescope on Earth and tries to convince him to launch his vessel the next morning. Geordi glorifies Cochrane by explaining that his ship will make first contact with alien life forms. Humanity will be saved if Cochrane launches his ship. Still drunk, Cochrane agrees.

 

Aboard the ship, the Borg Queen introduces herself to a bound Data, claiming that she is the Collective. Reactivating Data's emotion chip, the Borg begin to graph organic, human skin onto the android's arm. As Data is overcome by this new human sensation of touch, something he never thought possible, the Borg continue their work.

 

Lily and Picard wander through the service deck as the captain attempts to explain what has happened between Lily's time and his own. She begins to calm down until they suddenly run into a Borg-infested area. Quickly escaping in the Holodeck, Picard activates a Dixon Hill program. At a dance, he and Lily try to blend in without being noticed by the Borg. Following the Holodeck's story, Picard searches for Nicky the Nose and takes his machine gun. Killing the Borg with the gun, Picard retrieves the memory chip that contains all of the information the Borg has received. Lily then notices that the two dead Borg were once crewmembers of the U.S.S. Enterprise.

 

Back on Earth, Cochrane keeps hearing what an amazing historical figure he is and begins to question whether or not he wants to go through with the launch. He doubts his own nobility and flees the launch site. Geordi and Riker attempt to catch up with Cochrane in the woods and are forced to stun him with a phaser to return him to the Phoenix.

 

Lily and Picard join the rest of the surviving crew and discover that the Borg are outside of the ship. The retrieved memory chip reveals that they are reconfiguring the main deflector in order to contact the Borg of this century, calling them to Earth to assimilate the planet. Picard, Worf and Lieutenant Hawk put on space suits and venture onto the surface of the starship to stop the Borg.

 

Aware of Data's desire to become human, the Borg Queen offers him the chance to be entirely covered in human flesh and join the Borg, in an attempt to get the encryption codes from Data so she can obtain total control over the U.S.S. Enterprise. Outside the Enterprise, Hawk, Worf and Picard attempt to unlock the deflector dish. Attacked by a Borg, Worf's suit begins to depressurize. Two Borg are killed and Hawk is attacked. As the dish is released, a now-assimilated Hawk attempts to kill Picard. Worf saves the captain, but Hawk is killed. Picard and Worf then destroy the free-floating deflector dish.

 

On Earth, Cochrane explains to Riker that his only motivation for inventing warp travel was money. He never expected to save mankind, become a hero, or be instrumental in the founding of a new civilization. He simply wanted to retire in peace.

 

An argument ensues aboard the Enterprise as the majority of the senior officers believe that they should evacuate the ship, destroying it and the Borg. Picard won't give up, and insists they stay. Challenged by Worf, Picard orders him off the Bridge. Lily follows Picard into his ready room and demands that he explain his obsession with fighting the Borg. Picard declares he won't sacrifice the starship, and swears to finally make the Borg pay for all they've done. Lily quietly and calmly compares Picard to Captain Ahab, forever fighting his white whale — the Borg. Realizing that this fight could only destroy himself and his crew, Picard decides to evacuate the ship. Worf, Picard and Crusher activate the ship's self-destruct sequence. The countdown begins, and the crew leaves in escape pods. Picard surveys his ship and prepares to leave when he hears Data calling him.

 

Meanwhile , the earth-bound crew and Cochrane begin takeoff. Cochrane, Geordi and Riker take off in the Phoenix, and with music blaring, the three men launch successfully into orbit.

 

On the ship, Lily and Picard say good-bye and the captain goes to save Data. Entering Engineering, Picard confronts the Borg Queen, whom he knows from his experience with the Borg. The queen reminds Picard that it was not enough that he was assimilated, but that he needed to give himself freely to the Borg — she wished him to stand by her side as an equal to further the power of the Collective. Picard offers himself in exchange for Data, but the android does not comply. He refuses to leave, and at the queen's command, disarms the self-destruct sequence. He quickly enters the encryption codes, offering full control of the Enterprise to the Borg.

 

As Cochrane's ship nears warp, Data arms the U.S.S Enterprise's weapons and aims them at the defenseless Phoenix. At the Borg Queen's order, Data fires, but the missiles fail to hit the Phoenix. His deception of the Borg complete, Data smashes a conduit, releasing a gas that floods engineering, killing all organic material. As the Borg are destroyed, Picard climbs to safety and the Borg Queen falls into the deadly gas. With the Borg threat gone, Cochrane safely completes humanity's first warp flight.

 

Celebrating the flight back on Earth that night, Cochrane and the Enterprise crew see an alien ship land nearby. The doors open, and Zefram Cochrane makes Earth's first contact with an alien race — the Vulcans. Picard and his crew beam out, having witnessed this historic event, and the U.S.S Enterprise NCC 1701-E returns to the 24th century.

 

To safeguard the security of photos, videos, group chats and voice calls as well as the text messages sent by its billion users around the globe, a powerful form of encryption is now being used by Whatsapp.

Authorities in Brazil lately arrested and then released a Facebook Inc. executive after...

 

tamilgoose.com/whatsapp-turns-more-secure-extending-encry...

Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but

 

Certainly!

 

Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.

 

The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.

 

In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.

 

In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.

Geheimschreiber

 

Although the ENIGMA remains the best know German cryptographic machine of World War II, in the early 1940's the German military introduced several new cryptographic teletypewriters known under the name Geheimschreiber - sometimes translated as "private secretary", sometimes as "secret writer".

 

These machines offered on-line encryption and decryption, that is plain test could be typed directly into the machine, automatically converted to encrypted text, and sent directly to the transmitter. In addtion to security, these "secret writers" provided the Germans with the ability to encrypt large volumes of test at high speed.

 

Learning that the Germans had named an early version of these machines SWORDFISH, the British and Americans bestowed nicknames associated with fish on the machines and the communications links in which they were used. The two most famous are TUNNY and STURGEON.

 

Just as they developed the Bombe to assist decryption of ENIGMA , the British developed data processing to attack the fish family of machine ciphers. (I must add: This was a whale of a job!) This led to the construction of the COLOSSUS which British historian F. H. Hinsley is "justly claimed as a pioneer programmable electronic digital computer."

The 40 (SZ40) when first encountered in 1940 was nicknamed TUNNY by the British - after a fish better known to Americans as TUNA.

 

The Schlüsselzusatz SZ40, manufactured by the German firm Lorenz, was used by the German Army for high-level communications, generally between Army groups. It provided on-line encryption and decryption and was capable of handling large volumes f traffic at high speed. The TUNNY depended on wheels for encryption and decryption but unlike ENIGMA it did nut substitute letters but insted encrypted elements of the electrically generated Baudot code used in normal telegraphic transmissions.

  

Source: National Cryptologic Museum 13 February 2009 with some hyperlinks added

 

Link to report on TUNNY

 

A modern day COLLOSSUS

 

i09_0214 087

Telecomix Crypto Munitions Bureau works for the benefit of cipherspace. Cipherspace is the state of crypto anarchy. This means that your identity is anonymous as long as you stay protected. There are no identities or authorities in cipherspace, and it is not possible to enforce laws where there is no identity, or where there are no authorities.

 

Today there are several threats to the inhabitants of the internet. The politicians of oppressive regimes in the east and in the west, in north and south, are imposing surveillance. Surveillance of the entire networks. What people say to each other, what information is transmitted between bots and humans alike.

 

This aggression must be met with the strongest encryption algorithms available to modern computers. With onion and garlic routing it is possible to erect the fractal cipherspace. With distributed hash tables it is possible to create networks that has no central node. There is no one that controls the fractal cipherspace. Internet as we know it, turns into darknet.

 

Telecomix Crypto Munitions Bureau recommends that you use the following software: i2p, for anonymous and secure communications, Gnu Privacy Guard, for direct and verified communication. The onion router, TOR, to access the internets.

 

Telecomix Munitions is a defense bureau.

 

You can change the future of the internets by joining us in defending the networks and creating cipherspace.

 

You can help defending yourself and your friends, yes, all inhabitants of the networks.

 

By learning a few skills you can take control over technology.

 

Telecomix munitions are currently developing and promoting advanced security devices, which can endure even the harshest forms of government or corporation surveillance.

 

Your personal computer is an encryption device. Modern hardware can transform plain text to ciphertext with ease. So rapidly you barely notice the difference between unencrypted and encrypted data.

 

The laws of mathematics are infinitely stronger than the laws of nations and corporations, as the human laws are really only ink on paper. The laws of mathematics, on the other hand, are the laws that define our very universe. With the use of modern crypto algorithms we can use this fact to defend free speech and the integrity of both bots and humans. Information is nothing but numbers, numbers governed not by human laws, but by the laws of mathematics.

 

Networks that utilize the power of cryptography already exist. It will not be possible to stop the spread of the fractal cipherspace.

 

To find out more, come to telecomix.org or visit us in cipherspace on telecomix.i2p.

Feel free to visit my works on Deviant Art: xp0s3.deviantart.com/

no kids are supposed to know the secret code to enter our school

How to encrypt files and directories with eCryptFS on Linux

 

If you would like to use this photo, be sure to place a proper attribution linking to xmodulo.com

from 'Islands and Other Experiments'

  

ARM 32-bit Cortex M3 CPU: STM32, F103TBU6, 9HA12 9U, MYS 434

Technical specifications of the sexy thin E71

  

Size Form: Monoblock with full keyboard

Dimensions: 114 x 57 x 10 mm

Weight: 127 g

Volume: 66 cc

Full keyboard

High quality QVGA display

Display and 3D Size: 2.36"

Resolution: 320 x 240 pixels (QVGA)

Up to 16 million colors

TFT active matrix (QVGA)

Two customisable home screen modes

Security features Device lock

Remote lock

Data encryption for both phone memory an microSD content

mobile VPN

Keys and input method Full keyboard

Dedicated one-touch keys: Home, calendar, contacts, and email

Speaker dependent and speaker independent voice dialling

Intelligent input with auto-completion, auto-correction and learning capability

Accelerated scrolling with NaviTMKey

Notification light in NaviTMKey

Colors and covers Available in-box colours:

- Grey steel

- White steel

Connectors Micro-USB connector, full-speed

2.5 mm Nokia AV connector

Power BP-4L 1500 mAh Li-Po standard battery

Talk time:

- GSM up to 10 h 30 min

- WCDMA up to 4 h 30 min

Standby time:

- GSM up to 17 days

- WCDMA up to 20 days

- WLAN idle up to 166 hours

Music playback time (maximum): 18 h

Memory microSD memory card slot, hot swappable, max. 8 GB

110 MB internal dynamic memory

Communication and navigation

Communication and navigation

Operating frequency E71-1 Quad-band EGSM 850/900/1800/1900, WCDMA 900/2100 HSDPA

E71-2 Quad-band EGSM 850/900/1800/1900, WCDMA 850/1900 HSDPA

E71-3 Quad-band EGSM 850/900/1800/1900, WCDMA 850/2100 HSDPA

Offline mode

Data network CSD

HSCSD

GPRS class A, multislot class 32, maximum speed 100/60 kbps (DL/UL)

EDGE class A, multislot class 32, maximum speed 296/177.6 kbps (DL/UL)

WCDMA 900/2100 or 850/1900 or 850/2100, maximum speed 384/384 kbps (DL/UL)

HSDPA class 6, maximum speed 3.6 Mbps/384 kbps (DL/UL)

WLAN IEEE 802.11b/g

WLAN Security: WEP, 802.1X, WPA, WPA2

TCP/IP support

Nokia PC Internet Access (capability to serve as a data modem)

IETF SIP and 3GPP

Local connectivity and synchronization Infrared, maximum speed 115 kbps

Bluetooth version 2.0 with Enhanced Data Rate

- Bluetooth profiles: DUN, OPP, FTP, HFP, GOEP, HSP, BIP, RSAP, GAVDP, AVRCP, A2DP

MTP (Multimedia Transfer Protocol) support

Bluetooth (Bluetooth Serial Port Profile. BT SPP)

Infrared

File

Network (Raw). Direct TCP/IP socket connection to any specified port (a.k.a HP JetDirectTM).

Network (LPR). Line Printer Daemon protocol (RFC1179).

Support for local and remote SyncML synchronization, iSync, Intellisync, ActiveSync

Call features Integrated handsfree speakerphone

Automatic answer with headset or car kit

Any key answer

Call waiting, call hold, call divert

Call timer

Logging of dialed, received and missed calls

Automatic redial and fallback

Speed dialing

Speaker dependent and speaker independent voice dialing (SDND, SIND)

Fixed dialing number support

Vibrating alert (internal)

Side volume keys

Mute key

Contacts with images

Conference calling

Push to talk

VoIP

Messaging SMS

Multiple SMS deletion

Text-to-speech message reader

MMS

Distribution lists for messaging

Instant messaging with Presence-enhanced contacts

Cell broadcast

E-mail Supported protocols: IMAP, POP, SMTP

Support for e-mail attachments

IMAP IDLE support

Support for Nokia Intellisync Wireless Email

Integrated Nokia Mobile VPN

Easy Email set-up

Web browsing Supported markup languages: HTML, XHTML, MP, WML, CSS

Supported protocols: HTTP, WAP 2.0

TCP/IP support

Nokia browser

- JavaScript version 1.3 and 1.5

- Mini Map

Nokia Mobile Search

Nokia PC Internet Access (capability to serve as a data modem)

GPS and navigation Integrated A-GPS

Nokia Maps application

Image and sound

Image and sound

Photography 3.2 megapixel camera (2048 x 1536 pixels)

Image formats: JPEG/EXIF

CMOS sensor

digital zoom

Autofocus

Focal length: 3.8 mm

Focus range: 10 cm to infinity

Macro focus: 10-60 cm

LED flash

Flash modes: Automatic, On, Red-eye reduction, Off

Flash operating range: 1 m

White balance modes: automatic, sunny, incandescent, fluorescent

Centre weighted auto exposure; exposure compensation: +2 ~ -2EV at 0.7 step

Capture modes: still, sequence, self-timer, video

Scene modes: auto, user defined, close-up, portrait, landscape, night, night portrait

Colour tone modes: normal, sepia, black & white, negative

Full-screen viewfinder with grid

Active toolbar

Share photos with Share on Ovi

Video Main camera

320 x 240 (QVGA) up to 15 fps

176 x 144 at 15 fps (QCIF)

digital video zoom

Front camera

- Video recording at up to 128 x 96 pixels (QCIF) and up to 15 fps

- Up to 2x digital video zoom

Video recording file formats: .mp4, .3gp; codecs: H.263, MPEG-4 VSP

Audio recording formats: AMR,AAC

Video white balance modes: automatic, sunny, incandescent, fluorescent

Scene modes: automatic, night

Colour tone modes: normal, sepia, black & white, negative

Clip length (maximum): 1 h

RealPlayer

Video playback file formats: .Flash Lite 3, mp4, .3gp; codecs: H.263, MPEG-4 VSP,RealVideo,H.264

Video streaming: .3gp, mp4, .rm

Customisable video ring tones

Music and audio playback Music player

Media player

Music playback file formats: .mp3, .wma, .aac, AAC+, eAAC+

Audio streaming formats: .rm, .eAAC+

FM radio 87.5-108 MHz

Visual Radio support. Read more: www.visualradio.com

2.5 mm Nokia AV connector

Nokia Music Manager

Nokia Music Store support

Nokia Podcasting support

Customizable ring tones

Synchronize music with Windows Media Player

NaviTM wheel support

Voice Aid

Voice and audio recording Voice commands

Speaker dependent and speaker independent voice dialling (SDND, SIND)

Voice recorder

Audio recording formats: AMR-WB, AMR-NB

Speech codecs: FR, EFR, HRO/1, AMR-HR, and AMR-FR

Text-to-speech

Personalization: profiles, themes, ring tones Customizable profiles

Customizable ring tones

Customisable video ring tones

Support for talking ring tones

Customizable themes

Customizable home screen content in Business and Personal modes

Software

Software

Software platform and user interface S60 3.1 Edition, Eseries

Symbian Os 9.2

Two home screens with customizable active standby views

Voice commands

FOTA (Firmware update Over The Air)

Personal information management (PIM): contacts, clock, calendar etc. Advanced contacts database: multiple number and e-mail details per contact, contacts with images

Support for assigning images to contacts

Support for contact groups

Closed user group support

Fixed Dialling Number support

Clock: analogue and digital

Alarm clock with ring tones

Reminders

Calculator with advanced functions

Calendar with week and month view

Converter

Active Notes

To-do list

PIM information viewable during call

Applications JavaTM MIDP 2.0

Flash Lite 3.0

Chat and instant messaging

Nokia browser

- JavaScript version 1.3 and 1.5

- Mini Map

Dictionary

Quickoffice (Quickword, Quickpoint, Quicksheet)

PDF Viewer

ZIP Manager

Download!

File Manager

Nokia Search

Nokia Maps

Adding more applications:

- Use the Download! client

- Over-the-air (OTA) downloads

Accessories

Accessories

Sales package contents Nokia E71

Nokia Battery (BP-4L)

Nokia Charger (AC-5)

Nokia Connectivity Cable (CA-101)

Nokia Headset (HS-47)

Nokia Eseries Lanyard

Nokia Eseries Pouch

User Guide, Quick Start Guide and other documentation

2GM microSD depending on market/channel

Recommended accessories Nokia Bluetooth Headset BH-602

Nokia Mobile Holder CR-106

Nokia 8 GB microSDHC Card MU-43

Compatible accessories Complete accessories for your Nokia E71

Support and related documents

Support and related documents

Related documents SAR certification information

Eco Declaration (.pdf, 52 KB)

Declaration of Conformity

Product legal notice

Product legal notice

Copyright © 2008 Nokia. All rights reserved.

 

europe.nokia.com/A41146122

  

Forget the NSA.

Forget the FBI.

Forget the Federal Government.

You ARE being watched by EVERY online business... including Yahoo!, parent firm of Flickr... and MORE!

What you're seeing here is a partial list of trackers that have been stopped by some of the add-ons listed here below.

In the United States, by comparison, there are fewer online/data privacy laws that in European Union member nations, Australia or Canada.

• Read both sides of a brief Yes/No opinion on the matter here:

online.wsj.com/news/articles/SB10001424127887324338604578...

• Read a current (2013) news item about the matter here:

www.nbcnews.com/id/15221111/ns/technology_and_science-pri...

• And for the wonkier among us, here is Stanford University Law School's Center for Internet and Society

cyberlaw.stanford.edu/

Unbeknownst to most computer users, there are literally hundreds, thousands or more scripts, codes, hidden pixels, cookies and more which are all designed with one purpose in mind... TO TRACK YOU ONLINE.

Some malicious hackers take advantage of the abundance of such computer code to attempt to trick your computer into "giving away" valuable information, such as your identity, passwords to sensitive accounts (not just email, but online banking, prescription services, etc.), and more.

While in years past the Congress was motivated to address various aspects of such legitimate concern, and enacted the Children's Online Privacy Protection Act (COPPA), there is little reason to now imagine that this present Congress will do anything about anything... except sit on their big, fat cat asses and collect their taxpayer paid salaries, and enjoy some mighty fine health insurance and retirement benefits.

There really is no "watchdog" to protect consumers' interests, and the FCC is steam-rolling towards a system wherein only the BIG DOG companies can pay to play in the high-speed lane, and thereby, slow everyone else down. If you like the Internet AS IT IS NOW (not your provider, but the idea that EVERY SITE gets treated equally, i.e., PLAYS BY THE SAME RULES) then it is incumbent upon you to ACT NOW to share your comment with the FCC.

You may do that here, and select Proceeding Number entitled:

"14-28 Protecting and Promoting the Open Internet":

www.fcc.gov/comments

Meanwhile... when Congress gets in the mood to cooperate for the benefit of the people that elected them, and NOT the MAJOR CORPORATIONS, we can expect more of the same type of nonsensical foot-dragging which has hampered American economic recovery.

There ARE a few things you can do, however, to assist keeping your private information private, and to lower, and practically eliminate much of the tracking efforts and scripts that run amok in your computer.

Here's a partial list of FREEWARE, browser add-ons, and other tools which can significantly reduce the time it takes for various pages to load, as well as provide some level of control for you over the things that ask to flow through your computer.

Privacy Badger, anti-tracking browser add-on, by Electronic Frontier Foundation

www.eff.org/privacybadger

HTTPS Everywhere, secure connection browser add-on, by Electronic Frontier Foundation

www.eff.org/https-everywhere-node

Ghostery, anti-tracking, privacy browser add-on by Ghostery

ghostery.com

Disconnect, blocking, counter-tracking browser add-on, by Disconnect

Disconnect.me

NoScript Security Suite, script blocker/identifier, Firefox browser add-on, by Giogio Maone

addons.mozilla.org/en-US/firefox/addon/noscript/

MaskMe, hides your email address in online forms & provides "disposable" hidden email addresses, by Abine

www.abine.com/maskme/

DoNotTrackMe, browser add-on/mobile app, by Abine

abine.com/donottrackme.html

Flashblock, blocks Adobe's Flash player-mediated functions until you specifically request it, Firefox browser add-on, by Philip Chee

addons.mozilla.org/en-US/firefox/addon/flashblock/

And the Granddaddy of them all...

GPG Tools & Suite, public key encryption software for the Apple OS (Macintosh), by GPGTools

gpgtools.org/

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting. The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

I was asked to shoot a couple of photos of Vera. We connected really well and it turned into a two hour photo-shoot in which we had great fun driving around the hackerspace and Buitenplaats Koningsweg compound looking for shooting locations during golden hour.

Geheimschreiber

 

Although the ENIGMA remains the best know German cryptographic machine of World War II, in the early 1940's the German military introduced several new cryptographic teletypewriters known under the name Geheimschreiber - sometimes translated as "private secretary", sometimes as "secret writer".

 

These machines offered on-line encryption and decryption, that is plain test could be typed directly into the machine, automatically converted to encrypted text, and sent directly to the transmitter. In addtion to security, these "secret writers" provided the Germans with the ability to encrypt large volumes of test at high speed.

 

Learning that the Germans had named an early version of these machines SWORDFISH, the British and Americans bestowed nicknames associated with fish on the machines and the communications links in which they were used. The two most famous are TUNNY and STURGEON.

 

Just as they developed the Bombe to assist decryption of ENIGMA , the British developed data processing to attack the fish family of machine ciphers. (I must add: This was a whale of a job!) This led to the construction of the COLOSSUS which British historian F. H. Hinsley is "justly claimed as a pioneer programmable electronic digital computer."

The 40 (SZ40) when first encountered in 1940 was nicknamed TUNNY by the British - after a fish better known to Americans as TUNA.

 

The Schlüsselzusatz SZ40, manufactured by the German firm Lorenz, was used by the German Army for high-level communications, generally between Army groups. It provided on-line encryption and decryption and was capable of handling large volumes f traffic at high speed. The TUNNY depended on wheels for encryption and decryption but unlike ENIGMA it did nut substitute letters but insted encrypted elements of the electrically generated Baudot code used in normal telegraphic transmissions.

 

Source: National Cryptologic Museum 13 February 2009 with some hyperlinks added

 

Link to report on TUNNY

 

A modern day COLLOSSUS

 

i09_0214 088

Technical specifications of the sexy thin E71

  

Size Form: Monoblock with full keyboard

Dimensions: 114 x 57 x 10 mm

Weight: 127 g

Volume: 66 cc

Full keyboard

High quality QVGA display

Display and 3D Size: 2.36"

Resolution: 320 x 240 pixels (QVGA)

Up to 16 million colors

TFT active matrix (QVGA)

Two customisable home screen modes

Security features Device lock

Remote lock

Data encryption for both phone memory an microSD content

mobile VPN

Keys and input method Full keyboard

Dedicated one-touch keys: Home, calendar, contacts, and email

Speaker dependent and speaker independent voice dialling

Intelligent input with auto-completion, auto-correction and learning capability

Accelerated scrolling with NaviTMKey

Notification light in NaviTMKey

Colors and covers Available in-box colours:

- Grey steel

- White steel

Connectors Micro-USB connector, full-speed

2.5 mm Nokia AV connector

Power BP-4L 1500 mAh Li-Po standard battery

Talk time:

- GSM up to 10 h 30 min

- WCDMA up to 4 h 30 min

Standby time:

- GSM up to 17 days

- WCDMA up to 20 days

- WLAN idle up to 166 hours

Music playback time (maximum): 18 h

Memory microSD memory card slot, hot swappable, max. 8 GB

110 MB internal dynamic memory

Communication and navigation

Communication and navigation

Operating frequency E71-1 Quad-band EGSM 850/900/1800/1900, WCDMA 900/2100 HSDPA

E71-2 Quad-band EGSM 850/900/1800/1900, WCDMA 850/1900 HSDPA

E71-3 Quad-band EGSM 850/900/1800/1900, WCDMA 850/2100 HSDPA

Offline mode

Data network CSD

HSCSD

GPRS class A, multislot class 32, maximum speed 100/60 kbps (DL/UL)

EDGE class A, multislot class 32, maximum speed 296/177.6 kbps (DL/UL)

WCDMA 900/2100 or 850/1900 or 850/2100, maximum speed 384/384 kbps (DL/UL)

HSDPA class 6, maximum speed 3.6 Mbps/384 kbps (DL/UL)

WLAN IEEE 802.11b/g

WLAN Security: WEP, 802.1X, WPA, WPA2

TCP/IP support

Nokia PC Internet Access (capability to serve as a data modem)

IETF SIP and 3GPP

Local connectivity and synchronization Infrared, maximum speed 115 kbps

Bluetooth version 2.0 with Enhanced Data Rate

- Bluetooth profiles: DUN, OPP, FTP, HFP, GOEP, HSP, BIP, RSAP, GAVDP, AVRCP, A2DP

MTP (Multimedia Transfer Protocol) support

Bluetooth (Bluetooth Serial Port Profile. BT SPP)

Infrared

File

Network (Raw). Direct TCP/IP socket connection to any specified port (a.k.a HP JetDirectTM).

Network (LPR). Line Printer Daemon protocol (RFC1179).

Support for local and remote SyncML synchronization, iSync, Intellisync, ActiveSync

Call features Integrated handsfree speakerphone

Automatic answer with headset or car kit

Any key answer

Call waiting, call hold, call divert

Call timer

Logging of dialed, received and missed calls

Automatic redial and fallback

Speed dialing

Speaker dependent and speaker independent voice dialing (SDND, SIND)

Fixed dialing number support

Vibrating alert (internal)

Side volume keys

Mute key

Contacts with images

Conference calling

Push to talk

VoIP

Messaging SMS

Multiple SMS deletion

Text-to-speech message reader

MMS

Distribution lists for messaging

Instant messaging with Presence-enhanced contacts

Cell broadcast

E-mail Supported protocols: IMAP, POP, SMTP

Support for e-mail attachments

IMAP IDLE support

Support for Nokia Intellisync Wireless Email

Integrated Nokia Mobile VPN

Easy Email set-up

Web browsing Supported markup languages: HTML, XHTML, MP, WML, CSS

Supported protocols: HTTP, WAP 2.0

TCP/IP support

Nokia browser

- JavaScript version 1.3 and 1.5

- Mini Map

Nokia Mobile Search

Nokia PC Internet Access (capability to serve as a data modem)

GPS and navigation Integrated A-GPS

Nokia Maps application

Image and sound

Image and sound

Photography 3.2 megapixel camera (2048 x 1536 pixels)

Image formats: JPEG/EXIF

CMOS sensor

digital zoom

Autofocus

Focal length: 3.8 mm

Focus range: 10 cm to infinity

Macro focus: 10-60 cm

LED flash

Flash modes: Automatic, On, Red-eye reduction, Off

Flash operating range: 1 m

White balance modes: automatic, sunny, incandescent, fluorescent

Centre weighted auto exposure; exposure compensation: +2 ~ -2EV at 0.7 step

Capture modes: still, sequence, self-timer, video

Scene modes: auto, user defined, close-up, portrait, landscape, night, night portrait

Colour tone modes: normal, sepia, black & white, negative

Full-screen viewfinder with grid

Active toolbar

Share photos with Share on Ovi

Video Main camera

320 x 240 (QVGA) up to 15 fps

176 x 144 at 15 fps (QCIF)

digital video zoom

Front camera

- Video recording at up to 128 x 96 pixels (QCIF) and up to 15 fps

- Up to 2x digital video zoom

Video recording file formats: .mp4, .3gp; codecs: H.263, MPEG-4 VSP

Audio recording formats: AMR,AAC

Video white balance modes: automatic, sunny, incandescent, fluorescent

Scene modes: automatic, night

Colour tone modes: normal, sepia, black & white, negative

Clip length (maximum): 1 h

RealPlayer

Video playback file formats: .Flash Lite 3, mp4, .3gp; codecs: H.263, MPEG-4 VSP,RealVideo,H.264

Video streaming: .3gp, mp4, .rm

Customisable video ring tones

Music and audio playback Music player

Media player

Music playback file formats: .mp3, .wma, .aac, AAC+, eAAC+

Audio streaming formats: .rm, .eAAC+

FM radio 87.5-108 MHz

Visual Radio support. Read more: www.visualradio.com

2.5 mm Nokia AV connector

Nokia Music Manager

Nokia Music Store support

Nokia Podcasting support

Customizable ring tones

Synchronize music with Windows Media Player

NaviTM wheel support

Voice Aid

Voice and audio recording Voice commands

Speaker dependent and speaker independent voice dialling (SDND, SIND)

Voice recorder

Audio recording formats: AMR-WB, AMR-NB

Speech codecs: FR, EFR, HRO/1, AMR-HR, and AMR-FR

Text-to-speech

Personalization: profiles, themes, ring tones Customizable profiles

Customizable ring tones

Customisable video ring tones

Support for talking ring tones

Customizable themes

Customizable home screen content in Business and Personal modes

Software

Software

Software platform and user interface S60 3.1 Edition, Eseries

Symbian Os 9.2

Two home screens with customizable active standby views

Voice commands

FOTA (Firmware update Over The Air)

Personal information management (PIM): contacts, clock, calendar etc. Advanced contacts database: multiple number and e-mail details per contact, contacts with images

Support for assigning images to contacts

Support for contact groups

Closed user group support

Fixed Dialling Number support

Clock: analogue and digital

Alarm clock with ring tones

Reminders

Calculator with advanced functions

Calendar with week and month view

Converter

Active Notes

To-do list

PIM information viewable during call

Applications JavaTM MIDP 2.0

Flash Lite 3.0

Chat and instant messaging

Nokia browser

- JavaScript version 1.3 and 1.5

- Mini Map

Dictionary

Quickoffice (Quickword, Quickpoint, Quicksheet)

PDF Viewer

ZIP Manager

Download!

File Manager

Nokia Search

Nokia Maps

Adding more applications:

- Use the Download! client

- Over-the-air (OTA) downloads

Accessories

Accessories

Sales package contents Nokia E71

Nokia Battery (BP-4L)

Nokia Charger (AC-5)

Nokia Connectivity Cable (CA-101)

Nokia Headset (HS-47)

Nokia Eseries Lanyard

Nokia Eseries Pouch

User Guide, Quick Start Guide and other documentation

2GM microSD depending on market/channel

Recommended accessories Nokia Bluetooth Headset BH-602

Nokia Mobile Holder CR-106

Nokia 8 GB microSDHC Card MU-43

Compatible accessories Complete accessories for your Nokia E71

Support and related documents

Support and related documents

Related documents SAR certification information

Eco Declaration (.pdf, 52 KB)

Declaration of Conformity

Product legal notice

Product legal notice

Copyright © 2008 Nokia. All rights reserved.

 

europe.nokia.com/A41146122

  

Click here for my Facebook

 

HDR

 

Hi everyone!

Yes, it is a joke but my day was not a joke at all or it was a really really bad joke... I lost all my photos from past years that I had on my external hard disk drive, yes, thanks to the fucking microsoft encryption software, all is gone!, then we are on the last weeks of the project so the release of the project was planned for the next Friday the 24th of January and yes, today, the date was changed for the 22nd of January, yes, more stress, I left the office today at midnight, yes, waiting for an available tester for my applications as the one who was working with me is out sick, yes more more awesome nice news, stress, yes I am really stressed! and tomorrow will not be better and just to make it better it is a fact that I will need to work on Saturday and Sunday, yes, already two meetings planned for Saturday and as the meetings are planned in USA times, well yes, I need to be at the office in the evening, on my weekend!, that fucking SUCKS!!! yes, I am stressed, I want just to get out of here!!!

 

About the photo, it was taken on August 30, I was helped by Anna, yes, one of the photos I didn't save on my external hard disk drive... well, I think I will try to go to bed now... have a nice evening or morning or day... chau...

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Taken with the N95 cameraphone

 

Here with my little finger ...:)

 

Technical specifications of the sexy thin E71

  

Size Form: Monoblock with full keyboard

Dimensions: 114 x 57 x 10 mm

Weight: 127 g

Volume: 66 cc

Full keyboard

High quality QVGA display

Display and 3D Size: 2.36"

Resolution: 320 x 240 pixels (QVGA)

Up to 16 million colors

TFT active matrix (QVGA)

Two customisable home screen modes

Security features Device lock

Remote lock

Data encryption for both phone memory an microSD content

mobile VPN

Keys and input method Full keyboard

Dedicated one-touch keys: Home, calendar, contacts, and email

Speaker dependent and speaker independent voice dialling

Intelligent input with auto-completion, auto-correction and learning capability

Accelerated scrolling with NaviTMKey

Notification light in NaviTMKey

Colors and covers Available in-box colours:

- Grey steel

- White steel

Connectors Micro-USB connector, full-speed

2.5 mm Nokia AV connector

Power BP-4L 1500 mAh Li-Po standard battery

Talk time:

- GSM up to 10 h 30 min

- WCDMA up to 4 h 30 min

Standby time:

- GSM up to 17 days

- WCDMA up to 20 days

- WLAN idle up to 166 hours

Music playback time (maximum): 18 h

Memory microSD memory card slot, hot swappable, max. 8 GB

110 MB internal dynamic memory

Communication and navigation

Communication and navigation

Operating frequency E71-1 Quad-band EGSM 850/900/1800/1900, WCDMA 900/2100 HSDPA

E71-2 Quad-band EGSM 850/900/1800/1900, WCDMA 850/1900 HSDPA

E71-3 Quad-band EGSM 850/900/1800/1900, WCDMA 850/2100 HSDPA

Offline mode

Data network CSD

HSCSD

GPRS class A, multislot class 32, maximum speed 100/60 kbps (DL/UL)

EDGE class A, multislot class 32, maximum speed 296/177.6 kbps (DL/UL)

WCDMA 900/2100 or 850/1900 or 850/2100, maximum speed 384/384 kbps (DL/UL)

HSDPA class 6, maximum speed 3.6 Mbps/384 kbps (DL/UL)

WLAN IEEE 802.11b/g

WLAN Security: WEP, 802.1X, WPA, WPA2

TCP/IP support

Nokia PC Internet Access (capability to serve as a data modem)

IETF SIP and 3GPP

Local connectivity and synchronization Infrared, maximum speed 115 kbps

Bluetooth version 2.0 with Enhanced Data Rate

- Bluetooth profiles: DUN, OPP, FTP, HFP, GOEP, HSP, BIP, RSAP, GAVDP, AVRCP, A2DP

MTP (Multimedia Transfer Protocol) support

Bluetooth (Bluetooth Serial Port Profile. BT SPP)

Infrared

File

Network (Raw). Direct TCP/IP socket connection to any specified port (a.k.a HP JetDirectTM).

Network (LPR). Line Printer Daemon protocol (RFC1179).

Support for local and remote SyncML synchronization, iSync, Intellisync, ActiveSync

Call features Integrated handsfree speakerphone

Automatic answer with headset or car kit

Any key answer

Call waiting, call hold, call divert

Call timer

Logging of dialed, received and missed calls

Automatic redial and fallback

Speed dialing

Speaker dependent and speaker independent voice dialing (SDND, SIND)

Fixed dialing number support

Vibrating alert (internal)

Side volume keys

Mute key

Contacts with images

Conference calling

Push to talk

VoIP

Messaging SMS

Multiple SMS deletion

Text-to-speech message reader

MMS

Distribution lists for messaging

Instant messaging with Presence-enhanced contacts

Cell broadcast

E-mail Supported protocols: IMAP, POP, SMTP

Support for e-mail attachments

IMAP IDLE support

Support for Nokia Intellisync Wireless Email

Integrated Nokia Mobile VPN

Easy Email set-up

Web browsing Supported markup languages: HTML, XHTML, MP, WML, CSS

Supported protocols: HTTP, WAP 2.0

TCP/IP support

Nokia browser

- JavaScript version 1.3 and 1.5

- Mini Map

Nokia Mobile Search

Nokia PC Internet Access (capability to serve as a data modem)

GPS and navigation Integrated A-GPS

Nokia Maps application

Image and sound

Image and sound

Photography 3.2 megapixel camera (2048 x 1536 pixels)

Image formats: JPEG/EXIF

CMOS sensor

digital zoom

Autofocus

Focal length: 3.8 mm

Focus range: 10 cm to infinity

Macro focus: 10-60 cm

LED flash

Flash modes: Automatic, On, Red-eye reduction, Off

Flash operating range: 1 m

White balance modes: automatic, sunny, incandescent, fluorescent

Centre weighted auto exposure; exposure compensation: +2 ~ -2EV at 0.7 step

Capture modes: still, sequence, self-timer, video

Scene modes: auto, user defined, close-up, portrait, landscape, night, night portrait

Colour tone modes: normal, sepia, black & white, negative

Full-screen viewfinder with grid

Active toolbar

Share photos with Share on Ovi

Video Main camera

320 x 240 (QVGA) up to 15 fps

176 x 144 at 15 fps (QCIF)

digital video zoom

Front camera

- Video recording at up to 128 x 96 pixels (QCIF) and up to 15 fps

- Up to 2x digital video zoom

Video recording file formats: .mp4, .3gp; codecs: H.263, MPEG-4 VSP

Audio recording formats: AMR,AAC

Video white balance modes: automatic, sunny, incandescent, fluorescent

Scene modes: automatic, night

Colour tone modes: normal, sepia, black & white, negative

Clip length (maximum): 1 h

RealPlayer

Video playback file formats: .Flash Lite 3, mp4, .3gp; codecs: H.263, MPEG-4 VSP,RealVideo,H.264

Video streaming: .3gp, mp4, .rm

Customisable video ring tones

Music and audio playback Music player

Media player

Music playback file formats: .mp3, .wma, .aac, AAC+, eAAC+

Audio streaming formats: .rm, .eAAC+

FM radio 87.5-108 MHz

Visual Radio support. Read more: www.visualradio.com

2.5 mm Nokia AV connector

Nokia Music Manager

Nokia Music Store support

Nokia Podcasting support

Customizable ring tones

Synchronize music with Windows Media Player

NaviTM wheel support

Voice Aid

Voice and audio recording Voice commands

Speaker dependent and speaker independent voice dialling (SDND, SIND)

Voice recorder

Audio recording formats: AMR-WB, AMR-NB

Speech codecs: FR, EFR, HRO/1, AMR-HR, and AMR-FR

Text-to-speech

Personalization: profiles, themes, ring tones Customizable profiles

Customizable ring tones

Customisable video ring tones

Support for talking ring tones

Customizable themes

Customizable home screen content in Business and Personal modes

Software

Software

Software platform and user interface S60 3.1 Edition, Eseries

Symbian Os 9.2

Two home screens with customizable active standby views

Voice commands

FOTA (Firmware update Over The Air)

Personal information management (PIM): contacts, clock, calendar etc. Advanced contacts database: multiple number and e-mail details per contact, contacts with images

Support for assigning images to contacts

Support for contact groups

Closed user group support

Fixed Dialling Number support

Clock: analogue and digital

Alarm clock with ring tones

Reminders

Calculator with advanced functions

Calendar with week and month view

Converter

Active Notes

To-do list

PIM information viewable during call

Applications JavaTM MIDP 2.0

Flash Lite 3.0

Chat and instant messaging

Nokia browser

- JavaScript version 1.3 and 1.5

- Mini Map

Dictionary

Quickoffice (Quickword, Quickpoint, Quicksheet)

PDF Viewer

ZIP Manager

Download!

File Manager

Nokia Search

Nokia Maps

Adding more applications:

- Use the Download! client

- Over-the-air (OTA) downloads

Accessories

Accessories

Sales package contents Nokia E71

Nokia Battery (BP-4L)

Nokia Charger (AC-5)

Nokia Connectivity Cable (CA-101)

Nokia Headset (HS-47)

Nokia Eseries Lanyard

Nokia Eseries Pouch

User Guide, Quick Start Guide and other documentation

2GM microSD depending on market/channel

Recommended accessories Nokia Bluetooth Headset BH-602

Nokia Mobile Holder CR-106

Nokia 8 GB microSDHC Card MU-43

Compatible accessories Complete accessories for your Nokia E71

Support and related documents

Support and related documents

Related documents SAR certification information

Eco Declaration (.pdf, 52 KB)

Declaration of Conformity

Product legal notice

Product legal notice

Copyright © 2008 Nokia. All rights reserved.

 

europe.nokia.com/A41146122

  

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting. The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

I was asked to shoot a couple of photos of Vera. We connected really well and it turned into a two hour photo-shoot in which we had great fun driving around the hackerspace and Buitenplaats Koningsweg compound looking for shooting locations during golden hour.

Telecomix Crypto Munitions Bureau works for the benefit of cipherspace. Cipherspace is the state of crypto anarchy. This means that your identity is anonymous as long as you stay protected. There are no identities or authorities in cipherspace, and it is not possible to enforce laws where there is no identity, or where there are no authorities.

 

Today there are several threats to the inhabitants of the internet. The politicians of oppressive regimes in the east and in the west, in north and south, are imposing surveillance. Surveillance of the entire networks. What people say to each other, what information is transmitted between bots and humans alike.

 

This aggression must be met with the strongest encryption algorithms available to modern computers. With onion and garlic routing it is possible to erect the fractal cipherspace. With distributed hash tables it is possible to create networks that has no central node. There is no one that controls the fractal cipherspace. Internet as we know it, turns into darknet.

 

Telecomix Crypto Munitions Bureau recommends that you use the following software: i2p, for anonymous and secure communications, Gnu Privacy Guard, for direct and verified communication. The onion router, TOR, to access the internets.

 

Telecomix Munitions is a defense bureau.

 

You can change the future of the internets by joining us in defending the networks and creating cipherspace.

 

You can help defending yourself and your friends, yes, all inhabitants of the networks.

 

By learning a few skills you can take control over technology.

 

Telecomix munitions are currently developing and promoting advanced security devices, which can endure even the harshest forms of government or corporation surveillance.

 

Your personal computer is an encryption device. Modern hardware can transform plain text to ciphertext with ease. So rapidly you barely notice the difference between unencrypted and encrypted data.

 

The laws of mathematics are infinitely stronger than the laws of nations and corporations, as the human laws are really only ink on paper. The laws of mathematics, on the other hand, are the laws that define our very universe. With the use of modern crypto algorithms we can use this fact to defend free speech and the integrity of both bots and humans. Information is nothing but numbers, numbers governed not by human laws, but by the laws of mathematics.

 

Networks that utilize the power of cryptography already exist. It will not be possible to stop the spread of the fractal cipherspace.

 

To find out more, come to telecomix.org or visit us in cipherspace on telecomix.i2p.

Feel free to visit my works on Deviant Art: xp0s3.deviantart.com/

Star Trek, First Contact (Paramount, 1996).

youtu.be/wxyZQR2d6yw Trailer

 

youtu.be/GTQzusrfCxc?t=3s

Star Trek - 'Beyond First Contact' The Borg - Making The Movie.

 

Starring Patrick Stewart, Jonathan Frakes, Brent Spiner, LeVar Burton, Michael Dorn, Gates McFadden, Marina Sirtis, Alfre Woodard, James Cromwell, Alice Krige, Neal McDonough, Robert Picardo, and Dwight Schultz. Directed by Jonathan Frakes.

 

Captain Jean-Luc Picard awakens from a nightmare about his Borg assimilation experience to an incoming message from Admiral Hayes. Hayes informs Picard that Deep Space Five reported that a colony has been destroyed. Completing the Admiral's sentence, Picard realizes who destroyed the colony — the Borg.

 

Picard calls a meeting and informs his senior officers that their ship has been instructed to patrol the Neutral Zone. Their orders are to protect the area from any possible Romulan uprising during a Borg attack. Despite protests from his officers, Picard remains faithful to his orders and the U.S.S. Enterprise NCC 1701-E begins to patrol the area. Later, Picard regretfully tells Riker that it is his own fault they are stuck in the Neutral Zone. Starfleet believes Picard to be too emotionally involved with the Borg because of his previous assimilation to tactically complete a mission against them.

 

The men return to the bridge to learn that Starfleet has engaged in combat with the Borg. Intercepting messages between the starships, the crew learns that the Federation is losing. Picard, with his Borg experience, knows he can help the fleet. He informs his staff that he will make a decision directly in opposition to Starfleet commands. With no objections from his crew, Captain Picard gives the order and the starship Enterprise sets a course for Earth and the attacking Borg cube.

 

A massive battle ensues and it appears that the Federation will lose the fight. Despite serious structural damage to the Borg cube, their strength does not weaken. Even the U.S.S. Defiant, commanded by Worf, does not appear to be able to turn the tides of the battle. As the starship Defiant is about to ram the Borg ship on a suicide run, the U.S.S. Enterprise beams aboard its crew, including Worf. Picard, having an inside perspective of the Borg and their vessel, focuses the firepower of the fleet on coordinates he knows to be critical. Just as the main ship is destroyed, a spherical escape pod flies out. The sphere creates a temporal vortex, catching the starship Enterprise in its wake. Immune to the paradoxes created by the time travel, the starship's crew learns that Earth at the present time appears to be inhabited entirely by the Borg. The commanding officers realize that the Borg have gone into the past and assimilated Earth, so they follow them back in time to repair the damage the Borg have done.

 

On Earth, over three centuries earlier, a somber Lily Sloane accompanies a stumbling, drunk Zefram Cochrane out of a bar after a night of revelry. Then, Lily notices a fast moving light. She hardly has time to ask what the object is, when the Borg vessel attacks. Back aboard the Enterprise, Picard demands that Data tell him the exact date and location the Borg ship is attacking. The location: central Montana. The date: April 4, 2063 — the day before First Contact. Realizing that the Borg have come to prevent first contact between alien life forms and humans, the crew knows they must stop the Borg and facilitate this exchange. They destroy the Borg sphere, and Dr. Crusher, Captain Picard, Commander Data, Commander Riker, Counselor Troi and other U.S.S. Enterprise crew transport down to Earth to survey the damage.

 

At the Borg attack site in Montana, the crew finds destruction and chaos. They split into groups to search for Cochrane. Data and Picard hunt for Cochrane's warp ship, the Phoenix. There they encounter a very angry and confused Lily, who believes Data and Picard to be members of a coalition that broke the cease-fire after World War III. She shoots at them in a rage, but impervious to bullets, Data approaches Lily. Overcome by fear and radiation, she falls to the ground. Dr. Crusher diagnoses Lily with radiation sickness caused by the damaged Phoenix, and inoculates the entire crew. Against Picard's better judgment, Crusher takes Lily to sickbay. Geordi is called to help repair the warp vessel and Picard becomes intrigued by its historical significance. In this vessel began the future as the world would know it, and the past as Picard remembers it. He reaches out to touch the ship. Data, curious about the human need for tactile reinforcement, attempts to create the same feelings he observes in Picard, but is unsuccessful in duplicating this aspect of humanity.

 

Aboard the ship, two crewmembers are sent to examine unexplained maintenance problems, and both disappear. Picard is called to the ship and discovers that the survivors from the Borg sphere have transported onto the ship and are taking over Deck 16. While Picard arranges teams to fight them, the Borg manipulate the climate of the deck to suit their needs and begin to spread throughout the ship. When the Borg attack sickbay, Crusher, her staff, and Lily escape through a Jeffries tube, thanks to a distraction by the ship's Emergency Medical Hologram. While Crusher leads the group down the passageway, Lily steals away in a different direction.

 

On Earth, Riker finds Troi and Cochrane drunk in a bar. Troi justifies that the only way she could get Cochrane to talk to her was by shooting Tequila with him. Denying her drunken state, Troi offers her professional opinion on Cochrane. She explains, "He's nuts."

 

Picard and his team are tracking the Borg through the starship. As Crusher and her staff find Worf's team, Picard's team encounters the Borg, who have begun to assimilate U.S.S. Enterprise crewmembers. Worf's team engages the Borg in combat, but the enemies adapt to the crew's weapons too quickly to make any difference. The teams are ordered to regroup on Deck 15, but Data is captured. Picard cannot save him, so he quickly crawls into a Jeffries tube to escape. Face to face with Picard, Lily steals his phaser and demands an explanation and escape route. Picard agrees.

 

Geordi shows Cochrane the starship Enterprise through a large telescope on Earth and tries to convince him to launch his vessel the next morning. Geordi glorifies Cochrane by explaining that his ship will make first contact with alien life forms. Humanity will be saved if Cochrane launches his ship. Still drunk, Cochrane agrees.

 

Aboard the ship, the Borg Queen introduces herself to a bound Data, claiming that she is the Collective. Reactivating Data's emotion chip, the Borg begin to graph organic, human skin onto the android's arm. As Data is overcome by this new human sensation of touch, something he never thought possible, the Borg continue their work.

 

Lily and Picard wander through the service deck as the captain attempts to explain what has happened between Lily's time and his own. She begins to calm down until they suddenly run into a Borg-infested area. Quickly escaping in the Holodeck, Picard activates a Dixon Hill program. At a dance, he and Lily try to blend in without being noticed by the Borg. Following the Holodeck's story, Picard searches for Nicky the Nose and takes his machine gun. Killing the Borg with the gun, Picard retrieves the memory chip that contains all of the information the Borg has received. Lily then notices that the two dead Borg were once crewmembers of the U.S.S. Enterprise.

 

Back on Earth, Cochrane keeps hearing what an amazing historical figure he is and begins to question whether or not he wants to go through with the launch. He doubts his own nobility and flees the launch site. Geordi and Riker attempt to catch up with Cochrane in the woods and are forced to stun him with a phaser to return him to the Phoenix.

 

Lily and Picard join the rest of the surviving crew and discover that the Borg are outside of the ship. The retrieved memory chip reveals that they are reconfiguring the main deflector in order to contact the Borg of this century, calling them to Earth to assimilate the planet. Picard, Worf and Lieutenant Hawk put on space suits and venture onto the surface of the starship to stop the Borg.

 

Aware of Data's desire to become human, the Borg Queen offers him the chance to be entirely covered in human flesh and join the Borg, in an attempt to get the encryption codes from Data so she can obtain total control over the U.S.S. Enterprise. Outside the Enterprise, Hawk, Worf and Picard attempt to unlock the deflector dish. Attacked by a Borg, Worf's suit begins to depressurize. Two Borg are killed and Hawk is attacked. As the dish is released, a now-assimilated Hawk attempts to kill Picard. Worf saves the captain, but Hawk is killed. Picard and Worf then destroy the free-floating deflector dish.

 

On Earth, Cochrane explains to Riker that his only motivation for inventing warp travel was money. He never expected to save mankind, become a hero, or be instrumental in the founding of a new civilization. He simply wanted to retire in peace.

 

An argument ensues aboard the Enterprise as the majority of the senior officers believe that they should evacuate the ship, destroying it and the Borg. Picard won't give up, and insists they stay. Challenged by Worf, Picard orders him off the Bridge. Lily follows Picard into his ready room and demands that he explain his obsession with fighting the Borg. Picard declares he won't sacrifice the starship, and swears to finally make the Borg pay for all they've done. Lily quietly and calmly compares Picard to Captain Ahab, forever fighting his white whale — the Borg. Realizing that this fight could only destroy himself and his crew, Picard decides to evacuate the ship. Worf, Picard and Crusher activate the ship's self-destruct sequence. The countdown begins, and the crew leaves in escape pods. Picard surveys his ship and prepares to leave when he hears Data calling him.

 

Meanwhile , the earth-bound crew and Cochrane begin takeoff. Cochrane, Geordi and Riker take off in the Phoenix, and with music blaring, the three men launch successfully into orbit.

 

On the ship, Lily and Picard say good-bye and the captain goes to save Data. Entering Engineering, Picard confronts the Borg Queen, whom he knows from his experience with the Borg. The queen reminds Picard that it was not enough that he was assimilated, but that he needed to give himself freely to the Borg — she wished him to stand by her side as an equal to further the power of the Collective. Picard offers himself in exchange for Data, but the android does not comply. He refuses to leave, and at the queen's command, disarms the self-destruct sequence. He quickly enters the encryption codes, offering full control of the Enterprise to the Borg.

 

As Cochrane's ship nears warp, Data arms the U.S.S Enterprise's weapons and aims them at the defenseless Phoenix. At the Borg Queen's order, Data fires, but the missiles fail to hit the Phoenix. His deception of the Borg complete, Data smashes a conduit, releasing a gas that floods engineering, killing all organic material. As the Borg are destroyed, Picard climbs to safety and the Borg Queen falls into the deadly gas. With the Borg threat gone, Cochrane safely completes humanity's first warp flight.

 

Celebrating the flight back on Earth that night, Cochrane and the Enterprise crew see an alien ship land nearby. The doors open, and Zefram Cochrane makes Earth's first contact with an alien race — the Vulcans. Picard and his crew beam out, having witnessed this historic event, and the U.S.S Enterprise NCC 1701-E returns to the 24th century.

 

Taken at the National Cryptologic Museum, NSA.

 

Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Developed for small and medium businesses, the 5600 Series IP Telephones deliver an extensive set of software features, high audio quality, and an attractive streamlined design. They are simple to use and highly reliable, with sophisticated security capabilities such as media encryption and protection from denial-of-service attacks.

 

Visit Avaya.com for more information on the Avaya 5600 Series IP Telephones.

e-Commerce Websites

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Taken at the National Cryptologic Museum, NSA.

 

Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.

1 2 ••• 5 6 8 10 11 ••• 79 80