Page 4,121«..1020..4,1204,1214,1224,123..4,1304,140..»

About – Stockfish – Open Source Chess Engine

Get Notified

Get notified about new releases by following us on Twitter, liking us on Facebook, or reading our blog.

The Stockfish engine was developed by Tord Romstad, Marco Costalba, and Joona Kiiski. It is now being developed and maintained by the Stockfish community.

Stockfish for Mac was built by Daylen Yang. Stockfish for iOS was built by Tord Romstad.

The Stockfish project started with the open source Glaurung engine, authored by Tord Romstad. In November 2008, Marco Costalba forked the Glaurung 2.1 code and introduced Stockfish 1.0. Tord and Joona Kiiski joined the Stockfish project and the Glaurung project slowly faded away. Meanwhile, Stockfish quickly rose to become the strongest open source chess engine, with frequent updates every few months. Today, it remains one of the strongest engines in the world.

This website was built by Daylen Yang. The Stockfish icon was designed by Klein Maetschke.

Stockfish is free, and distributed under the GNU General Public License Version 3 (GPLv3). Essentially, this means that you are free to do almost exactly what you want with the program, including distributing it among your friends, making it available for download from your web site, selling it (either by itself or as part of some bigger software package), or using it as the starting point for a software project of your own.

The only real limitation is that whenever you distribute Stockfish in some way, you must always include the full source code, or a pointer to where the source code can be found. If you make any changes to the source code, these changes must also be made available under the GPL.

For full details, read the GPL.

More here:
About - Stockfish - Open Source Chess Engine

Read More..

Kaspersky Internet Security – Wikipedia

Kaspersky Internet Security (often abbreviated to KIS) is an internet security suite developed by Kaspersky Lab compatible with Microsoft Windows and Mac OS X. KIS offers protection from malware, as well as email spam, phishing and hacking attempts, and data leaks. Kaspersky Lab Diagnostics results are distributed to relevant developers through MIT[clarify].

Version 6.0 was the first release of KIS.[3] PC World magazine praised version 6.0's detection of malware. KIS detected 100 percent of threats on a subset of the January 2006 wild-list, a list of prevalent threats. The suite detected almost 100 (99.57%) percent of adware samples. KIS has the ability to scan within compressed or packed files, detecting 83.3 percent of the "hidden" malware. However, version 6.0 was criticized for not completely removing malware by leaving Registry entries and files. PC World also highlighted the suite's false positives eight of 20,000 clean files were incorrectly flagged as malicious and its noticeable impact on computer performance. However, data is cached from each scan, making each subsequent scan faster. The firewall blocked all attacks from inside and outside the computer when tested.[4]

The magazine found the graphical user interface to be awkward to navigate. Features such as parental controls and instant messaging protection, found in competing suites from Symantec and McAfee, were not a part of version 6.0. Both CNET and PC World criticized the suite's relatively high retail price, US$79.95.

KIS 6.0 supports Windows 98 SE, ME, NT Workstation 4.0, 2000 Professional, XP Home Edition, XP Professional, XP Professional x64, and Vista. 50 megabytes of free space, Internet Explorer 5.5, and Windows Installer 2.0 are required. RAM and CPU requirements are dependent on the operating system.[5]

Version 7.0 introduced a redesigned GUI. Components were renamed and reorganized; the Anti-hacker module was renamed to the Firewall, and the Anti-Spy module was integrated with the Privacy Control module. PC World described the new interface as "intuitive" and "great-looking".[6]

Parental controls were introduced, with specific settings for different age categories, such as "child" or "parent". Within age categories are content categories, such as drugs or violence. Users can manually configure profiles. Filtering profiles can be associated with users. Since content is filtered at the network level, the feature will work with any Internet browser. The filter relies on a database of known URLs and can analyse websites in real-time. Attempts to access forbidden URLs are logged, and sites visited are tracked as well, raising privacy issues. Limits on Internet access may be set based on time, and chat rooms along with webmail sites can be manually blocked.[7]

Spam filtering integrates with Microsoft Outlook, Outlook Express, Windows Mail, and The Bat!. E-mail content is analysed and scored, and e-mail with scores above two specified thresholds are either marked as "!!spam" or "??probably spam". The Mail Dispatcher feature shows subject and sender information for messages, and allows users to avoid downloading blatant spam by selecting which messages to download. The filter self-trains by analyzing incoming and outgoing e-mail not marked as spam, or by analyzing folders only containing spam or valid e-mail. Senders of verified valid e-mail are whitelisted. E-mail can also be whitelisted or blacklisted based on phrases present in the text. E-mail with non-ASCII characters or invisible text can also be blocked. However, version 7.0 had a relatively poor showing, misidentifying 30 percent of valid messages in PC Magazine testing. 30 percent of spam also made to the inbox.[7]

Protection against data leaks was incorporated in this release. The suite warns users when programs attempt to access or send data from certain areas, such as where Internet Explorer stores webform information.[6]

Malware protection was mostly positive in detection and disinfection tests by AV-Test.org. Version 7.0 detected 100 percent of wildlist threats. Using one-month-old signatures and a set of new malware, however, detection fell to 14 percent. Files were scanned at 5.24 megabytes per second. Version 7.0 successfully identified all six actively running rootkits, four of six inactive rootkits, and was only able to remove two of six rootkits. The firewall correctly blocked all attempted outside connections, with a reasonable level of security when left on default settings.[6]

This version drops support for the Windows 98, 2000, and NT. Windows XP Service Pack 2 is required, except in the case of XP Professional x64 edition. Vista is supported as well. RAM and CPU requirements are dependent on the operating system. 75 megabytes of free space, Internet Explorer 5.5, and Windows Installer 2.0.

This version introduces a revised user interface, an application filtering module, an updated anti-virus engine, and a vulnerability scanner.[8] The main window separates settings in four categories, compared to eight in its predecessor. A status bar changes colour (green, yellow, and red) to reflect overall program status and flashes to divert attention when needed. PC Magazine also noted pop-up notifications were kept to a minimum.[9]

Kaspersky claims the core anti-virus engine was revised to increase scan speed. PC Magazine found an initial scan took over two hours, however subsequent scans took two minutes to complete. However, malware detection was relatively low in comparison to other anti-virus applications tested. Out of 650 thousand samples, version 8.0 detected 95.6 percent. The top score was around 99 percent. Using two-week-old signatures, version 8.0 detected 52 percent of viruses in a different set of samples. Kaspersky also blocked about 60 percent of malware based solely on behaviour. The top performers scored 55.3 percent and 80 percent respectively. Version 2009 detected 98.1 percent of adware. However, PC World noted to achieve that kind of performance, users will have to modify program settings. On default settings, KIS allowed Zango to install. To block the installation, users must enable KIS to scan for "other malware".[10]

The Security Analyzer looks for operating system and program patches. It also looks for vulnerable system settings, presenting users with a list of recommended actions to prevent malware from gaining access to a system. However, PC World criticized the amount of computer jargon used and lack of information about how adjust settings appropriately.[citation needed] On the other hand, PC Magazine found the feature straightforward, and often the solution involved downloading and installing an update.[11]

KIS uses a whitelist by Carbon Black to classify trusted and malicious programs. Malicious programs are not allowed to run at all. Unknown programs falling in between the two categories are restricted in the actions they can perform. Its firewall blocked all attacks in PC Magazine testing. Phishing protection was introduced in this release. Testing by PC Magazine found the feature blocked 44 percent of phishing URLs. Internet Explorer 7 blocked 67 percent of the URLs, and Mozilla Firefox blocked 81 percent.[12]

Spam filtering now integrates with Mozilla Thunderbird and scans NNTP traffic. Spam can be automatically diverted to its own folder. When using an unsupported e-mail client to download POP3, IMAP or NNTP mail, Kaspersky will still generate a report of all messages. However, in an unsupported client, there will be no toolbar nor will the program classify any messages as spam in the client itself.

Version 2010 of Kaspersky Internet Security introduced an overhauled user interface and a sandbox for running applications in a virtualized environment. The 9.0.0.736 build of KIS 2010 fully supported the Windows 7 operating system.[13]

The beta version was released for all windows users on 8 June 2010. This version included a new interface, as well as a gadget only available for Windows Vista and Windows 7 users.[14] PC Mag rated this version "very good" (4/5 stars). Its firewall was noted to be very good, but that made up for its only adequate malware detection rates.[15] Two critical fixes have been released by Kaspersky Lab, making the current version 11.0.2.556.[16]

On 1 March 2011, Kaspersky released the first build of version 2012, it came out as beta version and in English, French and Russian version, with more versions due out later.[17] On 7 June 2011 Kaspersky Lab announced the commercial release of Kaspersky Internet Security 2012 in France, Germany, Switzerland. The current version is 12.0.0.374.[18]

The beta version was released for all windows users on 3 March 2012. This version includes an interface which looks (currently, at least) much like Internet Security 2012. There is no Safe Run option, no Proactive Defense, while instead the behavioural monitoring System Watcher seems to be taking greater responsibility for detecting malware and a Safe Banking feature has been added.

The release candidate (build 13.0.1.4088 RC) was released for all windows users on 20 July 2012.

The Final Version was released on 28 August 2012 build 13.0.1.4190

Beta testing started on 12 March 2013.[19] This version introduced a Windows 8 like GUI design. The final version was released on 3 August 2013 build 14.0.0.4651 in India and Russia, then on August 13 in the USA and August 27 in the UK. The 2014 release was frequently characterized as inferior to user expectations, largely due to its removal of a range of granular fine-tuning options in 2013 and earlier, which were used by experienced users; a number of these were added back in the 2015 beta by the time of its technical release (build 463).

As of February 13, 2014 build 14.0.0.4651(E) was released. Build 14.0.0.4651(I) is the latest (current) version.

In April 2014, a beta version of the 2015 product, build 463, was released, followed by a technical release preview, of the near-complete 2015 product. The first official release of the product was in Bangladesh in June 2014.[20]

In March 2015, Bloomberg accused Kaspersky of having close ties to Russian military and intelligence officials.[21] Kaspersky slammed the claims in his blog, calling the coverage "sensationalist" and guilty of "exploiting paranoia" to "increase readership".[22]

As a result of alleged Russian involvement in the 2016 Presidential Election and ongoing investigations, the Department of Homeland Security officially banned the use of the Kaspersky Internet Security by the United States federal government in September, 2017.[23]

As of December 12, 2017, the use of Kaspersky software is banned from use by the American federal government by law.[24]

Link:
Kaspersky Internet Security - Wikipedia

Read More..

Anti-Virus Web Protection & Spyware Removal | StopSign …

The month of October 2016 is the 13th annual National Cyber Security Awareness Month (NCSAM) here in the United States. Internet (cyber) security continues to be at the forefront of our minds as we push further into the 21st century, and once again President Obama has made a presidential proclamation regarding the need for increased cybersecurity:

Technology plays an increasingly significant role in our daily lives. The rise of the Internet has brought incredible opportunity and new ways of innovating and enhancing our way of life but with great potential also comes heightened risk to our data. Keeping cyberspace secure is a matter of national security, and in order to ensure we can reap the benefits and utility of technology while minimizing the dangers and threats it presents, we must continue to make cybersecurity a top priority. Throughout National Cybersecurity Awareness Month, we recognize the role that individuals can play in enhancing cybersecurity, and we join to raise awareness of the importance of securing our information against cyber threats. (Read more)

We all have a part in taking cybersecurity seriously and addressing it in our every day lives. The staff of StopSign Internet Security software is proud to be part of the solution by providing excellent antivirus, antispyware, and firewall software as recommended by the Department of Homeland Security for every computer user in the US.

Special Offer: Once again were offering a special discount of 20% off our StopSign Internet Security software (which includes antivirus, antispyware, and firewall software [downloaded separately]) for anyone using the coupon code NCSAM during National Cyber Security Awareness Month. To take advantage of this money saving offer, visit the StopSign shopping cart and enter the code to get your special price. (The site will open in a new window.) Please note that the discount will not be applied to the StopSign CD box.

If you dont see the coupon entry form right away, click on the coupon code link in Step 2 on the cart to enter your coupon code before you order!

StopSign is proud to endorse NCSAM by helping raise awareness regarding Internet security-related topics. For more information on National Cyber Security Awareness Month or government recommendations on cyber security, please visit StaySafeOnline.org.

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.

Read more here:
Anti-Virus Web Protection & Spyware Removal | StopSign ...

Read More..

Pricing – Cloud Services | Microsoft Azure

Region: Central US East US East US 2 North Central US South Central US West Central US West US West US 2 North Europe West Europe East Asia Southeast Asia Japan East Japan West Brazil South Australia Central Australia Central 2 Australia East Australia Southeast Central India South India West India Canada Central Canada East Germany Central Germany Northeast UK South UK West France Central France South Korea Central Korea South US DoD Central US DoD East US Gov Arizona US Gov Iowa US Gov Texas US Gov Virginia South Africa North South Africa West

Currency: US Dollar ($) Euro () British Pound () Australian Dollar ($) Indian Rupee () Canadian Dollar ($) Argentine Peso ($) Australian Dollar ($) Brazilian Real (R$) British Pound () Canadian Dollar ($) Danish Krone (kr) Euro () Hong Kong Dollar (HK$) Indian Rupee () Indonesian Rupiah (Rp) Japanese Yen () Korean Won () Malaysian Ringgit (RM$) Mexican Peso (MXN$) New Zealand Dollar ($) Norwegian Krone (kr) Russian Ruble () Saudi Riyal (SR) South African Rand (R) Swedish Krona (kr) Swiss Franc. (chf) Taiwanese Dollar (NT$) Turkish Lira (TL) US Dollar ($)

Display pricing by: Hour Month

For websites, small-to-medium databases, and other everyday applications.

The latest generation of A-Series, Av2 Standard, has similar CPU performance and faster disk. Suitable for development workloads, build servers, code repositories, low-traffic websites and web applications, Av2 Standard also works for micro services, early product experiments, and small databases.

For large databases, SharePoint server farms, and high-throughput applications.

Available in select data centers. A8 and A9 virtual machines feature Intel Xeon E5 processors and a 32 Gbit/s InfiniBand network with remote direct memory access (RDMA) technology. Ideal for Message Passing Interface (MPI) applications, high-performance clusters, modeling and simulations, video encoding, and other compute or network intensive scenarios.

The H-series is a new family specifically designed to handle high performance computing workloads such as financial risk modeling, seismic and reservoir simulation, molecular modeling, and genomic research. They are based on the Intel Xeon E5-2667 v3 Haswell 3.2 GHz (3.6 GHz with turbo) with DDR 4 memory. Turbo is always on for H-series instances. Two of the H-series configurations (H16r, H16mr) also carry a second low latency, high-throughput network interface (RDMA) optimized and tuned for tightly coupled parallel computing workloads such as MPI applications.

Available in select data centers. A10 and A11 virtual machines feature Intel Xeon E5 processors. For high-performance clusters, modeling and simulations, video encoding, and other compute or network intensive scenarios. They're similar to A8 and A9 instance configuration without the InfiniBand network and RDMA technology.

D-Series virtual machines feature solid state drives (SSDs) and faster processors than the A-Series, and its also available for web or worker roles in Azure Cloud Services. This series is ideal for applications that demand faster CPUs, better local disk performance, or higher memories.

For websites, small-to-medium databases, and other everyday applications.

For large databases, SharePoint server farms, and high-throughput applications.

Dv2-Series instances are the next generation of D-Series instances that can be used as virtual machines or cloud services. Dv2-Series instances will carry more powerful CPUs which are on average about 35% faster than D-Series instances, and carry the same memory and disk configurations as the D-Series. Dv2-Series instances are based on the latest generation 2.4 GHz Intel Xeon E5-2673 v3 (Haswell) processor, and with Intel Turbo Boost Technology 2.0 can go to 3.2 GHz. Dv2-Series and D-Series are ideal for applications that demand faster CPUs, better local disk performance, or higher memories, and offer a powerful combination for many enterprise-grade applications.

For websites, small-to-medium databases, and other everyday applications.

For large databases, SharePoint server farms, and high-throughput applications.

Great for relational database servers, medium to large caches, and in-memory analytics.

G-Series virtual machines feature Intel Xeon processor E5 v3 family and provide unparalleled computational performance to support large database workloads, specifically SAP, HANA, SQL Server, Hadoop, DataZen, and Hortonworks. The G5 instance is isolated to hardware dedicated to a single customer.

High disk throughput and IO. Ideal for Big Data, SQL, and NoSQL databases

The Lsv2-series features high throughput, low latency, directly mapped local NVMe storage running on the AMD EPYCTM 7551 processor with an all core boost of 2.55GHz and a max boost of 3.0GHz. The Lsv2-series VMs come in sizes from 8 to 80 vCPU in a simultaneous multi-threading configuration. There is 8 GiB of memory per vCPU, and one 1.92TB NVMe SSD M.2 device per 8 vCPUs, with up to 19.2TB (10x1.92TB) available on the L80s v2.

Excerpt from:
Pricing - Cloud Services | Microsoft Azure

Read More..

Fidelity Said to Offer Cryptocurrency Trading Within a Few …

Fidelity Investments, which began a custody service to store Bitcoin earlier this year, will buy and sell the worlds most popular digital asset for institutional customers within a few weeks, according to a person familiar with the matter.

The Boston-based firm, one of the largest asset managers in the world, created Fidelity Digital Assets in October in a bet that Wall Streets nascent appetite for trading and safeguarding digital currencies will grow. It also puts Fidelity a step ahead of its top competitors that have mostly stayed on the sidelines so far. The firm said in October that it would offer over-the-counter trade execution and order routing for Bitcoin early this year.

Fidelity would join brokerages E*Trade Financial Corp. and Robinhood in offering cryptocurrency trading to clients, though Fidelity is only targeting institutional customers and not retail investors like E*trade and Robinhood, said the person, who asked not to be named discussing private matters. A study released by Fidelity on May 2 found that 47 percent of institutional investors think digital assets are worth investing in.

We currently have a select set of clients were supporting on our platform, Fidelity spokeswoman Arlene Roberts said in en email. We will continue to roll out our services over the coming weeks and months based on our clients needs, jurisdictions, and other factors. Currently, our service offering is focused on Bitcoin.

According to the survey, which questioned 441 institutional investors from November to February, 72 percent prefer to buy investment products that hold digital assets, while 57 percent choose to buy them directly.

The hurdle to make crypto appeal to more mainstream investors is that it continues to be plagued with fraud, theft and regulatory infractions. The latest case involves the New York attorney general accusing Bitfinex, one of the largest Bitcoin exchanges, of hiding the loss of about $850 million in client and corporate cash. Vancouver-based Quadriga Fintech Solutions Corp., which is going through bankruptcy in Canada, owes 115,000 clients about $193 million in cryptocurrencies and cash after the death of founder Gerry Cotten last year.

Bitcoin has jumped more than 50 percent this year, extending the wild price swings that have attracted many individual investors to the mostly unregulated coin. The original digital currency gained widespread notoriety when it surged 1,400 percent in 2017, before tumbling 74 percent last year.

Before it's here, it's on the Bloomberg Terminal.

Read more here:
Fidelity Said to Offer Cryptocurrency Trading Within a Few ...

Read More..

Microsoft may be all-in on cloud computing, but Azure …

A Microsoft data center in Cheyenne, Wyo. (Microsoft Photo)

In an increasingly competitive market for cloud computing, reliability matters, and Microsoft has some work to do.

Data compiled by Gartner and Krystallize Technologies shows a noticeable gap between Microsoft Azure and the other two big cloud providers when looking at cloud uptime in North America during 2018. According to Gartner, last year Amazon Web Services and Google had nearly identical uptime statistics for the virtual machines at the heart of cloud services 99.9987 percent and 99.9982 percent, respectively while Azure trailed by a small but significant amount, at 99.9792 percent.

Azure has had significant downtime, not just in 2018, but even the first three months of 2019 have been not good for Microsoft, said Raj Bala, an analyst with Gartner who compiled the data.

As Microsoft courts developers this week at Build with an array of new services, it has also making been making changes behind the scenes to improve Azure reliability, said Mark Russinovich, Microsoft Azure CTO, in an interview this week with GeekWire. He plans to showcase a few of those improvements during his annual Azure architecture keynote on Wednesday, but also defended the companys track record when dealing with planned and unplanned disruptions to cloud service.

Weve invested a ton in capabilities that allow us to do maintenance with little to zero impact on customers, Russinovich said.

However, that didnt help last week when a routine DNS migration went haywire, disconnecting Azure services from customers and causing a major outage that lasted several hours and took out essential Microsoft services like Office 365 and Xbox Live, as well as websites such as the one youre currently visiting.

According to a root-cause analysis released by Microsoft earlier this week, that problem was caused by two separate errors, and had either one of those errors happened by itself, were not having this discussion. As a result, Microsoft is putting additional procedures and safeguards into place in hopes of preventing this from happening again in the future, Russinovich said.

When you do thousands of these and everything goes off fine, youre like, the process works, he said. Obviously something like this shows us that theres a gap, and were closing that gap.

There were two major unplanned events that rocked Microsofts cloud services in North America during 2018.

The discovery of the Meltdown and Spectre chip bugs in 2017 forced all cloud providers to update their services in January 2018 with software mitigations that isolated cloud customers from those bugs, but Microsoft had to reboot everyones servers to put those changes into effect, and that takes time. And in September 2018, a lightning strike at a data center in its South Central U.S. region caused some cooling systems to fail, damaging servers and knocking out some services for more than 24 hours as engineers worked to preserve customer data and replace the damaged systems.

In the months following the Spectre reboot cycle, Microsoft began rolling out new live migration capabilities that allow it to update servers running customer workloads with little to no disruption. Earlier this year it began rolling those features out across its network of data centers, and theyre now operating nearly everywhere, Russinovich said.

But AWS and Google also needed to update their servers to add the patches for Spectre and Meltdown, and it didnt appear to have as much of an impact on their service uptime. Google likes to tout its live migration capabilities that can update servers with no disruption to customer workloads, while AWS talks far less about the technologies it uses to run its cloud service, which is very on brand for the market-share leader.

Microsoft is also using machine-learning technology to do predictive analytics on its data center hardware, Russinovich said, in hopes of flagging components that are about to fail or underperform based on historical performance data.

On Wednesday Russinovich plans to show off Project Tardigrade, a new Azure service named after the nearly indestructible microscopic animals also known as water bears. This effort will detect hardware failures or memory leaks that can lead to operating system crashes just before they occur and freeze virtual machines for a few seconds so the workloads can be moved to a fresh server.

The company is also continuing to roll out availability zones in its cloud computing regions around the world. Microsoft cloud executives rarely miss an opportunity to point out that they have the most regions around the world of any cloud provider, but only within the last year has Microsoft started building availability zones separate facilities within a region with independent power and cooling supplies that help ensure availability in the event of a problem at one building in a region.

Microsoft launched its first availability zones in March 2018 in its Iowa and Paris data centers, and has since rolled them out to several other regions in the U.S., Europe, and Asia. Cloud providers refer to regions and zones a little differently, but AWS and Google Cloud have had far more availability zones up and running for several years.

Operating cloud computing services at scale is really one of the more amazing things human beings have accomplished; the complexity involved is hard to appreciate without a fair amount of knowledge about how these systems work. And even if Microsoft lags AWS and Google in reliability scoring, unless your company is blessed with world-class operations talent, Microsoft is likely still better at operating data centers than most companies managing their own servers.

But turning over control of your most critical business applications to a third-party provider still requires a leap of faith. As cloud companies fight tooth and nail for the next generation of large enterprise customers considering a move to the cloud, uptime numbers will be more and more important.

Continued here:
Microsoft may be all-in on cloud computing, but Azure ...

Read More..

The World’s Email Encryption Software Relies on One Guy, Who …

Update, Feb. 5, 2015, 8:10 p.m.: After this article appeared,Werner Koch informed us that last week he was awarded a one-time grant of $60,000 from Linux Foundation's Core Infrastructure Initiative. Werner told us he only received permission to disclose it after our article published. Meanwhile, since our story was posted, donations flooded Werner's website donation page and he reached his funding goal of $137,000. In addition, Facebook and the online payment processor Stripe each pledged to donate $50,000 a year to Kochs project.

The man who built the free email encryption software used by whistleblower Edward Snowden, as well as hundreds of thousands of journalists, dissidents and security-minded people around the world, is running out of money to keep his project alive.

Werner Koch wrote the software, known as Gnu Privacy Guard, in 1997, and since then has been almost single-handedly keeping it alive with patches and updates from his home in Erkrath, Germany. Now 53, he is running out of money and patience with being underfunded.

"I'm too idealistic," he told me in an interview at a hacker convention in Germany in December. "In early 2013 I was really about to give it all up and take a straight job." But then the Snowden news broke, and "I realized this was not the time to cancel."

Like many people who build security software, Koch believes that offering the underlying software code for free is the best way to demonstrate that there are no hidden backdoors in it giving access to spy agencies or others. However, this means that many important computer security tools are built and maintained by volunteers.

Now, more than a year after Snowden's revelations, Koch is still struggling to raise enough money to pay himself and to fulfill his dream of hiring a full-time programmer. He says he's made about $25,000 per year since 2001 a fraction of what he could earn in private industry. In December, he launched a fundraising campaign that has garnered about $43,000 to date far short of his goal of $137,000 which would allow him to pay himself a decent salary and hire a full-time developer.

The fact that so much of the Internet's security software is underfunded is becoming increasingly problematic. Last year, in the wake of the Heartbleed bug, I wrote that while the U.S. spends more than $50 billion per year on spying and intelligence, pennies go to Internet security. The bug revealed that an encryption program used by everybody from Amazon to Twitter was maintained by just four programmers, only one of whom called it his full-time job. A group of tech companies stepped in to fund it.

Koch's code powers most of the popular email encryption programs GPGTools, Enigmail, and GPG4Win. "If there is one nightmare that we fear, then it's the fact that Werner Koch is no longer available," said Enigmail developer Nicolai Josuttis. "It's a shame that he is alone and that he has such a bad financial situation."

The programs are also underfunded. Enigmail is maintained by two developers in their spare time. Both have other full-time jobs. Enigmail's lead developer, Patrick Brunschwig, told me that Enigmail receives about $1,000 a year in donations just enough to keep the website online.

GPGTools, which allows users to encrypt email from Apple Mail, announced in October that it would start charging users a small fee. The other popular program, GPG4Win, is run by Koch himself.

Email encryption first became available to the public in 1991, when Phil Zimmermann released a free program called Pretty Good Privacy, or PGP, on the Internet. Prior to that, powerful computer-enabled encryption was only available to the government and large companies that could pay licensing fees. The U.S. government subsequently investigated Zimmermann for violating arms trafficking laws because high-powered encryption was subject to export restrictions.

In 1997, Koch attended a talk by free software evangelist Richard Stallman, who was visiting Germany. Stallman urged the crowd to write their own version of PGP. "We can't export it, but if you write it, we can import it," he said.

Inspired, Koch decided to try. "I figured I can do it," he recalled. He had some time between consulting projects. Within a few months, he released an initial version of the software he called Gnu Privacy Guard, a play on PGP and an homage to Stallman's free Gnu operating system.

Koch's software was a hit even though it only ran on the Unix operating system. It was free, the underlying software code was open for developers to inspect and improve, and it wasn't subject to U.S. export restrictions.

Koch continued to work on GPG in between consulting projects until 1999, when the German government gave him a grant to make GPG compatible with the Microsoft Windows operating system. The money allowed him to hire a programmer to maintain the software while also building the Windows version, which became GPG4Win. This remains the primary free encryption program for Windows machines.

In 2005, Koch won another contract from the German government to support the development of another email encryption method. But in 2010, the funding ran out.

For almost two years, Koch continued to pay his programmer in the hope that he could find more funding. "But nothing came," Koch recalled. So, in August 2012, he had to let the programmer go. By summer 2013, Koch was himself ready to quit.

But after the Snowden news broke, Koch decided to launch a fundraising campaign. He set up an appeal at a crowdsourcing website, made t-shirts and stickers to give to donors, and advertised it on his website. In the end, he earned just $21,000.

The campaign gave Koch, who has an 8-year-old daughter and a wife who isn't working, some breathing room. But when I asked him what he will do when the current batch of money runs out, he shrugged and said he prefers not to think about it. "I'm very glad that there is money for the next three months," Koch said. "Really I am better at programming than this business stuff."

Original post:
The World's Email Encryption Software Relies on One Guy, Who ...

Read More..

Encryption breakthrough could keep prying eyes away from your …

Researchers have found a way to put handshake-style encryption in email and other communication tools, which is good news for spies.

Secret handshakes have long been a method of verification for spies in the field, but digitally things are about to change in a big way. Similar to the physical handshake, digital handshakes are used to verify communication participants identities in real time.

While fine for instant messaging, it has proven impossible to replicate in communication methods such as email whereby messages may need to be decoded long after they were originally sent.

However, a research team from the Stevens Institute of Technology has revealed a new cryptography breakthrough that could solve this 15-year-old problem. This could be hugely beneficial not only to intelligence agencies, but anyone with an interest in secure communications, such as journalists and doctors.

The demand for tools like this is incredible, said Giuseppe Ateniese, who led the research. Privacy is growing more and more important, and encryption is essential for almost everyone.

To achieve the breakthrough, Ateniese and his team combined existing key-based cryptographic algorithms in a novel arrangement to create a system called matchmaking encryption. This simultaneously checks the identities of both the sender and receiver before decrypting the message.

Crucially, matchmaking encryption does away with the need for real-time interactions, allowing messages to be sent on a dead drop basis and read at a later date.

A dead drop is like when a spy leaves a message behind a rock, Ateniese said. It can be used when you need to send a message to someone whos not there at the moment, but will find it if he or she is the intended recipient.

To use this form of encryption, both parties create policies or a list of traits that describe the people with whom they are willing to communicate. When both digital policies are happy that each party is who they say they are, the message will be sent.

Aside from person-to-person communication, it could also be used to group classes of people together. So, for example, CIA agents in New York could refuse to accept messages from anyone other than Philadelphia-based FBI agents.

Messages that dont fit the bill will not be decrypted, with no information being sent. Team member Danilo Francati said: This is important for intelligence I dont want to reveal to you that Im an FBI agent, so I want assurances that you are who you say you are. Matchmaking encryption provides that assurance as well as a level of privacy thats stronger than anything else thats available.

The team believes that the breakthrough opens new frontiers in secure communication and that additional applications will quickly emerge as researchers explore the new technology and make matchmaking encryption more powerful.

Ateniese will present the teams findings at the upcoming Crypto 2019 conference.

See original here:
Encryption breakthrough could keep prying eyes away from your ...

Read More..

What Is Data Encryption? Definition, Best Practices & More …

Data encryption defined in Data Protection 101, our series on the fundamentals of data security.

Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data iscommonlyreferred to as ciphertext, while unencrypted data is called plaintext. Currently, encryption is one of the most popular and effective data security methods used by organizations. Two main types of data encryption exist - asymmetric encryption, also known as public-key encryption, and symmetric encryption.

The purpose of data encryption is to protect digital data confidentiality as it is stored on computer systems and transmitted using the internet or other computer networks. The outdated data encryption standard (DES) has been replaced by modern encryption algorithms that play a critical role in the security of IT systems and communications.

These algorithms provide confidentiality and drive key security initiatives including authentication, integrity, and non-repudiation. Authentication allows for the verification of a messages origin, and integrity provides proof that a messages contents have not changed since it was sent. Additionally, non-repudiation ensures that a message sender cannot deny sending the message.

Data, or plaintext, is encrypted with an encryption algorithm and an encryption key. The process results in ciphertext, which only can be viewed in its original form if it is decrypted with the correct key.

Symmetric-key ciphers use the same secret key for encrypting and decrypting a message or file. While symmetric-key encryption is much faster than asymmetric encryption, the sender must exchange the encryption key with the recipient before he can decrypt it. As companies find themselves needing to securely distribute and manage huge quantities of keys, most data encryption services have adapted and use an asymmetric algorithm to exchange the secret key after using a symmetric algorithm to encrypt data.

On the other hand, asymmetric cryptography, sometimes referred to as public-key cryptography, uses two different keys, one public and one private. The public key, as it is named, may be shared with everyone, but the private key must be protected. The Rivest-Sharmir-Adleman (RSA) algorithm is a cryptosystem for public-key encryption that is widely used to secure sensitive data, especially when it is sent over an insecure network like the internet. The RSA algorithms popularity comes from the fact that both the public and private keys can encrypt a message to assure the confidentiality, integrity, authenticity, and non-repudiability of electronic communications and data through the use of digital signatures.

The most basic method of attack on encryption today is brute force, or trying random keys until the right one is found. Of course, the length of the key determines the possible number of keys and affects the plausibility of this type of attack. It is important to keep in mind that encryption strength is directly proportional to key size, but as the key size increases so do the number of resources required to perform the computation.

Alternative methods of breaking a cipher include side-channel attacks and cryptanalysis. Side-channel attacks go after the implementation of the cipher, rather than the actual cipher itself. These attacks tend to succeed if there is an error in system design or execution. Likewise, cryptanalysis means finding a weakness in the cipher and exploiting it. Cryptanalysis is more likely to occur when there is a flaw in the cipher itself.

Data protection solutions for data encryption can provide encryption of devices, email, and data itself. In many cases, these encryption functionalities are also met with control capabilities for devices, email, and data. Companies and organizations face the challenge of protecting data and preventing data loss as employees use external devices, removable media, and web applications more often as a part of their daily business procedures. Sensitive data may no longer be under the companys control and protection as employees copy data to removable devices or upload it to the cloud. As a result, the best data loss prevention solutions prevent data theft and the introduction of malware from removable and external devices as well as web and cloud applications. In order to do so, they must also ensure that devices and applications are used properly and that data is secured by auto-encryption even after it leaves the organization.

As we mentioned, email control and encryption is another critical component of a data loss prevention solution. Secure, encrypted email is the only answer for regulatory compliance, a remote workforce, BYOD, and project outsourcing. Premier data loss prevention solutions allow your employees to continue to work and collaborate through email while the software and tools proactively tag, classify, and encrypt sensitive data in emails and attachments. The best data loss prevention solutions automatically warn, block, and encrypt sensitive information based on message content and context, such as user, data class, and recipient.

While data encryption may seem like a daunting, complicated process, data loss prevention software handles it reliably every day. Data encryption does not have to be something your organization tries to solve on its own. Choose a top data loss prevention software that offers data encryption with device, email, and application control and rest assured that your data is safe.

Tags: Data Protection 101

More here:
What Is Data Encryption? Definition, Best Practices & More ...

Read More..

What is cloud storage? | IBM Cloud

Storage growth continues at a significant rate, driven by new workloads such as analytics, video and mobile applications. While storage demand is increasing, most IT organizations are under continued pressure to lower the cost of their IT infrastructure through the use of shared cloud computing resources.

It is vital for software designers and solution architects to match the specific requirements of their workloads to the appropriate storage solution or, in many enterprise cases, a mix. Enterprises adopting a hybrid cloud strategy may want to use a mix of on-premises dedicated storage with off-premises shared storage. Regardless of the combination, careful consideration of not only the location, deployment model (private, public or hybrid), scale, costs and a thorough understanding of the primary types of storage are important.

Block storage

Block storage continues to be the foundation for most enterprise applications. Block storage can come in a variety of forms with corresponding performance and availability attributes from host-direct attached storage (with its high IOPs and low latency for data intensive workloads) to virtualized block, with medium/low IOPs for more general-purpose or ephemeral workloads.

While the use of block storage by developers (via an operating system) is declining with the use of higher-level application platforms, the underlying storage is block.

File storage

File storage, also referred to as network-attached storage, has long been the mainstay for sharing files across users and application architectures. The very nature of file storage protocols such as NFS and CIFS makes the adoption of cloud-based storage easier than block. Yet there are higher network latency and throughput considerations, depending on the distance between your application and cloud storage provider. Cloud providers such as IBM offer file storage options that can be combined with traditional on-premises storage systems to build a hybrid storage solution.

Using a cloud storage gateway is one alternative to provide virtually endless storage to an existing on-premises application. Cloud storage gateways are devices (physical or software appliances) that reside locally in a data center and attach to cloud-based object storage. This can be an effective means to introduce a hybrid cloud storage solution without the need to significantly redesign an existing application.

Object storage

Many of the new born on the cloud applications are using object storage as their primary storage mechanism. Using simple HTTP REST-based APIs is the perfect developer-oriented storage solution, without file systems or other low-level operating system calls to contend with.

Object storage is not just for new applications but can be used to meet additional requirements for existing ones. It can also be used as an effective solution for backup and disaster recovery as a replacement for offsite, tape-based solutions, reducing the time to restore data.

The future of hybrid cloud storage is expanding as enterprises develop new applications and extend existing ones for public and private cloud solutions. In addition, the adoption of software-defined storage is evolving as enterprises increase the virtualization, automation and scalability of their storage environments. The key to adopting the right solution is to build a storage strategy that fits in ones cloud journey and match storage solutions with the requirements of the workload.

Follow this link:
What is cloud storage? | IBM Cloud

Read More..