Odd “news” item on Channel 4 News in the UK tonight, a feature length piece on Amazon’s “people who bought X” and also “bought Y” algorithm available to make thermite! Yes people – that’s lethal bomb making stuff.
So you start with the base chemical, enter that in Amazon and apparently it does the recommend thing. And yes it does!
Even after they have removed bomb making books. Which is a bit bonkers, this still works, so why?
I was going through all my 2FA account backup bits of paper at the weeked and found a few I hadn’t used for ages and came across Spectrocoin from an account I had set up in 2014.
Obviously I had lost interest in them since like many others they had never managed to find a UK friendly bank to allow BACS/FPS payments. Cryptopayme and the defunct Lazycoins did very briefly.
Like all the exchanges currently operating in the UK even seemingly with FCA blessing they still only offer a cheap way to obtain bitcoin IF you do a SEPA payment in EUROS to credit your account with fiat to start with. The best route for this is in the UK currently Fidor UK who do SEPA payments at £2.50 a go 🙂
So what is cool about SpectroCoin even with the SEPA payments madness plagued on all UK bitcoin exchanges:
Open an account just with your social login FaceBook or Google accounts
You can withdraw as gift vouchers. On the UK mobile phone networks and generate Amazon gift vouchers
It has debit card which if your balance is ZERO incurs no monthly £1 charge, I’ve just ordered one
You can transfer bitcoin to another spectrocoin.com account holder with ZERO bitcoin fees – instantly
You can transfer bitcoin to someone who has yet to open a spectrocoin.com account holder with ZERO bitcoin fees just by entering their email address. They receive an email to open an account
Their developer API section is the coolest documented reference I have ever seen
If I were in the business of crypto payment integrated solutions at EPOS street level this would be the player I would be looking at. This platform right now has the ability to provide fee lessbitcoin to bitcoin instant payments at retail level
If you have a merchant wallet with Spectrocoin you can have you bitcoin automatically converted into British Pounds for example and not be subject to bitcoin price fluctuations
At the end of a day a merchant can move their fiat to their Spectrocoin Debit card and pay suppliers instead of traditionally waiting receive cleared funds
They have tech support people via web chat who are there in the evenings and the weekend UK time
Lets say that again in laymans terms – they have a real-time friction free in transaction fee terms at retail level, bitcoin payment solution that is not waiting for the lightning network and payment hubs in the following countries
I think is what the Americans call on-ramp, I do hope they stay in business!
They are a visualized hard drive of your computer that can be used to either recover data or run your dead PC in a visualized environment. These are slight different to backup software that run continuously on your Windows PC like the native “File History” facility.
Think of “File History” back up as day to day. It bails you out of:
Accidentally deleting a file or folder
Allowing you view a file from several saves back with the same file name
A System Image can be thought much more of a get of jail card for complete failure and disaster recovery if the data is kept off-site and the data since last system image is also held off-site.
With a combination of the two backups and additionally the use of cloud services such as GDrive and DropBox could form a complete disaster recovery process.
100% of the details on this page are correct BUT the backup that this procedure does is really a lot more useful than it appears.
While you can’t restore a system image backup on another PC, you can extract individual files from a system image backup. Microsoft says it’s not possible to extract individual files from a system image backup, and they don’t provide an easy tool to do so — but they’re just standard VHD (virtual hard disk) image files that you can “mount” and copy files from using File Explorer or Windows Explorer.
It says that you cannot take restore the “system image backup on another PC”, whilst this is technically correct we can do something really cunning with this .VHD backup.
We can install Microsoft Virtual PC software on another powerful Windows PC and copy the .VHD file to it. He we can now run your old PC inside another PC while your replacement PC gets to you.
In Windows 7 the scheduling for creating an automated “Create a System Image” was built into the operating system. Then Microsoft removed this method making it very complicated. This will have been due to commercial agreements drawn up with third party backup vendors like Acronis who offer some very good comprehensive paid for solutions.
This youtube clip demonstrates your emergency fall back. It shows a Windows PC running a Windows PC inside it. The Windows PC inside it is a .VHD file
Automating the creation of .VHD files on Windows 8 / 10
Decide whether you want to run a daily or weekly backup of Windows 8.1. Also make sure you understand that every new backup will overwrite the previous one. So, if the backup fails, you won’t have a recovery copy to fall back to.
Connect an external drive with enough free space. This will depend on how much data you have in your hard drive(s).
Launch PowerShell as administrator (this is really important because this operation needs the highest administrative privilege as possible).
Quick Tip: Go to the Start screen do a search for PowerShell, from the result right-click Windows PowerShell, and select Run as administrator.
Type the following command to create a daily full Windows 8.1 backup and press Enter:Syntax:
Finally, if you want to double-check whether or not the task has been fully created. Go to the Start screen, do a search for Task Scheduler, expand the Task Scheduler Library, and on the list from the right, you should be able to see the task. This is also a good place to visit and troubleshoot the task if it isn’t running correctly.
There is lot of discussion in the media right now about about terrorist videos being published on the likes of YouTube and FaceBook, something must be done… Even the Daily Telegraph joined in last Saturday 25th March 2017.
Why nothing will be done about terrorist videos
But NOTHING is going to happen, because this material is actually being used to track and profile terrorists:
As long as terrorist videos help the security services, they will be allowed on the web. (Whether there will be any advertising next to them is a different matter.)
WhatsApp encryption is another RED HERRING because of zero-day vulnerabilities
January 2015 David Cameron made this statement:
Thanks to the CIA’s Dark Matter leak this month, we discovered that zero-day software has being deployed on computers and phones for a LONG time. Even Apple once thought to be pretty impregnable has been as open as the proverbial barn door.
A zero-day vulnerability – commonly just called zero-days by hackers – is an undisclosed computer-software vulnerability that both hackers and the security services can exploit.
Zero-day software allows your devices to be controlled by other people – in most cases now; remotely. And this software implanted on the device is not detectable for many years into the future due to its sophistication.
With regards to computers and phones a zero-day allows the security services to read the messages of the terrorist as they are being typed into an application like WhatsApp before it’s even encrypted. So being able to decrypt the encrypted message is totally unnecessary. It’s red herring.
The British security services were using zero-day exploitation more than fifty years ago. During the early Common Market discussions in 1960 – 1963, We created remote monitoring facilities that could listen to the French encryption devices before the messages were encrypted. This was brought to light by Peter Wright’s revelations in Spy Catcher, published in 1987. The Song remains the same.
We live in a world where you can safely assume that any Internet connected device can be remotely monitored by the security services. The recent Wikileaks Dark Matter Leak implies this clearly.
The issue of encrypted communications is a red herring. That problem was solved a very long time ago, The bigger fish is whether the security services can use zero-days without a warrant and with impunity? This is the news item.
Three lines icon (top RHS) – [this is the Menu icon in FireFox speak]
Use Master Password
In effect you use two browsers, Chrome for your Google intensive work where you get the tight integration and FireFox for your general with password protection for locally stored passwords. If you don’t get a Mozilla account then there is no risk of them ending up in Mozilla’s cloud either. If you use a Master Password on your computer then passwords are held on the machine encrypted unless you enter your master password when you first start using FireFox.
To more fully appreciate the risks, then read what the FireFox Senior Security Engineer has to say which is the first reply
A deterministic password generator allows you to remember one simplistic pass-phrase that you can remember for all your passwords but
Unique passwords are generated for each site and logins you use
They gives you the ability to rapidly change all your passwords in one go
Actually I recommend a combination of the two, my favourite is KeePass for a Password Manager with the password management file store on DropBox and SaltThePass which is a deterministic password generator on you mobile. Android or iPhone. KeePass is also available for Windows, Linux, Mac, Android and iOS.
I use KeePass as Password Manager with the password management file store on DropBox + two-factor authentication, this gives me the facility to cope with some complex information I don’t want to write down. This is the same for all Geeks, we ALL use KeePass like the early days the Geeks were the ones that used Google first.
So when do I use SaltThePass? I typically only use it with web sites that provide two factor authentication to login. That means that you need you mobile with you to be able to access the web site, pretty much using the same technology that you use when you log into your bank account with the PIN generator which is different each time.
My next related article in this password series is here:
Two-factor simply means that there has to be something else other than a password entered when you log into a web site. Try this explanation by BritChristopher Bernatt, missing the 1970’s Open University BBC 2 late spots, then he’s our man.
Common UK sites and sites that you might use offering this now are:
The Seagate 2TB External Hard Drive comes with an external mains power supply. Laptops often cannot supply enough power through USB ports for reliable data transfer, not a good idea when you are doing a backup...