Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





 
  Starting Today, Google Chrome Will Show Warnings for Non-Logged SSL Certificates
Posted by: tarekma7 - 05-02-2018 , 12:02 AM - Forum: Security News - No Replies

Quote:Starting today, the Google Chrome browser will show a full-page warning whenever users are accessing an HTTPS website that's using an SSL certificate that has not been logged in a public Certificate Transparency (CT) log.

By doing so, Chrome becomes the first browser to implement support for the Certificate Transparency Log Policy. Other browser makers have also agreed to support this mechanism in the future, albeit they have not provided more details.

This new policy was first proposed by Google engineers in 2016, and was scheduled to enter into effect in October 2017, but was later delayed for 2018.

CAs must log all newly issued SSL certificates
The CT logging policy dictates that Certificate Authorities (CAs) —the organizations that issue SSL certificates for supporting HTTPS connections— must publish logs with all the SSL certificates they have issued each day.

These logs must be public, so browser makers, fellow CAs, or independent researchers can freely investigate instances of misissued certificates at any time.

CAs have always kept logs of the certificates they issued, but these were private and only made available to browser makers when they were investigating instances of certificate misissuance.

Most CAs are publishing CT logs already
With a market share of over 60 percent, most CAs saw the writing on the wall and began publishing public CT logs starting last year when it became evident that Google was set to implement this new policy in Chrome.

"Chrome will require that all TLS server certificates issued after 30 April, 2018 be compliant with the Chromium CT Policy," Google engineer Devon O'Brien wrote in a Google Groups discussion earlier this year when he announced the new deadline.

"After this date, when Chrome connects to a site serving a publicly-trusted certificate that is not compliant with the Chromium CT Policy, users will begin seeing a full page interstitial indicating their connection is not CT-compliant," O'Brien added. "Sub-resources served over HTTPS connections that are not CT-compliant will fail to load and will show an error in Chrome DevTools."

These changes have rolled out to Chrome desktop platforms first, which include Chrome for ChromeOS, Linux, macOS, and Windows.

Google engineers have also added a Chrome policy flag that allows sysadmins to disable the CT log-checking behavior in instances Chrome is deployed inside an intranet.

New CT policy is not retroactive
The new CT policy is not retroactive. This means that older certs issued before today that have not been recorded in a CT log will continue to work.

But if a CA has issued a new SSL cert starting today and has not recorded it in a public CT log, Chrome will show an error.

The good news is that many CAs have started logging certificates in public logs and sharing data with each other. Merkle Town (operated by CloudFlare) and Crt.sh (operated by Comodo) are two websites that aggregate CT logs.

Such tools have been instrumental earlier this year when a user noticed that the South Korean government-controlled CA had misissued an SSL certificate for the entire *.go.kr top-level domain, allowing its operator to intercept traffic for all websites using that TLD. That discovery was made by an independent security researcher, and with public CT logs now becoming a de-facto standard, expect more cases like this to surface in the future.

You are not allowed to view links. Register or Login to view.

Print this item

  Amazon Follows Google in Banning "Domain Fronting"
Posted by: tarekma7 - 05-02-2018 , 12:00 AM - Forum: Security News - No Replies

[Image: APT29-domain-fronting.png]

Quote:Two of today's biggest cloud service providers are now blocking a technique called "domain fronting" that has been used by websites and applications to avoid government-based censorship, but also by malware to secretly siphon stolen data to covert servers.

The first one to drop support for domain fronting was Google, at the start of April. Tor developers were the first ones to notice that Google App Engine had stopped working with domain-fronted services on April 13.

A Google spokesperson told the media at the time that Google never officially supported domain fronting in the first place, and that recent changes in its infrastructure had resulted in the feature ceasing to work.

Amazon follows Google and bans domain fronting as well
But last week, Amazon, too, announced that it would drop support for the same feature.

"Domain fronting" is a technique that app and website developers have used in the past to fool censorship tools. The technique relies on using an intermediary cloud server as a proxy for the real website. Connections are initiated for the proxy server, but the user is redirected to the actual website in a subsequent step.

But despite its simple scheme, domain fronting has allowed websites and apps to evade ISP-level censorship and traffic inspection tools for more than a decade.

Domain fronting has been used by apps like Signal, Tor-to-Web proxies, the GreatFire service to bypass China's Great Firewall, and lots of VPN providers to hide their servers' real locations.

Domain fronting became popular with malware operations
But despite the technique's use with legitimate apps trying to skirt government-based bans, the domain fronting had also slowly started to become quite popular on the malware scene, where cybercriminals had been using it to disguise the locations of command-and-control (C&C) servers and provide an extra layer of resiliency during law-enforcement takedown efforts.

The most famous use of domain fronting for a malware operation was by APT29, a cyber-espionage group suspected to be a branch of the FSB, one of Russia's intelligence agencies, according to cyber-security firm CrowdStrike.

READ FULL ARTICLE You are not allowed to view links. Register or Login to view.

Print this item

  School pays $10,000 Ransom in Bitcoin after cyberattack | Reaction to the News Report
Posted by: tarekma7 - 05-01-2018 , 11:12 PM - Forum: Video Reviews - No Replies



Print this item

  [Xbox One] Battlefield 1 They Shall Not Pass DLC - Free
Posted by: djeans465 - 05-01-2018 , 07:58 PM - Forum: Gaming News - No Replies

[Image: image?url=8Oaj9Ryq1G1_p3lLnXlsaZgGzAie6M...format=jpg]

[Xbox One] Battlefield 1 They Shall Not Pass DLC - Free
 

Battlefield™ 1 They Shall Not Pass* is the first expansion pack for Battlefield 1, available standalone or as part of Battlefield 1 Premium Pass.

Play as one of the most ferocious armies in WW1 – the French. Engage in the savage fighting around the furnace of Verdun, and descend into the bowels of Fort de Vaux where barbarous battles rage in the gas-filled corridors. Take advantage of the mechanical monsters and unique arsenal by the Aisne riverbanks in the largest tank assault of the war. The French adopted a new battle cry during the war: They shall not pass!

Link:  You are not allowed to view links. Register or Login to view.

Print this item

  [PWYW] The Ashampoo Software Bundle @StackSocial
Posted by: AAU - 05-01-2018 , 07:05 AM - Forum: Hot Deals & Discounts - Replies (1)

Pay What You Want: The Ashampoo Software Bundle

Pay $1 and get Ashampoo Privacy Protector

Pay $11.77 or more and you'll take:
Burning Studio 19, UnInstaller 7, WinOptimizer 15, Snap 10, Photo Commander 16, Music Studio 7, and Backup Pro 11

You are not allowed to view links. Register or Login to view.

Print this item

  ImageMagick 7.0.7-29 (Freeware) Released
Posted by: mrtrout - 04-30-2018 , 08:14 PM - Forum: Freeware - No Replies

You are not allowed to view links. Register or Login to view.     Release ImageMagick version 7.0.7-29, GIT revision 14225:41edbdcea:20180430.
Fixed numerous use of uninitialized values, integer overflow, memory exceeded, and timeouts (credit to OSS Fuzz). 100% Scanned Malware Free & Clean With Comodo Cloud Antivirus & Digital Signature: ( ImageMagick Studio LLC) & ( On Comodo Trusted Vendors List )

Print this item

  Justin Trudeau announces new Amazon Vancouver headquarters to bring 3,000 jobs
Posted by: mrtrout - 04-30-2018 , 07:44 PM - Forum: Off Topic Chat - No Replies

You are not allowed to view links. Register or Login to view.      April 30, 2018 10:59 am Updated: April 30, 2018 1:15 pm
Justin Trudeau announces new Amazon Vancouver headquarters to bring 3,000 jobs
 By Amy Judd
Online News Producer Global News     Prime Minister Justin Trudeau announced Monday that Amazon is expanding its Vancouver tech hub with a new headquarters.

This is expected to bring an additional 3,000 high tech jobs to the city in fields including e-commerce technology, cloud computing, and machine learning.

The new headquarters will be located at the old Canada Post headquarters, at 349 West Georgia Street where Monday’s announcement was made. It is expected to open in 2022.

This is in addition to Amazon’s current Vancouver offices – including its 156,000 square-foot location in TELUS Garden which opened to Amazon employees in 2015. On top of Monday’s announcement, Amazon also confirmed last November its plans to expand into another downtown site on Dunsmuir Street, which will open in 2020.

READ MORE: Amazon bringing 1,000 new jobs to B.C.

“Amazon is excited to create 3,000 more highly skilled jobs in Vancouver,” said Alexandre Gagnon, vice-president of Amazon Canada and Mexico. “Vancouver is home to an incredibly talented and diverse workforce, and these thousands of new employees will invent on behalf of our customers worldwide.”

Amazon already employs more than 6,000 people in Canada. It employs more than 1,000 researchers and engineers in Vancouver.

“Our vibrant cities, which are home to some of the best talent in the world, are poised to attract premier investment that creates the jobs of tomorrow. Canadians share your passion for invention and your commitment to excellence – and that’s why we are excited to see Amazon grow here in Vancouver,” said Prime Minister Justin Trudeau Monday.

PHOTOS: Artist renderings of the new Amazon headquarters in Vancouver. Courtesy of QuadReal Property Group:



WATCH: Trudeau to meet with head of Amazon 


 

© 2018 Global News, a division of Corus Entertainment Inc.

Print this item

  Malwarebytes for Windows 3.4.5 released
Posted by: Starship - 04-30-2018 , 01:10 PM - Forum: Paid - Replies (1)

Malwarebytes for Windows  3.4.5 / March 29, 2018

Performance/protective capability

Improved remediation for hijacked shortcuts

Continued improvements to overall protection, detection and remediation

Usability

Device Name now syncs to the Malwarebytes My Account portal for users on the paid version

Improved accessibility features for the Notification Center

Added custom messages designed to highlight the value of Malwarebytes protection

Stability/issues fixed

Fixed problem when cutting / pasting files with anti-ransomware enabled

Fixed problem where USB stick would not eject properly with anti-ransomware enabled

Fixed a service crash related to self-protection

Fixed a blue screen crash related to Web Protection
Addressed other miscellaneous defects

Print this item

  (We Are Comodo Cybersecurity) Comodo Cybersecurity
Posted by: mrtrout - 04-30-2018 , 03:38 AM - Forum: Video Reviews - No Replies

You are not allowed to view links. Register or Login to view.      We Are Comodo Cybersecurity        
Comodo Cybersecurity
Published on Apr 16, 2018
Can your company survive a more advanced and sophisticated cyber attack with its current measures? 

In many cases of data breaches, hackers gain access to the corporate networks either through weak, default, or stolen user credentials. From SMBs to Large Enterprises, organizations face several challenges in protecting private customer data and securing critical business information as they embrace Cloud and digital transformation. 

This is where Comodo's Cyber Security comes in; we can help you Detect, Respond and Recover from even the most sophisticated cyber attacks. Through this platform, we contain the threats and render attacks useless across your entire IT infrastructure.

Subscribe for The Latest In Cybersecurity ►► You are not allowed to view links. Register or Login to view....
Category
Science & Technology
License
Standard YouTube License

Print this item

  Disturbed - The Sound Of Silence [Official Music Video]
Posted by: Mike - 04-29-2018 , 12:30 PM - Forum: Photo Albums, Images, & Videos - No Replies










Print this item

  DLL vs EXE | Windows DLL Hell
Posted by: tarekma7 - 04-29-2018 , 11:57 AM - Forum: Video Reviews - No Replies



Print this item

  Charlaine Harris: Dying for Daylight
Posted by: ahmed - 04-29-2018 , 09:10 AM - Forum: Game Giveaway of the Day - No Replies

[Image: 4pnHA3V.jpg]

About:
Exclusive offer from Giveaway of the Day and MyPlayCity! No third-party advertising and browser add-ons!

Enter a vampire world as Dahlia, a vampire with a fantastic sense of fashion and a razor-sharp wit! Go on an epic hunt to find the legendary sun potion in Dying for Daylight. As vampires have been productive and ultimately accepted into society, their ancient vulnerability remains true – they can only emerge at night. When rumors circulate that a legendary potion exists allowing vampires to walk amid the daylight, Dahlia jumps at the chance to further investigate in this fun Hidden Object game.

[Image: 2220600CH.jpg]


Giveaway Page:
You are not allowed to view links. Register or Login to view.#

System Requirements:
Windows XP/ Vista/ 7/ 8/ 10; CPU: 1.0 GHz; RAM: 1024 MB; DirectX: 9.0; Hard Drive: 280 MB

Print this item

  AVG vs Avast | AVG=Avast? (The PC Security Channel)
Posted by: mrtrout - 04-29-2018 , 05:24 AM - Forum: Video Reviews - No Replies

You are not allowed to view links. Register or Login to view.        AVG vs Avast | AVG=Avast?     
The PC Security Channel [TPSC]
Published on Apr 28, 2018
Ever since Avast acquired AVG they have been merging the products in terms of core technology. As of now, both Avast and AVG are still available on different websites as separate products, but are they?  Category
Science & Technology
License
Standard YouTube License

Print this item

  THAICERT SEIZES HIDDEN COBRA SERVER LINKED TO GHOSTSECRET, SONY ATTACKS
Posted by: mrtrout - 04-28-2018 , 02:38 AM - Forum: Security News - No Replies

You are not allowed to view links. Register or Login to view.       THAICERT SEIZES HIDDEN COBRA SERVER LINKED TO GHOSTSECRET, SONY ATTACKS
by Tara Seals April 27, 2018 , 11:58 am
Thailand’s Computer Emergency Response Team (ThaiCERT) has seized a server operated by the North Korea-linked Hidden Cobra APT, which is used to control the global GhostSecret espionage campaign. The campaign is still ongoing.

ThaiCERT said in an alert on Wednesday that it is working with McAfee and law enforcement to analyze the control server, which was located at Thammasat University in Bangkok. Researchers said that the server has the same IP address as the one used in the infamous 2014 Sony Pictures hack, known to be linked to Hidden Cobra (a.k.a. the Lazarus Group) and North Korea.

Earlier this week McAfee warned that the GhostSecret campaign was carrying out data reconnaissance on a wide number of industries, including critical infrastructure, entertainment, finance, healthcare and telecommunications, in at least 17 countries.

“The public exposure is likely to force the actors to change infrastructure and implants,” a McAfee spokesperson told Threatpost. “We also suspect this may be the tip of the iceberg and there may be more hidden infrastructure yet to be discovered.”

The offensive uses multiple implants, tools and malware variants associated with Hidden Cobra, which together have established a covert network to gather data and create the capability to launch further attacks. The malware in play includes Bankshot, which is a remote access tool that gives an attacker full capability on a victim’s system (with the functionality to wipe files and content, and gather data). Hidden Cobra has used Bankshot in the past to target finance and other industries, including attacking a major Korean bank. Bankshot also can search for hosts related to the SWIFT network, researchers said, which Hidden Cobra has been known to go after, as in the case of the Bangladesh Central Bank heist in 2016 that saw the attackers make off with $81 million.

Researchers also uncovered two previously unknown malware variants. One has capabilities that resemble the Destover malware, which also was used in the Sony attack; and another, dubbed Proxysvc, is a unique data-gathering and implant-installation component that listens on port 443 for inbound control server connections. McAfee said that Proxysvc is part of a covert network of Secure Sockets Layer listeners that allow the attackers to gather data and install more complex implants or additional infrastructure; it essentially lets attackers know which systems were infected in order to connect to them.

“Our analysis of the code…indicates that Bankshot, Proxysvc, and the Destover-like implant are distinct families, but also contain overlapping code and functionality with current tools of Hidden Cobra,” McAfee researchers said. They added, “the evolution in complexity of these data-gathering implants reveals an advanced capability by an attacker that continues its development of tools.”

Operation GhostSecret kicked off in February 2018, when the actors targeted the Turkish financial system via spear-phishing emails containing malicious Microsoft Word documents and the Bankshot payload. It started with a major government-controlled financial organization, next appeared in another Turkish government organization involved in finance and trade, and then victimized a further three large financial institutions in the country.

ThaiCERT said that it’s in the process of accessing the information on the seized server, and that once analyzed, it will then assist Thai victims with remediation. McAfee is continuing to investigate as well.

Print this item

  SAMSAM RANSOMWARE EVOLVES ITS TACTICS TOWARDS TARGETING WHOLE COMPANIES
Posted by: mrtrout - 04-28-2018 , 02:36 AM - Forum: Security News - No Replies

You are not allowed to view links. Register or Login to view.        SAMSAM RANSOMWARE EVOLVES ITS TACTICS TOWARDS TARGETING WHOLE COMPANIES
by Tara Seals April 27, 2018 , 3:41 pm
Ransomware has lately lost its status as the queen of the cybercrime prom, but a new iteration of the nefarious SamSam extortion code shows that it can still make a bid to be sparkly and attention-getting.

The latest version of SamSam has taken the malware road less traveled, ditching widespread spam campaigns for unusually targeted, whole-company attacks. According to an analysis by Sophos, in a reversal of previous tactics, SamSam operators are now launching thousands of copies of the ransomware at once into individual organizations, each of which has been carefully selected.

To effect the “whole-company” play, SamSam uses various vulnerability exploits rather than phishing and spam to gain access to a victim company’s network; it’s also been seen using brute-force tactics against weak Remote Desktop Protocol (RDP) passwords, Sophos said. After gaining a foothold, SamSam follows its known pathology, seeking out additional victims via network-mapping and stealing credentials – a tactic that Cisco Talos analysts noticed back in January. Once the potential targets are discovered, the attackers manually deploy SamSam on the selected systems, using tools like PSEXEC and batch scripts.

After they’ve infiltrated a target company and saturated it with the malware, the operators are also mixing things up when it comes to business tactics: They’re offering a “volume discount” to clean all of those machines.

In Sophos’ examination, the volume discount works out to about $45,000 worth of Bitcoin at current exchange rates.

“We don’t know why the price is $45,000,” said Sophos researcher Paul Ducklin, in a post. “For all we know, that number was picked because it’s below certain reporting thresholds, or because the crooks want to pick the highest value they dare without getting into corporate board-level approval territory. All we can say is that $45,000 is a lot of money.”

If companies don’t want the so-called volume discount, they can pay per host, restoring select machines by sending the specific host names to the operators.

As far as how well business is going for the SamSam gang, Talos reported that a SamSam-affiliated Bitcoin wallet address in January had received 30.4 BTC. A second address, active from mid-January, has received 23 payments as of April, Sophos said. Between the two, the criminals have raked in a total income of 68.1 Bitcoin to date, which works out to about $632,199 at the latest exchange rate.

The good news is that basic security hygiene, like patching, segmenting the network, having backups in place and enforcing policy on privileged account access can all help protect against SamSam. Companies should take note and take the time to build a ransomware plan, because the stakes are high: While they shouldn’t pay the ransom, victims are sure to pay in one way or another.

The city of Atlanta, a high-profile recent SamSam victim, ponied up $2.7 million to security firms and consultants to help it get its machines and data back. The attack caused a complete shutdown for days of the Georgia capital’s online systems, which support the police department, city courts, parts of the airport (the world’s busiest) and more. Attackers asked the city to pay $6,800 to unlock each computer, which translates into a whopping $51,000 for all of the needed keys – but the city declined to pay. Regardless, the event was costly – and some systems are still inaccessible, according to reports.

Print this item

  Apartment building fire leaves residents homeless in Bible Hill
Posted by: mrtrout - 04-28-2018 , 01:00 AM - Forum: Off Topic Chat - No Replies

You are not allowed to view links. Register or Login to view.       Apartment building fire leaves residents homeless in Bible Hill
No injuries in blaze that ripped through three-storey building off Vimy Road
Shaina Luck · CBC News · Posted: Apr 27, 2018 3:29 PM AT | Last Updated: 4 hours ago


Fire crews were called to an apartment building in Bible Hill on Friday. The building was extensively damaged. (Shaina Luck/CBC)
Several families are homeless after a fire ripped through a 12-unit apartment building in Bible Hill, N.S., on Friday.

Fire crews responded to the call at 23 Brooklyn Dr. at 12:30 p.m. All residents managed to escape and are accounted for. Fire officials said there were no injuries and Red Cross volunteers are assisting displaced residents.

Jenny Shin and her mother were in the process of moving from an apartment on the first floor to one on the third floor when she smelled something unusual.

"My mom said, 'Someone is maybe cooking something.'"



Jenny Shin and her mother are two of the people displaced by the fire. (CBC)
But when Shin went to the window, she could see flames and people already getting out of the building. She and her mother quickly did the same. She's now waiting for word on when she can get back in to assess the damage. Shin said they hadn't set up fire insurance prior to the move.

She's staying in guest housing at Dalhousie University's agricultural campus, where she is a graduate student. They're trying to find a place for her mother.

Bible Hill Fire Brigade Chief Joey Bisson said the entire front of the three-storey building was engulfed in flames reaching from the third storey to the roof as the first two trucks arrived.

"From that point it was just spreading rapidly."



Bible Hill Fire Brigade Chief Joey Bisson said the building's third storey and roof were fully engulfed when the first two trucks arrived on scene. (CBC)
Wendy Smith lives across the street from the apartment building. She said she was having a nap when she heard a loud sound like rain.

"I looked out my bathroom window and it was just shooting flames everywhere."

Firefighters were able to extinguish the blaze by mid-afternoon, in part by using an aerial truck to "drown out the top of fire," said Bisson. The building's roof was extensively damaged and eventually collapsed as crews monitored the scene for hot spots or flareups.

Bisson said it's too soon to know how the fire started, although he said it appears to have started in the front of the building. Firefighters from just about every fire department in Colchester County also responded to the call, said Bisson.



A fire on Friday caused extensive damage to an apartment building in Bible Hill. (Shaina Luck/CBC)

Print this item

  [Game][Xbox One] KORGAN is now FREE
Posted by: djeans465 - 04-27-2018 , 11:09 PM - Forum: Gaming News - No Replies

[Image: image?url=8Oaj9Ryq1G1_p3lLnXlsaZgGzAie6M...format=jpg]

Korgan [Xbox One] is now FREE

Korgan is an episodic dungeon-crawler game. 
While playing the story mode you can switch your character in real time to face different kind of enemies or obstacles.


Combine their abilities: freeze an enemy with the mage, then switch your character to the warrior and finish him with brute force, or perhaps shoot him from a safe distance with the hunter. Each character have their own abilities, strengths and weakness.

Link:  You are not allowed to view links. Register or Login to view.

Print this item

  Kaspersky Antivirus AppLock & Web Security Beta
Posted by: mrtrout - 04-27-2018 , 06:47 PM - Forum: Phones & Tablets News - No Replies

You are not allowed to view links. Register or Login to view.        Kaspersky Antivirus AppLock & Web Security Beta
Kaspersky LabTools
Everyone      Welcome to Kaspersky Internet Security for Android – Beta!

Our powerful mobile antivirus blocks malware & dangerous links, helps you filter out unwanted calls & texts and guards your private communications – plus lots more. If your device goes missing, our remote tools can help you prevent personal data falling into the wrong hands.

With this Beta release, you will be able to:

• Preview the latest capabilities and try out the newest features. Sometimes these may be a little rough around the edges. Please note, this Beta version may be unstable.

• Give early feedback – let us know what you think and help us make Kaspersky Internet Security for Android better. If you spot any bugs or problems or would like to make some suggestions, you can send your feedback to kisa-beta@kaspersky.com.


You can replace your current version of Kaspersky Internet Security for Android with this Beta version providing you have the free or premium product already installed on your Android phone or tablet.
• While in Beta, you won’t be able to make a purchase inside the product. And access to premium features is available for a limited period of time. Please use these instructions You are not allowed to view links. Register or Login to view. to try premium functionality.
• If you already have the premium version of our mobile antivirus, your license will be saved for you on your device until you decide to leave Beta testing & reinstall the premium version (instruction here You are not allowed to view links. Register or Login to view.). Please note, your license will still be valid within the license validity period and you may continue using this license on your alternative device during the testing.
• Official version of the product is available in Google Play for installation. Here is the link You are not allowed to view links. Register or Login to view.
WHAT'S NEW
New! Side navigation menu for quick & easy access to product features, settings and other offers by Kaspersky Lab. 
An anti-virus scan that takes less time.
ADDITIONAL INFORMATION
Updated
April 23, 2018
Size
Varies with device
Installs
5,000+
Current Version
Varies with device
Requires Android
Varies with device
Content Rating
Everyone
Learn More
Permissions
View details
Report
Flag as inappropriate
Offered By
Kaspersky Lab
Developer
Visit website
kisa.beta@kaspersky.com
Privacy Policy
Leningradskoye shosse, 39a/3 125212, Moscow, Russia

Print this item

  Defiance 2050 Beta free this weekend 27th-29th April PC/PS4/Xbox
Posted by: djeans465 - 04-27-2018 , 05:55 PM - Forum: Gaming News - No Replies

[Image: med_Defiance_2050_Announcement_Screensho...724979.jpg]

Defiance 2050 Beta free this weekend 27th-29th April PC/PS4/Xbox

Defiance 2050 a sequel to the original game or possibly a rework. Its been getting very positive feedback after a recent beta test. You can now sign up for a closed beta this weekend across PC/PS4/PC. I got a code within a few hours. The original game was great and this should easily surpass that. Its basically a sci-fi massive shooter game. 

You are not allowed to view links. Register or Login to view.

For this particular beta event, PS4 will only be available in North America.

You are not allowed to view links. Register or Login to view.

Print this item

  PDF Page Lock
Posted by: tarekma7 - 04-27-2018 , 04:18 PM - Forum: Freeware - No Replies

[Image: BDNUBG6.jpg]

PDF Page Lock is a special PDF security tool helps users keep vital parts of PDF documents inaccessible to unauthorized people. With PDF Page Lock, users can lock or hide selected pages of a PDF file while leaving all other pages available.

[Image: shotsmall.png]

So in other words, the best advantage of PDF Page Lock is it can lock with a password or hide completely selected page of the given PDF document while leaving all other pages publicly available. When a page of a PDF document is locked, any PDF viewer will display an empty page with a lock icon on it, and hidden pages do not show at all. 

[Image: lock.png]

The program works on Windows XP/Vista/7/8/10, 32-bit and 64-bit both. There is also a portable ZIP version on the download page.

File Size: 12 MB

Download:

You are not allowed to view links. Register or Login to view.

Portable version:

You are not allowed to view links. Register or Login to view.You are not allowed to view links. Register or Login to view.

Features:

- Lock PDF Pages
- Hide PDF Pages
- Password Protecting PDF Pages
- Customize Pages to be Locked
- Doesn't Affect Normal Pages
- Easily Unlock PDF with 1-Click Unlock
- Multi-language

[Image: qsiEzr9.png]

Website: You are not allowed to view links. Register or Login to view.
Languages supported: English, French, German and Chinese.
You are not allowed to view links. Register or Login to view.



Print this item