Get 2GB Extra Google Drive Space Just By Checking Your Security Settings

Get 2GB Extra Google Drive Space Just By Checking Your Security Settings

Want 2 GB of extra space in your Google Drive account? Today, Google will give it to you for free, just for doing something you should be doing anyway: Reviewing your security.

Turning on things like two-step verification and having a strong password are great, but it’s not enough to just set it and forget it. If you don’t check in on things now and then, you might get yourself screwed.

Google’s Security Checkup—a promotion that’s running until Feb 17 as part of "Safer Internet Day"—runs you through your recovery settings, app access, recent logins, and other shit you should check periodically. And at the end, you’ll get 2 GB for your trouble (effective at the end of the month). Yeah sure, you should be doing this anyway, but it’s always nice to get a little reward for finishing your chores. [Google via The Next Web]

via Gizmodo
Get 2GB Extra Google Drive Space Just By Checking Your Security Settings

Five Best File Encryption Tools

Five Best File Encryption Tools

Keeping your personal data safe doesn’t have to be difficult—as long as you keep the sensitive stuff encrypted and under your control. That’s why this week we’re looking at the five best file encryption tools you can use to encrypt your data locally so only you have the key.

Earlier in the week we asked you for your favorite file encryption tools, and you gave us tons of great nominations, but as always, we only have room for the top five.

For the purposes of our roundup, we’re focusing on desktop file encryption tools – the ones you use on your own computer to encrypt your own private data, not cloud services that promise to encrypt your data, or business services that say they offer encryption. The goal here is to find the best tools you can use to lock down your sensitive files—whether they’re photos, financial documents, personal backups, or anything else—and keep them locked down so only you have the key. For those unfamiliar with the topic, we have a great guide on how encryption works, and how you can use it to keep your own data safe.

With that out of the way, here are your top five, in no particular order:

VeraCrypt (Windows/OS X/Linux)

Five Best File Encryption Tools

VeraCrypt is a fork of and a successor to TrueCrypt, which ceased development last year (more on them later.) The development team claims they’ve addressed some of the issues that were raised during TrueCrypt’s initial security audit, and like the original, it’s free, with versions available for Windows, OS X, and Linux. If you’re looking for a file encryption tool that works like and reminds you of TrueCrypt but isn’t exactly TrueCrypt, this is it. VeraCrypt supports AES (the most commonly used), TwoFish, and Serpent encryption ciphers, supports the creation of hidden, encrypted volumes within other volumes. Its code is available to review, although it’s not strictly open source (because so much of its codebase came from TrueCrypt.) The tool is also under constant development, with regular security updates and an independent audit in the planning stages (according to the developers.)

Those of you who nominated VeraCrypt praised it for being an on-the-fly encryption tool, as in your files are only decrypted when they’re needed and they’re encrypted at rest at all other times, and most notably for being the spiritual (if not almost literal) successor to TrueCrypt. Many of you praised them for being a strong tool that’s simple to use and to the point, even if it’s lacking a good-looking interface or tons of bells and whistles. You also noted that VeraCrypt may not support TrueCrypt files and containers, but can convert them to its own format, which makes moving to it easy. You can read more in its nomination thread here.


AxCrypt (Windows)

Five Best File Encryption Tools

AxCrypt is a free, open source, GNU GPL-licensed encryption tool for Windows that prides itself on being simple, efficient, and easy to use. It integrates nicely with the Windows shell, so you can right-click a file to encrypt it, or even configure "timed," executable encryptions, so the file is locked down for a specific period of time and will self-decrypt later, or when its intended recipient gets it. Files with AxCrypt can be decrypted on demand or kept decrypted while they’re in use, and then automatically re-encrypted when they’re modified or closed. It’s fast, too, and allows you to select an entire folder or just a large group of files and encrypt them all with a single click. It’s entirely a file encryption tool however, meaning creating encrypted volumes or drives is out of its capabilities. It supports 128-bit AES encryption only, offers protection against brute force cracking attempts, and is exceptionally lightweight (less than 1MB.)

Those of you who nominated AxCrypt noted that it’s really easy to use and easy to integrate into your workflow, thanks to its shell support. If you’re eager for more options, it also has a ton of command line options, so you can fire up the command prompt in Windows and perform more complex actions—or multiple actions at once. It may not support the strongest or most varied encryption methods available, but if you’re looking to keep your data safe from most threats, it’s a simple tool that can lend a little security that your data—like files stored in the cloud on Dropbox or iCloud, for example—are secure and convenient to access at the same time. You can read more in this nomination thread here and here.


BitLocker (Windows)

Five Best File Encryption Tools

BitLocker is a full-disk encryption tool built in to Windows Vista and Windows 7 (Ultimate and Enterprise), and into Windows 8 (Pro and Enterprise), as well as Windows Server (2008 and later). It supports AES (128 and 256-bit) encryption, and while it’s primarily used for whole-disk encryption, it also supports encrypting other volumes or a virtual drive that can be opened and accessed like any other drive on your computer. It supports multiple authentication mechanisms, including traditional password and PINs, a USB "key," and the more controversial Trusted Platform Module (TPM) technology (that uses hardware to integrate keys into devices) that makes encryption and decryption transparent to the user but also comes with a host of its own issues. Either way, BitLocker’s integration with Windows (specifically Windows 8 Pro) makes it accessible to many people, and a viable disk encryption tool for individuals looking to protect their data if their laptop or hard drives are lost or stolen, in case their computers are compromised, or a business looking to secure data in the field.

Of course, it goes without saying that BitLocker was a contentious nomination. More than a few of you touted BitLocker’s accessibility and ease of use, and many of you even praised its encryption for being strong and difficult to crack. Many of you noted that you switched to BitLocker after the developers of TrueCrypt suggested it. Others, however, brought up the assertion made from privacy advocates that BitLocker is compromised and has backdoors in place for government security agencies (from multiple countries) to decrypt your data. While Microsoft has officially said this isn’t true and maintains there’s no backdoor in BitLocker (while simultaneously maintaining the code as closed source—but available to review by its partners, which include those agencies), the assertion is enough to make more than a few of you shy away. You can read more about the criticism and controversy at the Wikipedia link above, or in the nomination thread here.


GNU Privacy Guard (Windows/OS X/Linux)

Five Best File Encryption Tools

GNU Privacy Guard (GnuPG) is actually an open-source implementation of Pretty Good Privacy (PGP). While you can install the command line version on some operating systems, most people choose from the dozens of frontends and graphical interfaces for it, including the official releases that can encrypt everything from email to ordinary files to entire volumes. All GnuPG tools support multiple encryption types and ciphers, and generally are capable of encrypting individual files one at a time, disk images and volumes, or external drives and connected media. A few of you nominated specific GnuPG front-ends in various threads, like the Windows Gpg4Win, which uses Kleopatra as a certificate manager.

Those of you who nominated GnuPG praised it for being open-source and accessible through dozens of different clients and tools, all of which can offer file encryption as well as other forms of encryption, like robust email encryption for example. The key, however, is finding a front-end or a client that does what you need it to do and works well with your workflow. The screenshot above was taken using GPGTools, an all-in-one GnuPG solution that offers keychain management as well as file, email, and disk encryption for OS X. You can read more in its nomination thread here.


7-Zip (Windows/OS X/Linux)

Five Best File Encryption Tools

7-Zip is actually a lightweight file archiver—and our favorite archive utility for Windows. Even though it’s amazing at compressing and organizing files for easy storage or sending over the internet, it’s also a strong file encryption tool, and is capable of turning individual files or entire volumes into encrypted volumes that only your have the keys to. It’s completely free, even for commercial use, supports 256-bit AES encryption, and while the official download is Windows only, there are unofficial builds for Linux and OS X systems as well. Most of 7-Zip’s code is GNU LGPL licensed and open to review. Compressed and encrypted .7z (or .zip, if you prefer) archives are easily portable and secure, and can be encrypted with passwords and turned into executables that will self-decrypt when they get to their intended recipient. 7-Zip also integrates with the shell of the operating system you’re using, making it usually a click away from use. It’s also a powerful command line utility.

Those of you who nominated it noted that it may not have the most robust user interface, but it gets the job done, and many of you have it installed anyway specifically for its robust file compression and decompression capabilities. You noted it’s fast, flexible, free, and easy to use, and while it may not be the fastest file encryption tool (and it’s not capable of whole volume or disk encryption), it gets the job done—especially for encrypting files you need to send to someone else and actually have them be able to access without jumping through too many hoops. Some of you noted that 7-Zip’s encrypted volumes are flexible—perhaps too flexible, since new files added to an encrypted archive aren’t encrypted (you’d have to extract them all and make a new archive for that), but it’s otherwise a minor ding. You can read more in its nomination thread here.


Now that you’ve seen the top five, it’s time to put them to an all-out vote to determine the community favorite.


Honorable Mentions

We have two honorable mentions this week. First and foremost is Disk Utility (OS X), which is bundled with OS X as a disk repair and management tool. Disk Utility can also encrypt drives and volumes, and since OS X can create a compressed volume just by right-clicking a file, series of files, or a folder and selecting "Compress," Disk Utility makes encrypting anything you want extremely easy. Plus, it’s built in to OS X, so you don’t need to install anything else. You can read more about it in its nomination thread here.

Second, we should tip our hats to the venerable old TrueCrypt, our old champion, which actually earned a number of nominations in the call for contenders thread. We covered the meltdown of TrueCrypt when it happened, with the developers abruptly abandoning the project claiming that it’s no longer secure, in the middle of their independent security audit. The developers suggested switching to BitLocker, and pushed out a new version that’s widely considered compromised. However, the older version, 7.1a, is still widely regarded as safe, even though development on it has been abandoned, and the tool has been left without security updates since then. Even so, security analysts split on whether you should trust TrueCrypt or move on to another encryption utility. Many people stand by it even though it’s a dead project, others have built their own projects on top of it (see VeraCrypt, mentioned earlier), and others keep using the last safe version. We can’t recommend TrueCrypt anymore ourselves, but you can read more in its nomination thread here, and over at Steve Gibson’s page dedicated to TrueCrypt here.

Have something to say about one of the contenders? Want to make the case for your personal favorite, even if it wasn’t included in the list? Remember, the top five are based on your most popular nominations from the call for contenders thread from earlier in the week. Don’t just complain about the top five, let us know what your preferred alternative is—and make your case for it—in the discussions below.

The Hive Five is based on reader nominations. As with most Hive Five posts, if your favorite was left out, it didn’t get the nominations required in the call for contenders post to make the top five. We understand it’s a bit of a popularity contest. Have a suggestion for the Hive Five? Send us an email at tips+hivefive@lifehacker.com!

Title photo by andrey_l (Shutterstock).


via Lifehacker
Five Best File Encryption Tools

Fascinating photos reveal how they built the SR-71 Blackbird

Fascinating photos reveal how they built the SR-71 Blackbird

Built and designed in the 1960s after the A-12 Oxcart, the SR-71 Blackbird is still the fastest, most vanguardist air-breathing airplane in the history of aviation. These once classified photos reveal how Lockheed built both birds in secret, in California. They look taken at the Rebel base in Hoth.

"Everything had to be invented"

The A-12 and the SR-71 were a completely different design from anything else before it—and everything after, as time has demonstrated. At the time, many of the technologies needed to make these airplanes were considered "impossible." And yet, thanks to Kelly Johnson and the amazing team at engineers and scientists at Lockheed’s Skunk Works, they were invented from scratch—in twenty months.

According to Lockheed Martin’s official account, Kelly Johnson—the engineer who made the A-12 Oxcart and the SR-71 Blackbird—"everything had to be invented. Everything." From the The Pratt & Whitney J58 engines—a technological feat still unsurpassed by today’s mass manufactured airplanes—to its titanium skin—capable of surviving temperatures from 315C (600F) to more than 482C (900F)—and composite materials. Its landing gear, for example, is "the largest piece of titanium ever forged in the world." Ironically, the United States did not have enough titanium to build these airplanes, so they have to buy it from the Soviet Union. Imagine that: Buying the only material in the world that could make an spy plane from the country you wanted to spy.

Major Brian Shul, one of the SR-71 pilots and author of Sled Driver, tells more about the manufacturing process:

Lockheed engineers used a titanium alloy to construct more than 90 percent of the SR-71, creating special tools and manufacturing procedures to hand-build each of the 40 planes. Special heat-resistant fuel, oil, and hydraulic fluids that would function at 85,000 feet and higher also had to be developed.

Thanks to these technologies and his skills, Shul survived many surface-to-air missile attacks (check out this amazing story about how the Blackbird saved his neck over the skies of Libya.) No Blackbird was ever shot down.

These photos are a testimony to this amazing engineering and manufacturing feat:

Fascinating photos reveal how they built the SR-71 Blackbird

Cutaway illustrations of the twin cockpit variant of the SR-71. Notice the inlet funnels that increased the air speed in front of the J58 engines.

Fascinating photos reveal how they built the SR-71 Blackbird

Lockheed’s Skunk Works’s manufacturing plant in Burbank, California. Later, both the Oxcart and the Blackbird would be coated with an special black paint that reduced the temperature by 23C (75F) and had radar absorbing capabilities.

Fascinating photos reveal how they built the SR-71 Blackbird

Fascinating photos reveal how they built the SR-71 Blackbird

Fascinating photos reveal how they built the SR-71 Blackbird

Fascinating photos reveal how they built the SR-71 Blackbird

Notice the titanium panels forming the skin of these birds.

Fascinating photos reveal how they built the SR-71 Blackbird

Fascinating photos reveal how they built the SR-71 Blackbird

Only 50 Blackbird airframes were built. "The dies or molds were destroyed as directed by then Secretary of Defense McNamara to prevent any other nation from building the aircraft."

Fascinating photos reveal how they built the SR-71 Blackbird


Final A-12 Oxcart ever produced: Article 133

Fascinating photos reveal how they built the SR-71 Blackbird

Close up of one of the SR-71s in manufacturing

Fascinating photos reveal how they built the SR-71 Blackbird

Another angle, from the other side


Fascinating photos reveal how they built the SR-71 Blackbird

Production schedule for the SR-71

Fascinating photos reveal how they built the SR-71 Blackbird

Fascinating photos reveal how they built the SR-71 Blackbird

The J-58 engines

Fascinating photos reveal how they built the SR-71 Blackbird

This is the exhaust of the J-58 engine. It could reach temperatures of 1760C (3200F).

Fascinating photos reveal how they built the SR-71 Blackbird

Fascinating photos reveal how they built the SR-71 Blackbird

The Blackbirds kept flying long after their retirement from the USAF. One of them stayed at NASA: Here’s a photo from the Armstrong Flight Research Center (then Dryden) of an SR-71 being retrofitted for test of the Linear Aerospike SR Experiment (LASRE).

The finished Blackbirds

And now more Blackbird porn because I know you love it

Fascinating photos reveal how they built the SR-71 Blackbird

Fascinating photos reveal how they built the SR-71 Blackbird

Fascinating photos reveal how they built the SR-71 Blackbird

Fascinating photos reveal how they built the SR-71 Blackbird

Fascinating photos reveal how they built the SR-71 Blackbird

Fascinating photos reveal how they built the SR-71 Blackbird

Fascinating photos reveal how they built the SR-71 Blackbird

Fascinating photos reveal how they built the SR-71 Blackbird

Fascinating photos reveal how they built the SR-71 Blackbird

Fascinating photos reveal how they built the SR-71 Blackbird

The analog cockpit was the only thing that, compared to the rest of futuristic technologies used in the Oxcart and Blackbird, seems completely out of place:

Fascinating photos reveal how they built the SR-71 Blackbird

You can see it in ultra-high definition here. And get the explanation of how it works from a SR-71 pilot here.

One last factoid:

478 total people have flown the Blackbirds. More people have climbed to the top of Mount Everest than has flown this aircraft. Although a few Lockheed crewmembers were killed during the testing stages of the Blackbird, the U.S. Air Force never lost a man in the entire 25 years of active service. The SR-71 flew for 17 straight years (1972-1989) without a loss of plane or crew. Considering the environment the Blackbirds flew in, that is an enviable safety record.

According to Kelly Johnson, no SR-71 was ever touched by any of the more than 1,000 missiles launched at these birds since its first mission to 1981.


SPLOID is delicious brain candy. Follow us on Facebook or Twitter.

via Gizmodo
Fascinating photos reveal how they built the SR-71 Blackbird

Adware Medic Removes Macintosh Malware

Adware Medic Removes Macintosh Malware

Mac: Although Macs don’t often get malware, they aren’t immune. If you don’t have a good Mac antivirus program installed, or something slipped through, Adware Medic removes common nasties.

Adware Medic is an on-demand anti-malware scanner (rather than an always-on antivirus program) that removes adware from your Mac. Most of these infections hit browsers like Safari and Chrome, and are more of an annoyance than an actual danger, but can be tough to get rid of.

AdwareMedic | The Safe Mac


via Lifehacker
Adware Medic Removes Macintosh Malware

What This Video Of Jordanian F-16s Striking ISIS Tells Us Is Alarming 

What This Video Of Jordanian F-16s Striking ISIS Tells Us Is Alarming 

Jordan has released a video montage showing the kickoff of its retaliatory air campaign against ISIS in Syria. Over 20 Jordanian F-16s struck ISIS targets while US F-22s, F-16s, surveillance and tanker aircraft supported them. Although the idea of such a campaign represents a powerful show of force, the video hints at a much grimmer and more questionable story.

Beyond the messages written on bombs and the noses of Jordan’s second-hand F-16 fleet, most making declarations against ISIS’s ideology as well as proclamations of vengeance, what was most noticeable in the video was all the dumb bombs (Mk82, Mk83, Mk84) loaded onto the aircraft. In other words, few jets appeared to have precision guided munitions loaded onto their weapons stations, and those that did were equipped only with a pair of relatively small and older, but still effective, GBU-12 laser guided bombs, which are more suited for taking out small buildings and vehicles than large fixed structures.

Even when deployed from an advanced fighter jet with digital avionics, dumb bombs are much more accurate the lower they are released. As the altitude of their release increases so does their Circular Error Probability (CEP), in quite a drastic manner. Using this method of weapons delivery from over 15k feet, above most man portable air defense systems (MANPADS) and anti-aircraft fire, makes hitting individual structures very problematic. One way to overcome this issue is to throw more sorties at each target, but for each attack made the risk to aircrew making follow-on attacks increases. In fact, every extra minute over enemy territory increases the risk to aircrews. Additionally, and even more importantly, these bombs end up exploding somewhere regardless of if that somewhere is playground or an ammunition dump full of enemy fighters and their use greatly increases the chances of unintended causalities.

On the other hand, if Jordanian F-16s are flying at low altitude, right into the heart of the MANPADS, anti-aircraft and even small arms fire envelope, in order to more accurately deliver their unguided weaponry, then that is a very poor and dangerous decision, both for Jordan and the coalition. Bravery aside, doing so could puts many more coalition warfighters at risk as the chances of an aircraft being brought down are quite high. This means a combat search and rescue (CSAR) mission would most likely be launched, which is another low altitude and even riskier affair that could result in an Osprey or Black Hawk full of pararescuemen being downed as well. The startling possibility that Jordan may be putting aircrew at high risk due to the possible lack of adequate guided munitions also comes as US CSAR assets are now confirmed to be operating out of northern Iraq, a move that seems extremely overdue.

What the widespread use of dumb bombs by Jordan equates to is a set of puzzlingly simple tactics being used, ones that are highly ineffective or highly risky, while trying to obtain a very complex outcome. If Jordan hit all high-priority targets on a targeting list, they are either doing so at great peril to any innocent people nearby, or to themselves and the coalition, or they are creating a target list based on their limited weapons stores and capabilities.

This would mean that they could be selecting a few high-priority urban targets for precision guided munitions and the rest of the targets would be those in rural areas with little potential for unintended casualties when dumb weapons are applied. Either way, dictating what targets you hit, especially on the first day of a highly invigorated air campaign, based on the limited munitions you have at hand is a poor way to fight a modern air war in 2015 and it could usher in either a large loss of innocent life, which could dangerously erode support for the operation as whole in the region, or Jordanian forces are mainly hitting very low priority targets that are located literally in the middle of nowhere.

What This Video Of Jordanian F-16s Striking ISIS Tells Us Is Alarming 

Another issue that could have led to the use of so much unguided weaponry could be Jordan’s lack of targeting pods for their F-16AM/BM fleet. Costing millions of dollars themselves, they could be, and probably are, in very short supply. This would make the delivery of precision guided munitions impossible for much of the RJAF F-16AM/BM fleet as Jordan has not purchased GPS guided Joint Direct Attack Munitions (JDAMs) that do not require a laser targeting pod when used against fixed targets.

Considering that the video is showcasing the first ‘shock and awe’ strike by Jordan, the fact that only a small portion of the jets are using precision guided munitions also makes it fairly clear that the Jordanian Air Force is not really in a place to sustain an effective air campaign over time on its own. With this conclusion in mind, it makes much more sense as to why King Abdullah was in Washington literally begging for ‘expendables’ (munitions, countermeasures, and fuel, as well as certain spare parts) so that they can take on ISIS for the long haul. Although the King’s weapons supply situation seems more dire than imagined as it is not just a question of his forces running out of precision guided munitions sometime in the future, but it is one of not having enough now.

Then there is the question of the target list itself that Jordan pursued on Thursday. After months of bombing, and even the use of American F-22s in an offensive strike role, why do targets remain on a list that are so large Jordanian F-16s can go after them using unguided weaponry? At this point in the game how are there any targets on that list at all? The answer may be much more damning for the U.S., which leads the anti-ISIS coalition operating over Iraq and Syria, than for Jordan, as any sustained air campaign that is many months old should have wiped out all of ISIS’s fixed targets early on, with new and time sensitive ones being dealt with on a very consistent basis. This is especially true considering that ISIS does not possess an integrated air defense system or any aerial defenses at all beyond shoulder-fired missiles.

What This Video Of Jordanian F-16s Striking ISIS Tells Us Is Alarming 

If the U.S. is in fact dragging its feet when it comes to striking ISIS targets deep inside Syria then the whole operation needs to be questioned. If this is not the case and these are just new targets acquired from recent intelligence, then how are they magically low enough of a priority to have Jordanian F-16 pilots slinging dumb bombs at them? Or if they are not new, but are of such a low priority that they were not even worth hitting with precision weapons by coalition forces long ago, then why on earth are we risking Jordanian and American air crews on them at all? If ‘optics’ is the answer then Washington has some serious explaining to do.

If Jordan’s use of a large portion of dumb bombs on its first ‘alpha strike’ against supposedly key ISIS targets in Syria is a matter of lack resources on Jordan’s part and lack of prior commitment on the coalitions part, then the U.S. should immediately transfer large stocks of precision guided munitions, targeting pods and spare parts to Jordanian forces to that they can continue to do what the US and the coalition will not — keep the pressure on ISIS in their own backyard via precision air power. Additionally, considering it costs America way more to field similar expeditionary forces in the region over the long haul, reinforcing Jordan’s fighter and ISR (information, surveillance, reconnaissance) fleet should be examined in the near term as well. There are plenty of used F-16s available and U.S. stocks of precision guided weapons are better off being used by Jordanian pilots protecting their own region than American ones sent there to do it for them.

What This Video Of Jordanian F-16s Striking ISIS Tells Us Is Alarming 

In the end, information is a powerful and proven weapon in its own right and an uplifting montage showing Jordanian fighters taking the fight to the enemy in order to avenge their countryman should be a powerful weapon for the coalition. Yet, in this case, when you look closely, the reality is exactly what I predicted: issuing strong statements and putting fighter jets in the air does not equate to a solid strategy with a plausible endgame of defeating ISIS in mind, and King Abdullah knows this all too well. The evidence is in his hat-in-hand trip to Washington paired with the clips seen in this video depicting inadequate weaponry being used in inadequate volume against an asymmetric and powerful enemy.

Then again, the same can be said for the entire anti-ISIS operation as a whole. There have been endless soaring statements on the need to act decisively to defeat ISIS by many nations, and especially the U.S. and Britain, and there has been a lot of jet fuel burned in the process, but is there really a plausible strategy for victory, yet alone the resources available needed to realize it?

No, not by a long shot.

Tyler Rogoway is a defense journalist and photographer who maintains the website Foxtrot Alpha for Jalopnik.com You can reach Tyler with story ideas or direct comments regarding this or any other defense topic via the email address Tyler@Jalopnik.com

via Gizmodo
What This Video Of Jordanian F-16s Striking ISIS Tells Us Is Alarming