Home
        Randy Julander presents “Snow Survey and Water
         Contents
1.      Tal           z      E          E       1 technolytics          Results 1  10 of about 581 000 for lose laptop   0 28 seconds  d 91271557     Last month  the  human verification  tests  which typically  require users to iden   tify deformed letters  set against a cluttered  backdrop  were bro   ken by a computer    The test is called  CAPTCHA  which is  an acronym for  Com   pletely Automated  Public Turing Test to  Tell Computers and  Humans Apart   As  the name suggests  it    Page 17 Blue Chips Magazine     May 2008    is a test that determines the probability  of the solver being a human  The letters  are supposed to be impossible for com   puters to read in the time allotted  but  is relatively easy for humans       To send a message             Ue  character Fs ou gee      this picture    CBE 12  x WX           ant         rh Boe                   YAY7D       The computer then repeatedly  created free Hotmail e mail accounts  and sent spam from them  according  to Websense  the security firm that  detected the hacking        Solving the  human verification tests with comput   ers allows spammers to rapidly create  new e mail accounts from which to is   sue spam  which is estimated by Ferris  Research to cost the U S  economy  42  billion annually         702 869    Briefs Distributed WorldWide       Current Spy Ops Briefing Data   lt www spy ops com gt    Date  Monday  April 14  2008  Title  Hacking gets physical  Briefs    The first computer attack to inflict  phy
2.      You      ALWAYS    IT   S ALL ABOUT MONEY     ANO  IT COULD EASILY  BE YOURS                    Created with Comic Book Creator         Page 12 Blue Chips Magazine     May 2008            Qt  ge nori    Per Record Cost Of Breaches  Keeps Going Up   197       Por record cost of a breach       2005 2006 2007    Data  Ponemon Institute survey of 35 companies that experienced  breaches involving the loss of personal data during 2007    DYCRAV   EZ as 1 2 3  Automated Encryption  AutoEnc     AE      Brand New Security Technology Paradigm Shift      AutoEnc        hnamk  USE   i               3  Factor Auth      FOBBRACHLDON        CAM  amp  Encryption                                        1 4                           F  TVDUOMESLZI    GZPBTDUNCFTYKE    RODNGAZLCEBYN                           urToOMPTYOQSBOWTYI    XTRJLAYNGATIO        IBTMTORASKVEP       Automated Encryption                           la                 1                                             eral    KISS  The  zum Highest and Safest   Level of DnD    Dynamic     Secure   Digital Data Management  Stordge    Handling  amp  Transportation    Created with Comic Book Creator    Page 13 Blue Chips Magazine     May 2008     STEALING     amp  YOU                147    4d    Cloned Credit Cards Are    Stealing Yau  Claned Credit Cards Are  Stes    Clanad Cradit Cards Are  Stealing  ad with Comic Book Creator    Page 14 Blue Chips Magazine            2008          ned C re dii    gras s ps      E Mire fL    HIT 
3.      as one derivation   and    I get it  Yes sir  Rock on     as  another    BIW Here   s the only    Gumment  Employee    who definitely knows how  to take back something that has been     stolen from him    in this case  his sleep    GOD Bless  them all  Hurry back  home safely  our young heros   Well done   See Security Related  News  amp  Views 101  cont     Outlets  and Updated Information immedi   ately following this review        About Copy 2Go Storage Solution   USB Drive    I must admit that it took me a  little while to figure out the real  or  imagined   difference between a 2Go  Drive  2GD  and a Copy2Go Drive   C2GSS   They can be synonymous   meaning they can be one in the same  function   alternatively  and more likely   they will be entirely unrelated  as the  titles imply  Let me try to explain that  conundrum for you    A Copy2Go Storage Solution   C2GSS  is the state   of the art standalone  USB 2 0 Hard Drive  manufactured by CMS   Duh  It is sold in two   2  sizes  60MB and  100MB  It is an ex   tremely handsome  piece of hardware  to  say the least  Plus  it comes with its own  beautiful traveling case  as well  It works   Best  hand in glove with the Copy2Go  Professional Software  C2GP    BIW that s why C2GSS is named like  it is  and what it is originally designed  for  but  repeat but  it can be equally as  effective as a standalone USB HD    exactly like any other USB 2 0  Storage Device   I   m making a fuss  about all this  because this is my 17
4.    USB Storage Device review herein BCM   and this one s a genuine beauty  Then  too  simply because I really didn t fully  understand the differences initially   because of the similarity of their  names  Clear as mud  Right                    Let   s clear up the muddy waters  a bit  The 2Go Drive  2GD  is exactly  what is says it is  It is  The   repeat     THE    2Go Drive located on the Right  Hand  i e      Storage Side     side of the  Copy2Go Professional   s Simple     Intuitive    Interface  The My Com   puter   C  Drive  et al   is located  on the Left Hand side of the C2GP  Interface  C2GP s Center Section is  the  Common  View Area wherethe  contents of your  On going Project   are stored   at your  Beck and Call     awaitingfurther action  See graphic and  C2GP explanation below      Whew  C2GSS s installation is a  piece of cake  It s exactly like all other  USB Storage devices today  except it s  prettier  CMS provides a power cable  in case your computer can t handle the  C2GSS  but in this case you connect the  cable to a SEPARATE USB PORT   The C2GSS comes pre formatted as  an NTFS volume  Once the C2GSS  is seen in the  My Computer  option  of the Windows Start menu  you are  ready to install the Copy2Go Pro   fessional Software  C2GP   BTW  Minor inconvenience  You must  have Microsoft Framework 2 0  installed on your computer  If  you do not  C2GP will guide you  through that too    FYI  Any  repeat ANY  external  USB Storage device can do the  same job 
5.    restore and manage files configured by  users  C2GP serves as a content man   ager by providing a gateway  or digital  bridge  between a portable or desktop  computer running the Windows XP     Vista OS and a wide array of stor     age devices   More specifically  CMS Products     Copy2Go Professional Multi   Media Xplorer is the ultimate tool for  managing your important Multi  Media  files  Represented in a Simple Intui        tive Interface  C2GP  sports a very easy to navi   gate interface  With it   you can easily and  quickly    1  Perform       Operations Straight  From That One In   tuitive Screen  What   s  more  you can easily view  photos or listen to pre   views of music files all  from within C2GP    2  LOCATE the files  you want  click on them   and let C2GP send them    to the storage device    of your choice   3  FIND your Multi     Media files in a flattened  folder structure  elimi   _ nating the need to wade    through multiple levels  of buried and hidden    folders  You can even do    Page   Blue Chips Magazine     May 2008    a keyword search on file names    4  VIEW your Multi Media files as  thumbnails  or expand your image  to full screen for a better view  The  built in slide show viewer allows you  to manually  or automatically  move  quickly between files within a direc   tory    5  SELECT your Multi Media files  using C2GP s  Sticky Selection  feature   Select and maintain files across multiple  folders without losing your previous se   lection
6.  Monitoring   Key Strake Loggers    SnoopStick    Product ID   TH SNSTE  Price  45 00                  KeyCarbon 512K Home    Product ID   ES KECUSBHOME  Price  99 501               KeyCarbon 1 5     USB Corporate SE    Praduct ID   ES KCUSBSE  Price  120 304            KeyCarbon ZME USE Forensic    Product ID   ES ECFOR  Price  174 50         2    USE Key Logger Including         amp  Linux    Product ID   TH USBEL  Price  119 504  KeyKatcher 128K Family    4  X    Product ID   ES EK5  Price  39 50    KeyKatcher 256K PRO         _ ProductID                   Price  49 504  KeyKatcher MAGNUM 4hib    i       Product ID   ES KEMAGHUM  Price  73 50               KeyKatcher Mini 64K    Praduct ID   ES EKZ  Price  29 304            Security 1 5  Whole Disk Encryption Apps   7 Whole Disk Encryption Apps  Put A Lock On Data  TruCrypt   Also used in CE Secure   PGP   FreeOTFE  BitLocker  DriveCrypt   and 7 Zip provide remarkably  strong  on the fly  encryption to  keep your data secure from loss   theft  or prying eyes     See  lt http   www informa   tionweek com  news security   privacy  showArticle jhtml articl  eID 206905765 amp pgno 1 amp query  Text  amp isPrev  gt      By Serdar Yegulalp  Information   Week  March 28  2008      Few IT professionals need to be    lectured about data security       too  frequently we hear of the theft or loss  of a computer or hard drive with data  stored in the clear   without encryption   Fortunately  on the fly data encryption  is no longer s
7.  Watch your six          SURVEILLANCE EQUIPMENT    Utah Blue Chips Calenoar  May 2008  June 2008       Sunday Monday Tuesday Wednesday Thursday Friday Saturday           11 May 12          13          14 May             17    UBC  General Meeting    U of U   7 00 p m           Weather   E    N     E  Magazine      JT     FL be Deadline    May 1  May  9       May 28      May30 May 31                Jun   Jum 2   Juin 4 Jun 5   Jum     UCS  Board of  Trustees  C amp C Bldg   Room  N3005  6 30 p m     Jun 5        9   Juin 10   Jun if          12 Juin 13 Pn   f    UBC  General Meeting    UofU 4  7 00                                         Deadline    Jun 15 Jun 16 Jui 17 Jun 15   Jun 19   Jun 20           21          
8.  ing review on the very next page  which  must obviously be Security  based   I  leave you with this quote from Robert  Lewis Stevenson  who most surely must  have been pondering the  Nemesis of  All Security      Static    Passwords  PIN s  and UserNames     when he wrote     You  cannot run away from weakness  you  must sometimes fight or perish        Ciao                 JUST FOLLOW  THE BOUNCING                 SADDLE AGAIN   WHERE A FRIEND IS A FRIEND          AE D  BACK TN TH THE 5 SADDLE AGAIN  RIDIN    T  THE PANDE E  TOTIN  MY OLD 44  WHERE YO  EU M EVERY NIGHT  AND    BACK IN IN THE 2 SADDLE AGAIN              jy WIC       4 i         20  Ol  2       CREATE YOUR MWN  PHOTO BODES   COMIC ROOKS  e STOR THORS  B MINUTES                    VV LACE ORE  CHOOSE GLIM CHIPS A MAG AZINE   MAR  2008 ARCHIVES  EEE SELEST 78  ADF VERSION  FCR ITS PEALT                   11 Blue Chips Magazine            2008      spying and now have   more than 800 cases  currently uncer                             Feds Lose Laptop    Containing Sensitive Data   Again    1  urne         made                  Com E LOC mg unencrypted           Ils 01              art ants in an                     iri i  m eder    T                            wi Ern et perl 1      a   2008  but it s not a joke  Mo Sheel       Google   bum                    sed       b Results 1  10 of about 581 000 for lose laptop   0 28 seconds       No Matter What     DU    Road You Travel   T       E With Digital Data      
9.  push comes to shove   with minor exceptions  See be   low    For example   SIZE DOES  COUNT  IN CASE YOU               DIDN T KNOW        the more  reason to have a C2GSS  or two  2    the  Big Guy on the block         Copy2go Professional Overview Diagram    oo     Types of  Storage Devices  Associated with   Copy2Go Pro     Software    App    Sytem Line               Letter Aon geri  By Windies             6 Blue Chips Magazine     May 2008    Note  C2GSS HAS BOTH THE     Copy2Go    AND    U3Copy2Go     Applications pre loaded on it   Therefore  it is not absolutely  necessary to install C2GP from  the Installation CDROM  nor pur   chase C2GP separately for  39 00   etc    which you can do BIW  Thought  you might like to knowthat little tidbit   Also  the C2GP User   s Manual  from  off the CDROM  is pre loaded on the  C2GSS  so we don   t have to dig out  the CDROM again any time we have a  question  or two    Guess what  You re now all set  for the  Big Gun   Copy2Go Profes   sional Software installation      22       3  The Ultimate  Multi Media Manager       A r rfr          Ur       DET apre Tte            TL y FNERIT           About Copy 2Go Professional  Software   Copy2Go Professional  C2GP   Multi  Media storage solution for Win   dows XP  and  it s also VISTA Ready   1   Istheultimatetool for managingimpor   tant Multi Media files  C2GP software  allows users to find  view  select  edit   transfer and group Multi Media cre   ations including image files  video fi
10.  showing up in 0 28 sec   onds  and after going through the first  60 returns  I gave up in total disgust  and shook my head vigorously  Noth   ing ever changes  it seems  Well  how  can it  really  The End users aren t  the only ones who never change  Aha   That s why we re doing this     Google saris         Search    More to the point  the following  Latest Security News is just a taste  of  what s been going on the past six   months  or so  at a location near you      And  the breaches only get worse with  time  Like I said     It   s all about money   pure and simple     folks     Per Record Cost Of Breaches  Keeps Going Up   197       Per record cost of a breach    Data  Ponemon Institute survey of 35 companies that experienced  breaches involving the loss of personal data during 2007    Which translated only means     Ev   eryone has to prepare themselves for the  worst  my friends  it   s definitely going  to happen to someone you love  maybe  even you      Security 1 3 Latest  Security News   I always run across some of the most  interesting    stuff    while researching  these reviews  This for example    Unsolicited e mails  Comput   ers mimicking humans crack  code  A machine was able to  decipher wavy letters to create  Hotmail e mail accounts to send  spam   By Peter Whoriskey  The Washing   ton Post  Salt Lake Tribune 05  02 2008        http    www sltrib             technology       rch  Preferences           Web       Likelihood of Occurrence    fence    E   
11. Access Management           ignominiously used in conjunction with  Usernames and PINS  and  2  Used in  encrypting things  such as Zipping  To  be sure they are all    extinct        TARN  TOOTHED TIGER                                           LIKE US   THEYRE                      EXTINCT    By way of explanation  2  months  ago  March 2008  I kick started my  attack on  Static Passwords   as they are used within the  gentle  confines  of Comic Book Creator 2 s    CBC2   Zipping  capability  which  can be employed while  Publishing   newly created Comic books  Then  too  last month  April 2008   I did  the exact same thing again with Nero  8 Ultra Edition s   N8UE     Zipping     capability  also with    Static Pass   word    protection    I admit is was a bit of a stretch to  include    Password Protecting     a ZIP file as a    Security related    Ap   plication  but in truth  that   s exactly  what it is  You may not have thought  of it that way  but let me ask you this  question  Why    Password Protect     your file in the first place  or even at  all  What   s the Password for  J ust so  you can pick up the phone and tell the  recipient on the other end what the     Static Password    you used was   Oh really  What you really wanted  was privacy  which is just another  word for security  that   s all     Page 19 Blue Chips Magazine            2008               Robert Siciliano  Identity Theft Expert and CEO  IDE         Dorn       Security 1 7 Last  But Obviously   N
12. This Month   s Presentation       Magazine    Volume 26  No  5 May2008    eae eee Randy Julander   This Monti Meeting  presents     Snow Survey and   Check Out the Water Forcasting     Review of  Copy2Go  Professional    Software and  Storage  Solution   oh Page 4       Utah   s Award Winning Computer Magazine        I Need One of These for      Brain       Researchers at HP Labs have discovered the existence   of the    memristor     electrical circuits that might lead to   computer systems with memories that never forget     Memristor is short for    memory resistor     They con   sume less power than current systems   and computers based on the memristor  would not need to be booted up     If I had one of these in my brain   my poor memory would disappear  and   maybe  I wouldn t need a cup of coffee in  the morning to get me started  But then  again  I might need XP or Vista to run it   and I don t want Microsoft in my head     I Phone Advances   A University of California professor is working on  an small imaging machine that somehow connects to a  regular cell phone  It would send images to a doctor or  hospital for a speedy diagnosis of a problem  I would be  a boon to remote parts of the world where medical as   sistance is in short supply  It would also speed up things  in the US as well  A quick diagnosis of a suddenly severe  problem will save lives     Perhaps someone someday will find a way to include  the scanner in your cell phone  Then  for example  if you  th
13. WIT H NO  LONGER A  BLANK CAQD     Claned Credit Cards        Stealing          dd wth Comic Book Creator    Page 15 Blue Chips Magazine            2008       Security Related News and Views 101    Reviewed by Don Nendell    Prolog   Yes  I   m back in the saddle  again  It   s been over six months  now since my last Security 101  column  long enough  because   there   s no turning back to    naive   ty     ever again  at least as long as     They    are out there out to get you   And    They    definitely are folks   make no mistake about it  This is  not meant to be a scare tactic  it   s  simply a    Fact of Today   s Everyday  Life     Get used to it     It   s all about  money           Security 1 0 Security  Facts of Life   I would guess t mate that fully  50 75  of you out there reading this  have very little  if any  to do with the  day to day business world     You   re  simply an End user     you say  Wrong   You re in the business world all the time   whether it   s at the super market  on line  banking  chatting on your cell phone   accessing your PDA  laptop  Blackberry   or doing virtually any type of    mobile   telecomputing           The catch  Truth be known  in  the eyes of a potential thief  you are  really no different than any other  mobile employee of some business   or other  Thieves initially can   t differ   entiate between the two of you sitting  side by side in an airport using your  mobile device s   or at a Starbuck   s  remote terminal  or most 
14. buch Mp ede meran dinves  flash cards           DVDs            al cameras an Ana ccrta ne co             sr selected Multi Media fies                     1 Fidi  Vie  Select       E Backup         imponi              iln    raw     leac aic n  da     vri    peor tries           Emily cena          wiha  mutile dide    Select lim bom vaihin maliiple                     Create pour cram  gropii ul  valet Las idea ds                eve toner operation       ipea mi le click                ch  wh         SELL poor mpi is vari     pr     molriie                           iH cnm             fies          EE                gm                    EM               puter on and find that the drive has  crashed and the photos  music files or  documents are gone  Using Copy2Go  Professional keeps all of those valu   able files safe and secure      Why Use C2GP    Hard drive capacities have grown  tremendously overthe years  See above   making it difficult keeping track of many  image  audio  movie and document files   C2GP is specifically designed to easily  locate these files that are often scattered  amongthe hundreds of gigabytes of stor   age present on today s modern computer  systems  Once located  these files then  can be viewed  played  copied or even  backed up to a mobile storage device  such as an external hard disk  USB flash  drive  UFD   digital camera or MP3  player  et al  C2GP uses a mobile storage  device  Copy2Go Storage Solution   C2GSS   See above  to collect  backup
15. een                                                            v the             corte wc                  Chee current folder bars           m                          um           color    Page9 Blue Chips Magazine     May 2008    2go Drive Side Active    Basic Functions   Backup and Restore    bey Ph due  denen    4 Cole nor  dee                star inhares        Cee  Pare    Cond iguratica                dor Rarkup      an   Restore      m global                  mrg            cre              Pe es bo boh Puree     Um dir left      thee cng eee for                Al       eer     The calgary conl gare dace                  Proewiew Central   Lor apr ton                    cau  Din        ate  Uraga  Mie  Wiens zr Doc   AI Hos         lor                                 pn Hub elected  dieses                                 Freed  DI Ha            ipay ol h        m greater an fhe                        at                  Paice ia                                    mus THE d AER         Revere      eerste         al the Conon Fla             to the Ay            cere                                                HE Inlormaliese Lermiral Fama       Created wih Comic Book Creator            In Summary   C2GP is extremely valuable in as   sisting me in locating graphics for these  reviews  graphics that are scattered all  over my computer  I mean    Scattered         Splattered     It   s    Tornado Alley    in  spades out there  folks  Now with C2GP  I am presented a th
16. ense Department cur   rently is detecting about three million  unauthorized probes on its computer  networks every day and the State De   partment fends off two million probes  daily  That being said China has pen   etrated key government and industry  databases in the United States  The       advanced attack used    key loggers      my emphasis here  as downloads at   tached to phishing email and social  engineering to compromise the systems           T  x   n         24  2008       Date  Thursday  J anuary  Title   7 1 Billion Dollar Fraud  Briefs    French Bank Societe Generale          ond largest bank in France  announced  today that a fraud committed by a single  trader had caused it a 4 9 billion euro    7 16 billion USD  loss and that it  would seek emergency funds as a result        he 31 year old trader  insider  was  said to have extensive insight into the  operations of the computer system  and  used stolen Passwords  that aided  in his ability to commit the largest fraud  in history     Security 14 Digital Spy Tools    The Covert World of Espionage         FYT Key loggers are very easy to  buy all over the Internet  Anyone can  do it  especially crooks  Here   s but one  example from my favorite    Security     Magazine  Eye Spy    Note  At the Eye Spy online store     lt www eyespymag com gt    you can buy a  whole host of    Spy Gadgets     naturally   including    Key loggers         Page 18 Blue Chips Magazine            2008    Key Stroke Loggers    Computer
17. ery single  day  since it came out more than 16  years ago  it s actually a Windows 3 1  version  you know   Yes  that  B  Drive  still works very well  thank you  But  I  digress  this is about storage  isn t  it  Oh well   Same song  different  verse  could be better  could be  worse       Third   Remember  obsolescence  is by design   not just in data storage  media but in pretty much anythingthat s  sold nowadays  They have to keep com   ing out with new stuff for us to buy and  convincing us it   s better than the old  stuff  or they d go out of business     Not  a coincidence    FYI MBA s the world  over are taught this underlying  Suc   cessful Business  principle  They even  have a name for it  It   s called  Planned  Obsolescence      But  you don t have to wait that  longfor a great storage product to come  along  it s already here  It goes by the  name of CMS s Copy2Go Storage  Solution  i e   USB 2 0 External  Hard Drive   And  it gives me great  pleasure to review it for you here and  now  What makes me most excited is  not only what it does  but most especially  theapplicationsthat come  and work   with it  They are  1  Copy2Go Profes   sional Software  and 2   Optionally   also from CMS  CE Secure Vault Edi   tion Pro Data Encryption  See Part  2 next month   Hoo aah    BTW Did you ever wonder  what that stands for  From Ghost    1          Blue Chips Magazine     May 2008        Wars  2004   Steve Coll tells us  it   s     Heard  Understood and Ac   knowledged
18. este en   brc ar   Pos       LL      Hirn  Fin xmi dat km m   oom bp  om numo 5a amcmil emm  Fe pm meri miii ee    yari    Opening Screen    Basic Functions  Sides  Categories  Drives    These two bubons ore              and set the         xa           cong n nol ported    The miie vide controls Fa jiona Central                         panem    the catagory bine     Page 8 Blue Chips Magazine     May 2008    It s Easy To Use   And Here s How    F       Dag ame lle i aem bee soe            v    puma rg Pad a dm bitum  Fire          aes mS Ler  Che ign hiire sole             lie                                          ay                        jey                 Yad                Phen LL                    Ug red Fike ba Ay Camper    Screen Annotated    Created with Comic Book Creator          Folder infonnation            ae  ee tne prt E      Teo holder            Bey computer biir and zs i  bul        bras ri gon dH a Der mh  Ew ume       ol bam information     Bag heh Phy                  Folter  hakir B   gest            bu Maecen       Cane            ivi          Hp              iti       ai    eie     Formal      Se dapured riran                    For alba          ee      pe    Fi         vieles           er               Pokker Same                   Sambi                      bey Eras                               ju                                             ci bet          bey           ah     SR              an                 central after the Fodder Fuss b
19. fically  instead  of merely  Crying  about it  simply  because we are  all  at the mercy of  would be  actual thieves  et al    See  lead in graphics pages once again   such as those shown in the excellent  presentations on ABC WorldNews  with Charles Gibson  re   Thieves  May Be Stealing and Selling  Your ID  How Do You Protect  Yourself From Online Crooks    Apr  30  2008    How Identity  Theft Happens and How to Pro   tect Yourself  Most Common  Ways Your Identity Gets Stolen  and How to Fight Back   May 1   2008   and   Crooks Have Your  Card and You Don t Even Know  It  How Thieves Copy Credit  and Debit Cards and Drain Ac   counts   May 2  2008      Note    See the original broadcast s   for yourself at   lt http   abc   news go com Technology   story  id 4773999 amp page 1 gt              20 Blue Chips Magazine            2008       ABC WorldNews certainly de   serves a resounding round of applause  for this great    educational    community  service about Identity Theft to all of hu   manity  Thank you ABC  Mr  Gibson         all of your staff  Well done     Prolog   John Steinbeck wrote     Must  the hunger become anger and the  anger fury before anything will be  done     Recent statistics indicate  that an identity is stolen every  three seconds  Best of Luck    Til the next time     Stay Safe        Ciao     Footnote  1 See the actual Reviews in the Blue  Chips Magazine Archives at  lt www ucs   org gt   Note  Always choose the  pdf for   mat for its beauty       
20. ink you broke your leg  you could  x ray  it  send itto a  doctor or hospital and get a professional opinion quickly   They could then send you  or talk to you  information as  to what steps you could take to alleviate the situation     Some researchers have already developed wireless  Band Aids containing RFID chips that transmit informa   tion to a cell phone     Itis speculated that when  not if  this cell phone con   nection comes to fruition  it will greatly reduce emergency  room visits and provide better and quicker relief to any  emergency     Recent  Trends    Gone Phishing  See the Sign Upon the Door   Last week the Internet Crime Compliant Center is   Sued a warning about a phishing scam designed to steal  your personal information using the tax rebate check  as bait     The phishing messages claim that the  best and fastest way to get your rebate is  through direct deposit  They even include  a Web link to a site designed to fool you  into believing that providing your per   sonal data will speed your rebate     It even includes a fake IRS message  that warns you that failure to submit  information may delay the rebate     These pirates are getting more devi   ous every day  I received a suspicious E mail afew weeks  ago from    Hallmark Cards    that told me that a card was  waiting for me and all I had to do to view it was click  on a button  When I clicked on the button to  view  it   a box came up asking me where to download the  exe  file  I quickly shut it d
21. ize is 71   2    10 inches  All other page sizes are based on a 7 x 10  inch page in order to conform to editorial style  Half page ads may be 7 x 5 inches  or 3  x 10 inches  Quarter page ads are 35 x 5 inches  Business card ads        3   x 2  inches     Classified Advertising  Utah Blue Chips members may place personal classified ads at no charge   Maximum ad size is 7 lines  35 characters per line     Submissions   Members are encouraged to submit text articles for publication in ASCII  text only  Photos in  TIF or  JPG format only  Line graphics  tables  in almost any  vector or  TIF format  Do not imbed graphics or tables in text files  All articles  must be received by the 75th of the month preceding the month of publication  All  articles become the property of the Utah Computer Society and by submitting an  article  the author gives permission for the Blue Chips Magazine Staff to edit the  submission  The author also gives permission for republication in other users groups     communications     Permission to Copy  Permission is granted to other nonprofit PC user groups to reproduce any  article published in this newsletter  provided credit is given Blue Chips Magazine  and the author  s  of the reproduced materials  Reprinted articles are subject to the  terms of their respective copyright holders     MONTHLY MEETING LOCATION  2nd Wedn                CENE  University of Utah  Union Building  7 00 p m        apcug    Charter Member of the  Association of PC User Grou
22. l  Software  for now  thank you very  much        However  a couple of pertinent     Talkback   s    concerning Harris    blog  do beg repeating here  for some very  obvious reasons  They are    First     When Pioneer first came  out with their CDRW drives  1998  the  price was  50k  These  new holographic  devices  are cheap in comparison  In 5  years     there ll probably be a bigger     better  and  faster solid state  no mov   ing parts  drive on the market though   making this one obsolete       Second     The problem with storage  technology is that it becomes obsolete  too soon for one reason or another   storage provider goes out of business   competing formats confuse the market   place  a newer better format takes its  place       Psst  That may be well and  good  but I have all of that old stuff  lying around still   being a first adapter    reviewer  you know  J ust to prove it to  you  I   ve scanned in two  2  old boxes   the first of which  is possibly the first  of the laser based technology storage  devices  Imation   s 120MB Super Disk   It still works  of course  Note  It   s the  same size as the old 3 and 1 2    floppy    Y NATION     LEM        r Carpztible        disk  remember those  BOH  Bit of  History  Back on 2  13  94 Donna and  I bought 300 recycled WordPerfect 3 5   Floppy disks  For a UCS Fund Raiser   for the unheard of price of  0 15 each   And  to this very day  I m still playing  QOP s fantastic Solitaire s J ourney  on my Windows XP Pro ev
23. les   audio files and documents  A keyword  search by genre is included  while the  built in slide show viewer enables us   ers to move  manually or automatically   quickly between files within a directory   and  2  Automatically searches internal  and external storage devices including  hard disks  memory drives  flash cards   CD DVDs  digital cameras and MP 3  players  as well as  other removable  storage devices to find and present  Multi Media files  Thanks to a single  screen format and an intuitive layout   using the program and backing files up  is a snap     Multimedia Management  with          Because of the explosive growth  of irreplaceable digital photos  video   music and documents stored on com   puters today  we developed Copy2Go  as a media management tool     ex  plained Ken Burke  president  CMS  Products     Copy2Go Professional  allows people to quickly and easily find  their valuable photos and other data on  their computer s internal hard drive  and  then back that data up to the external  Copy2Go Storage Solution  USB  drive  for safe keeping   He continued    no one wants to turn his or her com        The Ultimate             Multi Media Manager    EMS Produc perita fessional MultiMedia Xplorer is  the ubimate tocd for managing eur important Mul              files  Wish Biene an hn a WH        e      transier  and nm idem    Mu pus dia ludin image fles    video files  audio files       E      mad               r internal and external storage           
24. likely  at any  other public place either     You both are  targets of highly organized  absolutely  diabolical  thoroughly unethical  illegal  and debaucherous  and totally dedicated  thievery     If you are careless about your  activities in public   yes  even at home    you have a target on you back that says      Money     And  in the end  that s what  it s all about    M O N E Y       It is under   stood that the    business  aka    1 mobile worker   3 is pounded on  daily while at  work to strictly  adhere to in   house business  safety and security procedures at all  times  repeat all times  However  most  of us  naive  End users don t have that  constant reminder to be ever alert and  safe in our day to day computing ac   tivities  Mobile workers fall into that  identical rut the very instant they leave  the confines of work  They  in effect   become just like us  the every day End   user  They relax their vigilance because   Big Brother  isn t watching any longer   orso they seem to think  However  other   creeps  immediately take their place  outside in the  Watch Zone   You  may recall the old B W TV series             Twilight Zone with Rod Sterling    Same difference   same results    Boo  They Got You            The mobile threat landscape is  far and wide     writes Christian Perry   Securing The Mobile Worker  Don t Let  Company Data Escape Through Em   Page 16 Blue Chips Magazine            2008    ployees  Processor Magazine  4  18 08   p  10  See the full a
25. nt the  ways     Ugh    1  However  you can  actually see C2GP in operation for  yourself by watching the CMS  Adobe  Captivate  Video Demonstration of  C2GP at     http    www cmsproducts   com  products  copy2go  demo html  gt        at   http    www cmsproducts com   copy2go  Default html gt                    ih   E           ue            E Ld    ul         Simple Intuitive Interface    timp                    Literas    yee had b Perg          bo erie Bed naycate of  prag Inm phe          pps  Wm rare  ies QA         ama phptoB B6 hgfa      Pee pf rigged       ad Freer       LOGY Dg Pend Her          pow wet                Eg          et  Cay deo          Sheet               dq              Ir males pe  FRG atu                       OE  phebza  muse  veces Cer Gurr  Many nm  quek scd  FEET            shep Inge            Pao end Document                                  Berea                       ape   nr             a ge Dodqe eee Pe  De                                                 Dor Wm                             ee 08  change Caries              devises ane            dee posce                 han         HPJ Hai  gold                      doran  petes pema    anc reach mersa                       Do ey rel  peter  debida  ara copy dq phorizi  Cede mae  ceed we                 deocaman  r                 Fle lypru m           Be  os          QT  TIF                2 2 P   PL WEA                                                         bow    d  redd pep mp     d
26. oad You Travel  With Digital Data  You ll Always  Need Security   Naturally  we ll be  discussing more on that subject of  security all throughout Parts 1  2 of  this month s review     J       j  m  ns                         N         4 ic  ks e le  7   ho  ks              No Matter What       Road You Travel       Thomas Huxley  who was instru   mental in developing scientific educa   tion in Britain  is quoted as saying    If a little knowledge is dangerous   where is the man who has so much  as to be out of danger   My experi   ence  to date  dictates that this  State  of Being  will never happen again in  our lifetime  until  repeat until we  can eradicate the extreme Islamist   terrorist  subversive  radical  hacker   malware  writer  ID thief  and that ilk   elements in our society  Which is never   As longas any peace loving individual  has to live in mortal terror for his  her  life  limb family and property  we must  be proactive against and ever vigilant  for wrongdoing everywhere  The  noted US radio announcer and news  commentator  Elmer Holmes Davis   1890 1958   counsels us   The first  and great commandment is  Don t let  them scare you      Security 1 2 Google search   lose laptop    Everyone surely knows that if you  do a Google search on  lose laptop   you ll get a pretty good response  Ha   Little did I know  Please note  that  although this portion of the review is  being written on April Fool s Day  I  assure y ou  this is not a joke  With  581 000 hits
27. of a possible 100  UFD s I  have to choose from  to see how they  all worked together  They were  1   Naturally  the host product reviewed  herein  the CMS 60GB Copy2Go  Storage Solution  USB HD   2   The USModular 8GB USB Mon   stor Removable USB drive  See  my October 2006 BCM review at   lt www ucs org gt   remember to choose  the  pdf version for its beauty   and   3  Ihe Sandisk 1GB U3 Cruzer  Micro USB Flash Drive  See my  December 2005 BCM review at   www   ucs org gt   again   pdf version please    Which means  bottom line  I checked  out two  2  different security related  storage products  devices out of the  three  3  mentioned above  with my  DYCRAV tm  Security Suite  which  gave it an added layer of obfusca   tion  i e   security and stealthiness    See my August 2006 BCM review at   lt www ucs org gt   again   pdf version    please   Naturally  of course  they    all worked perfectly  I couldn t  be any happier  thank you very    much  Kudos all around   Hoo aah        Page 10 Blue Chips Magazine            2008       sUPPORT OUR TROOPS               In Conclusion   See you next month with CMS Part  2   CE Secure Vault Edition Pro  Data Encryption  the perfect comple   ment to C2GP and C2GSS  the  coup  de grace  to all other Security Storage  solutions  It is then and there that we  will really get deep into    Security      my best suit     And  with a near perfect segue   as  we eagerly anticipate that significant   Security  review  as well as  the follow  
28. olution    Reviewed by Don Nendell    CMS Products  Inc    3095 Redhill Avenue   Costa Mesa  CA 92626   Ph   714  424 5520   CMS Web Site  lt www cmsproducts   com gt    Sales Department    Hours  Open between Monday  amp  Friday  8am   5pm PST   Toll free phone   800  327 5773  Ph   714  424 5520  Option 2    N  American Reseller Partners    lt http   www cmsproducts com  resellers asp gt    CMS Support    Hours  Open between Monday  amp  Friday  8am   5pm PST   Phone   714  424 5520  Customer  Service  Option 3     Technical Support   Option 2     Fax   714  435 9411  Online   lt www cmsproducts com  support gt    Email  support www cmsproducts com   Allow one business day for support inquiries  excluding weekends    Copy2Go Professional Software Sys   tem Requirements    Intel Pentium or compatible processor   256MB RAM   35MB Available Hard Disk Space   Windows XP   Vista Ready   Supported Image Formats  PNG  J PG   GIF  amp  CRW image files   Supported Audio Formats  MP3  M4P                 ATRAC  SNG  WMA  amp  RAM audio  files   Supported Video Formats  AVI  MP4   WMV  MPG   amp  QuickTime  QT  video files   Supported Doc Formats  XLS  PPT   TXT  WDB  VSD  DXF  MDE  DOC  PDF  SWF   GRF  AI  PST  WPS  ZIP  MPP  amp  PUB   MSRP  The Copy2Go Storage Solution   USB storage drive  is offered in 60       159   and 100GB   219  capacities  and includes  not only an Installation CDROM of Copy2Go  Professional Software and its User  Manual  they are pre loaded on the Drive  it
29. ome exotic  costly beast   Rather than just encrypting single files   some applications are able to create vir   tual disks  either within a file or directly  on a partition  where everything written  to the disk is automatically encrypted   On modern hardware  the overhead for  encryption is minimal  you no longer  need dedicated hardware to make this  happen  See Part 2     Article Comments    Disgruntled Worker with an  Axe   commented on Apr  2  2008       They are ALL vulnerable  be   cause they are all  Protected by  Passwords   which can be cracked     and have been since PK Zip switched  encryption schemes years ago  But  I  guess I can t prove that without violat   ing National Security now can I            Get The Picture   Passwords are  like Dinosaurs     Security 1 6 So  What Can We Do  About      This     GOD created the world  but it is  the Devil who keeps it going     Tristan  Bernard   As for me  this is my 46th Security   related review        Each one of those reviews  in one  way or another  is aimed in  that  direction   i e    Security Problem  Solution s      I know that no one person  has the    Final    solution  but I can at least  Start with the miscreants prime target   the Security chain   s absolute weakest  link      Static    Passwords    Passwords come in two  2  distinct  flavors  Black and White  Cut and Dried   Frick and Frack  etc  and both are the  weak links in Security  More specifi   cally they are  1  The prime culprits of  Identity 
30. ot Least   Robert Siciliano  Identity Theft  Expert and CEO IDTheftSecurity com    http     www realtysecurity com  index   php   says   Most people think that it  can t happen to them        Having this     It can t happen to me syndrom     is  what invites thieves and predator into  your place of business and your life         Security is a journey  It is not a destina   tion  a place you arrive to  So  the need  for security continues         Call to Action  Therefore  I feel  the time has come  once and for all  to  answer the  Call to Action   As my  positive response to that call  I invite  you all to view the video I have posted  on Screencast com  To do so  merely                 the following URL and    paste     it into your browser s Address Win   dow     lt http   www screencast com   1  7S8lysDSR gt     My    story    is told in part in this  informative 13 minute video  As you  will see  it pertains  in a large part  to   stopping  ID Theft with a US patented  paradigm shifting security protocol en   titled   Dynamic  Challenge Response   Identity  Authentication and Veri   fication  DYCRAV      The protocol  can augment  or completely replace    Static  Passwords  PIN s and User   names   each in their own right   the  weak link  in digital data security  the  very bane of ID Theft                     EZ as 1 2 3  Automated Encryption  AutoEnc     AE   A Brand New Security Technology Paradigm Shift    AutoEnc        Dynamic    USB  2 Factor Auth    AM  amp  Enc
31. own with  I hope  no ill results  I  immediately ran my virus scanner  spybot  etc  and was  told I was clean     The E mail looked very official and real    Hallmark  logos  good graphics  etc  Let this be a lesson to you  and me    BE VERY CAUTIOUS  WHEN IN DOUBT   DON T     Insect Instructions  The latest science fiction movie has nothing on the  latest device for fighting on the front lines  It is a bug     It is a robot that looks like a bug and is as small as  a bug  It has a small camera and sensors able to detect  chemical  biological or radioactive weapons     They can be thrown in a building  cave  etc   and  send back information to the troops  Sort of gives new  meaning to the phrase  don t bug me      Fine    Page2 Blue Chips Magazine     May 2006    Blue Chips                                    Magazine       Utah   s Award Winning Publication       i       5 d             nis               _                    Magazine Staff    Editor     Cliff Millward   Review Program Liaison     James Alexander  Review Product Editor     Donna Nendell  Review Editor Product Recruiter     Don Nendell  Photography     LeRoy Johnson   Proof Reader     Larry Lamph  Doug Jackson    955 9633  290 2269  965 9594  965 9594    Advertising Rates    12 months   1200   900   450   225   120    6 months   700   500    3 months   400    Ad costs 1 month  2 Page Spread  150   Full Page  100  275  Half Page  50  130  250  Quarter Page  25  70  130    Business Card  15  30  60    Full page s
32. ps    Officers and Trustees Eve  Phone E mail   President  Stuart Gygi 576 1891 sgygi xmission com   V  Pres   Larry Lamph 571 2908 larry lamph  gmail com  Secretary  Lowell Kenedy 278 3035 Ikenedyconetworld com  Treasurer  John Witzel 296 1390 witzeljconetscape net   Rick Gregory 582 7783 rfg csolutions net   Doug Jackson 322 2337 cjackson104 hotmail com    Information  Persons or companies may join or renew at the meeting  or by sending a check payable  to the Utah Computer Society to     Utah Computer Society  Membership Secretary  PO  Box 510811   Salt Lake City UT 84151    Individual memberships are  25 year  Business Memberships are  35 00 a year   Corporate sponsorships are available at two levels  Corporate Sponsors enjoy all benefits  of membership including multiple individual membership and prepaid advertising coverage   Contact a Board Member for more information   10 year memberships withoutthe magazine  are available for students other family and Senior Citizen Center members    Other important information     Meeting Information http   www ucs org    Group Business  James Alexander  200 2269  Magazine  Cliff Millward  955 9633  Program Coordinator  James Alexander  200 2269  Web Site http   www ucs org  WebMaster 272 8949  Membership  evenings   Bob  262 6045    May  Renewals    Bob Beaudoin  Douglas C  Davis  Larry W  Hirschi   Glen J  Parker  Norm Peterson    Page 3 Blue Chips Magazine     May 2008    CMS Part 1  Copy2Go  Professional Software  amp  Storage S
33. re than four  million complete storage solutions in 90 plus  countries  The complete line of product offerings  includes automatic backup solutions for both  portable and desktop computers  RAID systems   backup and disaster recovery software  media  management software  laptop  notebook hard  drive upgrades and data transfer kits and high  capacity desktop hard drives     Update  The latest News From  Lake Woe Be Gone   Seems I   m writing this review just  in the nick of time  CMS just got  some competition  NOW HEAR  THIS  This from a blog posted by  Robin Harris  04  18 08  on ZDNet   Holographic storage ships next  month     lt http   blogs zdnet com   storage   p 313 amp tag nl e550 gt  also   there s an interesting accompanying  110 second video FYI  as well    Even  r   since astronaut Dave Bowman discon   nected the HAL 9000 s holographic  memory in 2001  A Space Odyssey  techies have been wondering when we  could buy real holographic storage  Now  we know          2008     It is that value   InPhase Technologies  spec d the opti   cal media they use  a 5 25inch clear disk  in a cartridge   at 50 years  that justifies  aprice   18 000   that will keep most of  us from buying ourselves an early Xmas  gift     Perhaps in 15 years holographic  burners will be  50 and the media less  than a  1                 4 Blue Chips Magazine            2008       Windows Review       Whew  I ll stick with CMS    Copy   2Go Storage Solution  USB Drive   and their Copy2Go Professiona
34. rticle at  lt www pro   cessor com gt    In a Key Points Side   bar Perry stresses  1  Protect devices   Mobile devices are easy to steal and  serve as a gateway to confidential com   pany  and your End user  information   2  Secure the home office  Telecom   muters must remain as vigilant about  data security at home as they do in the  business office  The use of firewalls and  regularly updated security software is a  must      nuff said End users       Avoid  eavesdroppers  Business travelers  are easy prey for eavesdroppers  who  can steal information from phone calls  or device displays  like at the ATM   Supermarket  et al   with little effort   Teach employees  this applies to all of  us End users  to keep displays away  from roaming eyes and limit telephone  conversations  and  4  Be careful with  public terminals  If they must use  public computer terminals  employees   this means everybody  must log out of  Web email and other login  mandatory  programs before leaving the station   public libraries  Starbucks  et al      So  how does all this fit in with CMS   s  review products  which are  CMS   s  Copy2Go Pro USB Hard Drive and  CE Secure Vault Edition Pro  Data  Encryption Software AES 256 Bit  Protection    That s Easy  These two  2   fit into the mobile computing arena ab   solutely perfectly  like a rich tailor made  pair of leather gloves     Security 1 1 Digital  Data Security   More to our point here  From  here on out  now and forever     No  Matter What R
35. ryption                   KTDOOGSBYI  MWAGDGBDRECL        POTVDUOMESLZI   QZPBTDUNCFYKE  RODNGAZLCEBYN  urTOMPYOSBGWI TI  XTRJLAYNGATIO  IBYMTORASKVEP                                 EHS J       YOBRSACKLDOEKE                                                                                 LOGPOSBIEYHFLTE    RKRAHGATITDIU         HMEBSXECBMURX                    Dual Layer      Automated Encryption       T mi   i  niam erae                    m      roto ee    KISS  The Fastest  Highest and Safest      Level of DnD  Dynamic       Digital Data    Management  Stor    Secure             Handling  amp  Transportation    My Hat s in The Ring   DYCRAV  tm         is my  Hat     Thrown    into the Security Ring    I havea solution to the ID Theft prob   lem  I merely need a    Champion    to  help me virtually  save all of us    you  and I   once and for all  We can win  this fight  that is  if we all stand up  and shout in unison loudly enough    I m Mad  Stop This Insanity  Right Now   Then  it would be  stopped    FYI I have reviewed the  full   DYCRAV Security Suite  i e   DY   CRAV    AutoEnc     Drag       Drop  Security As Easy As 1 2 3  on page  8 in the August 2006 issue of Blue  Chips Magazine     BTW I shall be talking with CMS  about bundling these same DYCRAV   Security  protocols in with their won   derful products        Security 1 8   I think it is about time we all did  something about all  digital data  communication security weaknesses       but ID Theft most speci
36. s  C2GP even displays how many  files you have selected in each folder and  offers the option of viewing all of the  selected files at one time    6  EDIT your Multi Media files us   ing whatever current application you are  already using and are familiar with  With  C2GP there is no need to learn new  editing programs  You can even Delete  a file s   as needed or desired  from any  selectable location  Use C2GP s  bulk  Rename  feature to quickly and easily  change multiple file names at the same  time  Thisis an especially important and  extremely useful feature when dealing  with sequentially numbered photos cre   ated by your digital camera    7  BACKUP  amp  RESTORE your  Multi Media files to almost any stor   age device attached to your system   C2GP supports transfers to hard drives   memory disks  flash cards and other  removable storage devices  including  C2GSS   C2GP incorporates a single  backup button  making it easy to pre   serve your precious and irreplaceable  photos and video  as well as music or  document files  and    8  GROUP your Multi Media files  to create related collections of your  favorite files in C2GP s relational data   base  which can even include different  types of Multi Media files within the  same group  In C2GP  a Multi  Media  file can exist in any number of groups    Note  With apologizes to Ms   Browning  but I really do like this  captivating  colorful and highly useful  C2GP product very much    How do I      er  show thee  Let me cou
37. self  Handy    Copy2Go Professional Software is  also offered as a standalone product in three  3   different flavors  versions   1  CD    39 00  2   Windows Download    29 00  and 3  Windows  U3 Download    29 00     Insert graphic 01a CMS Prod   ucts gt   About CMS   CMS Products  Inc  CMS   a world leader  in content management and data backup tech        PRODUCTS    nologies since 1983  has provided innovative  backup  restore and storage systems for laptop  and desktop computer users in more than 90  countries  They are a leading innovator in data  backup  encryption and security  In addition   to their extensive line of laptop hard drive  upgrades  CMS recently introduced a full suite  of data security products for business and con   sumer users  Their offering includes CE Secure  Vault Edition Pro  data encryption software    See the CMS Part 2 Review in the J une BCM   and the innovative ABS Secure line of fully  encrypted portable backup secure solutions  By  developing leading edge  easy to use products  revolutionizing the laptop  notebook and desk   top data backup  restore and storage industry   CMS has received global recognition because of  its high quality  user friendly product offerings   CMS Products supplies enterprise  government  agency and educational institutions  as well as  SOHO  consumers through national and inter   national distributors and resellers     About CMS Products   CMS has sold more than two million units  of software while installing mo
38. sical harm  My emphasis here  on  the victims began on March 22  2008  when hackers inserted scripts into  hundreds of messages embedded with  flashing animated gif images  The hack   ers increase d  their efforts and turned  to a more effective tactic on Sunday   injecting JavaScript into some posts  that redirected users    web browser to  an alternate page with a complex im   age that was specifically designed to  trigger seizures in both photosensi   tive and pattern sensitive epileptics   Date  Tuesday  April 08  2008  Title  New Internet Threat s   Explode  Briefs    Symantec reported new internet  threats rose over 460  in 2007  They  also reported how cheap stolen account  information is being sold   See   http      news yahoo com  s  ap  20080408     _  on hi te internet security threats   This plus the article on terrorist  5  using  stolen credit cards on Defensetech org   See  lt http   www de   fensetech org  archives  004105   html gt    paints a grim picture   Date  Monday  March 10  2008  Title  Over20terabytesofdatastolen  Briefs    The U S  Director of National Intel   ligencein his testimony before the Con   gressional Armed Services Committee  disclosed that approximately 20 tera   bytes of data was stolen by cyber attacks  last year  Some of this data was from the  Department of Defense  We seem to be  firmly ensconced on the    Wide Road  to Now Here   Now here        a      Date  Sunday  January 20  2008  Title  The Attack Has Started  Briefs    The Def
39. umbnail view of ev          graphic I ve ever put on my PC   I can even    Group    them  Pretty neat   Ha  I ll bet I ve got thousands of the  suckers  I have at least 200  or more   just for this month   s reviews alone  The  buggers are really piling up on me  it  seems lately  For instance  I must have  had at least that many graphics for last  month   s review  April  of Nero 8 Ultra  Edition  And most likely  there were  that many for Comic Book Creator 2 0   the month before that  March   And  I  fully intend putting all of CMS s prod   ucts on the C2GSS  plus other UFD   s   as well  so that I can be entirely mobile   like when I go to Cliff s to put these re   views to bed  for instance  60GB may   just may  handle all my review graphic  stuff  but we ll just have to wait and see  about that     Then too  I m getting a little ahead  of myself here  I should be sharing the  following summary with you at the Con   dusion of the CMS Part 2 CE Secure  Vault Encryption Software review   which of course  comes next month  Say  a little prayer for me in the meantime       explain that one next month     GOD  willing and the creek don t rise        4 paw        E j L1  1 I      i       To continue  It s a little prema   ture  however  here goes anyway   it s  certainly worth telling  The acid  Lests  yes I said tests  came when  I installed both Copy2Go Profes   sional Software and CE Secure  Vault Pro  Encryption software   on three  3  different storage modali   ties  out 
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
CNC 8035 - Manual de programação  User Manual  - Affordable Scales & Balances  ficha de aplicación  Vesmatic 10/20 Manager - Micro  Frigidaire FFRH0822Q1 Wiring diagram    LG WM2250CW Energy Guide  ang.  キャメロット 取扱説明書      Copyright © All rights reserved. 
   Failed to retrieve file