Cyber Men and Ladies

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 52

1

Cyber Men and Ladies

https://www.scribd.com/document/391453542/Cyber-Men-and-Ladies

McAfee® WebAdvisor from Intel Security - http://intel.ly/2ld3PAY

---

System76 might not be the only Linux PC manufacturer on the market, but it's certainly one, if not
the, top Linux PC companies around. Offering pre-built Linux laptops, servers, and desktops,
System76 made the foray into the operating system space with its Pop!_OS, an Ubuntu derivative
which concentrates on makers and do-it-yourself (DIY) fanatics. However, System76 isn't just
providing a customized Linux distro. Now, the Denver, Colorado-based company prepares to launch
a set of open-source desktops.

https://www.electromaker.io/blog/article/system76-prepares-for-new-desktop-launch

---

Teclast F5 Laptop Review

Can lightning strike twice? The Teclast F7 which we reviewed previously has become an ideal laptop
for cost conscious-makers, needing a slim and light laptop but with a full 1080p screen.

The Teclast F5 is a much smaller laptop, in fact, it is smaller than a sheet of A4 paper at 27.4cm x
18.8cm x 1.2cm and it is light weighing only 1.1kg so you will not notice it in your rucksack.

Specifications

CPU: Intel Gemini Lake N4100 1.1GHz,Quad Core

OS: Windows 10

128GB SSD

RAM: 8GB DDR4

11.6” Screen (1920 x 1080p) 360 degree rotation

Bluetooth 4.2

WIFI: 802.11b/g/n/ac

1MP Webcam

3.5mm Headphone Jack

Micro HDMI

Micro USB 2.0

1
2

USB 2.0 TF card slot

1 x Type-C (PD, Ethernet, USB3, HDMI)

https://www.electromaker.io/blog/article/teclast-f5-laptop-review

---

the home of online investigations

https://www.bellingcat.com/

How this man unearths the world's biggest secrets

British blogger Eliot Higgins and his investigative website Bellingcat make headlines around the
world. Eliot Higgins isn’t your typical journalist. A former video gamer, in the past he’s worked for a
bank, an oil rig company even a lingerie firm. Unlike old-school foreign correspondents, he uses
‘armchair analytics’ – what he calls ‘open source’ materials like Facebook, twitter and Google earth
to try to uncover what’s really going on in far away conflicts. Chemical weapons in Syria, the
downing of Malaysian Airlines flight MH17 over Ukraine and the attempted poisoning of Sergei and
Julia Skripal in Salisbury, he’s had one scoop after another. Mark Coles tries to discover more about
the man and how he is a pioneer in digital investigative journalism.

https://www.bbc.co.uk/programmes/p06nxbnd

---

Teclast F6 Pro Notebook Fingerprint Recognition - SILVER 239418201

13.3 inch Windows 10 Home English Version Intel Core m3-7Y30

https://www.gearbest.com/laptops/pp_1245434.html?wid=1433363&currency=GBP&vip=4264395
&gclid=CjwKCAjwx7DeBRBJEiwA9MeX_LvoM1wTtqiCvLZdu_BlA2ceB0iaJvIpaQSJu-
_Incr31Jar9S6fdBoCmmcQAvD_BwE

---

Teclast F5 Laptop 360° Rotating Touch Screen - GRAY CLOUD 270167101

Windows 10 Home Version Intel Gemini Lake N4100

https://uk.gearbest.com/laptops/pp_009491412269.html?wid=1433363&currency=GBP&vip=14752
948&gclid=CjwKCAjwx7DeBRBJEiwA9MeX_Obvbg3pjWueCIuTzDAo2_P1d_x6bRtcNTewV_RCOvZWH
B4TNz2GnBoCaJoQAvD_BwE

2
3

---

Teclast

http://www.teclast.com/en/tablet.html

---

Electromaker

Share your hardware projects with the global maker community

Electromaker is a free online publishing platform that showcases exciting projects built by makers
from around the globe. It also features news, review and tutorials on exciting hardware.

https://www.electromaker.io/?ref=producthunt

---

Notes Plus

Handwriting like pen on paper, only better!

Notes Plus is a powerful note-taking tool that has enabled many people to go completely paperless.
It was one of the few feature-rich iPad apps released right after the first iPad’s debut. Since 2010, it
has gone through 30 version upgrades and 3 complete overhauls, resulting in 8 million update
downloads by almost one million users.

http://www.writeon.cool/notes-plus/?ref=producthunt

---

SpeakUp® by People Intouch: worldwide, multi-language, integrated phone/web misconduct


reporting & case management

https://www.peopleintouch.nl/

---

Blackbox

3
4

Instantly transcribe audio & search through voice

We are building a smart note-taking mobile app that instantly transcribes audio, makes voice
searchable and provides summary keywords for every conversation.

Professionals spend enormous amount of time taking notes during meetings and recalling what was
discussed during the meeting. Blackbox helps them do it instantly. Free 14 days trial & $8/month
premium.

App Store: https://itunes.apple.com/us/app/blackbox-ai/id1434053592?ls=1&mt=8

https://www.blackboxai.tech/

---

Battreminder

Get notified when your laptop battery is fully charged!

Battreminder is a light-weight minimal browser extension, which lets you track your laptop's battery
level and reminds you with a sound notification when the battery is fully charged!

https://chrome.google.com/webstore/detail/battreminder/eolgelhflgphiebnjopklpnplinmemfi?ref=p
roducthunt

https://github.com/aniketkudale/battreminder?ref=producthunt

---

Subscribe to Europe's premium policy intelligence service

EMPOWER YOUR TEAM WITH POLITICO PRO.

https://www.politico.eu/why-go-pro/

---

Meet Helm, the startup taking on Gmail with a server that runs in your home

Fee-based service couples the security of a private server with the reliability of the cloud.

https://arstechnica.com/information-technology/2018/10/meet-helm-the-startup-taking-on-gmail-
with-a-server-that-runs-in-your-home/?via=indexdotco

---

4
5

Vinpok Split

Split is the perfect on-the-go external touchscreen monitor

Vinpok Split is the perfect on-the-go external touchscreen monitor that turns your laptop into a full-
blown desktop. Weighing only 1.4lbs, this 15.6’’ monitor is your ultimate tool for boosting your
efficiency. 1080P high resolution and touchscreen functionality. Compatible with smartphone/ PS4 /
XBOX One / Nintendo Switch

https://www.indiegogo.com/projects/vinpok-split-best-on-the-go-touch-screen-monitor#/

https://split.vinpok.com/?ref=producthunt

---

Valossa

Valossa provides unparalleled AI-powered video recognition and content intelligence capabilities.

Oulu, FI

Team: lauripen

Valossa provides unparalleled video recognition and content intelligence capabilities to capture new
value of video. Valossa AI is a world-leading technology platform that enables a completely new
generation of analytics and content profiling tools bringing forward new ways of monetizing video.

The roots of the video AI company Valossa are in one of Europe’s leading computer science and AI
labs at the University of Oulu in Finland. During the years in the university research labs, the team
had seen how the world moved beyond text, with video playing a greater role in our daily
communication. This spawned an idea to use technology to automatically understand what we are
viewing and apply the latest techniques to meet the emerging needs of content producers globally.
Since their founding in 2015 Valossa has built next generation video intelligence tools for the benefit
of the businesses working with video.

http://valossa.com/

@ValossaInc

http://valossa.com/

---

New York City startup Clarifai thinks it can lighten the load with the help of artificial intelligence (AI).
It today announced an end-to-end moderation solution that taps computer vision to parse the

5
6

content of user-generated photos and videos, and, when it detects something offensive or
objectionable, flag them appropriately. It launches this week in public beta.

https://venturebeat.com/2018/10/16/clarifais-ai-can-detect-explicit-content-in-images-and-videos/

---

Escape the Wolf - Preemptive Personal Security Handbook Kindle Edition

by Clinton Emerson (Author), Lynn Walters (Editor) also in paper format

The one thing every serious world traveler needs to pack: Escape the Wolf – Personal Security
Handbook for the Traveling Professional.

Blend into the local culture more effectively using these insights on cultural practices, traditions and
customs.

Once only available to defense contractors and government employees, this same level of expert
advice is now available to the business traveler.

The author, Clinton Emerson, is a respected authority on mitigating risk for global travelers within
government security circles. In Escape the Wolf, he shares expertise in coping with various threats,
or wolves, that lurk in today’s world based on 20 years of government experience, his civilian travels
and being raised in Saudi Arabia.

In Escape the Wolf, travelers learn how to recognize, assess and avoid threats ranging from common
crime, illness, natural disasters, corporate espionage, or even terrorism using Escape the Wolf’s
proven Total Awareness? System.

Order a copy today for yourself and your employees who travel abroad to:

learn how to avoid being a “walking target”

gain new confidence when venturing into unfamiliar territory

identify, avoid and minimize threats, and learn how to escape from threatening situations

know the key steps to take before you even set foot outside your front door

https://www.amazon.co.uk/gp/product/B0099BJENU/ref=oh_aui_d_detailpage_o02_?ie=UTF8&psc
=1

---

Free for everyone

Signal is made for you. As an Open Source project supported by grants and donations, Signal can put
users first. There are no ads, no affiliate marketers, no creepy tracking. Just open technology for a
fast, simple, and secure messaging experience. The way it should be.

6
7

https://signal.org/

---

Safe

When used properly, ICLOAK can turn even virus infested computers into a secure computer. It's
designed to use anonymous networks like Tor to browse the internet Anonymously without leaving
any trace of internet activity on the computer.

Simple

With the touch of a button even the most non-technical person can secure their own computer.
Welcome to the world of knowing that you are using some of the best, most sophisticated tools that,
until now have only been the province of hackers, security professionals, governments and criminals.

Powerful

This tiny device contains an entire secure computer environment that you can use at home, at work,
or wherever you go. Until now, security pros, governments, hackers and cyber criminals have been
able to use these tools. Now, all of us have access to powerful security tools to protect our
passwords, money, safety and security.

https://icloak.me/

---

Camelot

PDF table extraction for humans

Camelot is a Python Library to extract tabular data from PDFs.

https://github.com/socialcopsdev/camelot?ref=producthunt

---

Protect your data

SyncStop prevents accidental data exchange when your device is plugged into someone else’s
computer or a public charging station. SyncStop achieves this by blocking the data pins on any USB
cable and allowing only power to flow through. This minimizes opportunities to steal your data or
install malware on your mobile device.

SyncStop is the 'cased' version of the original USB Condom. We listened and spent some time
designing and manufacturing our own enclosure.

7
8

SyncStop works with any mobile device...

http://syncstop.com/

---

Reolink Go

A wire-free 4G LTE security camera, ??powered

https://reolink.com/product/reolink-go/?ref=producthunt

---

EverCam is designed from the ground up to offer wireless freedom. We eliminated power cables,
wall outlets, and the need to drill holes, giving you freedom to install EverCam practically anywhere.
We partnered up with Anker (the leader in charging technology) and developed battery technology
that runs for 365 days (or 3 years in Standby Mode).

EverCam: The Wirefree Security Cam with 365-Day Battery Life

Face-Recognizing Alerts | Motion Detection | 1080p Full HD | No Monthly Fee | Free Local Storage |
Night Vision | Weatherproof (IP66)

https://www.kickstarter.com/projects/1116368506/evercam-the-wirefree-security-cam-with-365-
day-
bat?ref=3ci076&utm_source=crowdcreate&utm_medium=cc_eufy_evercam&utm_content=cc_eufy
_evercam

---

Door Blaster HDB 90 ST

Door opener for extremely fast door breaching. Quiet remote operation with Door Blaster Pack.

https://www.holmatro.com/en/special-tactics/productcategorie/78-breaching.html

This device can smash through a door in 2 seconds

Holmatro's Door Blaster has a pushing force of over 4 tons.

It can open a door quietly in under 2 seconds.

Only one person is needed to operate the device, which can all be carried in its custom backpack.

8
9

This door breacher can open doors within seconds, making it faster and quieter than traditional
methods. The Holmatro Door Breacher is used for military and police operations and has a pushing
force of over 4 tons.

It's powered by a lightweight pump unit that is carried by the operator in a custom made backpack.
The device clamps onto the frame of the door, and with a push of the button, it opens doors in
under two seconds.

You can buy the Holmatro Door Breacher from the company website

---

THE DELFAST EBIKE GOES THE DISTANCE WITH A RECORD-SETTING BATTERY RANGE

Delfast - e-bike with 380 km range on a single charge

https://www.digitaltrends.com/outdoors/long-distance-delfast-ebike/

http://delfastbikes.com/

---

A text annotation tool to train AI

Turn text into intelligence. Easy.

Get relevant insights from text, automatically

Discover patterns, identify challenges, realize solutions

Examples:

> Analyze user feedback and design specific actions for improvement

> Enrich your unstructured text with metadata and make it searchable

> Find out bid opportunities in your industry

https://www.tagtog.net/

---

YubiKey 5 NFC

Works with the most services across the web.

Single

9
10

Tip: Purchase a spare YubiKey in case of loss.

Protect online accounts against unauthorized access

Touch based authentication for NFC supported Android and iOS devices and applications

Durable, waterproof, and crush resistant

Fits USB-A computer ports and designed to fit on your keychain

$45

https://www.yubico.com/product/yubikey-5-nfc/#yubikey-5-nfc

---

KeePass Password Safe

This is the official website of KeePass, the free, open source, light-weight and easy-to-use password
manager.

https://keepass.info/

---

SterJo Facebook Password Finder and many more - Recover forgotten Facebook password and many
more...

http://www.sterjosoft.com/

---

Stellar Phoenix Windows Password Recovery

Stellar Phoenix Windows Password Recovery to Reset Login Passwords

Stellar Phoenix Windows Password Recovery is a professional login password recovery tool to safely
reset the access passwords of all login and administrator accounts on Windows Xp, Vista, Windows 7
and Windows 8. It can also recover Windows passwords for several FTP clients, email clients, chat
messengers and web browsers in your PC.

http://www.mannatsoftware.com/stellar-phoenix-windows-password-recovery.html

http://www.mannatsoftware.com/password-recovery.html

---

10
11

This extension allows you to check your password on any website by double clicking or hovering over
the box

This basic chrome extension is designed to let you check the password you typed into the password
box so you can be sure you entered the correct password. By adding this extension you can view the
password as text on any website. By default you must double click on the password box to view the
password, alternatively you change the setting to display on hovering over the password box.

https://chrome.google.com/webstore/detail/check-my-
password/hfkkdbocalihgkgniglgildacnnfknke?ref=producthunt

---

VBA Password Recovery v4.0

Support Excel VBA Password Recovery & Word VBA Password Recovery

User Ratings : (Average Rating 4.8 Based on 120 Reviews)

https://www.sysinfotools.com/recovery/vba-password-recovery.php

---

Android Phone Recovery Stick

The Android Phone Recovery Stick is the ultimate recovery tool for anyone who wants to capture
currently-held and previously deleted information from an Android phone. New updated version
covers some of the latest Android operating systems.

https://www.spyequipmentuk.co.uk/android-phone-recovery-stick

---

SIM Card Deleted Text Spy

Sku:TSP

Availability: In stock

The SIM Recovery Pro will recover all data such as phone number, deleted text messages saved to
SIM.

https://www.eyetek.co.uk/sim-card-deleted-text-spy

11
12

---

About Kernel Data recovery Software

Kernel Data Recovery is an Information Technology company, providing technology solution for
critical data recovery needs and beyond. We are a matured IT solution provider, possessing an
experience of more than a decade in the realm of IT management solutions, offering diversified IT
solutions that surpasses standard service industry practices.

We cater the best and cost-efficient solutions in the entire data recovery market. With a wide
spectrum of software solutions, we streamline the entire concept of data & email recovery, data
security, data migration and other data management needs.

Our continuous research, unique approach and rigorous dedication towards technology deliver you
the right software solution to ensure every client meets the best and satisfactory results. more...

https://www.kerneldatarecovery.com/

---

Connect with anyone.

Hunter lets you find email addresses in seconds and connect with the people that matter for your
business.

https://hunter.io/

---

Active@ Boot Disk : Password Resetting

If your Administrator's password is forgotten or lost you can reset local administrator and user
passwords on Windows XP / VISTA / 2003 / 2000 / NT /Server 2008 /Server 2012 / Windows 7 /
Windows 8 systems with Active@ Password Changer of Active@ Boot Disk.

The forgotten password recovery tool

Supports:

multiple hard disk drives.

Detects:

several SAM databases (if multiple OS were installed on one volume).

Provides:

the opportunity to pick the right SAM before starting the password recovery process.

12
13

'Account is disabled', 'Password never expires', 'Account is locked out', 'User Must Change Password
at Next Logon' and 'Logon Hours' can be changed or reset.

With Active@ Password Changer you can simply choose the local user from the list to reset the
password.

http://www.boot-disk.com/password_changer.htm

3 Ways to Reset a Forgotten Windows Administrator Password

https://www.makeuseof.com/tag/3-ways-to-reset-the-forgotten-windows-administrator-password/

---

Missing People offers a lifeline for the 250000 people who run away and go missing ... Missing
People is the only charity in the UK which is dedicated to bringing ..

https://www.google.co.uk/search?q=charity+Missing+People&oq=charity+Missing+People&aqs=chr
ome..69i57&sourceid=chrome&ie=UTF-8

---

Top Links September 2018

https://www.scribd.com/document/387548483/Top-Links-September-2018

http://bit.ly/2wxDu8H

---

Top Links October 2018

https://www.scribd.com/document/389880830/Top-Links-October-2018

http://bit.ly/2NWjE1J

---

Cybersecurity

https://www.scribd.com/document/351723386/Cyber-Security

http://bit.ly/2siZiDe

13
14

---

Robots & Coding & Children’s Books

https://www.scribd.com/document/335465160/Robots-Coding-Children-s-Books

http://bit.ly/2iFebJf

---

Windows Setup & Security & Maintenance

https://www.scribd.com/document/364858625/Windows-Setup-Security-Maintenance

http://bit.ly/2zRFuLM

---

Top Research Links on the very reliable and very secure SCRIBD Platform

https://www.scribd.com/document/307172389/My-Professional-Research-Links

bit.ly/PND2016

---

Consultancy Pages

https://www.scribd.com/user/6985819/Andrew-Thompson

---

Reading List 2017/2018...

https://www.scribd.com/document/335059474/Reading-List-2017

---

14
15

Running Stuff 2018

https://www.scribd.com/document/369561967/Running-Stuff-2018

http://bit.ly/2DtSE4n

---

Andrew Thompson – Biking Stuff

https://www.scribd.com/document/368716269/Andrew-Thompson-Biking-Stuff

---

TrueCrypt alternatives: 25+ disk encryption apps

Alternatives to TrueCrypt for Windows, Mac, Linux, Android, iPhone and more. Filter by license to
discover only free or Open Source alternatives. This list contains a total of 25+ apps similar to
TrueCrypt.

TrueCrypt is a freeware utility used for on-the-fly encryption (OTFE). If your looking for more info
about TrueCrypt like screenshots, reviews and comments you should visit our info page about it.
Below you find the best alternatives.

The list of alternatives was last updated: 09/08/2018 05:32:00

https://alternativeto.net/software/truecrypt/

---

Dell tries to make durable laptops more modern with updated Latitude rugged line

Sometimes, design takes a backseat to practicality—but these aren't cheap.

https://arstechnica.com/gadgets/2018/10/dell-refreshes-its-latitude-rugged-laptop-line-with-three-
new-models/?via=indexdotco

---

IDS-Israel Defense Store - Green IDF Parka mega warm got one...

UP TO 20% OFF ON OUR WINTER GEAR!

Snowsuits, Fleeze coats, Sweatshirts, Hooded Parka Coats and more...

15
16

https://www.israeldefensestore.com/inter/winter-gear-sale-2018.html

Israel Special Forces IDF Scout Leather Commando Boots - Mega comfortable - Leather and Vegan
Options...got desert pair...

https://www.israeldefensestore.com/inter/outdoors/clothing/scout-commando-boots-palladium-
style.html

Bulletproof flight jacket With sleeves protection level III-A

https://www.israeldefensestore.com/inter/tactical/bullet-proof.html

---

This is how government spyware StrongPity uses security researchers' work against them

While researchers are looking forward, hackers are going back to their roots to create new attacks
from the ashes of old ones.

https://www.zdnet.com/article/this-is-how-promethium-malware-operators-used-security-
research-bulletins-in-their-favor/?via=indexdotco

---

Korean Nong Shim Hot & Spicy Noodle Big Bowl - 16 Bowl - Ring of Fire - Mount Doom...

by Nong Shim

Price: £19.99 (£1.10 / 100 g)

https://www.amazon.co.uk/Korean-Nong-Shim-Spicy-
Noodle/dp/B00AZHI8VQ/ref=sr_1_17_a_it?ie=UTF8&qid=1540323958&sr=8-
17&keywords=spicy+noodles

---

Kraken Cryptor ransomware merges with Fallout exploit kit, fees slashed to gain followers

The ransomware-as-a-service is attempting to drum up more business in the Internet's underbelly.

https://www.zdnet.com/article/kraken-cryptor-ransomware-merges-with-fallout-exploit-
kit/?via=indexdotco

16
17

---

Rockville, Md.-based INKY makes a cloud-based email security platform powered by unique
computer vision, artificial intelligence and machine learning.

The company has a main goal to stop attacks on company inboxes, allow people to have confidence
in the messages they are receiving and know that the people interacting with them are who they say
they are, INKY Cofounder and CEO Dave Baggett told Technical.ly. Baggett also cofounded ITA
Software, the airfare search company purchased by Google in 2011 for $730 million which now
powers Google Flights.

https://technical.ly/dc/2018/10/31/this-email-protection-startup-just-released-its-flagship-anti-
phishing-solution/?via=indexdotco

---

Metalyfe

Your first blockchain browser

Barcelona, ES

Introducing Metalyfe, the world’s first server-less browsing platform. A modern browser redefining
how to consume and interact with the digital world with a focus on providing the highest level of
web security and data privacy.

We are excited to announce the launch of the desktop version for Mac, Windows and Linux, now
available through the Metalyfe.com website. This new innovative browser utilizes blockchain
technology to create a portal to the new era of Web 3.0 decentralized applications and processes.

After three years of hard work we are finally releasing our blockchain browser to the public:

https://medium.com/metalyfe/metalyfe-your-first-blockchain-browser-cb296258dc40

https://www.metalyfe.com/

---

BFS-Auto can achieve high-speed and high-definition book digitization at over 250 pages/min using
the original media format. This performance is realized by three key points: high-speed fully-
automated page flipping, real-time 3D recognition of the flipped pages, and high-accuracy
restoration to a flat document image.

http://www.k2.t.u-tokyo.ac.jp/vision/BFS-Auto/index-e.html

17
18

---

Trazor: The first all-in-one shaving system for men & women

Accepts over 40 different razor blades and includes built-in features for ultimate comfort &
convenience giving you a luxurious shave

https://www.kickstarter.com/projects/1407866020/trazor-the-first-all-in-one-shaving-system-for-
men?ref=producthunt

---

Credo360

Your personal credibility in a single number.

San Diego, US

Credo360 (or simply Credo) is an independent social credibility system that helps you trade safely
with people on any platform, online or in person. With Credo you can:

- Check how trustworthy someone is before dealing with them.

- Chat with people without revealing your full name, phone number, or email.

- Make and accept payments using your favorite payment methods (including cryptocurrencies).

- Rate and review your experiences with people you’ve dealt with.

After you sign up, you’ll get a trust score (also called Credo Score). You can get a good score by
verifying your identity and having a few friends vouch for you. But getting an "excellent" score will
require positive feedback from people you deal with - so, it will take time.

Your Credo Score is not tied to any marketplace - so, you can use it on any platform!

https://www.credo360.com/

---

Suzy Lamplugh Case

What we do

Mission

Our mission is to reduce the risk of violence and aggression through campaigning, education and
support.

Vision

18
19

Our vision is a society in which people are safer - and feel safer - from violence and aggression; we
want people to be able to live life to the full.

https://www.suzylamplugh.org/

---

National Personal Safety Day 8th November 2018

National Personal Safety Day 2018 will be held on 8th November highlighting issues relating to
personal safety in the workplace with a particular focus on the retail sector.

We'll be launching the results of our retail personal safety survey and our code for staying safe in the
workplace in a pamphlet and poster to be made available on our website on the day. Watch this
space for more information!

https://www.suzylamplugh.org/national-personal-safety-day-8th-november-2018

---

News Bling

Escape your political bubble in 5 min

News Bling is a 5 min daily newsletter that exposes readers to liberal and conservatives news
outlets. Our goal is to get Millennials and Gen Zs out of their political bubble and help bridge the
growing gap between liberals and conservatives. We believe the media is becoming increasingly
biased. Our nonpartisan newsletter helps expose the bias by taking headlines from outlets like CNN
and Fox News and putting them next to each other.

https://newsbling.co/

---

The Internet Warriors

Documenting the extraordinary world of online trolls

Why do people vent such toxic opinions online? Filmmaker Kyrre Lien spent three years travelling
the world to find out who these anonymous ‘internet warriors’ are and why they do it.

https://www.producthunt.com/posts/the-internet-warriors

https://theinternetwarriors.com/?ref=producthunt

19
20

---

Dr. Link Check

Check your website for broken and malicious links

Dr. Link Check scans your website for broken and malicious links. The service crawls through the
entire code of the site and examines page links as well as links to images, style sheets, and other
resources.

Results can be filtered in various ways or exported for further processing in other tools. You can also
schedule checks to run automatically on a regular basis and get notified about problems via email.

https://www.drlinkcheck.com/

---

As a top developer of drone technology, and a leading global exporter of military drones, Israel has
leveraged its know-how to develop a significant commercial drone market, with some startups in the
industry generating international headlines for their innovative tech solutions.

http://nocamels.com/2018/10/8-israeli-startups-drone-tech-heights/

---

My new extension of mailing information and knowledge...

https://myemail.constantcontact.com/From-Andrew-Thompson---I-am-a-Professional-Researcher---
We-are-Local-.html?soid=1131491130632&aid=1cXDDHNj_tE

---

Signup for Access to STD/STI Scanner

Munchron makes no medical claims and is fully autonomous using Machine Learning and A.I.

but may lead you to a diagnosis with your physician.

Munchron - STD/STI Detection

Now Scan for a STD/STI with Munchron

Our new STD/STI detection has the ability to scan 10 of the most common Sexually Transmitted
Diseases and HIV/AIDS skin rashes that are known to be skin-identifiable by Physicians.

20
21

Tool does NOT act as a diagnosis but offers encouragement to users to seek medical attention to
hopefully confirm if detection is accurate.

https://munchron.com/login/registration.php?ref=producthunt

---

Here are 25 of the most innovative new projects using tech to help refugees and NGOs

https://techcrunch.com/2018/10/27/here-are-25-of-the-most-innovative-new-projects-using-tech-
to-help-refugees-and-ngos/?via=indexdotco&guccounter=1

---

Go for the automated 'Cryptojacking test' (https://cryptojackingtest.com/) designed by Opera. Just


visit this link and click the 'Start' button. The tool will analyze your CPU's performance in the
background and confirm if you've been cryptojacked in a matter of seconds.

Want to protect your computer from hidden cryptomining? Try this

https://www.newsbytesapp.com/timeline/Science/35059/155062/how-to-protect-your-computer-
from-hidden-cryptomining?via=indexdotco

---

ThreatList: 3 Out of 4 Employees Pose a Security Risk to Businesses

https://threatpost.com/threatlist-3-out-of-4-employees-pose-a-security-risk-to-
businesses/138506/?via=indexdotco

---

At Naked Prosthetics, we provide digit amputees with functional, body-powered prosthetic devices.

https://www.npdevices.com/

---

Curated Directory of

21
22

400 Startup Grants

and Government Loans

https://financelinx.com/?ref=producthunt

---

Innovation Posters

Spice up your office with these innovation posters!

Our innovation posters have already spiced up thousands of offices worldwide. Download this free
pack - containing 10 new, freshly baked, straight-to-the-point posters.

https://www.boardofinnovation.com/tools/innovation-posters/?ref=producthunt

Our mission is

to share and inspire.

Reaching a worldwide audience with the newest tools, guides, and articles to help your organization
optimize the way it innovates.

We empower corporate teams to innovate and to move faster from concept to market success.

Reach out know more about our tailored programs.

https://www.boardofinnovation.com/

---

Business Impact

A cyber-skills shortage means students are being recruited to fight off hackers

Students with little or no cybersecurity knowledge are being paired with easy-to-use AI software
that lets them protect their campus from attack.

https://www.technologyreview.com/s/612309/a-cyber-skills-shortage-means-students-are-being-
recruited-to-fight-off-hackers/

---

22
23

Government Spyware Vendor Left Customer, Victim Data Online for Everyone to See

The Germany-based spyware startup Wolf Intelligence exposed its own data, including surveillance
target’s information, passports scans of its founder and family, and recordings of meetings.

https://motherboard.vice.com/en_us/article/vbka8b/wolf-intelligence-leak-customer-victim-data-
online

---

Eliminate an entire category of bugs with a few simple tools

How you can use a few simple static code analysis tools to avoid common programming bugs.

NOTE: This is a cross-post from my newsletter. I publish each email two weeks after it’s sent.
Subscribe to get more content like this earlier right in your inbox! ??

You’ve probably heard of ESLint, Prettier, and Flow/TypeScript. These are static code analysis tools
that are wildly popular in the JavaScript ecosystem. I consider them all testing tools. Let’s take a look
at each:

https://blog.kentcdodds.com/eliminate-an-entire-category-of-bugs-with-a-few-simple-tools-
f0dd2aaf4bc9

---

Tech startups have been revolutionising many industries, but we don’t come across too many that
are aiding law enforcement.

Edinburgh-based startup Cyan Forensics develops digital forensic technology to help the police catch
criminals faster. The startup has just has closed a €1 million investment round led by Mercia Fund
Managers. This brings its total funding to over €1.7 million since it was founded in 2016.

Cyan Forensics’ software can find time-critical digital evidence in minutes instead of days, helping
police in highly sensitive investigations such as child sexual exploitation and counter-terrorism. The
company is currently working with customers across law enforcement agencies which are seeing
success using the technology operationally.

https://www.eu-startups.com/2018/11/cyan-forensics-raises-funding/

---

ThreatList: 3 Out of 4 Employees Pose a Security Risk to Businesses

https://threatpost.com/threatlist-3-out-of-4-employees-pose-a-security-risk-to-
businesses/138506/?via=indexdotco

23
24

---

International Research Centre for Investigative Psychology

The International Research Centre for Investigative Psychology (IRCIP) is world leading in pioneering
research in this area, called upon to consult in legal cases, as well as providing training and software
tools to police and crime analysts.

The IRCIP provides a vibrant, varied, and productive research environment for both students and
researchers, with world-leading staff supervision and ground-breaking academic programmes
offering research activity and experiences unique to the learning context that the centre provides.

https://pure.hud.ac.uk/en/organisations/international-research-centre-for-investigative-psychology-
2

---

BFS-Auto can achieve high-speed and high-definition book digitization at over 250 pages/min using
the original media format. This performance is realized by three key points: high-speed fully-
automated page flipping, real-time 3D recognition of the flipped pages, and high-accuracy
restoration to a flat document image.

http://www.k2.t.u-tokyo.ac.jp/vision/BFS-Auto/index-e.html

---

Iris.ai is an AI-powered science assistant that functions like a search tool, helping R&D Departments
navigate and find research text content in the ever-growing mountain of scientific knowledge.
Estimated to save 90 percent off the time on research text, with 85 percent of the materials relevant
to the research. The Oslo-based startup was founded in 2015 and raised $2.4 million in disclosed
funding from angel investors and a pair of seed rounds.

http://www.eu-startups.com/2018/08/10-norwegian-startups-to-look-out-for-in-2018-and-beyond/

https://iris.ai/

---

Facebook has built a tool called Getafix that automatically finds fixes for bugs and offers them to
engineers to approve. This allows engineers to work more effectively, and it promotes better overall
code quality.

24
25

https://code.fb.com/developer-tools/getafix-how-facebook-tools-learn-to-fix-bugs-automatically/

---

$99 USB-C dock gives iPad Pro an audio jack, HDMI port, SD card slot

The dock makes Apple's iPad Pro act more like a PC.

https://www.cnet.com/news/99-usb-c-dock-gives-ipad-pro-an-audio-jack-hdmi-port-sd-card-
slot/?via=indexdotco

https://index.co/market/technology

---

alternativeto.net - AlternativeTo is a free service / Crowdsourced Software Recommendations...

https://alternativeto.net/

---

Suzy Lamplugh Trust

What we do

Mission

Our mission is to reduce the risk of violence and aggression through campaigning, education and
support.

Vision

Our vision is a society in which people are safer - and feel safer - from violence and aggression; we
want people to be able to live life to the full.

https://www.suzylamplugh.org/

---

National Personal Safety Day 8th November 2018

National Personal Safety Day 2018 will be held on 8th November highlighting issues relating to
personal safety in the workplace with a particular focus on the retail sector.

25
26

We'll be launching the results of our retail personal safety survey and our code for staying safe in the
workplace in a pamphlet and poster to be made available on our website on the day. Watch this
space for more information!

https://www.suzylamplugh.org/national-personal-safety-day-8th-november-2018

---

Trazor: The first all-in-one shaving system for men & women

Accepts over 40 different razor blades and includes built-in features for ultimate comfort &
convenience giving you a luxurious shave

https://www.kickstarter.com/projects/1407866020/trazor-the-first-all-in-one-shaving-system-for-
men?ref=producthunt

---

Newsletters...

https://conta.cc/2Q1OAL5

https://conta.cc/2DffxIg

---

At Naked Prosthetics, we provide digit amputees with functional, body-powered prosthetic devices.

https://www.npdevices.com/

---

World's Simplest BI & Analytics Tool

An AI-powered data analytical tool for everyone

Upload data

Upload structured tabular data in the form of an Excel or CSV

Search

Ask Zepto for any questions you have on your data in Plain English!

26
27

Monitor

Create your own dashboard with charts in just 3 clicks

Trusted by big to small brands around the world!

https://www.zepto.io/?ref=producthunt

---

Franz 5

Get back on top of your messaging.

Franz is your messaging app for WhatsApp, Facebook Messenger,


Slack, HipChat, Telegram and many many more.

https://meetfranz.com/?ref=producthunt

---

Escape the Wolf - Preemptive Personal Security Handbook Kindle Edition

by Clinton Emerson (Author), Lynn Walters (Editor) also in paper format

The one thing every serious world traveler needs to pack: Escape the Wolf – Personal Security
Handbook for the Traveling Professional.

Blend into the local culture more effectively using these insights on cultural practices, traditions and
customs.

Once only available to defense contractors and government employees, this same level of expert
advice is now available to the business traveler.

The author, Clinton Emerson, is a respected authority on mitigating risk for global travelers within
government security circles. In Escape the Wolf, he shares expertise in coping with various threats,
or wolves, that lurk in today’s world based on 20 years of government experience, his civilian travels
and being raised in Saudi Arabia.

In Escape the Wolf, travelers learn how to recognize, assess and avoid threats ranging from common
crime, illness, natural disasters, corporate espionage, or even terrorism using Escape the Wolf’s
proven Total Awareness? System.

Order a copy today for yourself and your employees who travel abroad to:

learn how to avoid being a “walking target”

gain new confidence when venturing into unfamiliar territory

identify, avoid and minimize threats, and learn how to escape from threatening situations

27
28

know the key steps to take before you even set foot outside your front door

https://www.amazon.co.uk/gp/product/B0099BJENU/ref=oh_aui_d_detailpage_o02_?ie=UTF8&psc
=1

---

SigmaXL is a leading provider of user friendly Excel add-in tools for statistical and graphical analysis.
Our flagship product, SigmaXL was designed from the ground up to be cost-effective, powerful, and
easy to use. It allows users to measure, analyze, improve, and control their service, transactional and
manufacturing process. As an add-in to the already familiar Microsoft Excel, SigmaXL is ideal for Six
Sigma training and is used by leading consultants. It is rapidly becoming the tool of choice for Six
Sigma professionals. Priced at $249, SigmaXL is a fraction of the cost of any major statistical product,
yet it has all the statistical and graphical functionality most people need.

http://www.sigmaxl.com/SigmaXL_Information_Google.shtml

---

Reshape.XL

Data wrangling tool for Excel

Reshape.XL is a simple add-in for data wrangling in Excel. Process your data simpler and faster.
Inspired by R and SQL languages, but all features are available without coding or complicated
formulas.

Reshape.XL

Data Wrangling Tool for Excel. Simple and effective way to process your data in Excel.

Reshape.XL in an Excel add-in for data processing. With this add-in you can clean, complete,
reshape, wrangle, summarize, edit, subset, select, format, separate, unite, pivot, unpivot, combine
your data that are messy, incomplete, contain many records and variables. Using the "Grammar of
Data" you can do it inside one, very effective and simple environment. No formulas, no scripts or
languages such as VBA. For all the work you use only one window - without dozens of dialogs, input
boxes and windows. Your data transformations are processed in the same way you think about it -
Step by Step.

http://reshapexl.com/?ref=producthunt

---

Berlin-based Morressier secures $1.7 million to unlock the value of early scientific research

28
29

Morressier, the platform digitizing academic conferences and reshaping the exchange of early
scientific findings, today announced a $1.7 million seed funding round led by Redalpine. Experts in
the field of scholarly publishing contributed to the round, including Jan Reichelt, cofounder of
academic network Mendeley, and Jan Maier, cofounder of research management tool AVEDAS,
among others.

Around the world, conferences play a unique and essential role in academia by enabling researchers
to share knowledge, discover breakthroughs and connect with peers. Although conferences are the
primary location for scientists to share their early findings, conference material is still predominantly
restricted to the offline world. This leaves highly valuable scientific insights, research trends and
collaboration opportunities hidden, unstructured and disconnected.

http://www.eu-startups.com/2017/11/berlin-based-morressier-secures-1-7-million-to-unlock-the-
value-of-early-scientific-research/

---

Turning the world’s information

into knowledge

Make smarter,

faster decisions

Signal offers a complete picture of your world.

Powerful artificial intelligence finds

the information you need,

from places you didn’t even know to look,

to make the unknown, known.

https://signalmedia.co/

---

Business and Technology and Startup News and Products and Software...

Product Hunt

https://www.producthunt.com/

Beta Page

29
30

https://betapage.co/

Index

https://index.co/market/technology

Refind

https://refind.com/

Journalism

https://www.journalism.co.uk/

Digital Trends

https://www.digitaltrends.com/outdoors/

Inhabitat

https://inhabitat.com/

EU-Startups

http://www.eu-startups.com/

No Camels

http://nocamels.com/

The Hacker News

https://thehackernews.com/

Leadership Review

https://www.leadershipreview.net/

---

30
31

History Search

The missing filesystem of the web

With History Search you’ll be able to retrieve articles, open online documents, find emails or any
other webpage using a phrase, comment or topic you remember.

? Available for Microsoft Edge, Chrome, Firefox, Opera and Safari

?? Use PRODUCTHUNT25 for a 25% discount (valid Today and Tomorrow).

https://historysearch.com/?ref=producthunt

---

Sigstr Pulse

AI that quantifies every relationship in your business.

By analyzing the email and calendar patterns, Sigstr Pulse identifies and quantifies the entire
universe of relationships that your employees have. Sigstr Pulse gives marketing and sales true
insight into the quality of relationships and engagement within target accounts.

https://www.sigstr.com/pulse/?ref=producthunt

---

When CEO Satya Nadella joined Microsoft, he started diffusing its toxic culture by handing each of
his execs a 15-year-old book by a psychologist

http://uk.businessinsider.com/microsoft-satya-nadella-nonviolent-communication-2018-10

---

Nonviolent Communication: A Language of Life, 3rd Edition: Life-Changing Tools for Healthy
Relationships (Nonviolent Communication Guides) Kindle Edition

by Marshall B. Rosenberg PhD (Author), Deepak Chopra (Author)

https://www.amazon.co.uk/Nonviolent-Communication-Language-Life-Changing-Relationships-
ebook/dp/B07C6JQZ7H/ref=sr_1_1?ie=UTF8&qid=1538598001&sr=8-
1&keywords=Nonviolent+Communication

---

31
32

The Best PR Consultancy for Africa...

http://54communications.com/

---

YubiKey 5 NFC

Works with the most services across the web.

Single

Tip: Purchase a spare YubiKey in case of loss.

Protect online accounts against unauthorized access

Touch based authentication for NFC supported Android and iOS devices and applications

Durable, waterproof, and crush resistant

Fits USB-A computer ports and designed to fit on your keychain

$45

https://www.yubico.com/product/yubikey-5-nfc/#yubikey-5-nfc

---

flowpilot

The easiest way for businesses to plan and manage their cash flow actively.

The easiest way for businesses to plan and manage their cash flow actively. Cash flow planning has
never been this easy! Simply upload your accounting data and get an overview of your current and
forecasted cashflow. Recognize risks and optimization potentials early as they arise and get tips how
to eliminate them. Make better decisions by easy and quick simulations simply without effort. Test
our highly automated cash flow management software 14 days for free!

https://flowpilot.io/

---

Contract Review Automation

The quickest and easiest way for businesses to review and approve incoming contracts

32
33

https://www.lawgeex.com/

---

The ‘nudge unit’: the experts that became a prime UK export

A team of former civil servants specialising in behavioural psychology now pulls in revenues of £14m
a year

https://www.theguardian.com/politics/2018/nov/10/nudge-unit-pushed-way-private-sector-
behavioural-insights-team

https://www.behaviouralinsights.co.uk/

---

Portrait of the Artist as a False Accuser

In 1976 and 1977, New York City was terrorized by one of America’s most infamous serial killers.
Before being captured in front of his Yonkers home, David Berkowitz killed six victims, and wounded
seven others. Berkowitz claimed he was following the orders of his neighbour’s dog, whom he
described as being connected to a demonic figure named Sam. “I am a monster,” Berkowitz wrote in
one of the notes he left for police. “I am the ‘Son of Sam.’”

https://quillette.com/2018/11/09/portrait-of-the-artist-as-a-false-accuser/

---

The Souls of Yellow Folk—A Review

A review of The Souls of Yellow Folk by Wesley Yang. W. W. Norton & Company (November 2018),
256 pages.

Wesley Yang’s longform essay “The Face of Seung-Hui Cho” was first published in the small magazine
n+1 in the early months of 2008. At the time Yang, who was in his early 30s, seemed to be a typical
young New York writer. He had published an assortment of short pieces, mostly about books, for
places like New York, Salon, and the New York Observer. He wasn’t a “name” yet, but he was well-
known enough that one of the editors of n+1 thought of him when they were looking for someone
to write about Cho, the Korean-American student who’d killed 32 people and wounded 17 during his
shooting rampage on the campus of Virginia Tech.

https://quillette.com/2018/11/09/the-souls-of-yellow-folk-a-review/

---

33
34

Dhound

Simple security monitoring for web servers, clouds and apps.

Dhound is a threat detection software for your web servers, clouds and apps, it presents you with a
dashboard to monitor all possible and incoming threats and it works most systems including
Rasberry PI

https://dhound.io/?ref=producthunt

---

Cynet Review: Simplify Security with a True Security Platform

Cynet is trying to change the face of the industry with a consolidated platform that brings together
multiple security capabilities—network and endpoint—while automating and simplifying the job of
the defender.

https://thehackernews.com/2018/11/cynet-cyber-security-solution.html

https://www.cynet.com/

---

A Conference for the

Data-Driven Generation

22—23 November 2018 | Kühlhaus Berlin

https://datanatives.io/

---

Claim compensation for your flight delay or cancellation

Flight delays happen, but that doesn’t mean you have to accept them. You may be entitled to as
much as 600 € in compensation if your flight has been delayed, canceled or overbooked within the
last three years.

https://www.airhelp.com/en-
gb/?&bidkw=airhelp&dvc=c&h=https://clickserve.dartsearch.net/link/click?lid=43700035050511117
&ds_s_kwgid=58700004220141703&bidkw=airhelp&dvc=c&h=https://clickserve.dartsearch.net/link
/click?lid=43700035050511117&ds_s_kwgid=58700004220141703&gclid=CjwKCAiAiarfBRASEiwAw1

34
35

tYv1uDe_MLAw-ul-
r1Gyf5qh1SFaZkD9GcRwXDmGDcrSXrT2K1lrwkGRoCwmAQAvD_BwE&gclsrc=aw.ds

---

XM Cyber provides the first fully automated APT Simulation Platform to continuously expose attack
vectors, above and below the surface, from breach point to any organizational critical asset. This
continuous loop of automated red teaming is completed by ongoing and prioritized actionable
remediation of organizations’ security gaps. In effect, HaXM by XM Cyber operates as an automated
purple team that fluidly combines red team and blue team processes to ensure that organizations
are always one step ahead of the cyber-attackers.

https://xmcyber.com/

http://nocamels.com/2018/11/mossad-cybersecurity-xm-cyber-22m/

---

Cloud Cybersecurity Startup Coronet Partners With Dropbox For Data Protection

Israeli cloud security startup Coronet announced that it has entered an agreement to partner with
Dropbox to bring its innovative data breach protection platform to the US-based company’s millions
of users, Reuters reported. Coronet’s platform will be integrated into Dropbox’s own security
features, and will be available by the end of the year.

http://nocamels.com/2018/11/cloud-security-coronet-dropbox/

---

PENTESTON

PENTESTON is a cyber security vulnerability assessment workbench used by individuals, businesses


and...

PENTESTON is a cyber security vulnerability assessment workbench used by individuals, businesses


and services providers worldwide. Quickly snap into the pre-configured cyber-range and easily select
from over (40+) Tools.

Engage single system or multiple targets to determine if identified technical risk presents a business
risk.

?For large projects collaborate with different team members, import and enter manual findings to a
centralized QA resource.

https://www.penteston.com/

35
36

---

French cyber-security agency open-sources CLIP OS, a security hardened OS

CLIP OS 4 and CLIP OS 5 now available to everyone on GitHub, not just French cyber-spies.

The National Cybersecurity Agency of France, also known as ANSSI (Agence Nationale de la Sécurité
des Systèmes d'Information), has open-sourced CLIP OS, an in-house operating system its engineers
had developed to address the needs of the French government administration.

In a press release, ANSSI described CLIP OS as a "Linux-based operating system [that] incorporates a
set of security mechanisms that give it a very high level of resistance to malicious code and allow it
to protect sensitive information."

https://www.zdnet.com/article/french-cyber-security-agency-open-sources-clip-os-a-security-
hardened-os/?via=indexdotco

---

Debevoise Lawyers Assess Latest Cybersecurity and Data Privacy Developments in Newly Released
Breach Reading 3.0

13 September 2018

The data privacy and cybersecurity field has shifted greatly over the past year, with new cyber threat
vectors and strict data privacy requirements constantly cropping up from a host of sources, but
Debevoise & Plimpton’s newly released Breach Reading 3.0 seeks to guide professionals through
these myriad developments.

“Keeping up with cyber developments can be a daunting task, even to the most seasoned
professional. Breach Reading 3.0 offers a thoughtfully curated selection of the most important
updates in the sector, so leaders can stay abreast of changes without being bogged down by them,”
said partner Jeremy Feigelson, Co-Chair of the firm’s Cybersecurity & Data Privacy practice and
member of the firm’s Intellectual Property and Media Group.

https://www.debevoise.com/news/2018/09/debevoise-lawyers-assess

---

Integrated Desktop & MDM Software

Desktop Central is a unified endpoint management solution that helps in managing servers, laptops,
desktops, smartphones, and tablets from a central location.

36
37

Automate your regular desktop management routines like installing patches, distributing software,
imaging and deploying OS, managing your IT Assets, managing software licenses, monitoring
software usage statistics, managing USB device usage, taking control of remote desktops, and more.
It supports managing Windows, Mac and Linux operating systems.

Manage your mobile devices to deploy profiles and policies, configure devices for Wifi, VPN, Email
accounts, etc., apply restrictions on using camera, browser, etc., and to secure your devices like
enabling passcode, remote lock/wipe, etc.Manage all your iOS, Android and Windows smartphones
and tablets.

Desktop Central is available in 4 Editions

Free

Edition

Suitable for SMBs

Fully functional

Up to 25 computers

Up to 25 mobile devices

https://www.manageengine.co.uk/products/desktop-central/

---

BinaryEdge Portal

We scan the entire internet to show what is exposed.

We scan the entire internet space and create real-time threat intelligence streams and reports that
show what is exposed on the internet.

- What services is your organization exposing?

- How many IOT devices are accessible?

- How many services/databases are miss-configured?

- What DataLeaks have affected a specific e-Mail?

https://app.binaryedge.io/?ref=producthunt

https://www.binaryedge.io/?ref=producthunt

---

Dhound

37
38

Dhound is a security monitoring and intrusion detection tool for internet-facing servers, web apps.

Dhound is a Security-as-a-Service Solution that provides web security monitoring by:

agent-less collection and analysis of security events in your cloud environment;

agent-based collection and analysis of security events on your web servers;

detecting and alerting about intrusions and suspicious activity;

auditing outgoing traffic and data leakage detection;

tracking events that are important for your online business (logins on websites or admin panel,
downloading files, changing account information, etc.)

https://dhound.io/

---

Hackuna (Anti-Hack)

Your weapon against the hackers...

Hackuna (Anti-Hack) is a mobile app available in Google Play Store that gives power to every user to
fight against the hackers. It will do the following:

-Detect and track the hackers within the network

-Discover backdoors within your smartphone

-Make you aware about latest threats in cyber security

-Strengthen your skills in cyber security

https://play.google.com/store/apps/details?id=org.cryptors.hackuna002&ref=producthunt

---

From embedded to cloud¸ NanoLock Security provides the industry’s only lightweight¸ virtually¸ low-
cost security and management solution for connected edge devices.

Using virtually zero computing or power resources¸ NanoLock Security protects firmware¸ boot
image and critical applications stored on connected IoT devices¸ preventing attacks ranging from
ransomware to malicious manipulation of stored code and configuration info.

https://www.nanolocksecurity.com/

---

38
39

A select group of veterans from the Israeli elite intelligence units that specialises in tailored solutions
to complex business and litigation challenges

https://www.blackcube.com/

---

elementary OS

The fast, open, and privacy-respecting replacement for Windows and macOS

All-new Code. Night Light. Picture-in-Picture. More productive window management and tiling.
Shortcut Overlay. Color emoji. And a ton more.

-Go Fast

Stop waiting around for your computer to load. elementary OS starts fast and stays fast. Apps are
lightning quick to open and remember where you left off. Even better, elementary OS doesn’t slow
down with updates.

-Open Source

We respect the rights of our users. All of elementary OS is available for review, scrutiny,
modification, and redistribution by anyone. Which improves security and privacy for everyone.

-Safe & Secure

We’re built on GNU/Linux, one of the most secure systems in the world. It’s the same software
powering the U.S Department of Defense, the Bank of China, and more.

https://elementary.io/

---

Debevoise Lawyers Assess Latest Cybersecurity and Data Privacy Developments in Newly Released
Breach Reading 3.0

13 September 2018

The data privacy and cybersecurity field has shifted greatly over the past year, with new cyber threat
vectors and strict data privacy requirements constantly cropping up from a host of sources, but
Debevoise & Plimpton’s newly released Breach Reading 3.0 seeks to guide professionals through
these myriad developments.

“Keeping up with cyber developments can be a daunting task, even to the most seasoned
professional. Breach Reading 3.0 offers a thoughtfully curated selection of the most important
updates in the sector, so leaders can stay abreast of changes without being bogged down by them,”
said partner Jeremy Feigelson, Co-Chair of the firm’s Cybersecurity & Data Privacy practice and
member of the firm’s Intellectual Property and Media Group.

39
40

https://www.debevoise.com/news/2018/09/debevoise-lawyers-assess

---

It’s been a little over a year since Intel made the Movidius Neural Compute Stick (previously
codenamed Fathom) generally available. The $79 thumb drive — a metal dongle housing a system-
on-chip purpose-built for accelerating machine learning algorithms — was the product of chipmaker
Movidius, which Intel acquired in September 2016. In the intervening months, it’s been used by
thousands of developers and featured in “dozens” of research projects, according to Intel. And today
marks the debut of its successor.

At Intel’s first AI developer conference in Beijing this week, the Santa Clara company took the wraps
off of the Intel Neural Compute Stick 2, or NCS 2. It ditches its predecessor’s Myriad 2 Vision
Processing Unit (VPU) — the chip inside Google’s Clip camera, Flir’s Firefly, DJI’s Phantom 4 drone,
and Tencent’s DeepGaze camera — for the markedly more powerful Myriad X VPU, which Intel
claims delivers 8 times the overall compute performance.

https://venturebeat.com/2018/11/14/intels-neural-compute-stick-2-is-8-times-faster-than-its-
predecessor/?via=indexdotco

---

Somiflash

World's Smartest 1TB flash Drive

Somiflash allows to keep different kind of file and allow access upto 12 users at the same time. So
you can use it in office meetings and during entertainment in a Group. you can access your device
anytime with it’s ios and android app, and can enjoy 10 hours continuous steaming.

Somiflash is compatible to all of your devices.

http://somiflash.com/?ref=producthunt

---

The Finale Newsletter for 2018 - https://conta.cc/2REFCnE

---

The Best Business & Social Software and Apps from my Research (Y 2015 - Y 2018)

40
41

https://conta.cc/2QvI3bC

Newsletters...

https://conta.cc/2Q1OAL5

https://conta.cc/2DffxIg

https://conta.cc/2REFCnE

---

Spybot Identity Monitor

You’ve got the right to know!

You’ve probably registered on dozens of websites (or more) over the years, giving them your email
address, personal data like birth dates and street addresses, and passwords. Spybot Identity Monitor
gives you a tool that allows you to check if your information already is in the hand of hackers. It’s
your data – your deserve to know!

What to do if…?

If Spybot Identity Monitortells you that a service has leaked your data, you should:

Change your password at that service at once.

Change your password on all other services where you might have used the same password. Start
using a password manager to make sure all those passwords are stored safely.

Start using Two Factor Authentication where possible.

https://www.safer-networking.org/products/spybot-identity-monitor/

---

Download PortableApps.com Platform - Free App Store & Menu

your computer, without the computer™

The PortableApps.com Platform™ is a full-featured portable software system that ties all your
portable apps together and lets you build your own custom portable app suite for use in your synced
cloud folder, on your local PC, or on a portable USB drive.

https://portableapps.com/

---

41
42

Winja is a lightweight but powerful tool for discovering malware hiding on your system. Winja allows
you to scan any file or process with the Google VirusTotal Multi Engine Scanner and also provides
deeper analysis using the advanced tools to hunt down and eliminate malware.

https://www.phrozen.io/freeware/winja/

---

KPI6.com

The Media Intelligence that helps marketing professionals succeed in their daily business challenges

KPI6 has developed a tool that helps marketing professionals, strategists, and data analysts to
harness the complexity of data with two environments:

Analytics: A complete Listening engine, which enables the creation of requests to the databases of
the leading social networks and digital public sources.

Audiences: enrich our user groups, previously intercepted, with demographic and psychographic
insights, in a crystal-clear transparent and compliance way with the data regulation process.

https://kpi6.com/

---

SUBSCRIBE

SENTINELONE ANNOUNCES NEW VIGILANCE SERVICE TO SUPPORT THREAT HUNTING AND


RESPONSE CAPABILITIES FOR SECURITY TEAMS

https://www.sentinelone.com/press/sentinelone-announces-new-vigilance-service-support-threat-
hunting-response-capabilities-security-teams/

New Service Offers 24/7 Monitoring of Security Alerts By Expert Security Analysts as Cybersecurity
Skills Gap Grows

Mountain View, Calif., – Sept. 14, 2017 – SentinelOne, a pioneer in delivering autonomous AI-
powered security for the endpoint, datacenter and cloud, t

SentinelOne Vigilance provides a turnkey solution, built on SentinelOne Endpoint Protection


Platform (EPP), to augment security and IT teams in accelerating the detection, prioritization, and
response to advanced cyber threats and reducing the risk of missing critical alerts. Vigilance also
benefits from the rich visibility and automation capabilities of SentinelOne EPP to help customers
maximize their security coverage and speed of response. Vigilance Cybersecurity Analysts assess
suspicious alerts, review raw data on threats and network connections, and collaborate with security
researchers to identify and prioritize events. Vigilance cyber security analysts will also notify security

42
43

personnel, help orchestrate security operations, and execute applicable policy-driven actions to limit
the impact of any threat to an organization.

SentinelOne Vigilance gives security teams the extra set of eyes to give every security alert the
attention it deserves, reduce the number of false positives and allow security teams to focus on the
most critical threats. Using a “follow-the-sun” approach, Vigilance Security Operation Centers (SOC)
allow security experts to continuously monitor, analyze and respond to security threats.

SentinelOne Vigilance is offered at two tiers of support to accommodate needs of different


organizations:

Active Monitoring gives customers full 24/7 coverage to classify and prioritize incoming threats and
alerts. The Vigilance team will deliver Executive Reporting on a quarterly basis.

Active Response also includes Expert Consultation, Threat Response and On-Demand Deep Sample
Forensics services. This level also delivers Executive Reporting monthly.

SentinelOne Vigilance can coexist with Managed Security Service Providers (MSSP) to augment their
efforts to keep an organization secure. In such deployments, the Vigilance Cyber Security Analysts –
will work with the MSSP counterparts to operationalize the workflow from detection to remediation.

Current SentinelOne customers can subscribe to the Vigilance service by working with their
customer success managers. Prospective customers can learn more about SentinelOne EPP and
Vigilance capabilities here.

https://www.sentinelone.com/press/sentinelone-announces-new-vigilance-service-support-threat-
hunting-response-capabilities-security-teams/

---

WireGuard® is an extremely simple yet fast and modern VPN that utilizes state-of-the-art
cryptography. It aims to be faster, simpler, leaner, and more useful than IPSec, while avoiding the
massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is
designed as a general purpose VPN for running on embedded interfaces and super computers alike,
fit for many different circumstances. Initially released for the Linux kernel, it is now cross-platform
and widely deployable. It is currently under heavy development, but already it might be regarded as
the most secure, easiest to use, and simplest VPN solution in the industry.

https://www.wireguard.com/

---

StealthMail

Best-in-class secure email channel solutions

43
44

StealthMail is a solution which makes your emails secure and invisible to email relays, hackers, or
Public Internet threats - making email relationship with clients a trusted one via StealthMail’s best-
in-class Secure Email Channel.

Professional

Email Security

StealthMail makes your emails secure and invisible to email relays, hackers, or Public Internet
threats - making email relationship with clients a trusted one via StealthMail’s best-in-class Secure
Email Channel.

Moreover, StealthMail gives you full and exclusive control over your encryption keys, data, and
access rights - so that your email communication is fully protected.

To start using StealthMail no integration is needed. There are no risks for existing IT infrastructure.
The whole deployment takes less than 4 hours. Users get Outlook Add-ins and the server is deployed
to Company’s Azure Cloud.

https://stealthmail.com/?ref=producthunt

---

Site Audit by cognitiveSEO

cognitiveSEO's Site Audit tool analyses and detects the weak points of your website

Our all-inclusive Site Audit tool is part of a complete SEO Software suite that covers all the needs an
SEO Pro, webmaster or digital marketer might have : Backlink Analysis, technical SEO Audits, content
audits, keywords research & rank tracking, content optimization, Google Penalty prevention and
recovery, and much much more.

https://cognitiveseo.com/site-audit/

---

Seven Israeli startups were selected by Israel’s Internal Security Agency (ISA, also known as the Shin
Bet in Hebrew) and TAU Ventures, the investment arm of Tel Aviv University, to participate in a
unique accelerator that would allow the domestic security service to tap into entrepreneurs working
in artificial intelligence (AI), primarily natural-language processing (NLP) technologies, robotics, and
data science.

http://nocamels.com/2018/07/shin-bet-7-startups-accelerator/

Brands and public identities are negatively

44
45

impacted by social media attacks

https://www.cyabra.com/

---

Israel’s Internal Security Agency (ISA, also known as the Shin Bet and Shabak in Hebrew) is launching
the second cycle of its tech accelerator program, Xcelerator, in partnership with TAU Ventures, the
investment arm of Tel Aviv University founded earlier this year.

http://nocamels.com/2018/12/israels-internal-security-service-launches-2nd-tech-accelerator-cycle/

Last year, the Mossad, Israel’s intelligence agency, launched a venture capital arm to invest in
cutting-edge Israeli technologies. The fund was named Libertad (which means “freedom” in Latin,
but is also the name of a ship that carried Jewish refugees escaping the Nazis in 1940) and offered as
much as $500,000 for research and development projects.

http://www.libertad.gov.il/eng/

---

The top 18 questions we get asked about CybSafe

How does CybSafe work?

CybSafe is built on two foundational pillars: machine learning & advanced data analytics, and
psychology & behavioural science.

CybSafe first measures the security awareness, behaviours and culture of a group of people. It then
implements interventions designed in collaboration with psychologists and behavioural scientists to
improve all three of these areas.

As time goes on, CybSafe continues to measure each area accordingly to help keep people safe
online.

https://resources.cybsafe.com/top-18-questions-about-cybsafe/?via=indexdotco

---

Gigahex

An upcoming desktop app to setup and manage sandbox environment for Big Data Developers.

45
46

Gigahex is a desktop app to create, manage sandbox environments using docker containers in the
user's machine.

This enables Big Data developer and learners to focus on development and testing of their business
logic and not waste time in setting up local environment.

https://gigahex.com/

---

Treadstone 71 Cyber Intelligence Subscription Program

Published: Tuesday, 04 September 2018 08:15

The Cyber Intelligence 12-Month Online Subscription Program is designed to guide organizations in
their cyber and threat intelligence program builds through online lectures,
demonstrations,T71mixmatch and templates covering a wide range of topics. After years of teaching
intelligence courses and delivering intelligence programs to clients, Treadstone 71 now offers the
subscription-based, automated program guiding clients through the strategic planning process, goals
and objectives creation, maturity assessment, SOP development, threat intelligence platform
selection, collection planning, intelligence analysis, analytic writing, and dissemination non-
inclusively.

https://www.treadstone71.com/2-uncategorised/162-subscription

---

Deep Web for Journalists – Comms, Counter-Surveillance, Search: The Digital Journalists' Handbook
Kindle Edition

by Alan Pearce (Author)

Journalism has been transformed by the Internet and the Internet has opened journalists to levels of
surveillance that would have horrified George Orwell. All journalists should be aware of the dangers
they face in the digital world – the emerging battleground.

Being a journalist in 2017 is more dangerous than it ever was. In addition to the usual threats,
beatings, murders and war casualties, we are now being actively targeted online by intelligence
agencies, law enforcement and others.

These days it is not just journalists working in repressive regimes that need worry. We now know
that the US and its cyber-allies – Britain, Canada, Australia and New Zealand – actively monitor
domestic journalists in their mass surveillance of the Internet.

Edward Snowden has warned journalists that they are special targets and he has expressed surprise
that news organizations rarely have any counter-measures in place.

46
47

They harvest our contacts and monitor our telephone logs. They read our emails and texts. They
follow our every move online and they keep tabs on every line we write.

But it is not just intelligence agencies and law enforcement that we should worry about. All kinds of
people have a vested interest in knowing about your next story – individual criminals and criminal
organizations, political parties and extremist groups, law firms and the corporate giants.

Large business interests have their own intelligence units. They know what is being said about them
and by whom. They keep track of their competitors and they know when somebody starts asking
awkward questions about them.

If big business or anyone wanted to destroy a journalist’s reputation this is simplicity itself.

The key is not to attract attention in the first place, and to learn to operate beneath the radar.

But how can journalists safeguard their sources and communicate without being overheard? How
can they conduct sensitive research without having to watch their backs?

This book will show how to block intruders, set up secure communications, mask your identity online
and browse and download anonymously, and store any amount of data without leaving a trace.

If that wasn't enough, the Deep Web is also a largely-unknown research and information resource. If
you know the right entry points, you can mine a rich seam of multimedia files, images, software and
documents that you cannot find on the Surface Web.

Deep Web for Journalists “offers an uncompromising diagnosis of the perils of online
communications and should shatter the confidence many of us place in the unguarded ways of
working online,” says Jim Boumelha, President of International Federation of Journalists in his
Foreword to the book.

Journalist, broadcaster and author Alan Pearce has covered conflicts from the Khmer Rouge to the
Taliban for the BBC and Time Magazine, among others. He now teaches cyber-security skills and
counter-surveillance to journalists.

“The work of journalism has become immeasurably harder than it ever has been in the past.
Journalists have to be particularly conscious about any sort of network signalling, any sort of
connection, any sort of licence plate reading device that they pass on their way to a meeting point,
any place they use their credit card, any place they take their phone, any email contact they have
with the source - because that very first contact, before encrypted communications are established,
is enough to give it all away.” – Edward Snowden 17 July 2014 in The Guardian.

https://www.amazon.co.uk/Deep-Web-Journalists-Counter-Surveillance-Handbook-
ebook/dp/B00CSW1KUW/ref=pd_typ_k_rtpb_1_341689031_4/260-8057516-
7580851?_encoding=UTF8&psc=1&refRID=1KH641FERRT78C2MXYC4

---

Untangling The Web : An NSA Guide to Internet Research Kindle Edition

by National Security Agency (Author)

47
48

"There’s so much data available on the internet that even government cyberspies need a little help
now and then to sift through it all. So to assist them, the National Security Agency produced a book
to help its spies uncover intelligence hiding on the web.

The 643-page tome, called Untangling the Web: A Guide to Internet Research (.pdf), was just
released by the NSA following a FOIA request filed in April by MuckRock, a site that charges fees to
process public records for activists and others.

The book was published by the Center for Digital Content of the National Security Agency, and is
filled with advice for using search engines, the Internet Archive and other online tools. But the most
interesting is the chapter titled “Google Hacking.”

-Wired Magazine 2013

https://www.amazon.co.uk/gp/product/B00L2XVI46/ref=oh_aui_d_detailpage_o00_?ie=UTF8&psc=
1

---

About MuckRock. MuckRock is a non-profit, collaborative news site that brings together journalists,
researchers, activists, and regular citizens to request, analyze .

MuckRock is a United States-based 501(c)(3) non-profit organization which assists anyone in filing
governmental requests for information through the Freedom .

https://www.muckrock.com/

MuckRock is a United States-based 501 non-profit organization which assists anyone in filing
governmental requests for information through the Freedom of Information Act, then publishes the
returned information on its website and encourages journalism around it.

https://en.wikipedia.org/wiki/MuckRock

---

Moneyland: Why Thieves And Crooks Now Rule The World And How To Take It Back Kindle Edition

The SUNDAY TIMES BUSINESS BOOK OF THE YEAR, the ECONOMIST POLITICS & CURRENT AFFAIRS
BOOK OF THE YEAR and a DAILY MAIL and TIMES book of the year

'You cannot understand power, wealth and poverty without knowing about Moneyland.'

Simon Kuper, New Statesman

From ruined towns on the edge of Siberia, to Bond-villain lairs in Knightsbridge and Manhattan,
something has gone wrong with the workings of the world.

Once upon a time, if an official stole money, there wasn't much he could do with it. He could buy
himself a new car or build himself a nice house or give it to his friends and family, but that was about

48
49

it. If he kept stealing, the money would just pile up in his house until he had no rooms left to put it
in, or it was eaten by mice.

And then some bankers in London had a bright idea.

Join the investigative journalist Oliver Bullough on a journey into Moneyland - the secret country of
the lawless, stateless superrich.

Learn how the institutions of Europe and the United States have become money-laundering
operations, undermining the foundations of Western stability. Discover the true cost of being open
for business no matter how corrupt and dangerous the customer. Meet the kleptocrats. Meet their
awful children. And find out how heroic activists around the world are fighting back.

This is the story of wealth and power in the 21st century. It isn't too late to change it.

https://www.amazon.co.uk/Moneyland-Thieves-Crooks-Rule-World-
ebook/dp/B01NBWDPW8/ref=sr_1_1?ie=UTF8&qid=1545883190&sr=8-
1&keywords=Moneyland%3A+Why+Thieves+And+Crooks+Now+Rule+The+World+And+How+To+Tak
e+It+Back

---

Manal al-Sharif is a Saudi Arabian women's rights activist who helped start a women's right to drive
campaign in 2011. A women's rights activist who had previously filmed herself driving, Wajeha al-
Huwaider, filmed al-Sharif driving a car as part of the campaign. The video was posted on YouTube
and Facebook. Wikipedia

https://www.manal-alsharif.com/

---

I'm Professor of Computer Science and Technology Evangelist at Durham University, a digital skills
expert, social entrepreneur, consultant and international ...

https://sueblack.co.uk/

---

My name is danah boyd and I'm a Principal Researcher at Microsoft Research and the founder of
Data & Society. I'm also a Visiting Professor at New York

http://www.danah.org/

---

49
50

THE MOST TRUSTED HACKER-POWERED SECURITY PLATFORM

More Fortune 500 and Forbes Global 1,000 companies trust HackerOne to test and secure the
applications they depend on to run their business.

https://www.hackerone.com/

---

You are protected against data theft

The solution of vigilance against identity theft of your customers and your collaborators

The reliability of your user accounts, customers and employees, is reinforced

https://littlebluefox.io/?ref=producthunt

---

Dash Aids Venezuelan Adoption As 66,000 KRIP Phones Sold in 4 Months

Dash has recorded yet another adoption milestone driven by special circumstances in Venezuela,
with the sale of more than 66,000 KRIP mobile phones that are designed with special cryptocurrency
enhancements optimised for the Dash ecosystem. According to the company, from launch in August
2018 to present, the vast majority of the devices have been sold in Venezuela, making it by far the
world’s biggest market for the cryptocurrency-enabled phones.

https://www.ccn.com/dash-venezuela-adoption-krip-phones/?via=indexdotco

---

Ever wished you could save a video from the Internet? Search no more, Downie is what you're
looking for. Easily download videos from thousands of different sites.

https://software.charliemonroe.net/downie.php?ref=producthunt

---

OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application,


maintained by OWASP. You can install WebGoat, learn about the vulnerabilities, how to exploit

50
51

them, and how to remediate each issue. The project also includes documentation explaining the
issues and how they should be remediated with best-practices.

As serverless adoption is expected to continue growing and reach new audiences, we see the
importance of education on topics such as how to build robust, secure and reliable AWS Lambda
serverless applications. This project will expose developers and security practitioners to basic
serverless security concepts, risks, attacks and mitigation best-practices.

https://www.owasp.org/index.php/OWASP_Serverless_Goat?ref=producthunt

---

TryHackMe

Learn Cyber Security Easily from the cloud! How to Hack.

We take the pain out of learning and teaching Cybersecurity. Our platform makes it a comfortable
experience to learn by designing prebuilt courses which include virtual machines hosted in the cloud
ready to be deployed. This avoids the hassle of downloading and configuring VM's. Our platform is
perfect for CTFs, Workshops, Assessments or Training.

https://tryhackme.com/?ref=producthunt

---

Windows Sandbox

Lightweight desktop environment tailored for safely running applications in isolation

Windows Sandbox is a new lightweight desktop environment tailored for safely running applications
in isolation.

#Prerequisites for using the feature

-Windows 10 Pro or Enterprise build 18305 or later

-AMD64 architecture

-Virtualization capabilities enabled in BIOS

-At least 4GB of RAM (8GB recommended)

-At least 1 GB of free disk space (SSD recommended)

-At least 2 CPU cores (4 cores with hyperthreading recommended)

https://techcommunity.microsoft.com/t5/Windows-Kernel-Internals/Windows-Sandbox/ba-
p/301849

51
52

---

Sordum Random Password Generator

https://www.sordum.org/10946/sordum-random-password-generator/

---

The #1 most preferred password manager

You deserve the best in security. LastPass keeps your information private, secure, and hidden (even
from us).

https://www.lastpass.com/

---

Protecting brands from social media disinformation attacks

New Knowledge is a cybersecurity company specializing in disinformation defense for highly visible
brands under attack by coordinated disinformation campaigns. Through machine learning and AI we
detect threats and provide brand manipulation protection before damage is done.

https://www.newknowledge.com/

---

52

You might also like