QR codes with advanced imaging and photon encryption protect computer chips

QR codes with advanced imaging and photon encryption protect computer chips

QR, or Quick Response, codes — those commonly black and white boxes that people scan with a smartphone to learn more about something — have been used to convey information about everything from cereals to cars and new homes.

But, University of Connecticut (UConn) researchers think the codes have a greater potential: protecting national security.

Using advanced 3-D optical imaging and extremely low light photon counting encryption, Board of Trustees Distinguished Professor Bahram Javidi and his research team have taken the ordinary QR code and transformed it into a high-end cybersecurity application that can be used to protect the integrity of computer microchips. The findings were published in IEEE Photonics Journal.

“An optical code or QR code can be manufactured in such a way that it is very difficult to duplicate,” said Javidi, whose team is part of UConn’s Center for Hardware Assurance, Security, and Engineering (CHASE) in the School of Engineering. “But if you have the right keys, not only can you authenticate the chip, but you can also learn detailed information about the chip and what its specifications are.

“And, that is important to the person using it.”

Corrupted and recycled integrated circuits or microchips posed a significant threat to the international electronics supply chain. Bogus or used computer chips may not matter much when they cause poor cell phone reception or an occasional laptop computer crash in personal use. But the problem becomes exponentially more serious when counterfeit or hacked chips turn up in the U.S. military.

The problem has been exacerbated in recent years by the fact that much of the national production of microcircuits has moved offshore, where prices are lower but ensuring quality control is more difficult.

In 2012, a Senate Armed Services Committee report found that more than 100 cases of suspected counterfeit electronics parts from China had made their way into the Department of Defense supply chain. In one notable example, officials said counterfeit circuits were used in a high-altitude missile meant to destroy incoming missiles. Fixing the problem cost the government $2.675 million, the report said.

Unlike commercial QR codes, Javidi’s little black and white boxes can be scaled as small as microns or a few millimeters and would replace the electronic part number that is currently stamped on most microchips.

Javidi says he can compress vital information about a chip — its functionality, capacity, and part number — directly into the QR code so it can be obtained by the reader without accessing the Internet. This is important in cybersecurity circles, because linking to the Internet greatly increases vulnerability to hacking or corruption.

To further protect the information in the QR code, Javidi applies an optical imaging “mask” that scrambles the QR code design into a random mass of black-and-white pixels that look similar to the snowy images one might see on a broken TV. He then adds yet another layer of security through a random phase photon-based encryption that turns the snowy image into a darkened nighttime sky with just a few random stars or dots of pixilated light.

The end result is a self-contained, highly secure, information-laden microscopic design that is nearly impossible to duplicate. Only individuals who have the special corresponding codes could decrypt the QR image.

And that is important to all of us.

Chinese Version of PC Monitor Expert Updated to Version 1.62

PC Monitor Expert is a trusted computer monitoring product. It can capture every keystroke, Chat, Instant Message, visited website, screenshot, running program, application and etc of the monitored computer. It can also block the use of any program, app, chatting software, downloading software or game software as you want. Once found opening a prohibited program, the program will be closed forcibly and this act will be recorded. Meanwhile, PC Monitor Expert can send monitoring record to your e-mail which makes it convenient for you to keep tabs on the object computer remotely.

Update information of PC Monitor Expert:

File Name: PC Monitor Expert

Version:   V1.62

File Size:   3.78MB

Category:   Computer monitoring software

Language:  Chinese

License:  Trial version

Running on: Win XP/ Vista/7/8

Released on: Feb. 10, 2015

Download from: http://www.jiamisoft.com/pcsc/download.html

What’s new in this version:

– fixed a bug;

* refined the error message when sending emails;

* added the support for Enterprise QQ.

Chinese Version of PC Monitor Expert Updated to Version 1.62

Main features of PC Monitor Expert:

1)Stealth operation: PC Monitor Expert cannot be found on the monitored computer. The monitoring software becomes invisible without any trace after installation, and it can monitor the object monitored computer secretly without letting anyone know. You can launch it by pressing hot key “Ctrl + Alt + U”.

2)Keystrokes Input Records: PC Monitor Expert can monitor all typed keystrokes, including Chinese, English, figures and functional keys. MSN or QQ chats, IMs, e-mail sent, usernames and passwords logged on some websites or e-mail can also be recorded(Warning: please DO NOT use this monitoring software for illegal use. This software won’t record sensitive passwords like QQ or MSN password).

3)Computer Screenshots Capture: Take screenshot of QQ or MSN chats window, active window or the entire compter screen. The monitored screenshots can be played automatically when you view them.

4)Opened Windows Monitoring and Control: Record all titles of opened window and the time they were opened. Prohibit opening windows containing specific block keywords in the title. For example, if you want to keep your children away from some adults contents, you can add adult contents as keyword to the prohibited list. In this way, all windows containing adults contents will be filtered automatically and PC Monitor Expert will forcibly close such web pages. Besides, this software can also record the action you open a prohibited window and opening time.

5)Running Programs Monitoring and Control: Prohibit software you specified (PC Monitor Expert has pre-configured over 30 game software). If a prohibited program is detected, PC Monitor Expert will forcibly shut it down and record this breach;

Prohibit chat software like MSN, QQ or Skype;

Prohibit using web browsers to view web pages;

Prohibit using download software to download;

Prohibit modifying system time;

Prohibit Task Manager(to prevent from ceasing active programs illegally), Registry or Control Panel etc.

6)Enhanced Functions: PC Monitor Expert can sent all monitored record (keystrokes, screenshot captured, active windows, and breaching behaviors and etc.) to a specific E-mail. You can conduct network monitoring as you wish. You can also set a password for this software and thus no one can modify settings or delete this software without the valid password. This software offers timed shutdown function with which you can schedule to shut down your computer at a certain time.

In addition, PC Monitor Expert supports disk control, which can better protect your important content.

DoGoodSoft Releases Best Folder Encryptor 16.75 with Higher Security

DoGoodSoft, one of the leading security software developers in China, offers better-in-class software for both individual and enterprise users at home and abroad. Recently, it released the latest version of its encryption software Best Folder Encryptor. In this new version, DoGoodSoft fixed certain bugs by which users will feel more security to protect their important files and folders in the computer. Besides, the company also improved user experience.

DoGoodSoft Releases Best Folder Encryptor 16.75 with Higher Security

Best Folder Encryptor is a professional file and folder encryption software, which features superfast encryption along with highest security. Based on the advanced encryption algorithms, the encrypted files and folders cannot be decrypted without original password, and are prevented from copy, deletion and removal. The software encrypts your folder in five methods–flash encryption, hiding encryption, full encryption, diamond encryption and portable encryption. It encrypts file by the way of diamond and portable encryption.

DoGoodSoft Releases Best Folder Encryptor 16.75 with Higher Security

In addition, Best Folder Encryptor supports disk protection, data shredding, folder disguise, System Garbage cleanup and other enhancements.

Depend on the high quality, user-friendly design and powerful function, DoGoodSoft has won wide approval and recognition from users.

More information about the product please visit:

http://dogoodsoft.com/best-folder-encryptor/

If you want to learn more products of DoGoodSoft, please visit its website: http://www.dogoodsoft.com/

 

 

Ace Secret Disk – Protect Data Security by Creating Secret Disk on Computer

When it comes to the issue of information security, most people should be afraid but cannot come up with any solution to get rid of it. Here a well-known utility called Ace Secret Disk may settle down the headache. It is designed to be a secure tool for users to protect their data or information from leakage.

Ace Secret Disk is a kind of safe and stable encryption software that allows users to create one or more additional virtual disks on computer, where all private files such as photos, videos, financial information and other documents can be stored. It is used just like a regular disk. In this way the possibility of data leakage should be completely eradicated.

Main features of Ace Secret Disk

High Safety

Ace Secret Disk – Protect Data Security by Creating Secret Disk on Computer  With new and advanced methods, Ace Secret Disk allows users to create one or more encrypted disks on computer along with a password. The disk cannot be opened by anyone else except you. Its encryption can be super strong.

Excellent Performance

Ace Secret Disk – Protect Data Security by Creating Secret Disk on Computer

The secret disk created on computer takes up no extra space, with data export and import as fast as lightning.

Easy-to-Use

Ace Secret Disk – Protect Data Security by Creating Secret Disk on ComputerThe secret disk can be used just like a normal disk, which is easy for people to save private files.

Pricing and Availability:

Ace Secret Disk is compatible now with 32-bit and 64-bit of Windows 7/8, Windows XP, Vista and others. And the price of this utility is $29.95.

To experience the advantages of the mentioned features of Ace Secret Disk, or more products of this developer, please go to visit its website: www. dogoodsoft.com/

 

Fabulous CHK File Recovering Software – CHK File Recovery from DoGoodSoft

DoGoodSoft, one of the famous security software developers whose software is with high awareness, high quality and high loyalty, recommends an advanced file recovering tool CHK File Recovery to users.

Fabulous CHK File Recovering Software – CHK File Recovery from DoGoodSoftCHK File Recovery features recovering more than 100 common file types in a quick and easy way, the file type including mp3, mp4, jpg, bmp, gif, png, avi, mov, mpg, wma, wmv, doc, docx, xls, xlsx, ppt, pptx, zip, rar, exe, dll, sql, mdb, psd and so on.

By default, CHK File Recovery can determine the file type automatically. However, if some unknown file types that cannot be recognized automatically, there is a senior function named Judge File Type Manually, which can confirm the file extension through four methods and recover it afterwards.

Improved software interface meets user preferences in a better way—simple and clear. Besides, it is easy to use – just select a disk in the browse window and click Search, then the software starts to scan the whole disk automatically. After that the search results are shown in the list of software by type. In addition, CHK File Recovery supports searching and scanning a certain folder.

To experience the advantages of the mentioned features, try it from below link:

http://www.dogoodsoft.com/chk-file-recovery/free-download.html

To learn more products of DoGoodSoft visit: http://www.dogoodsoft.com/

 

 

DoGoodSoft Updated Magic Timed Shutdown to Version 9.96

Professional PC auto-shutdown software-Magic Timed Shutdown is updated to version 9.96. In this version optimize software performance and fix a Bug.

Latest Version Information of Magic Timed Shutdown:

Version: V9.96

File Size: 4324KB

Category: Timed Shutdown Software

Language: English

License Type: Trial Version

Operating System(s): Win XP/Vista/7

Last Updated On: March 8th, 2012

Download:http: www.dogoodsoft.com/magic-timed-shutdown/free-download.html

What’s New in This Version:

+ Optimized software performance;

–  Fixed a Bug.

DoGoodSoft Updated Magic Timed Shutdown to Version 9.96Introduction of Magic Timed Shutdown:

Magic Timed Shutdown is a professional PC auto- and timed-shutdown software. It works as a good helper for parents and computer manager, satisfied all the needs of users.

Magic Timed Shutdown executes five tasks of auto-shutdown computers at your setting time: PC shutdown time, PC shutdown in certain time, PC shutdown after startup for some time, shutdown when network speed is less than a limitation for certain time, shutdown as keyboard and mouse without activity in limited time.

Besides, it can disable chats online, prohibit program you preset (e.g. Games), manage online time and PC usage, hide disk drives and control the use of USB devices and so on.

In a word, Magic Timed Shutdown satisfies all the needs of users who should control the use of computer.

 

 

Guard vital and private data on mobile devices with DoGoodSoft USB Encryptor

The latest Global Study on Mobility Risks shows that the phenomena of enterprises’ introduction of mobile devices and employees’ carrying of mobile devices are overhead current enterprise security system and security policy. Websense also said that 51% of enterprise data leakage is caused by mobile devices. Besides, according to one research on IT persons offered by Ponemon Institute indicates that 63% of data revelation results from mobile devices; only 28% comes from desktop computer.

Guard vital and private data on mobile devices with DoGoodSoft USB EncryptorTo better protect the data on mobile devices from leakage, Luoyang Xiabing Software Technologies Ltd. has published the new English version of USB Encryptor on some famous download sites like Softonic. USB Encryptor encrypts USB disks, mobile hard drives and other mobile devices in just seconds. They can be used on any computer without limitations after encryption. Meanwhile, data decryption is also fast as lightning.

Guard vital and private data on mobile devices with DoGoodSoft USB EncryptorUSB Encryptor, a kind of green software with high confidentiality, is user-friendly and easy to use. Moreover, it does not need to be installed, and simply put it in the USB devices you want to encrypt and use. In short, USB Encryptor is an optimal choice for you to guard your important or private data on mobile devices.

More product details please visit at: www.dogoodsoft.com/.

Luoyang Xiabing Software Technologies Ltd Recently Released Ace Secret Folder For Data Security

Luoyang Xiabing Software Technologies Ltd Recently Released Ace Secret Folder For Data SecurityAce Secret Folder is a kind of folder encryption software which makes your folder “secret” and invisible, providing strong shield to protect your important documents and privacy. It features four characters: completely invisible after installation, simple Hotkey invocation, folders disappearance after encryption and fast encryption and decryption.

Luoyang Xiabing Software Technologies Ltd Recently Released Ace Secret Folder For Data Security

Features

The program will become unseen and invisible without any trace after installation, and no one can perceive its existence. It is beyond all doubt that Ace Secret Folder is suitable to be a helper to guard your important and private data from prying eyes.

After Ace Secret Folder is installed, just use the shortcut hotkey “Ctrl + Alt + H” to quickly invoke the folder encryption software, so as to encrypt or decrypt a folder.

Most importantly, you have the right restricted only in the Full version to set your own software hotkey to make your folder more secret. A folder encrypted with Ace Secret Folder is going to be completely invisible and disappear from your computer. Moreover, it can only be opened or decrypted with this folder encryption software.

Besides, all encryption and decryption in Ace Secret Folder are done in just seconds regardless of the folder quantity size.

Pricing and Availability

You need spend 39.95$ in purchasing Ace Secret Folder. Moreover, it has a 7-day free trial period.

This program is perfectly compatible with 32-bit and 64-bit versions of Win 7, Win 8, Win XP, Vista and others.

More information about the product please visit: www.dogoodsoft.com/ace-secret-folder/

If you want to learn more products of us, please visit our company website: www.dogoodsoft.com/

Meet New English Version of Ease Folder Guard

Dogoodsoft recently announces the release of the new version of Ease Folder Guard in English. Ease Folder Guard offers the professional and powerful features for protecting personal folders from prying eyes. Disk protection and other functions are included. Also, it is easy to operate.

Meet New English Version of Ease Folder GuardEase Folder Guard protects folders in three different ways – password protect folders, hide folders and disguise folders. Password protection means to add a password before using a folder. After that, the password is a must to open a folder and is valid in any environment. Moreover, a password-protected folder is delete-proof, copy-proof, and remove-proof. If you hide a folder, you will not find it under any circumstance except with Ease Folder Guard. The powerful folder disguise feature would make an important folder become into a system file, and the original content in the folder cannot be seen.

Meet New English Version of Ease Folder GuardThis program also offers convenient OPEN function for the protected folders. A password-protected, hidden or disguised folder can be opened without cancelling protection. After use, it will restore to the previous state automatically and you don’t have to protect it again.

Besides, disk protection allows you to lock a specific disk as you wish, such as floppy disk, hard disk, CD-ROM disk. The disk will become invisible after being locked.

Enhancements like disabling USB devices or read-only use of USB devices can all-roundly prevent the data on computer from leakage.

Pricing and Availability

You need spend 39.95$ in purchasing Ease Folder Guard. Moreover, Ease Folder Guard has a 7-day free trial period.

This program is perfectly compatible with 32-bit and 64-bit versions of Windows 7, Windows XP, Vista and others.

More information about the product please visit: www.dogoodsoft.com/ease-folder-guard/.

If you want to learn more products of us, please visit our company website: www.dogoodsoft.com/.

Best Encryption Expert Will Be the Escort for Your Data Security

DoGoodSoft now recommends Best Encryption Expert – a perfect and easy-to-use application that combines file/folder encryption, folder protection, disk protection and other enhanced features. It had been acknowledged as the best choice for those who have the urgent need to protect data security.

Best Encryption Expert App Will Be the Escort for Your Data SecurityBest Encryption Expert encrypts files and folders in various ways. With advanced encryption algorithms and superfast encryption speed, the encrypted files and folders will be super strong in strength and be faultless. Folder protection includes folder password protection, folder disguise and folder hiding. The feature of disk protection gives an all-round guard for data security on computer. Moreover, enhancements make this program be the first choice for users. Data shredding, for example, can completely delete data, you will not find and restore it with any software.

Best Encryption Expert App Will Be the Escort for Your Data SecurityFree version of Best Encryption Expert can be used free of charge for 7 days. During the trial, some features like password restore and First Aid Center is not available. Besides, it can only decrypt an already encrypted file/folder when the trial expires.

In full version, users can use it forever with one payment and all the functions are available with no limitations any more. Most importantly, all owners of paid version will benefit from the permanent free updates and professional and customized service.

Availability

Best Encryption Expert is compatible with 32-bit and 64-bit versions of Windows 7, Windows XP, Vista and others.

More information about the product please visit: www.dogoodsoft.com/best-encryption-expert/

If you want to learn more products of us, please visit our company website: www.dogoodsoft.com/