The CHK File Recovery Has Been Updated to Version 1.25

CHK File Recovery is an excellent recovery tool specialized in recovering CHK files in a quick and easy way, which has been updated to version 1.25.

Change Log of CHK File Recovery V1.25:
Version: 1.25
File Size: 6.23MB
Category: CHK File Recovery Software
Language: English
License type: Trial Version
OS Support: Win VISTA/Win 7/Win 8/Win 10/Win 11
Released on: Jan.15, 2022
Download Address: https://www.dogoodsoft.com/chk-file-recovery/free-download.html

What’s New in This Version:
* Compatible with windows 11.
– No more Windows XP support.
* Included some improvements and bug fixes.

Why Choose CHK File Recovery:
CHK File Recovery1.25
CHK File Recovery can accurately and quickly recover more than 200 common file types, such as mp3, mp4, jpg, bmp, gif, png, avi, rm, mov, mpg, wma, wmv, doc, docx, xls, xlsx, ppt, pptx, zip, rar, exe, dll, sql, mdb, psd.

CHK File Recovery can determine file type automatically by default. However, for file types that cannot be recognized automatically, manual identification is used to confirm file type, which can check the content of an unknown file through 4 methods and recover it afterwards.

The interface of CHK File Recovery is simple and clear. It is easy to use. You only need to select a drive and click Search, then CHK File Recovery starts to scan the whole drive automatically. Afterwards, the CHK files found are shown in the list at the left of the application by their original file type. Besides, you can choose to search and scan a folder you specify.

Iran blocks encrypted messaging apps amid nationwide protests

For the past six days, citizens have taken to the streets across Iran, protesting government oppression and the rising cost of goods. Video broadcasts from the country have shown increasingly intense clashes between protesters and riot police, with as many as 21 people estimated to have died since the protests began. But a complex fight is also raging online, as protesters look for secure channels where they can organize free of government interference.

Iran blocks encrypted messaging apps amid nationwide protests

Even before the protest, Iran’s government blocked large portions of the internet, including YouTube, Facebook, and any VPN services that might be used to circumvent the block. The government enforced the block through a combination of centralized censorship by the country’s Supreme Cybercouncil and local ISP interference to enforce more specific orders. The end result is a sometimes haphazard system that can still have devastating effects on any service the regime sees as a threat.

For years, Iran’s most popular encrypted messenger has been Telegram. While some cryptographers have criticized Telegram’s homebrew cryptography, local Iranian users have cared more about the app’s independence from the United States. (The app’s core development team is based in Russia, making it less vulnerable to US government requests.) The app’s massive group chats proved popular, and the government was content to target individual users, occasionally hacking accounts by intercepting account reset messages sent to the user’s phone number.

As protests intensified, Telegram has become both a tool for organizers and a target for the regime. On Saturday, Telegram suspended the popular Amad News channel for violating the service’s policy against calls to violence. One conversation was publicly called out by Iran’s Minister of Technology for recommending protesters attack police with Molotov cocktails. According to Telegram founder Pavel Durov, the government also requested suspensions for a number of other channels that had not violated the policy on violence. When Telegram refused, the government placed a nationwide block on the app.

The government also banned Instagram, although government representatives insist both bans are temporary and will be lifted once protests subside.

The most popular alternative among US activists is Signal, which offers similar group chat features with more robust encryption — but Signal is blocked in Iran for an entirely different reason. The app relies on the Google AppEngine to disguise its traffic through a process called “domain fronting.” The result makes it hard to detect Signal traffic amid the mess of Google requests — but it also means that wherever Google is unavailable, Signal is unavailable too.

At the same time, Google appears to have blocked Iranian access to AppEngine to comply with US sanctions. After years of diplomatic pressure, US companies face significant regulations on any technology exported to Iran, and it’s often unclear how those rules extend to cloud services like AppEngine. Still, researchers like Collin Anderson say Google could find a way to whitelist Signal in Iran if the company wanted to. (Google declined to comment when reached by The Verge.)

Still, the blocks leave organizers in a difficult place, with no clear way to coordinate activity across groups that often sprawl to hundreds of thousands of people. WhatsApp is still available in the country, although bans on the service have been proposed in the past.

Bitcoin Exchange Has Been Forced to Close After Second Cyber-Attack

Bitcoin Exchange Has Been Forced to Close After Second Cyber-Attack

A South Korean Bitcoin exchange has been forced to close after suffering another major cyber-attack.

Youbit claimed it was “very sorry” but has filed for bankruptcy after it suffered the cyber-attack, less than eight months after the first.

In a statement in Korean on its homepage the firm said it had lost 17% of its assets in the raid, with all deposits and withdrawals now halted.

However, customers will get back the majority of their investments — with the firm promising to use cyber-insurance cover and money gleaned from selling its operating rights to pay them back.

It explained in the translated statement:

“Due to bankruptcy, the settlement of cash and coins will be carried out in accordance with all bankruptcy procedures. However, in order to minimize the damage to our members, we will arrange for the withdrawal of approximately 75% of the balance at 4:00 a.m. on Dec 19. The rest of the unpaid portion will be paid after the final settlement is completed.”

The incident highlights the increasing scrutiny being placed on crypto-currency exchanges by cyber-criminals keen to make a fast buck.

In April, Youbit lost 4,000 Bitcoins ($73m) to hackers, with South Korea’s Internet and Security Agency (Kisa) blaming the rogue nation over the border for the raid.

North Korean hackers are also thought to have been targeting crypto-currency insiders in London in a bid to steal credentials.

The hermit nation sees crypto-currency as one way to keep funds flowing into the country in the face of tightening sanctions put in place as a result of its continued nuclear testing.

Leigh-Anne Galloway, cyber-resilience lead at Positive Technologies, argues that Bitcoin exchanges need to get the basics right when it comes to cybersecurity.

“Firstly, server infrastructure and the applications that host cryptocurrencies need to be seen as a security risk — as this is a vector for attack we have seen time and time again. No matter how secure a currency is, if the web application, mobile application, server or network the currency operates on is vulnerable, the contents are at risk,” she explained.

“Secondly, there needs to be a greater focus on preventing social engineering attacks — protecting against website clones and educating users to avoid malicious websites and apps as quick as possible.”

What can I do if I forget the password for my encrypted files?

To be safer, most people would like to protect their important files and folders by encrypting them with a password. While it’s very common for people to forget the password because they should remember many different passwords.

If you choose Best Folder Encryptor to encrypt your files and folders, and you forgot the encryption password, what should you do?

1 Confirm Encryption Type

There are five encryption types in Best Folder Encryptor – flash encryption, hiding encryption, diamond encryption, full encryption and portable encryption.

Right click on the encrypted file or folder in Windows Explorer, select Properties, and you will see “Type of file”. From here we can confirm the encryption type.

2 Confirm License Type

For flash and hiding encryption, you may recall your password with the password prompt if you are using a trial version of software. You can retrieve the password with a full version.

What can I do if I forget the password for my encrypted files?

However, there is no way to recover the password of diamond-, full- or portable-encrypted files and folders if you forget it. If so, your encrypted files and folders will not be decrypted and opened until you remember the password.

3 Retrieve Encryption Password

If you are using a trial version, and forgot the password of flash- or hiding-encrypted folder, please contact us for the password prompt.

If you are using a full version of software, please do as follows:

1. Launch Best Folder Encryptor, and click Settings.

What can I do if I forget the password for my encrypted files?

2. Press the “Set Password” button to set an admin password. If you have set before, skip this step.

What can I do if I forget the password for my encrypted files?

3. Right click on the record of the flash- or hiding-encrypted folder in the software, select “Flash- and Hiding-encrypted Folders[Retrieve Password]”.

What can I do if I forget the password for my encrypted files?

4. Enter the admin password you set in step 2 and click OK, then you will see your password.

What can I do if I forget the password for my encrypted files?

Please note that if your file and folder is encrypted with diamond encryption, full encryption or portable encryption, whether it is a trial version or full version, there is no way to recover your password.

What if I want to use Best Folder Encryptor on another computer?

“I have used Best Folder Encryptor on my laptop for two years, now I want to use it on another computer. What can I do?”

If you purchase a license of Best Folder Encryptor, you will receive a registration code, with which you can activate Best Folder Encryptor on one computer. While if you change a new computer, should you have to purchase a license again? Of course not. Then what should we do?

In the new version of Best Folder Encryptor(v16.97), we added a new feature — Log Off.

If you want to replace a new computer, and continue to use Best Folder Encryptor, please first log off in the software on your old computer.

1. Launch Best Folder Encryptor, click “Help”, select “About Best Folder Encryptor”.

What if I want to use Best Folder Encryptor on another computer?

2. You will see the “Log Off” button. Click “Log Off” and wait for a moment.

What if I want to use Best Folder Encryptor on another computer?

3. Then you will see the message “The activation information has been logged off from the computer.”

What if I want to use Best Folder Encryptor on another computer?

4. Install Best Folder Encryptor on your new computer, and activate it with your registration code. The code is the one that you purchased before.

Important Notice

Before you change the computer, please decrypt your encrypted files and folders on the old device, then transfer them to another computer. Please note that DO NOT directly copy or move the encrypted files to another computer.

But, if your old computer has been crashed or lost, you cannot log off. What you can do?

Please do not hesitate to get in touch with us at support@dogoodsoft.com, we will get you the help you need.

How to open Best Folder Encryptor if you forgot the admin password?

“I used the encryption software Best Folder Encryptor to encrypt my files. To be safer, I have set an admin password for the software. But now I forgot the password. Is there a way to retrieve the admin password?”

It’s very common for users to set an admin password for the encryption software Best Folder Encryptor, which is safer for the encryption files. But, what if you forgot the password? If you can’t remember or retrieve the password, the encryption software will not be opened.

At this situation, please read the following method to recover your admin password.

How to Retrieve Admin Password:

1. Launch Best Folder Encryptor, and you will see the window “Enter Admin Password”.

How to open Best Folder Encryptor if you forgot the admin password?

2. Enter SOS in the Password field(Letters are not case-sensitive), then click OK.

3. Copy and paste your registration key to the pop-up window, and click OK. Note: The registration key must be the one that you activate the software.

How to open Best Folder Encryptor if you forgot the admin password?

4. Now you can see your admin password and be able to open the encryption software Best Folder Encryptor.

How to open Best Folder Encryptor if you forgot the admin password?

When you retrieve the admin password, you can cancel or change it.

How to Cancel Admin Password:

1. Open Best Folder Encryptor, click the Settings button.

How to open Best Folder Encryptor if you forgot the admin password?

2. Uncheck the box that says Require a password to open software.

How to open Best Folder Encryptor if you forgot the admin password?

3. Enter the admin password for confirmation, and click Ok.

4. Now the admin password has been cancelled. It is no longer need to enter the admin password before you open Best Folder Encryptor.

How to Change Admin Password:

1. Open Best Folder Encryptor, click the Settings button.

How to open Best Folder Encryptor if you forgot the admin password?

2. Press Change Password, enter your old password, and then your new password twice, and click OK.

How to open Best Folder Encryptor if you forgot the admin password?

How to open Best Folder Encryptor if you forgot the admin password?

3. Your admin password has been changed successfully.

It is difficult for the FBI to crack most smartphone encryption

It is difficult for the FBI to crack most smartphone encryption

The FBI is struggling to decode private messages on phones and other mobile devices that could contain key criminal evidence, and the agency failed to access data more than half of the times it tried during the last fiscal year, FBI Director Christopher Wray told House lawmakers.

Wray will testify at the House Judiciary Committee Thursday morning on the wide range of issues the FBI faces. One of the issues hurting the FBI, he said, is the ability of criminals to “go dark,” or hide evidence electronically from authorities.

“The rapid pace of advances in mobile and other communication technologies continues to present a significant challenge to conducting lawful court-ordered access to digital information or evidence,” he said in his prepared remarks to the committee. “Unfortunately, there is a real and growing gap between law enforcement’s legal authority to access digital information and its technical ability to do so.”

Wray said criminals and terrorists are increasingly using these technologies. He added that the Islamic State is reaching potential recruits through encrypted messaging, which are difficult for the FBI to crack.

“If we cannot access this evidence, it will have ongoing, significant effects on our ability to identify, stop, and prosecute these offenders,” he said.

He noted that in the last fiscal year, the FBI was unable to access data on about 7,800 mobile devices, even though they had the legal authority to try. He said that was a little more than half of the mobile devices the FBI tried to access in fiscal year 2017.

Wray said the FBI tries to develop workarounds to get at the data, but doesn’t always succeed.

Wray also made it clear that the FBI is not asking for more legal authority to access mobile devices, but said, without being specific, that new ways must be found to let the FBI access this data.

“When changes in technology hinder law enforcement’s ability to exercise investigative tools and follow critical leads, those changes also hinder efforts to identify and stop criminals or terrorists,” he said.

He added that the FBI is “actively engaged” with companies to discuss the problem that “going dark” has on law enforcement, and the agency is working with academics and technologists to find “solutions to this problem.”

Wray is likely to be questioned on a wide range of topics at Thursday’s hearing, including new complaints from Republicans that Wray and other Justice Department officials have ignored requests for information about their actions in the Russia election meddling probe.

Republicans this week started writing a contempt resolution against Wray and others after the Justice Department failed to answer questions from lawmakers about why a top FBI agent was removed from the Russia probe. It was later discovered that the agent sympathized with Hillary Clinton and opposed then-presidential candidate Donald Trump.

Texas Church Shooting: More Calls for Encryption Backdoors

Texas Church Shooting: More Calls for Encryption Backdoors

US Deputy Attorney General, Rod Rosenstein, has decided to use the recent mass shooting at a Texas church to reiterate calls for encryption backdoors to help law enforcers.

The incident took place at the First Baptist Church in Sutherland Springs, killing at least 26 people.

Deceased suspect Devin Kelley’s mobile phone is now in the hands of investigators, but they can’t access it — a similar situation to the one following the mass shooting in San Bernardino which resulted in a court room standoff between Apple and the FBI.

It’s now widely understood that there’s no way for an Apple, Facebook or other tech provider to engineer backdoors in encrypted systems that would allow only police to access content in cases such as these, without putting the security of millions of law-abiding customers at risk.

However, that hasn’t prevented Rosenstein becoming the latest senior US government official to call on technology companies to implement backdoors.

“As a matter of fact, no reasonable person questions our right to access the phone. But the company that built it claims that it purposely designed the operating system so that the company cannot open the phone even with an order from a federal judge,” he told a meeting of local business leaders in Maryland.

“Maybe we eventually will find a way to access the data. But it costs a great deal of time and money. In some cases, it surely costs lives. That is a very high price to pay.”

For its part, Apple has maintained that it works closely with law enforcement every day, even providing training so that police better understand the devices and know how to quickly request information.

However, it is standing firm on the matter of backdoors, aware that breaking its own encrypted systems for US police would likely lead to a stream of requests from other regions including China.

It’s also been suggested that cyber-criminals or nation state actors could eventually get their hands on any backdoors, which would be catastrophic for Apple and its users.

Top10VPN.com head of research, Simon Migliano, called for cool heads on the issue.

“The US Deputy Attorney General bemoans ‘warrant-proof encryption’ but fails to understand that there is no other type of encryption. As all privacy and security experts agree, to undermine encryption with ‘backdoors’ is to open a Pandora’s Box that puts at risk the entire online – and therefore real-world – economy.

“End-to-end encryption secures our banking, online shopping and sensitive business activities. Any kind of ‘backdoor’ would fatally undermine security in these areas. As we learned to our cost with the leak of CIA tools earlier this year, once an exploit exists, it’s only a matter of time until it leaks and cybercriminals have yet another tool at their disposal.”

Best Folder Encryptor Has Updated to Version 16.97

The professional file and folder encryption software – Best Folder Encryptor has been updated to version 16.97. The new version fixed bug that the control board cannot be closed after a Flash- and Hiding-encrypted folder is opened because of misjudgment, made some improvements and optimization, and several minor bug fixes. For more details about Best Folder Encryptor, please read the following content.

More about Best Folder Encryptor 16.97

File Name: Best Folder Encryptor

Version: 16.97

File Size: 10.04MB

Category: Folder Encryption, File Encryption

Language: English

License: Trial version

System Requirements: Win XP/vista/Win 7/Win 8/Win 10

Released on: Oct.08, 2017

Download Address: http://www.dogoodsoft.com/best-folder-encryptor/free-download.html

What’s New in This Version:

– Fixed bug the control board cannot be closed after a Flash- and Hiding-encrypted folder is opened because of misjudgment.

– Minor bug fixes.

* The new software interface.

* Some improvements and optimization.

* Better display of encryption records.

* The new disk mirroring.

– Fixed bug that the encrypted folder cannot be closed after it is opened in some cases.

– Fixed bug with disguise failure after opening a disguised folder.

– Fixed bug with wrong record after a folder is encrypted.

+ Added the drag-and-drop feature to encrypt.

– Fixed bug displayed in the software interface.

– Fixed bug with duplicate records when performing First Aid for Flash- and Hiding-encryted folders.

* Better dealing with the error files when decrypting a Full-encrypted folder.

* Security and usability improvements.

Best Folder Encryptor Has Updated to Version 16.97

Why Choose Best Folder Encryptor

Best Folder Encryptor is a professional file and folder encryption software. It features superfast with high security and confidentiality. With the internationally advanced encryption algorithms, encryption methods and file system drivers, the encrypted files and folders cannot be decrypted without the correct password, and are prevented from copy, deletion or removal.

It is convenient to open and edit the encrypted folder or file with the Open feature, and you don’t have to re-encrypt the folder or file after use.

Besides, it supports many powerful features such as data shredding (file/folder shredding), completely hiding hard disks, disabling USB storage devices or set them as read-only, etc. All these make Best Folder Encryptor undoubtedly a flawless encryption software and the best helper.

Three Defenses to Solve the Problem of Storing Password

Three Defenses to Solve the Problem of Storing Password

One of the biggest concerns around managing the passwords of an organization’s employees lies in how to store those passwords on a computer.

Keeping every user’s password in a plain text file, for example, is too risky. Even if there are no bugs to recklessly leak the passwords to the console, there’s little to stop a disgruntled systems administrator taking a peek at the file for pleasure or profit. Another line of defense is needed.

Let’s hash it out

Back in the 1970s, Unix systems began to ‘hash’ passwords instead of keeping them in plain text. A hash function is used to calculate a value (like a number) for each password or phrase, in such a way that, while the calculation itself may be easy, carrying out ‘in reverse’ – to find the original password – is hard.

By way of illustration, suppose we take an English word, and assign each letter a value: i.e. A=1, B=2, C=3 and so on. Each adjacent pair of letters in the word is then multiplied together, and added up. The “hash” of the word is this total so, using this method, the word BEAD has a hash value of (BxE) (ExA) (AxD) = (2×5) (5×1) (1×4) = 19. FISH scores 377, LOWLY scores 1101, and so on.

Using this system, the password file would store a number for each user, rather than the password itself. Suppose, for example, the password file entry for me has the number 2017. When I log in, I type in my password, the computer carries out the calculation above and, if the result is 2017, it lets me in. If, however, the calculation results in another value, access is denied.

As all that’s stored in the password file is the value 2017, and not my actual password, it means that if a hacker steals the entire contents of the file, there is still a puzzle to solve before they can log in as me.

Verbal attack

Although hashed passwords may be more secure than plaintext, there still remains a problem. The aim of a dictionary attack is to obtain a list of all English words and calculate their hash values, one by one; if my word is in there, it will be found eventually. However, while this may sound like a painful amount of work, the point is that it won’t just crack my password – it will crack every password.

An index is created in such an attack, which is then sorted by hash value, with individual words added to the index as their hash values are calculated: BAP goes on page 18, for example, BUN goes on 336, and CAT on page 23. ‘Reversing’ the hash function is then just a matter of looking up the word in the index – simply turn to page 2017 and you’ll find my password.

During World War II, the cryptanalysts at Bletchley Park did literally that: they worked out every possible way in which the common German word ‘eins’ could be enciphered using the Enigma machine, and recorded the Enigma settings as they went. The results were then sorted alphabetically into the so-called ‘eins catalogue’ meaning that, if the codebreakers could guess which encrypted letters represented the plaintext ‘eins’, they were then able to simply rummage through a battered green filing cabinet and pull out the key.

Salt in the wound

The next layer of defense against a dictionary attack is to use what’s called salt. A random variation to the calculation is applied differently for each user’s password in a salted hash scheme. One user could have A=17, B=5, C=13, and so on, for example, and another could have A=4, B=22, C=17. The password file would then store the salt (the A, B, C values) and the hash result. The computer could still carry out a quick calculation to check the password, but the variation means that the same password would have a different hash value for a different user.

It would therefore be impossible to compile a single dictionary that could successfully reverse the hash for everyone.

Finally, the best modern systems use a so-called iterated hash. The idea of this is to make the hash function itself harder to calculate by re-hashing the data thousands of times. This does slow down the computer checking the passwords, but anyone trying to search for a password will also be slowed by the same factor. The end result is essentially a computing power arms race between system administrators and hackers although, if you’re Amazon or Microsoft, it’s a fight you’re well placed to win.

Protecting user passwords is critical to the security of an organization’s confidential files and information. It’s vital therefore that steps are taken to protect passwords, encrypting them to such a degree that even the most determined criminal will find it impossible to decipher.