In this webinar, you will understand export compliance obligations for commercial encryption technology items. You can take control over your export activities and know the laws controlling what you can and cannot export and to whom. You will learn about the legal and practical encryption products under the Bureau of Industry and Security, export licensing requirements, types, and application procedures. You will also receive the latest information on how to comply with federal law. This webinar supports America's National Export Initiative. For more: http://export.gov/webinars/eg_main_046622.asp December 14, 2011
Views: 3372 International Trade Administration
This video was downloaded from the US Commerce Department Bureau of Industry and Security (BIS) website as a Windows Media Player file. This file type is incompatible with many operating systems and media players, so this Youtube video is provided as a cross-platform port of this free resource from BIS.
Views: 3593 Aaron Harper
Open Source, Encryption and Export Regulations & The New Compliance Frontier - Mark Gisi, Wind River Systems The percentage of Open Source Software (OSS) that commercial software solutions are composed of is growing rapidly. It is not uncommon for Linux and other OSS components to represent the lion share of the software running on an embedded device. In recent years a lot of attention and effort has gone into developing OSS license compliance best practices. Another area given less attention yet continues to grow in importance is software export compliance. Although different governments have different regulations for software, what's universal is that software export compliance centers on the use of encryption software. It is often difficult to answer questions about the existence or use of encryption software for OSS that a developer uses (but did not write). We discuss best practices used to identify encryption in software, and open source tools that can assist with the task. About Mark Gisi Mark Gisi, Directory of Intellectual Property and Open Source at Wind River Systems (an Intel subsidiary), has been responsible for managing Open Source policies, processes and programs for the past 10 years. Mark has extensive experience managing the use of open source software to both maximize ROI and mitigate risk. That includes managing Open source software to go beyond reducing costs such as: accelerating innovation; fostering internal code sharing and reuse; accelerating product adoption; obtaining ROI on strategically positioned open source projects; strengthening an organizationâ€™s brand; and facilitating the attraction/retention of highly skilled technical staff. Mark is a key contributor to the Linux Foundationâ€™s SPDX and OpenChain projects. Mark holds a MS degree in Computer Science and a BS degree in Mathematics.
Views: 521 The Linux Foundation
by David Adrian TLS has experienced three major vulnerabilities stemming from "export-grade" cryptography in the last year---FREAK, Logajm, and Drown. Although regulations limiting the strength of cryptography that could be exported from the United States were lifted in 1999, and export ciphers were subsequently deprecated in TLS 1.1, Internet-wide scanning showed that support for various forms of export cryptography remained widespread, and that attacks exploiting export-grade cryptography to attack non-export connections affected up to 37% of browser-trusted HTTPS servers in 2015. In this talk, I'll examine the technical details and historical background for all three export-related vulnerabilities, and provide recent vulnerability measurement data gathered from over a year Internet-wide scans, finding that 2% of browser-trusted IPv4 servers remain vulnerable to FREAK, 1% to Logjam, and 16% to Drown. I'll examine why these vulnerabilities happened, how the inclusion of weakened cryptography in a protocol impacts security, and how to better design and implement cryptographic protocols in the future. Having been involved in the discovery of all three export vulnerabilities, I'll distill some lessons learned from measuring and analyzing export cryptography into recommendations for technologists and policymakers alike, and provide a historical context for the current "going dark'' and Apple vs. FBI debate.
Views: 1326 Black Hat
This Import-Export Regulations training video is part of the CISSP FREE training course from Skillset.com (https://www.skillset.com/certifications/cissp). Skillset helps you pass your certification exam. Faster. Guaranteed. https://www.skillset.com Topic: Import-Export Regulations Skill: Information Security Legal Issues Skillset: Security and Risk Management Certification: CISSP Join the 40,000+ candidates in over 58 countries that have found a faster, better way to pass their certification exam. + Unlimited access to thousands of practice questions + Exam readiness score + Smart reinforcement + Focused training ensures 100% exam readiness + Personalized learning plan + Align exam engine to your current baseline knowledge + Eliminate wasted study time + Exam pass guarantee And much more - https://www.skillset.com
Views: 2062 Skillset
What is EXPORT OF CRYPTOGRAPHY? What does EXPORT OF CRYPTOGRAPHY mean? EXPORT OF CRYPTOGRAPHY meaning - EXPORT OF CRYPTOGRAPHY definition - EXPORT OF CRYPTOGRAPHY explanation. SUBSCRIBE to our Google Earth flights channel - http://www.youtube.com/channel/UC6UuCPh7GrXznZi0Hz2YQnQ?sub_confirmation=1 Source: Wikipedia.org article, adapted under https://creativecommons.org/licenses/by-sa/3.0/ license. The export of cryptography is the transfer from one country to another of devices and technology related to cryptography. In the early days of the Cold War, the U.S. and its allies developed an elaborate series of export control regulations designed to prevent a wide range of Western technology from falling into the hands of others, particularly the Eastern bloc. All export of technology classed as 'critical' required a license. CoCom was organized to coordinate Western export controls. Currently, many countries, notably those participating in the Wassenaar Arrangement, have similar restrictions.
Views: 26 The Audiopedia
Some people think privacy doesn't matter as long as you have nothing to hide. But online privacy is a form free speech. Despite government efforts, encryption is not a munition and source code is speech protected under the first amendment. If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 66% on the 2-year plan! Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 In the 1990s, the government fiercely attacked online privacy by classifying encryption software as a munition, and regulating it as biological weapons or firearms. Exporting encryption was heavily restricted, required a government license, and made its implementation on the Internet virtually impossible. In 1991 Phil Zimmerman developed his first version of an encryption program called Pretty Good Privacy designed to secure email communications, files or even entire disks. Two years later, Zimmerman was under criminal investigation for exporting munitions without a license and was barred from sharing his software on the Internet. Zimmerman published the whole PGP source code in a hardcover book distributed by MIT Press. In a digital form, PGP was an outlawed piece of software. But printed in a book, it was free speech protected by the Constitution. In 1994, a graduate student at the University of California was developing an encryption algorithm that he intended to publish, distribute and share openly on public lectures and on the Internet. However, the US Department of State classified his cryptographic software under the Arms Export Control Act and the International Traffic in Arms Regulations. After several years of legal battles, the court eventually decided that Bernstein’s source code is protected by the Constitution. The judge ruled that code is speech. Online privacy protects you from censorship. Encryption allows you to express yourself publicly but anonymously. It lets you develop and try ideas before you are comfortable to share them with others. It gives you a space with your own borders where you are free from judgment and control. The first amendment grants you the right to encrypted speech. Sources Legal cases https://www.eff.org/cases/bernstein-v-us-dept-justice https://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?referer=&httpsredir=1&article=1180&context=btlj https://www.eff.org/deeplinks/2015/04/remembering-case-established-code-speech https://www.eff.org/deeplinks/2005/07/eff15-phone-call https://www.eff.org/press/archives/2008/04/21-40 https://www.eff.org/press/archives/2008/04/21-29 https://www.eff.org/press/archives/2008/04/21-42 https://www.eff.org/deeplinks/2014/09/nine-epic-failures-regulating-cryptography https://law.stackexchange.com/questions/3696/is-the-right-to-keep-and-bear-crypto-protected-by-the-second-amendment Other https://networkingnerd.net/2016/03/16/thoughts-on-encryption/ http://www.cypherspace.org/rsa/legal.html https://www.millercanfield.com/resources-417.html https://www.gpo.gov/fdsys/pkg/FR-2018-08-30/pdf/2018-18771.pdf#page=1 https://www.ecfr.gov/cgi-bin/text-idx?node=pt22.1.121 https://www.law.cornell.edu/cfr/text/22/121.1 https://www.washingtonpost.com/wp-srv/politics/special/encryption/encryption.htm??noredirect=on https://www.nytimes.com/1996/11/08/business/us-classifies-a-device-to-surf-the-web-as-a-weapon.html https://www.philzimmermann.com/EN/essays/WhyIWrotePGP.html https://en.wikipedia.org/wiki/Pretty_Good_Privacy#cite_ref-zimmermann2_16-0 Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
Views: 11029 The Hated One
What is CONTROLLED CRYPTOGRAPHIC ITEM? What does CONTROLLED CRYPTOGRAPHIC ITEM mean? CONTROLLED CRYPTOGRAPHIC ITEM meaning - CONTROLLED CRYPTOGRAPHIC ITEM definition - CONTROLLED CRYPTOGRAPHIC ITEM explanation. Source: Wikipedia.org article, adapted under https://creativecommons.org/licenses/by-sa/3.0/ license. SUBSCRIBE to our Google Earth flights channel - https://www.youtube.com/channel/UC6UuCPh7GrXznZi0Hz2YQnQ A Controlled Cryptographic Item (CCI) is a U.S. National Security Agency term for secure telecommunications or information handling equipment, associated cryptographic component or other hardware item which performs a critical communications security (COMSEC) function. Items so designated may be unclassified but are subject to special accounting controls and required markings. Part of the physical security protection given to COMSEC equipment and material is afforded by its special handling and accounting. CCI equipment must be controlled in a manner that affords protection at least equal to that normally provided other high value equipment, such as money, computers, and Privacy Act-controlled. There are two separate channels used for the handling of such equipment and materials: "the COMSEC channel" and "the administrative channel." The COMSEC channel, called the COMSEC Material Control System, is used to distribute accountable COMSEC items such as classified and CCI equipment, keying material, and maintenance manuals. Some military departments have been authorized to distribute CCI equipment through their standard logistics system. The COMSEC channel is composed of a series of COMSEC accounts, each of which has an appointed COMSEC Custodian who is personally responsible and accountable for all COMSEC materials charged to his/her account. The COMSEC Custodian assumes accountability for the equipment or material upon receipt, then controls its dissemination to authorized individuals on job requirements and a need-to-know basis. The administrative channel is used to distribute COMSEC information other than that which is accountable in the COMSEC Material Control System. Persons with access to COMSEC materials are asked, among other restrictions, to avoid unapproved travel to any countries which are adversaries of the United States, or their establishments or facilities within the U.S.
Views: 101 The Audiopedia
What is EXPORT RESTRICTION? What does EXPORT RESTRICTION mean? EXPORT RESTRICTION meaning - EXPORT RESTRICTION definition - EXPORT RESTRICTION explanation. Source: Wikipedia.org article, adapted under https://creativecommons.org/licenses/by-sa/3.0/ license. SUBSCRIBE to our Google Earth flights channel - https://www.youtube.com/channel/UC6UuCPh7GrXznZi0Hz2YQnQ Export restrictions, or a restriction on exportation, are limitations on the quantity of goods exported to a specific country or countries by a Government. An export restriction may be imposed: To prevent a shortage of goods in the domestic market because it is more profitable to export To manage the effect on the domestic market of the importing country, which may otherwise impose antidumping duties on the imported goods As part of foreign policy, for example as a component of trade sanctions To limit or restrict arms or dual-use items that may be used in proliferation, terrorism, or nuclear, chemical, or biological warfare. To limit or restrict trade to embargoed nations. In the United States, the Export Administration Regulations are issued by the Bureau of Industry and Security (in the Department of Commerce) for all items except munitions. The Department of State has the responsibility of overseeing export of defense and military-related articles as per the International Traffic in Arms Regulations or ITAR.
Views: 303 The Audiopedia
In this third part of The GovCon Video Blog™ series covering the export control rules that apply to government contractors under the International Traffic In Arms Regulations (ITAR) and the Export Administration Regulations (EAR), we discuss briefly exports under ITAR, including transfers of technical data within the U.S. that are deemed exports.
Views: 104 The GovCon Video Blog
This Regulatory Compliance training video is part of the CISSP FREE training course from Skillset.com (https://www.skillset.com/certifications/cissp). Skillset helps you pass your certification exam. Faster. Guaranteed. https://www.skillset.com Topic: Regulatory Compliance Skill: Information Security Compliance Fundamentals Skillset: Security and Risk Management Certification: CISSP Join the 40,000+ candidates in over 58 countries that have found a faster, better way to pass their certification exam. + Unlimited access to thousands of practice questions + Exam readiness score + Smart reinforcement + Focused training ensures 100% exam readiness + Personalized learning plan + Align exam engine to your current baseline knowledge + Eliminate wasted study time + Exam pass guarantee And much more - https://www.skillset.com
Views: 4786 Skillset
In this first part of The GovCon Video Blog™ series covering the export control rules that apply to government contractors under the International Traffic In Arms Regulations (ITAR) and the Export Administration Regulations (EAR), we discuss briefly the application of the rules to technical data and software, e-mails and oral communications, and domestic communications with foreign persons. We also touch on permissible exports of controlled items with licenses and prior agency approval.
Views: 59 The GovCon Video Blog
Paul Rosenzweig, Professorial Lecturer in Law at the George Washington University, explains what encryption is and the legal issues that arise from its use. Related links: Security Win: Burr-Feinstein Proposal Declared “Dead” for This Year by Rainey Reitman https://www.eff.org/deeplinks/2016/05/win-one-security-burr-feinstein-proposal-declared-dead-year Russian Lawmakers Call For More Surveillance and Weaker Encryption http://fortune.com/2016/06/21/russia-encryption-surveillance/ BATTLE OF THE SECURE MESSAGING APPS: HOW SIGNAL BEATS WHATSAPP https://theintercept.com/2016/06/22/battle-of-the-secure-messaging-apps-how-signal-beats-whatsapp/ Why the fear over ubiquitous data encryption is overblown https://www.washingtonpost.com/opinions/the-need-for-ubiquitous-data-encryption/2015/07/28/3d145952-324e-11e5-8353-1215475949f4_story.html Encryption and Law Enforcement Special Access: The U.S. Should Err on the Side of Stronger Encryption http://www.heritage.org/research/reports/2015/09/encryption-and-law-enforcement-special-access-the-us-should-err-on-the-side-of-stronger-encryption The debate over government ‘backdoors’ into encryption isn’t just happening in the U.S. https://www.washingtonpost.com/news/the-switch/wp/2016/01/11/the-debate-over-government-backdoors-into-encryption-isnt-just-happening-in-the-u-s/
Views: 9517 The Federalist Society
For Complete Step by Step Tutorial and source code visit : http://dotnetawesome.blogspot.com/2013/11/how-to-upload-file-with-encryption-and.html
Views: 30366 sourav mondal
In the wake of the Panama Papers breach, securing law firm and client data has been a huge concern for many practitioners in the legal space. Similarly, other information leaks like the Edward Snowden revelations have made the general public more aware of government surveillance than ever before. In this episode of Digital Detectives, hosts Sharon Nelson and John Simek sit down with executive director for the Electronic Frontier Foundation Cindy Cohn to discuss domestic surveillance concerns, encryption technology, and how lawyers and law firms can protect themselves and their clients from cyber attacks. Cindy Cohn is the executive director of the Electronic Frontier Foundation. From 2000-2015 she served as EFF’s Legal Director as well as its General Counsel. Ms. Cohn first became involved with EFF in 1993, when EFF asked her to serve as the outside lead attorney in Bernstein v. Dept. of Justice, the successful First Amendment challenge to the U.S. export restrictions on cryptography.
Views: 9 LegalTalkNetwork
In this Monthly Briefing, Ray Potter, CEO of SafeLogic will provide a first-hand assessment of the challenges and opportunities associated with the application of cryptography to industrial control systems. SafeLogic is the creator of cryptographic engines used by major hardware and software vendors. In addition to Mr. Potter, ICS-ISAC Chair Chris Blask will provide an update on the Center and related issues. Designed to benefit both the technical & non-technical attendee the Member Briefing series takes a no-nonsense approach to addressing issues that cut across industry, sector, and job function. So whether you are hands-on ICS, administrator, or C-level decision-maker you will find valuable information that you can take and implement to further secure your industrial control systems
Views: 155 Chris Blask
What is CRYPTOGRAPHIC SERVICE PROVIDER? What does CRYPTOGRAPHIC SERVICE PROVIDER mean? CRYPTOGRAPHIC SERVICE PROVIDER meaning - CRYPTOGRAPHIC SERVICE PROVIDER definition - CRYPTOGRAPHIC SERVICE PROVIDER explanation. Source: Wikipedia.org article, adapted under https://creativecommons.org/licenses/by-sa/3.0/ license. SUBSCRIBE to our Google Earth flights channel - https://www.youtube.com/channel/UC6UuCPh7GrXznZi0Hz2YQnQ In Microsoft Windows, a Cryptographic Service Provider (CSP) is a software library that implements the Microsoft CryptoAPI (CAPI). CSPs implement encoding and decoding functions, which computer application programs may use, for example, to implement strong user authentication or for secure email. CSPs are independent modules that can be used by different applications. A user program calls CryptoAPI functions and these are redirected to CSPs functions. Since CSPs are responsible for implementing cryptographic algorithms and standards, applications do not need to be concerned about security details. Furthermore, one application can define which CSP it is going to use on its calls to CryptoAPI. In fact, all cryptographic activity is implemented in CSPs. CryptoAPI only works as a bridge between the application and the CSP. CSPs are implemented basically as a special type of DLL with special restrictions on loading and use. Every CSP must be digitally signed by Microsoft and the signature is verified when Windows loads the CSP. In addition, after being loaded, Windows periodically re-scans the CSP to detect tampering, either by malicious software such as computer viruses or by the user him/herself trying to circumvent restrictions (for example on cryptographic key length) that might be built into the CSP's code. To obtain a signature, non-Microsoft CSP developers must supply paperwork to Microsoft promising to obey various legal restrictions and giving valid contact information. As of circa 2000, Microsoft did not charge any fees to supply these signatures. For development and testing purposes, a CSP developer can configure Windows to recognize the developer's own signatures instead of Microsoft's, but this is a somewhat complex and obscure operation unsuitable for nontechnical end users. The CAPI/CSP architecture had its origins in the era of restrictive US government controls on the export of cryptography. Microsoft's default or "base" CSP then included with Windows was limited to 512-bit RSA public-key cryptography and 40-bit symmetric cryptography, the maximum key lengths permitted in exportable mass market software at the time. CSPs implementing stronger cryptography were available only to U.S. residents, unless the CSPs themselves had received U.S. government export approval. The system of requiring CSPs to be signed only on presentation of completed paperwork was intended to prevent the easy spread of unauthorized CSPs implemented by anonymous or foreign developers. As such, it was presented as a concession made by Microsoft to the government, in order to get export approval for the CAPI itself. After the Bernstein v. United States court decision establishing computer source code as protected free speech and the transfer of cryptographic regulatory authority from the U.S. State Department to the more pro-export Commerce Department, the restrictions on key lengths were dropped, and the CSPs shipped with Windows now include full-strength cryptography. The main use of third-party CSPs is to interface with external cryptography hardware such as hardware security modules (HSM) or smart cards.
Views: 1794 The Audiopedia
Blockchain technology has the potential to revolutionize Global Trade and the import export process. Warwick from BeefLedger explains what blockchain technology is, how it works and how blockchain solutions are being applied to real world import export shipments. Blockchain technology provides value for all parties along the supply chain, from shippers, freight forwarders, ports, customs, shipping lines and importers all over the world. Implementing blockchain throughout the supply chain will eliminate manual data re-entry, eliminate human error and increase security. It also provides the base for smart contracts to initiate events such as International payments when certain conditions are met. Warwick and Ben discuss: What Blockchain technology actually is? How does Blockchain technology work? How will Blockchain actually increase efficiencies in the supply chain? How will Blockchain increase security in the supply chain? How does Blockchain technology enable smart contracts and payments with Crypto-Currencies? How will Blockchain change the Letter of Credit process? How will banks implement the Blockchain / smart contracts / cryptocurrencies? How will BeefLedger ensure security and compliance in the supply chain? Importers and Exporters use https://incodocs.com/ to streamline Global Trade documentation
Views: 554 Inco Docs
At the end of 2013, an international export control regime known as the Wassenaar Arrangement was updated to include controls on technology related to “Intrusion Software" and “IP Network Surveillance Systems." Earlier this year, the US Government announced a draft interpretation of these new controls, which has kicked off a firestorm of controversy within the information security community. Questions abound regarding what the exact scope of the proposed rules is, and what impact the rules might have on security researchers. Is it now illegal to share exploit code across borders, or to disclose a vulnerability to a software vendor in another country? Can export controls really keep surveillance technology developed in the west out of the hands of repressive regimes? This presentation will provide a deep dive on the text of the new controls and discuss what they are meant to cover, how the US Government has indicated that it may interpret them, and what those interpretations potentially mean for computer security researchers, and for the Internet as a whole. Speaker bios: Tom Cross is the CTO of Drawbridge Networks. He is credited with discovering a number of critical security vulnerabilities in enterprise class software and has written papers on collateral damage in cyber conflict, vulnerability disclosure ethics, security issues in internet routers, encrypting open wireless networks, and protecting Wikipedia from vandalism. Tom was previously Director of Security Research at Lancope, and Manager of the IBM Internet Security Systems X-Force Advanced Research team. He has spoken at numerous security conferences, including DEF CON, Blackhat Briefings, CyCon, HOPE, Source Boston, FIRST, and Security B-Sides. Twitter: @_decius_ Collin Anderson is a Washington D.C.-based researcher focused on measurement and control of the Internet, including network ownership and access restrictions, with an emphasis on countries that restrict the free flow of information. Through open research and cross-organizational collaboration, these efforts have included monitoring the international sale of surveillance equipment, identifying consumer harm in disputes between core network operators, exploring alternative means of communications that bypass normal channels of control, and applying big data to shed new light on increasingly sophisticated restrictions by repressive governments. These involvements extend into the role of public policy toward promoting online expression and accountability, including regulation of the sale of surveillance technologies and reduction of online barriers to the public of countries under sanctions restrictions. Twitter: @cda
Views: 1318 DEFCONConference
USE THIS COUPON CODE FOR 80% OFF ENTIRE COURSE: https://www.udemy.com/information-security-cyber-security-made-easy/?couponCode=COURSE This course covers everything you've ever wanted to know about information security and cyber security. We'll review the following concepts: Confidentiality Integrity Availability Information Security Control Frameworks Security Governance Risk Management Business Continuity Planning Digital Signatures Digital Certificates Hashing Organizational Processes Security Roles and Responsibilities Compliance Ethics Computer Crimes Software Licensing Export Controls Data Breaches Security Policies RAID Technology Risk Assessment Techniques Quantitative Risk Factors Risk Management Strategies Security Controls Understanding Data Security Security Policies Developing Security Baselines Data Security Roles Customizing Security Standards Data Privacy Customizing Security Standards Leveraging Industry Standards Data Encryption Secure Design Principles Security Models Security Requirements Virtualization Cloud Computing Models Public Cloud Tiers Memory Protection Interface Protection High Availability and Fault Tolerance OWASP Top 10 SQL Injections Cross-Site Scripting (XSS) Cross-Request Forgery Understanding Encryption Symmetric vs. Asymmetric Cryptography Goals of Cryptography Codes vs. Ciphers Key Lifecycle Management Data Encryption Standard (DES) Triple DES (3DES) Advanced Encryption Standard (AES) Blowfish Twofish RC4 RSA Cryptography Elliptic Curve & Quantum Cryptography Key Exchange Diffie-Hellman Key Exchange Key Escrow Trust Models PKI and Digital Certificates Hash Functions and Digital Certificates Digital Signatures These are just a few of the topics covered in this course. Each lecture is designed to introduce concepts in manner that breaks down core concepts into fundamental principles. Whether you're a beginner in the field of information and cybersecurity, or an experience professional, you will gain valuable knowledge that can be applied in your personal and professional life.
Views: 16 e-Learning PRO
Cindy Cohn is the Legal Director for the Electronic Frontier Foundation as well as its General Counsel. She is responsible for overseeing the EFF's overall legal strategy and supervising EFF's fourteen staff attorneys. Ms. Cohn first became involved with the EFF in 1993, when the EFF asked her to serve as the outside lead attorney in Bernstein v. Dept. of Justice, the successful First Amendment challenge to the U.S. export restrictions on cryptography. Outside the Courts, Ms. Cohn has testified before Congress, been featured in the New York Times, San Francisco Chronicle and elsewhere for her work on digital rights and has traveled onto the Internet with Stephen Colbert. The National Law Journal named Ms. Cohn one of 100 most influential lawyers in America in 2013, noting: "[I]f Big Brother is watching, he better look out for Cindy Cohn." She was also named in 2006 for "rushing to the barricades wherever freedom and civil liberties are at stake online." In 2007 the National Law Journal named her one of the 50 most influential women lawyers in America. In 2010 Intellectual Property Section of the State Bar of California awarded her its Intellectual Property Vanguard Award and in 2012 the Northern California Chapter of the Society of Professional Journalists awarded her the James Madison Freedom of Information Award. Issues that Ms. Cohn currently handles NSA Spying: Ms Cohn serves as counsel in Jewel v. NSA, and First Unitarian Church v. NSA, each seeking to stop the ongoing dragnet warrantless surveillance of millions of ordinary Americans. Ms. Cohn also served as coordinating counsel for over forty national class action lawsuits against the telecommunications carriers and the government seeking to stop the warrantless surveillance. EFF filed the first such case, Hepting v. AT&T, in 2006 against telecom giant AT&T for violating its customers' privacy. In re National Security Letter: EFF represents service providers who have brought challenges the National Security Letter statute, which was dramatically expanded as part of the USA Patriot Act, including placing broad and permanent gag orders on providers. EFF previously represented the Internet Archive in a similar challenge in 2007, which was ended after the government withdrew the request and lifted the gag order. CFAA Reform: Ms. Cohn works to reform the Computer Fraud and Abuse Act in light of the tragic death of Internet activist Aaron Swartz. Surveillance technologies internationally: Ms. Cohn has worked to free up communications and other human-rights supportive technologies from U.S. government export control and to draw attention to the problems caused by the sale of U.S. surveillance technologies to repressive regimes around the world. Background Ms. Cohn is a graduate of the University of Michigan Law School. She did her undergraduate studies at the University of Iowa and the London School of Economics. For 10 years prior to joining the EFF, she was a civil litigator in private practice handling technology- related cases. Before starting private practice, she worked for a year at the United Nations Centre for Human Rights in Geneva, Switzerland. Ms. Cohn also served as counsel to the plaintiffs in Bowoto v. Chevron, two lawsuits in San Francisco arising from Chevron's involvement in human rights abuses against environmental protesters in Nigeria. She also serves on the Board of Directors of the nonprofit the VerifiedVoting.org and the Verified Voting Foundation. Past issues California Reader Privacy Act: Ms. Cohn and EFF co-sponsored this law, passed in 2011, that requires a court order for law enforcement to access reading records held by booksellers selling to California residents. Google Book Search and Privacy: Ms. Cohn represented a coalition of authors and publishers—including best-sellers Michael Chabon, Jonathan Lethem, and technical author Bruce Schneier—in urging a federal judge to reject the proposed settlement in a lawsuit over Google Book Search, arguing that the sweeping agreement to digitize millions of books ignores critical privacy rights for readers and writers. Source http://Eff.org
Views: 4687 ethicsintech
There are a number of reason one would want to Export a private key, here's how. 👓 Command Lines (Core Wallets): - Walletpassphrase [yourpassphrase] 60 - Importprivkey [yourkey] - dumpprivkey [youraddress] Additional note: 60 refers to the time/s of how long the wallet will remain unlocked. You can change 60 to any number 🎧 Music: ♪ The Messenger - Silent Partner ♪ Virtual Riot - Paper Planes
Views: 40645 Franklyn [Litecoin.com]
This video will guide you through the process of installing a Secure Email (S/MIME) certificate on Outlook 2016. This video relates to the technote found on: http://www.entrust.net/knowledge-base/technote.cfm?tn=70593 Contents of the video: 0:20 – Introduction 0:26 – Part 1 of 4: Installing the S/MIME certificate in the personal certificate store 1:42 – Part 2 of 4: Updating security setting to link S/MIME to Outlook profile 2:59 – Part 3 of 4: Signing and Encrypting messages 3:43 – Part 4 of 4: Storing a contact’s SMIME certificate (S/MIME Exchange) For further technical support or assistance please contact Entrust Certificate Services support. You can find our contact information here: https://www.entrust.net/customer_support/contact.cfm Hours of Operation: Sunday 8:00 PM ET to Friday 8:00 PM ET North America (toll free): 1-866-267-9297 Outside North America: 1-613-270-2680
Views: 25267 Entrust Datacard
From the CISR video library (http://www.cisr.us) William Crowell, CEO Cylink Corporation The Compelling Business Case for Information Security August 22, 2001 at the Naval Postgraduate School (http://www.nps.edu) ABSTRACT This lecture will present how business is dealing with computer and network security issues, future directions of computer security and cryptography for business and government use, and issues surrounding DoD use of commercial solutions. About William P. Crowell CEO Cylink Corp. William P. Crowell is President and CEO of Santa Clara California-based Cylink Corporation, a leading provider of e-business security solutions. Prior to becoming Cylink's CEO in November 1998, Crowell developed the new-product roadmap as Cylink's vise President of Product Strategy. Crowell came to cylink from the National Security Agency, where he held a series of senior positions, serving as the agency's Chief of Staff, Deputy Director of Operations, and finally as its Deputy Director and senior cryptologist. As Deputy Director, Crowell set the agenda for both information security systems development and the NSA's operations intelligence mission. From 1989 to 1990, Crowell served as a vise president at Atlantic Aerospace Electronics Corporation in Greenbelt, Maryland, leading new-business development by drawing upon the company's strengths in space technology, mathematics and signal processing. In April 99, Crowell was appointed by President Clinton to the President's Export Council (PEC), which advises the administration on trade and export policy. He also serves as chairman of the PEC Subcommittee on Encryption, which worked with the Clinton administration, Congress and private industry to substantially loosen restrictions on the export of encryption products and technology in 1999 and 2000. Crowell sits on Cylink's board of directors and also serves as a director for a Silicon Valley Internet streaming-video company. In September 1999, Crowell was elected a member of the National Board of the American Electronics Association. In March 2001, the Secretary of Defense appointed Crowell to a Federal Advisory Committee that is conducting a comprehensive review of the U.S. Nuclear Command and Control System.
Views: 155 securitylectures
More detail: https://bitscreener.com/coins/bitshares BitShares is an essential decentralized multi-user database with update permissions which is managed by a defined set of rules and public key cryptography. Software is open source, easy to copy and modify, and most importantly protected by free speech. That’s why it’s almost impossible to stop BitShares at the layer short of a global event that destroys almost all digital data. The cryptographic software was attempted to work as a weapon and impose export controls by the government. But in the end, the government failed to control the spread of free software. In the case of BitShares the software is in the Public Domain.
Views: 46 BitScreener
An introduction to CKMS: delivering automated and secure crypto key distribution to any endpoint.
Views: 937 CRYPTOMAThIC
OpenPGP Task is an SSIS Control Flow task for encryption and decryption using the OpenPGP (RFC 2440) standard. Free download from: http://cozyroc.com/ssis/openpgp-task ☆ Support for file encryption, decryption, signature creation and verification. ☆ Introduced June, 2008 in 1.3 version. ☆ Public key cryptography based on OpenPGP standard. ☆ Support for input and output data streaming, without a need for temporary storage. ☆ Streamlined user interface. ☆ Support for Azure Data Factory Version 2 (ADFv2 IR) Integration Runtimes. ☆ Support for SQL Server 2005, 2008, 2012, 2014, 2016, 2017 COZYROC SSIS+ Components Suite : http://cozyroc.com/products For support or any questions connect with us http://bit.ly/2xkrHxp or email us at: [email protected]
Views: 520 COZYROC
This Control Frameworks training video is part of the CISSP FREE training course from Skillset.com (https://www.skillset.com/certifications/cissp). Skillset helps you pass your certification exam. Faster. Guaranteed. https://www.skillset.com Topic: Control Frameworks Skill: Security Governance Skillset: Security and Risk Management Certification: CISSP Join the 40,000+ candidates in over 58 countries that have found a faster, better way to pass their certification exam. + Unlimited access to thousands of practice questions + Exam readiness score + Smart reinforcement + Focused training ensures 100% exam readiness + Personalized learning plan + Align exam engine to your current baseline knowledge + Eliminate wasted study time + Exam pass guarantee And much more - https://www.skillset.com
Views: 5868 Skillset
VOTE ON THIS BILL NOW at www.countable.us/encrypt-act! Each week we at Countable update you on Congressional happenings in a quick, easy-to-understand way! This week we cover the battle between Apple and the FBI, and how Congressman Ted Lieu proposes tackling encryption and decryption laws and standards.
Views: 590 Countable
Lition is a scalable public-private blockchain built for businesses with GDPR compliance in mind. In this sponsored interview, I talk to Dr. Lohwasser and Dr. Ha about what sets Lition's for peer-to-peer energy trading platform and the Lition blockchain. They designed a blockchain that both scales and complies with European GDPR Law (allows for deletion of data on the blockchain). #Ethereum #Lition #GDPR 0:53 Creating an Energy Trading Business on Blockchain 2:36 Making Blockchain Complaint for EU 12:24 Blockchain in German Parliament Blockchain Website: Lition.io Energy Trading Website: Lition.de 👍🏻Subscribe to Boxmining for Cryptocurrency Insight and News: https://www.youtube.com/c/boxmining 🔒Hardware Wallet: https://www.ledgerwallet.com/r/428b 📲Mobile Wallet: https://enjinwallet.io/ Brave Browser: https://brave.com/box831 #Bitcoin #Ethereum #Cryptocurrency #Crypto #Altcoins ●▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬● Telegram groups (Discuss Crypto with us!) Telegram Discussion Group: https://t.me/Boxdatamining Telegram Announcements: https://t.me/boxminingChannel ●▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬● ♨️Social (Add me on Social Media!) Instagram: https://www.instagram.com/boxmining/ Twitter: https://twitter.com/boxmining Facebook: https://www.facebook.com/boxmining Steemit: https://steemit.com/@boxmining ●▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬● I'm not a professional financial adviser and you should always do your own research. I may hold the cryptocurrencies talked about in the video. ●▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬●
Views: 6611 Boxmining
Introducing the Digital Smart Wallet by Enjin — the safest Bitcoin, Litecoin, Ethereum and ERC-20 mobile wallet on the planet. Download: https://enjinwallet.io/ Join our conversation on Telegram: https://t.me/enjin_coin Stay tuned for upcoming news and updates on our channels: Enjin Coin: https://enjincoin.io Enjin Network: https://enjin.com Blog: https://blog.enjincoin.io/ Reddit: https://www.reddit.com/r/enjincoin Facebook: https://www.facebook.com/enjinsocial Twitter: https://twitter.com/enjin Fast, secure and simple coin management. The Enjin Smart Wallet is the world's most secure cryptocurrency wallet available for Android — supporting BTC, ETH, LTC, ENJ and all ERC-20 tokens by default. It features a Smart UI that evolves on the fly to suit your specific needs, and employs innovative security measures to turn your smartphone into a hardware-like secure wallet. The Enjin Wallet never holds or has any access to your funds — you remain in total control of your private keys. You can always restore your wallet or funds on any device with your recovery 12 word passphrase. Security Innovations — Enjin Secure Keyboard: Designed to prevent any form of data sniffing or keyloggers, featuring an option to randomize keys for the ultimate level of input protection. — Rule of Two Encryption: Two independent layers of cryptography protect the keystore and confidential data. Hardware 256 AES encryption is employed on the lower level and software encryption is utilised at the application layer. — Memory encryption: Data is held in encrypted memory and any important values are deleted from system memory. — Screenshot & video blocking: Secure window layout at the OS level stops any screen recording attempts. Smart By Design, Simple by Choice — Smart UI: Seamless and blazing-fast user interface evolves on the fly to suit your specific needs. — A wallet for any coin you own: Supports Bitcoin (BTC), Ethereum (ETH), Litecoin (LTC), Enjin Coin (ENJ) and all ERC-20 tokens. Other Altcoins will be supported soon. — Detailed transaction info: View all the important details for all your transactions instantly. — Custom fees and limits: Transaction fees are calculated dynamically, for optimal sending. Alternatively, you can set your own custom fees and limits. Additional Features — Multi-Currency values — Multi-Lingual (31 languages) — QR Scanner — Import from most major wallets — ETH Transaction filters 12 words and a pen In case your device gets lost, you can secure your wallet and coins with just 12 words written on paper. The master phrase can restore your wallet and funds on any other device. No ads. No tracking. Always free. Always private. A free wallet with no ads or privacy concerns. That’s our promise. About Enjin & Enjin Coin Founded in 2009 and based in Singapore, Enjin is an information technology company with two core, integrated products - Enjin Network and Enjin Coin. Our goal is to fundamentally disrupt the gaming industry. Enjin Network is a gaming-focused CMS & eCommerce platform, with over 19m users spread out across 250,000 communities and thousands of games. Enjin Coin (ENJ) is a customizable cryptocurrency and virtual goods platform for gaming.
Views: 1108983 Enjin
Strong end-to-end encryption is legal in the United States today, thanks to our victory in what’s come to be known as the Crypto Wars of the 1990s. But in the wake of Paris and San Bernardino, there is increasing pressure from law enforcement and policy makers, both here and abroad, to mandate so-called backdoors in encryption products. In this presentation, I will discuss in brief the history of the first Crypto Wars, and the state of the law coming into 2016. I will then discuss what happened in the fight between Apple and the FBI in San Bernardino and the current proposals to weaken or ban encryption, covering proposed and recently enacted laws in New York, California, Australia, India, and the UK. Finally, I will discuss possible realistic outcomes to the Second Crypto Wars, and give my predictions on what the State of the Law will be at the end of 2016. Bio: Nate Cardozo is a Senior Staff Attorney on the Electronic Frontier Foundation’s digital civil liberties team. In addition to his focus on free speech and privacy litigation, Nate works on EFF’s cryptography policy and the Coders’ Rights Project. Nate has projects involving export controls on software, state-sponsored malware, automotive privacy, government transparency, hardware hacking rights, anonymous speech, electronic privacy law reform, Freedom of Information Act litigation, and resisting the expansion of the surveillance state. A 2009-2010 EFF Open Government Legal Fellow, Nate has a B.A. in Anthropology and Politics from U.C. Santa Cruz and a J.D. from U.C. Hastings.
Views: 7051 DEFCONConference
This talk is part of the CrySP Speaker Series on Privacy. For more information and to view other talks in the series, go to: https://crysp.uwaterloo.ca/speakers/ Fantastically Bad Laws and Where to Find Them Nate Cardozo, Electronic Frontier Foundation November 2, 2018 Abstract: Encryption is legal in the Five Eyes countries, thanks to our victory in what’s come to be known as the Crypto Wars of the 1990s. Computer security research is increasingly viewed as a boon rather than a scourge. But time is a circle and once again, law enforcement and policy makers around the world are calling for all that to change. In this presentation, I will discuss in brief the history of the first Crypto Wars, and the state of the law in 2018. With San Bernardino as our background I will outline current proposals to weaken or ban encryption, covering proposed and recently enacted laws in New York, California, Australia, India, China, and the UK. I'll also touch on the various attempts around the world to both facilitate and hamper the activities of researchers... such as yourselves. Bio: Nate Cardozo is a Senior Staff Attorney on EFF’s civil liberties team where he focuses on cybersecurity policy and defending coders’ rights. Nate has litigated cases involving electronic surveillance, freedom of information, digital anonymity, online free expression, and government hacking. His other projects include defending encryption, fighting software export controls, preserving automotive privacy, and assisting surveillance law reform efforts. As an expert in technology law and civil liberties, Nate works on EFF’s Who Has Your Back report and regularly assists companies in crafting rights-preserving policies and advising on compliance with legal process. A 2009-2010 EFF Open Government Legal Fellow, Nate spent two years in private practice before returning to his senses and to EFF in 2012. When he’s not brewing beer with his EFF colleagues, Nate serves on the boards of directors of the First Amendment Coalition and the South Asian Film Preservation Society. Nate has a B.A. in Anthropology and Politics from U.C. Santa Cruz and a J.D. from U.C. Hastings where he has taught first-year legal writing and moot court.
Views: 43 CrySP at UWaterloo
For more great training content on many of McAfee’s products, visit https://mcafee-catalog.netexam.com/ Looking for more ways to get the most out of your partnership with McAfee? 1) The McAfee Enterprise Support App shows real-time status updates on your mobile device from our Technical Support Engineers about your open Service Requests. You can also add updates to your Service Requests to expedite the resolution process. Just download from the app store to your Android or IOS device and use the same login credentials you use on the McAfee service portal. 2) Our new plug-in Support Center extension for ePolicy Orchestrator makes it easy for you to access the most asked for support capabilities from inside the ePO application. In just a few clicks you’ll be able to gain insight into the health of your ePO platform, review product notifications, search across McAfee content repositories, access “How To” resources, and other features to help keep your McAfee security solutions performing at optimal levels. https://kc.mcafee.com/corporate/index?page=content&id=SNS1845
Views: 176 McAfee Support
Author, teacher, and talk show host Robert McMillen shows you how to create a new encryption key in Backup Exec 15
Views: 2257 Robert McMillen
https://media.ccc.de/v/eh19-186-all-your-fitness-data-belongs-to-you-reverse-engineering-the-huawei-health-android-app This talk describes the reversing process of the Huawei Health app. In this context, the proprietary BLE Huawei Link Protocol v2 will be disclosed, which allows the use of the Huawei fitness devices without the Health App and its accompanying ecosystem. Fitness wristbands and watches, so-called fitness trackers are constantly gaining in popularity. They can record a variety of private data (e.g. pulse, steps, calorie consumption, sports activity), which may also be of interest to other individuals. By now, the first insurance companies are already offering superior rates for providing them with the captured fitness data. Due to the great demand, it is not surprising that many well-known manufacturers offer fitness trackers. With the Huawei Band 3 Pro, the Huawei Watch GT and the Honor Band 4 (Honor is a sub-brand of Huawei), Huawei also sells a wide range of varying trackers. All these trackers are controlled with the Huawei Health App, which is available for both Android and iOS. Huawei is using Bluetooth Low Energy (BLE) for the communication between smart phones and the addressed fitness devices. Built upon BLE, the proprietary protocol Huawei Link Protocol v2 is used. Since the protocol is not documented and partially encrypted, breaking out of the Huawei ecosystem is not simple. Until now, users have been bound to the Huawei Health App and its corresponding cloud environment and had to accept that their data is uploaded to Chinese servers. During this talk the following, generally applicable methods for reverse engineering of Android applications are discussed: Different methods to extract the app from the smart phone Static analysis and deobfuscation of complex multidex applications (the Huawei Health App comprises over 13.000 classes and far over 64K methods) with Jadx  and Android Studio  Dynamic analysis and instrumentation with Frida  to intercept the Bluetooth communication and to circumvent the code signing protection Furthermore, the subsequent results concerning the Huawei Health App and the Huawei Link Protocol v2 will be presented: The structure of the Huawei Link Protocol v2, including the handshake and cryptographic authentication between fitness tracker and smart phone The readout of the fitness data stored (beside the cloud) on the smart phone in an encrypted local SQLite database (SQLite Encryption Extension), including the retrievement of the encryption key  https://github.com/skylot/jadx  https://developer.android.com/studio/  https://www.frida.re/ Christian Kudera https://conference.c3w.at/eh19/talk/3XYZYY/
Views: 2070 media.ccc.de
solve this situation.
Views: 12094 entertainment
Easy Complete process of password protected usb stick by McAfee FRP.
Views: 1659 entertainment
Some recent news news stories: Android Lollipop will not encrypt by default FREAK *Factoring attack on RSA-EXPORT Keys *Many implementations of SSL contain both strong encryption algorithms and weak encryption algorithms (export grade encryption) *This attack works by forcing a weak option, then cracking it Rowhammer *Vulnerability in Dynamic Random Access Memory (DRAM) : repeatedly access a certain row of transistors, causes a change in the next row of transistors *Bit flips in page table entries (PTEs) to gain write access to its own page table, and hence gain read-write access to all of physical memory. Panda Antivirus Flags itself as Malware Eavesdropping Barbie *Voice recordings sent to the cloud for processing *For providing a chat-bot AI
Views: 128 Z. Cliffe Schreuders
The Crypto Dad shows you how to back up the Electrum Bitcoin wallet. I go through making sure your password is stored in a safe place. Then I talk about printing out the seed and keeping it safe. Then I discuss how to export your private keys. Finally, I show you how to make a copy of your wallet and re-open it. Electrum bitcoin wallet: https://electrum.org/#home iPhone Screen share was done using X-Mirage http://www.x-mirage.com/ Passwords were stored in the One Password App https://1password.com/ Donate Bitcoin: 1JBxwXG8P6PYKKsrHKzQduM8s8RoV3dnjr What is the Electrum Bitcoin Wallet? The Electrum Bitcoin wallet is software that runs on your computer. It is an application that allows you to send, receive and store bitcoins. It also has advanced features that allow you to check your current balance, see a list of transactions, and even maintain several “wallets”. It does this by allowing you to access a bitcoin address on the Bitcoin blockchain. Access to a Bitcoin address is provided by a cryptographic key-pair. The key-pair is a public/private asymmetric cryptographic key. The public key is the receiving address. This is the address you can share with others, so they can send you bitcoins. The private key is the part that allows you to send bitcoins. The Electrum Bitcoin software creates a new key-pair whenever you create a new wallet. It stores the private key on your computer. The private key is protected by on-disk encryption. Electrum will automatically decrypt the private key when you wish to send bitcoins. Access to the private key is also enhanced by a password or your own choosing that you can set when the wallet is created. Best practice is to choose a strong password for your Electrum Bitcoin Wallet. The Electrum Bitcoin Wallet is one of the most popular Bitcoin wallets for desktops. It has several advanced features that make it robust and flexible. It supports Two Factor Authentication, Multi-sig Wallets, and Cold Storage. Another unique feature of the Electrum Bitcoin Wallet is that it does not require you to download the entire Bitcoin Blockchain on to your computer (which can be time-consuming and requires a lot of space). It does this by maintaining several Blockchain servers which allow you to quickly access the current state of the Bitcoin Blockchain and the up-to-date status of the wallets you control. This includes your current balances and the transaction history for each of your wallets. What is Bitcoin? Bitcoin is a new technology that functions as a digital currency. It is a peer-based, decentralized way to hold, store, send, and receive value. It does this by maintaining a cryptographic “ledger” called the Blockchain. All of the bitcoins in existence are created and stored on the Blockchain. Bitcoin with a capital “B” refers to the technology itself. Bitcoin spelled with a little “b” refers to the tokens that hold the value and can be exchanged with others. Multiple copies of the Blockchain exist on thousands if not millions of computers worldwide. Each copy of the Blockchain “verifies” itself by connecting to the Internet and making sure it has the most up-to-date list of transactions. The Blockchain maintains its integrity by using strong, modern, encryption techniques. This makes it impossible for anyone to alter the ledger, create fake transaction or “double-spend” their bitcoins. Bitcoins do not require banks or third-party financial services to act as central clearing houses for electronic transfers. In essence, Bitcoin technology “cuts out the middleman”. Bitcoin is a decentralized, peer-to-peer monetary system that exists outside of the traditional, centralized, fiat-currency based financial system.
Views: 5544 Rex Kneisley
how to save encrypted password in database using Hashing or MD5 Encryption . in this video you can learn about how to encrypt data in database. ...topic covered.... 1.create Registration page ,save data with Hashing encryption 2.Login page 3.change password 4.New password and logout 5.validation of form control ................................ asp.net live project free of cost my other videos 1: Address book project part 1: https://www.youtube.com/edit?o=U&video_id=a36WnxE0ZaU part 2: https://www.youtube.com/edit?o=U&video_id=PkxAeo7oLrA 2 : Shopping website project https://www.youtube.com/edit?o=U&video_id=Y5_osxjnTPw 3: Library Management System Project https://www.youtube.com/edit?o=U&video_id=uxHfh-L36cY 4: Student Management System https://www.youtube.com/edit?o=U&video_id=XbWeir3mBhk my website https://www.coderbaba.in Thanks for watching these videos , hit like , subscribe our channel n yes don't forget to share with you friends Follow Us Socially ?? Facebook : https://www.facebook.com/coderbaba Instagram : https://www.instagram.com/coderbaba Twitter : https://www.twitter.com/thecoderbaba ............................ ............................ LIKE ? SHARE ? SUBSCRIBE ............................ See you in next video, have a nice day. GOOD LUCK
Views: 1019 Coder Baba