UrJTAG package is free software, covered by the GNU General Public License, and
you are welcome to change it and/or distribute copies of it under certain
conditions. There is absolutely no warranty for UrJTAG. Please read COPYING
file for more info.
Many of the designations used by manufacturers and sellers to distinguish their products are
claimed as trademarks. Where those designations appear in this book and Addison Wesley
Longman Inc., was aware of a trademark claim, the designations have been printed in initial caps
or all caps.
The authors and publisher have taken care in the preparation of this book, but make no
expressed or implied warranty of any kind and assume no responsibility for errors or omissions.
No liability is assumed for incidental or consequential damages in connection with or arising out
of the use of the information or programs contained herein.
The publisher offers discounts on this book when ordered in quantity for special sales. For more
information, please contact:
Shut the Box is a simple diversion written in C and GTK+. The object is simple: Roll the dice and click the tiles that sum up to that dice roll until there are no more tiles to click.
Connector/Net 5.0.6 Release Notes
--- --- ---
Welcome to the release notes for Connector/Net 5.0.6.
Important Changes
---------------------
There are no major changes in this version. Please see the changelog for the list of bugs fixed.
Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux
Main Features:
* Creates a virtual encrypted disk within a file and mounts it as a real disk.
* Encrypts an entire partition or storage device such as USB flash drive or hard drive.
* Encrypts a partition or drive where Windows is installed (pre-boot authentication).
* Encryption is automatic, real-time (on-the-fly) and transparent.
* Provides two levels of plausible deniability, in case an adversary forces you to reveal the password:
1) Hidden volume (steganography) and hidden operating system.
2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).
* Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS.
Further information regarding features of the software may be found in the:http://www.truecrypt.org/
The Red Hat Linux and Fedora distributions have become one of the major Linux
distributions, bringing to the PC all the power and flexibility of a Unix workstation as
well as a complete set of Internet applications and a fully functional desktop
interface. This book is designed not only to be a complete reference on Linux, but also to
provide clear and detailed explanations of Linux features. No prior knowledge of Unix is
assumed Linux is an operating system anyone can use