Home>America>tools

Sigil Ebook | e-book production tool

Sigil aims to make it easy to create excellent e-books using EPUB format. If you are using formatted books for yourself, or if you are a professional editor who publishes books on multiple platforms, then Sigil is for you. You can use Sigil to format and package your books into an EPUB that looks exactly what you want, with a set of advanced features that make Sigil one of the most popular EPUB editors. This open-source and completely free software is entirely written and supported by volunteers. The current Sigil development team includes Doug Massage and Kevin Hendricks as co leaders for development and maintenance. Previous developers/authors include John Schember, Grant Drake, and Dave Heiland. Sigil was originally created by Strahinja Markovic in 2009 and is completely free to download and use. Other volunteers also provide support by contributing code, translations, and useful answers to user questions. For a complete list of contributors, please refer to the Help=>About menu in Sigil. Some imprint functions: Free and open-source software under GPLv3 Multi platform: Run on Windows, Mac, and Linux Complete UTF-16 support EPUB 2 and EPUB 3 specifications support Multiple views: code view and preview view Fully control editing EPUB syntax directly in the code view Catalog generator with multi-level title support Metadata Editor Translate user interface into multiple languages Theme icon Use default and user configurable dictionaries for spell checking Full support for search and replace regular expressions (PCRE) Support importing EPUB and HTML files, images, and style sheets All imported files can be formatted and you can choose to "beautify" your code Plugin support Checkpoint support (comparing modified "snapshots")

Tag: E-book EPUB

Reading: 121 2024-11-12

GetHermit | A secure and private writing application

Hermit is a secure and private writing application suitable for anyone who loves writing, from graffiti artists to aspiring authors. Featured features Lightning fast The original design intention of Hermit is to be fast and lightweight, providing you with a pleasant writing experience. Do not wait for 10 seconds every time you attempt to refresh the page. Powerful automatic saving We are not unfamiliar with the frustration of random, undeclared browser and computer crashes. We have all been there. Combined with our auto save feature, all the content you input will be automatically backed up to Hermit's servers, so you will never lose any data. High quality version history We are not unfamiliar with the frustration of random, undeclared browser and computer crashes. We have all been there. Combined with our auto save feature, all the content you input will be automatically backed up to Hermit's servers, so you will never lose any data. Function Introduction Clean, simple, and easy to use Hermit eliminates all levels of complexity and provides a beautiful, minimalist layout to optimize your writing experience. Public and private sharing Do you want to share what you have written? Generate shareable URLs. Use password protection options to grant limited access to individuals approved by you personally, or simply keep all content for yourself. Publish your work The Hermit Library is an ideal place to publicly share your works. People will be able to read them in exquisite, modern layouts on their phones or computers. Obtain recognition Hermit users can vote for their favorite text to express appreciation and encourage emerging authors. By publishing your work, you can gain exposure and increase your readership. Display high-quality options Do you need easier eyes? Try our dark mode. Use professional looking layout configurations to enhance your writing experience. Export your work Convert your virtual books into HTML files or beautifully formatted PDFs to back them up to your computer or share with the world.

Reading: 82 2024-11-11

Have I Been Pwned | Check if your email has been leaked due to a data breach

I am Troy Hunt, Microsoft Regional Director and Developer Security Most Valuable Professional Award winner, blogger on troyhunt.com, international speaker on web security, and author of many top security courses for web developers on Pluralsight. I have created HIBP as a free resource where anyone can quickly assess whether they may be at risk due to their online account being compromised or 'stolen' in a data breach. I want it to be easy to use and completely free, so that it can bring the greatest benefits to the community. Except for sporadic donations, all expenses for building, operating, and maintaining the service are currently directly borne by myself. Fortunately, today's modern cloud services such as Microsoft Azure can achieve this without spending a lot of money! What is the entire content of this website? This website was born after the largest customer account breach at the time - Adobe. I often conduct post leak analysis on user credentials and constantly discover that the same account is exposed over and over again, usually using the same password, which puts the victim at further risk of other accounts being hacked. The FAQ page is more detailed, but all data on the site comes from 'violations', where the data is exposed to people who should not be viewing it. Why build a website? This website has two main purposes for me: firstly, it is clearly providing services to the public. Data breaches are rampant, and many people are unaware of the scale or frequency of their occurrence. By summarizing data here, I hope it can not only help victims understand that their accounts have been invaded, but also highlight the severity of online attack risks on the Internet today. Secondly, the website provided me with a great use case, allowing me to put many technologies together at their pace and keeping my hands-on skills up to date to some extent. Projects like this are an excellent way to maintain relevance, as my daily work increasingly focuses on software management rather than actually building things (which I happen to enjoy doing!). This is a very fulfilling journey, and I invite others to join me by frequently delving into the process on my blog. As the website inevitably evolves over time, I plan to keep up with this.

Reading: 59 2024-11-11

PoisonTap - A Hacker Tool (Usage and Prevention)

The working principle of PoisonTap PoisonTap generates a cascading effect of information leakage, network access, and installation of semi permanent backdoors by leveraging existing trust in various mechanisms of machines and networks, including USB/SSH, DHCP, DNS, and HTTP. PoisonTap is built for the $5 Raspberry Pi Zero and has no other components except for a micro USB cable and microSD card. It can work on any Raspberry Pi (1/2/3) with Ethernet to USB/Thunderbolt dongles, or on other devices that can simulate USB gadgets such as USB Armory and LAN Turtle. When PoisonTap (Raspberry Pi Zero&Node.js) is inserted into a locked/password protected computer, it: Simulate Ethernet devices through USB (or Thunderbolt) Hijacking all Internet traffic from the machine (although it is low priority/unknown network interface) Extract and store HTTP cookies and sessions from web browsers of the top 1000000 Alexa ranked websites Expose the internal router to attackers, allowing them to rebind remote access through outbound WebSocket and DNS (thank you to Matt Austin for the idea of rebinding!) Install a persistent web-based backdoor in HTTP cache for hundreds of thousands of domains and common Javascript CDN URLs, all of which can access users' cookies through cache poisoning Allow attackers to remotely force users to send HTTP requests and proxy responses (GET and POST) using any user cookie on the backdoor domain No need for machine unlocking Even after the device is removed and the attacker leaves, backdoors and remote access still exist PoisonTap circumvents the following security mechanisms: Password protected lock screen Routing table priority and network interface service order Same origin strategy X Framework Options HttpOnly Cookie SameSite cookie properties Two factor/multi factor authentication (2FA/MFA) DNS fixed Cross Origin Resource Sharing (CORS) HTTPS cookie protection when security cookie flag and HSTS are not enabled Preventing PoisonTap Server side security If you are running a web server, protecting PoisonTap is simple: Only use HTTPS, at least for authentication and authenticated content To be honest, you should specifically use HTTPS and always redirect HTTP content to HTTPS to prevent users from being deceived into providing credentials or other PII through HTTP Ensure that security flags are enabled on cookies to prevent HTTPS cookies from leaking through HTTP When loading remote Javascript resources, use the Subresource Integrity script to mark properties Using HSTS to prevent HTTPS downgrade attacks Desktop Security Adding cement to your USB and Thunderbolt ports will be very effective Closing the browser every time you leave the machine is fine, but it's completely impractical Disabling USB/Thunderbolt ports is also effective, but not practical Locking your computer has no impact as the network and USB stack run when the computer is locked. However, entering encrypted sleep mode that requires a key to decrypt memory (such as FileVault2+deep sleep) can solve most problems as your browser will no longer make requests, even if awakened

Reading: 54 2024-11-11

HummerStudio

FileWall FileWall is a file security tool based on transparent encryption and decryption (real-time encryption). The most practical part for ordinary users should be the ability to use this technology to achieve faster access or modification of encrypted files, without the need to decrypt, modify, and then encrypt the entire file like traditional encryption and decryption tools. We have also applied real-time encryption technology to cloud storage. Without changing users' usage habits, we have encrypted the data uploaded to the cloud server in real-time, solving the problem of users always worrying about data security in the cloud. In addition, FileWall also provides some auxiliary tools, such as file locking, file hiding, etc. The latest version of FileWall offers a 15 day full feature trial period. After expiration, you can choose to purchase a genuine license to support our work, or choose to continue the trial. Software Features *Encrypt files and folders *Encrypt file and folder names *Real time encryption *Hide files and folders *Lock files and folders *Using AES encryption algorithm, supporting AES instruction set *Support real-time encryption for cloud storage, including Dropbox, Skydrive, Kingsoft Express, Baidu Cloud, etc uWall UWall supports creating encrypted partitions for USB based disks, as well as creating regular partitions. After running uWall, you can enter the password to mount the encrypted partition. Normally, this device is just a normal regular device. We hope to provide users with a more effective and secure file management method, and we offer the complete version for the domestic market, which is free of charge. ###Software Features *Hard disk partition encryption *Virtual partition encryption *Encrypt using AES algorithm ElfBox ElfBox is an HTML parser for developers based on Embedded Web Browser. The inspiration comes from two open-source projects, node webkit and nodeJS, both based on the Google V8 JS engine, which have superior performance and good compatibility, but appear too bulky in terms of size. In some lightweight and logically uncomplicated situations, their advantages are not obvious. ElfBox was born to address user interaction in lightweight applications. Build a complete desktop application using HTML+JAVASCRIPT.

Reading: 66 2024-11-11

Writebox is a simple and interference free online text editor

WriteBox: Based on Google Chrome, the cloud storage file editing tool is a plugin tool that supports online editing of major cloud storage files in Chrome browser. Currently, it supports Google Drive and Dropbox. Writebox can turn Dropbox and Google Drive into a cloud based online editing tool. Writebox can help users edit text files on online storage platforms. Many online storage platforms only support online storage, and if you need to modify a file, you can only download and re edit it before uploading it. It is relatively free, and with this browser plugin tool, you don't have to worry about data loss. It also has a simple interface similar to Q10- Dedicated Text Editor, which can immerse you in the fun of writing. ID card and password We will not store your Dropbox and Google Drive passwords. We do not have access to this information We store your OAuth tokens for Dropbox and Google Drive on our servers. We store a cookie in your browser to maintain your Writebox session. We store your email address for Dropbox and Google Drive on our servers. This is to help you identify the account you are using on Writebox. File Content Writebox accesses your file content, file name, and folder tree through the Dropbox/Google API. We will not store the contents of your files on our servers, but rather save them in your local cache. We will not read the content of your file, we will only convert the file encoding into the correct display characters. We store the file path of the file you opened last time in Writebox on our server. This is to synchronize the last edited file across devices. Log recording When you use Writebox, we collect and analyze data through Google Analytics. This is only for service improvement. We do not track individual users.

Reading: 114 2024-11-10

Recommend