Cryptography – The New York Times

Latest Articles

A British spy agency is looking for recruits in a group suspicious of government: hackers.

A team of linguists applied statistics-based techniques to translate one of the most stubborn of codes, a German mix of letters and symbols.

A computer scientist discovered that a form of cryptography, believed to have been invented in the 20th century, actually has older roots.

A sculpture at the C.I.A.s headquarters has a secret code in it, and the artist is now offering a bit of help.

A claimed proof for one of the most vexing mathematical problems, P versus NP, set off shock waves online, demonstrating the potential of Web-based collaboration.

Such technical jousting matches are at the heart of the fields of computer security and cryptography.

One of the worlds most prominent cryptographers warned about a hypothetical scenario that could place the security of the global electronic commerce system at risk.

An anonymous computer programmer claims to have hacked the copy protection used in both the HD-DVD and Blu-ray high-definition DVD formats.

The United States Army has for the last month been training detectives of the bomb squad in cryptography to facilitate their work in tracking down the writers of kidnap and threatening letters, it was disclosed yesterday at police headquarters.

A Silicon Valley start-up company on Tuesday plans to unveil a new approach to sending secure electronic messages and protecting data, a simpler alternative to current encryption systems, which use long digital numbers, called public keys. The new company, Voltage Security, which is based here, instead uses another unique identifier as the public key: the message recipient's e-mail address.

LEAD: MOST people even vaguely familiar with computers are aware of two varieties of disks, hard and floppy, on which programs and data are stored. But the lesser-known cartridge disk has lately been gaining popularity with computer users.

Government attempts to control the export of data-scrambling software are an unconstitutional restriction on free speech, a Federal judge said in a ruling made public today. The ruling by Judge Marilyn Hall Patel of Federal District Court in San Francisco is a setback for the Clinton Administration, which has tried to orchestrate a compromise with technology companies that oppose its efforts to control such exports. The Administration seeks to require American companies that develop data-encryption systems to give Government agencies the ability to eavesdrop on data and voice communications.

A serious security flaw has been discovered in Netscape, the most popular software used for computer transactions over the Internet's World Wide Web, threatening to cast a chill over the emerging market for electronic commerce. The flaw, which could enable a knowledgeable criminal to use a computer to break Netscape's security coding system in less than a minute, means that no one using the software can be certain of protecting credit card information, bank account numbers or other types of information that Netscape is supposed to keep private during on-line transactions.

Last month the United States and 32 other countries agreed to create new international controls on the export of data-scrambling hardware and software. Many nations fear that the most advanced scrambling, which makes it impossible for anyone without the key to decode the data, could thwart efforts by intelligence agencies to track terrorists. Though the issue is a product of the information age, battles over secret coding have far older precedents. Below are excerpts from ''The Victorian Internet'' (Walker & Company, 1998), by Tom Standage, in which he writes about what he calls the ''19th-century precursor'' to the Internet: the electric telegraph invented by Samuel Morse and Charles Wheatstone. Cryptography -- tinkering with codes and ciphers -- was a common hobby among Victorian gentlemen. Wheatstone and his friend Charles Babbage, who is best known for his failed attempts to build a mechanical computer, were both keen crackers of codes and ciphers -- Victorian hackers, in effect. ''Deciphering is, in my opinion, one of the most fascinating of arts,'' Babbage wrote in his autobiography, ''and I fear I have wasted upon it more time than it deserves.''

Two of Israel's leading computer scientists say they have found a way to more easily decode and then counterfeit the electronic cash ''smart cards'' that are now widely used in Europe and are being tested in the United States. The researchers have begun circulating the draft of a paper that points out higher security risks than those discovered last month by scientists at Bell Communications Research.

To try to slow the acceptance of the Linux operating system by governments abroad, Microsoft is announcing today that it will allow most governments to study the programming code of its Windows systems. Under the program, governments will also be allowed to plug their security features instead of Microsoft's technology into Windows. More than two dozen countries, including China and Germany, are encouraging agencies to use ''open source'' software -- developed by programmers who distribute the code without charge and donate their labor to debug and modify the software cooperatively. The best-known of the open source projects is GNU Linux, an operating system that Microsoft regards as the leading competitive threat to Windows.

In an important milestone toward making powerful computers that exploit the mind-bending possibilities of calculating with individual atoms, scientists at the I.B.M. Almaden Research Center, in San Jose, Calif., are announcing today that they have performed the most complex such calculation yet: factoring the number 15. The answer itself was no surprise: 3 and 5, the numbers that divide into 15, leaving no remainder. But the exercise that led to that simple result -- the first factoring of a number with an exotic device called a quantum computer -- holds the promise of one day solving problems now considered impossible, and cracking seemingly impenetrable codes.

The technology that will cashier the linguists, mathematicians and hackers who have traditionally devoted themselves to breaking codes comes with a cool name: quantum cryptography. Ordinary cryptographic systems rely on scrambling messages so thoroughly that only a recipient with a code key can unscramble them. Quantum cryptography uses random codes lacking in any pattern that might offer clues to a code breaker. More important, it allows the parties transmitting the code to send it without the fear that it might be intercepted without their knowledge. The result? Unprecedented secrecy and security -- two commodities that are increasingly rare in a world dominated by the free flow of information. For futurists, the development of quantum cryptography is a kind of cosmic victory for personal privacy. Quantum cryptography is more powerful than any computer or eavesdropping equipment that could ever be built. Its impregnability stems from one of the quantum world's weirder but better-known features: that merely observing a quantum system changes it irreversibly. In the realm of quantum mechanics, measuring any system -- coded pulses of light, for example, in a fiber-optic cable that is infiltrated by a spy -- leaves an unalterable trace that immediately betrays the presence of an eavesdropper.

In the obscure world of computer cryptography, there may be no more self-consciously ornery group of coders than the Cypherpunks, an alliance of some of Silicon Valley's best programmers and hardware designers, who preach absolute privacy in the information age. The Cypherpunks, who often communicate among themselves by electronic mail protected with an encryption system popular in the computing underground, feel certain about one thing: The Government should not be creating a national encoding standard, as the Clinton Administration has recently proposed.

A British spy agency is looking for recruits in a group suspicious of government: hackers.

A team of linguists applied statistics-based techniques to translate one of the most stubborn of codes, a German mix of letters and symbols.

A computer scientist discovered that a form of cryptography, believed to have been invented in the 20th century, actually has older roots.

A sculpture at the C.I.A.s headquarters has a secret code in it, and the artist is now offering a bit of help.

A claimed proof for one of the most vexing mathematical problems, P versus NP, set off shock waves online, demonstrating the potential of Web-based collaboration.

Such technical jousting matches are at the heart of the fields of computer security and cryptography.

One of the worlds most prominent cryptographers warned about a hypothetical scenario that could place the security of the global electronic commerce system at risk.

An anonymous computer programmer claims to have hacked the copy protection used in both the HD-DVD and Blu-ray high-definition DVD formats.

The United States Army has for the last month been training detectives of the bomb squad in cryptography to facilitate their work in tracking down the writers of kidnap and threatening letters, it was disclosed yesterday at police headquarters.

A Silicon Valley start-up company on Tuesday plans to unveil a new approach to sending secure electronic messages and protecting data, a simpler alternative to current encryption systems, which use long digital numbers, called public keys. The new company, Voltage Security, which is based here, instead uses another unique identifier as the public key: the message recipient's e-mail address.

LEAD: MOST people even vaguely familiar with computers are aware of two varieties of disks, hard and floppy, on which programs and data are stored. But the lesser-known cartridge disk has lately been gaining popularity with computer users.

Government attempts to control the export of data-scrambling software are an unconstitutional restriction on free speech, a Federal judge said in a ruling made public today. The ruling by Judge Marilyn Hall Patel of Federal District Court in San Francisco is a setback for the Clinton Administration, which has tried to orchestrate a compromise with technology companies that oppose its efforts to control such exports. The Administration seeks to require American companies that develop data-encryption systems to give Government agencies the ability to eavesdrop on data and voice communications.

A serious security flaw has been discovered in Netscape, the most popular software used for computer transactions over the Internet's World Wide Web, threatening to cast a chill over the emerging market for electronic commerce. The flaw, which could enable a knowledgeable criminal to use a computer to break Netscape's security coding system in less than a minute, means that no one using the software can be certain of protecting credit card information, bank account numbers or other types of information that Netscape is supposed to keep private during on-line transactions.

Last month the United States and 32 other countries agreed to create new international controls on the export of data-scrambling hardware and software. Many nations fear that the most advanced scrambling, which makes it impossible for anyone without the key to decode the data, could thwart efforts by intelligence agencies to track terrorists. Though the issue is a product of the information age, battles over secret coding have far older precedents. Below are excerpts from ''The Victorian Internet'' (Walker & Company, 1998), by Tom Standage, in which he writes about what he calls the ''19th-century precursor'' to the Internet: the electric telegraph invented by Samuel Morse and Charles Wheatstone. Cryptography -- tinkering with codes and ciphers -- was a common hobby among Victorian gentlemen. Wheatstone and his friend Charles Babbage, who is best known for his failed attempts to build a mechanical computer, were both keen crackers of codes and ciphers -- Victorian hackers, in effect. ''Deciphering is, in my opinion, one of the most fascinating of arts,'' Babbage wrote in his autobiography, ''and I fear I have wasted upon it more time than it deserves.''

Two of Israel's leading computer scientists say they have found a way to more easily decode and then counterfeit the electronic cash ''smart cards'' that are now widely used in Europe and are being tested in the United States. The researchers have begun circulating the draft of a paper that points out higher security risks than those discovered last month by scientists at Bell Communications Research.

To try to slow the acceptance of the Linux operating system by governments abroad, Microsoft is announcing today that it will allow most governments to study the programming code of its Windows systems. Under the program, governments will also be allowed to plug their security features instead of Microsoft's technology into Windows. More than two dozen countries, including China and Germany, are encouraging agencies to use ''open source'' software -- developed by programmers who distribute the code without charge and donate their labor to debug and modify the software cooperatively. The best-known of the open source projects is GNU Linux, an operating system that Microsoft regards as the leading competitive threat to Windows.

In an important milestone toward making powerful computers that exploit the mind-bending possibilities of calculating with individual atoms, scientists at the I.B.M. Almaden Research Center, in San Jose, Calif., are announcing today that they have performed the most complex such calculation yet: factoring the number 15. The answer itself was no surprise: 3 and 5, the numbers that divide into 15, leaving no remainder. But the exercise that led to that simple result -- the first factoring of a number with an exotic device called a quantum computer -- holds the promise of one day solving problems now considered impossible, and cracking seemingly impenetrable codes.

The technology that will cashier the linguists, mathematicians and hackers who have traditionally devoted themselves to breaking codes comes with a cool name: quantum cryptography. Ordinary cryptographic systems rely on scrambling messages so thoroughly that only a recipient with a code key can unscramble them. Quantum cryptography uses random codes lacking in any pattern that might offer clues to a code breaker. More important, it allows the parties transmitting the code to send it without the fear that it might be intercepted without their knowledge. The result? Unprecedented secrecy and security -- two commodities that are increasingly rare in a world dominated by the free flow of information. For futurists, the development of quantum cryptography is a kind of cosmic victory for personal privacy. Quantum cryptography is more powerful than any computer or eavesdropping equipment that could ever be built. Its impregnability stems from one of the quantum world's weirder but better-known features: that merely observing a quantum system changes it irreversibly. In the realm of quantum mechanics, measuring any system -- coded pulses of light, for example, in a fiber-optic cable that is infiltrated by a spy -- leaves an unalterable trace that immediately betrays the presence of an eavesdropper.

In the obscure world of computer cryptography, there may be no more self-consciously ornery group of coders than the Cypherpunks, an alliance of some of Silicon Valley's best programmers and hardware designers, who preach absolute privacy in the information age. The Cypherpunks, who often communicate among themselves by electronic mail protected with an encryption system popular in the computing underground, feel certain about one thing: The Government should not be creating a national encoding standard, as the Clinton Administration has recently proposed.

Read the original here:
Cryptography - The New York Times

Edward Snowden scorns David Cameron, other leaders on Panama …

Here are the basics of what the Panama Papers leak is all about. Video by Jasper Colt, USA TODAY

Britain's Prime Minister David Cameron speaks during a question and answer session on the forthcoming European Union referendum with staff of PricewaterhouseCoopers in Birmingham, England, on April 5, 2016.(Photo: Christopher Furlong, AFP/Getty Images)

Edward Snowden, the National Security Agency whistle-blower, has been quite vocal on social media about the Panama Papers leak and theinternational fallout from the millions of documents released.

He's commented on global leaders involved withthe documents, mockingBritish Prime Minister David Cameron andIcelandPrime Minister Sigmundur David Gunnlaugsson, who stepped aside amid the fallout.

"If you're in charge of a country, keep your money in it,"Snowden tweeted Tuesday,

Cameronwas dragged into the scandal about offshoretax havens this weekover his late father's connections to an investment fund thatavoided paying tax in theUnited Kingdomby having its directors hold board meetings in Switzerland and the Bahamas rather than in London.

Ian Cameron, a stock brokerwho died in 2010, was named inthe documents stolen from the Panamalaw firmMossack Fonseca.The company set up for Ian Cameron was calledBlairmore.

USA TODAY

'Panama Papers' law firm says it is a hacking 'victim'

Downing Streetinitiallycalled the discovery a "private matter."

On Monday, Snowden tweeted a snarkyresponse after DavidCameron's spokeswoman calledfamily investments private.

Downing Street laterconfirmed the prime minister does not hold any shares in the company. Cameron released another statement, saying,"In terms of my own financial affairs, I own no shares. I have a salary as prime minister and I have some savings, which I get interest from and I have a house, which we used to live in, which we now let out while we are living in Downing Street and that's all I have."

USA TODAY

Panama Papers vs NSA: How big is the latest leak?

Cameron added: "I have no shares, no offshore trusts, no offshore funds, nothing like that. And, so that, I think, is a very clear description." His office added that Cameron, his wife and children do not benefit from any offshore funds.

Former National Security Agency systems analyst Edward Snowden(Photo: Uncredited, AP)

On Tuesday, Snowden tweeted that the "resignation of Iceland's PMmay explain why the U.K. PM is so insistent public has no right to know a PM's 'private'finances."

According to German newspaperSuddeutsche Zeitung, whichfirst shared newsof the Panama Papers, theleak consisted of 11.5 million documents, including 4.8 million emails.

That compares to about1.7 million documents leaked by Snowden, aformerNSA contractor, in 2013 aboutthe agency's surveillance efforts. The NSA release amounted to just15% of the number of documents with the Panama Papers investigation.

USA TODAY

The story behind the massive Panama Papers leak

Snowden noted on Twitter that the Panama Papers represent "the biggest leak in the history of data journalism."

Read or Share this story: http://usat.ly/1MSFnBr

Link:
Edward Snowden scorns David Cameron, other leaders on Panama ...

Edward Snowden calls on British people to rise up and demand …

Edward Snowden has called on the British people to rise up and demand that David Cameron resign.

The fugitive whistleblower urged voters to attend a protest outside Downing Street to force the Prime Minister from office.

In a series of tweets, Mr Snowden , said the next 24 hours "could change Britain."

He suggested the outrage at Mr Cameron's admission that he trousered thousands in profits from his father's offshore fund could spark the same kind of protests that yesterday forced Icelandic PM Sigmundur David Gunnlaugsson to quit.

An estimated 10% of Icelandic voters took to the streets on Tuesday night, furious at the revelation that Mr Gunnlaugsson had hidden millions in an offshore fund.

Mr Snowden tweeted: "It's up to the British people, not us. In Iceland, 10% of all voters were in the streets within 24 hours, and for less."

Responding to people on Twitter saying they "hope Cameron resigns," he said: "With respect, hope is not a strategy."

Watch this video again

The Live Event you are trying to watch is either unavailable or has not started

Read more: David Cameron should 'resign immediately' over offshore revelations

He pointed his 2 million followers towards the Facebook page of a protest planned for midday on Saturday outside Downing Street.

Earlier this week, Mr Snowden took issue with David Cameron 's insistence that his family's tax affairs were a "private matter."

Mr Snowden, who has heavily criticised the UK's push for mass government snooping on emails and browsing histories , pointed out the PM's hypocrisy.

He tweeted, simply: "Oh, now he's interested in privacy."

1 of 10

Read more:
Edward Snowden calls on British people to rise up and demand ...

Cryptography | Define Cryptography at Dictionary.com

Historical Examples

The same with cryptography, which we've both run up against, no doubt, in course of business.

They are much more difficult to decipher than was the cryptography left by the pirate Kidd.

He is the author of a work on cryptography, I believe, though I am ashamed to say I haven't yet read it.

In cryptography it's a number, or letter, thrown in for the sake of appearance, or to confuse.

In this work the different methods of cryptography are classified.

I am not altogether ignorant of cryptography; it was Trevisa's favorite pursuit when we were at college.

If they retained the name of some god or hero of mythology, the only way they dared to write it was by cryptography.

cryptography, krip-togra-fi, n. the art of secret writing: the character or cipher so used.

British Dictionary definitions for cryptography Expand

the science or study of analysing and deciphering codes, ciphers, etc; cryptanalysis

Derived Forms

cryptographer, cryptographist, cryptologist, nouncryptographic (krptrfk), cryptographical, adjectivecryptographically, adverb

Word Origin and History for cryptography Expand

1650s, from French cryptographie or directly from Modern Latin cryptographia, from Greek kryptos "hidden" (see crypt) + -graphy. Related: Cryptograph; cryptographer.

cryptography in Culture Expand

The science of coding and decoding messages so as to keep these messages secure. Coding (see encryption) takes place using a key that ideally is known only by the sender and intended recipient of the message.

cryptography in Technology Expand

Go here to read the rest:
Cryptography | Define Cryptography at Dictionary.com

Secret Language: Cryptography & Secret Codes | Exploratorium

Ron Hipschman

When you were a kid, did you have a "Captain Midnight" decoder ring? With it, you could send messages to a friends that no one else could read. Or perhaps you remember using special symbols to write notes to your "squeeze" in class. If the note was intercepted , your teacher, could learn nothing about your romance.

In more serious uses, codes and ciphers are used by our military and diplomatic forces to keep confidential information from unauthorized eyes. Businesses also send data that has been encoded to try and protect trade secrets and back-room deals. After all, you wouldn't want your competitor to know that you were about to acquire their company with a leveraged buy-out.

The study of enciphering and encoding (on the sending end), and deciphering and decoding (on the receiving end) is called cryptography from the Greek (kryptos), or hidden and (graphia), or writing. If you don't know Greek (and not many of us do) the above letters could be a form of code themselves! Although the distinction is fuzzy, ciphers are different from codes. When you substitute one word for another word or sentence, like using a foreign language dictionary, you are using a code. When you mix up or substitute existing letters, you are using a cipher. (I told you the difference was fuzzy, and you can combine codes and ciphers by substituting one word for another and then mixing up the result.) We'll concentrate on ciphers.

For a cipher to be useful, several things must be known at both the sending and receiving ends.

By way of analogy, to get into your home you would put a key in a lock to open the door. This process (the use of a key and a lock) is the method or algorithm. Now this method only works if you have the proper key to stick in the lock, and your key will be valid only as long as you are the resident of the particular abode. The next resident will have the locks changed to a different key to make sure that you cannot enter even though you may know the method.

The selection of the above three items - algorithm, key and period - depend on your needs. If you are in the battlefield and are receiving current tactical data, you want an algorithm that makes it easy to decipher the message in the heat of battle. On the other hand, you must also assume that your opponent has intercepted your enciphered message and is busy trying to break it. Therefore you must choose an algorithm (method) that is complicated enough so that by the time your opponent figures it out, the data will be worthless. The easier the algorithm you choose, the more often you will have to change the key that unlocks the code - if you want to keep your enemy in the dark.

Ciphers are broken into two main categories; substitution ciphers and transposition ciphers. Substitution ciphers replace letters in the plaintext with other letters or symbols, keeping the order in which the symbols fall the same. Transposition ciphers keep all of the original letters intact, but mix up their order. The resulting text of either enciphering method is called the ciphertext. Of course, you can use both methods, one after the other, to further confuse an unintended receiver as well. To get a feel for these methods, let's take a look at some ciphers.

The Captain Midnight decoder ring (which is an "encoder" ring as well) allows you to do a simple substitution cipher. It usually has two concentric wheels of letters, A through Z. You rotate the outside ring and substitute the letters in your message found on the outside ring with the letters directly below on the inside ring (see diagram). Here, the algorithm is to offset the alphabet and the key is the number of characters to offset it. Julius Caesar used this simple scheme, offsetting by 3 characters (He would have put the "A" on the outer ring of letters over the "D" on the inner ring if he had owned a Captain Midnight decoder ring.) The word "EXPLORATORIUM" thus becomes "HASORUDWRULXP." Such a scheme was easily broken and showed a certain level of naivete on Caesar's part concerning the enemy's intelligence.

Click here to download a copy of the cypher wheels (12k PDF). Copy and cut out the two wheels. Place the smaller wheel on top of the larger wheel and rotate them so your "key letter" on the small wheel is beneath the "A" of the large wheel. Now you can encipher your plaintext and pass it to your friend who knows the proper key letter.

You could make your ciphertext a little tougher to decode if you threw 26 pieces of paper into a hat, each with a letter of the alphabet written on it, drew them out one at a time, and put them side-by-side under a normal alphabet. The result might look like this (I just used the order of the keys on my keyboard, so you might call this a "Qwerty" code):

You can construct a secret message from the above table. Every time you see an "I" you would substitute the "O" beneath and so on for the other characters. The message "Meet me after school behind the gym," would read

Word lengths - especially the short words - give great clues as to the nature of the code (see frequency charts). To help conceal your message, ignore the spaces and break the message up into equal-sized chunks. Five letters are customary in the spy biz, so your message comes out like this (Note that an extra "dummy" character "M" is added at the end to make it come out with a 5-letter group. Your recipient should have no trouble with the extra character.):

Another popular system called a diagrammatic cipher, used by many children in school, substitutes symbols for letters instead of other letters. This system is, in essence, the same as the letter substitution system, but it's easier to remember than 26 randomly picked letters. It uses the tic-tac-toe boards and two X's as shown below.

The same secret message as above, using the line-shapes that surround each letter (and including a dot where needed) becomes:

Even though it looks like undecipherable outer-space alien text, this would take an arm-chair cryptologist only about 10 minutes or less to figure out. Why? Given enough ciphertext, certain patterns become obvious. Notice how often the empty four-sided box appears: six times out of a total of 29 characters or about 20% of the time. This would immediately indicate that the empty box was almost certainly the symbol for "E," the most frequently used letter in English. Other letters can also be determined by their frequency and by their association with other nearby characters (see "Frequencies"). Almost all substitution ciphers are open to this kind of analysis.

Francis Bacon created one of the more interesting substitution ciphers. He used two different type faces slightly differing in weight (boldness). He broke up his ciphertext into 5 character groups, each of which would represent one character in his plaintext. Depending on which characters of the group were bold, one could determine the plaintext character using the following table (* stands for a plain character and B for a bold character)

Our same secret message as above would appear thusly (Bacon's bold and plain characters were less obvious than those below):

To decipher, we just break the characters into groups of 5 and use the key above to find the plaintext message.

Going back way before your school days, to the 5th century B.C., the Spartans used an interesting transposition cipher called a scytale. The scytale utilized a cylinder with a ribbon wrapped helically around it from one end to the other. The message was written across the ribbons, and then unwrapped from the cylinder. Only someone with an identical diameter cylinder could re-wrap and read the message.

The scytale depended on a piece of hardware, the cylinder, which if captured by the enemy, compromised the whole system. Also, the receiver could lose or break the cylinder and therefore lose the ability to decipher any message. It would be better if the method were completely "intellectual" and could be remembered and used without resorting to a physical device.

Since both the sender and receiver of a transposed ciphertext must agree on and remember this algorithm or method for enciphering and deciphering, something easy would be nice. Since geometrical figures are easy to remember, they serve as the basis for a whole class of transposition ciphers. Let's put our message into the shape of a box. Since there are 29 characters, we'll add a dummy ("O") to make 30 and write the message in a six by five box.

We can now transcribe the message by moving down the columns instead of across the rows. Once again we'll break the characters into groups of five to give no clues about word sizes. The result looks like this :

The real variety begins when you realize that you don't have to write your plaintext into the box row by row. Instead, you can follow a pattern that zig-zags horizontally, vertically or diagonally, or one that spirals in or spirals out (clockwise or counterclockwise), or many other variations (see diagram below).

Once you've put the text in the chosen form using one route, you can then encipher it by choosing a different route through the text. You and your partner just have to agree on the reading route, the transcription (enciphering) route, and the starting point to have yourselves a system. These systems are called route transcriptions.

Here's our message again. The reading route spirals counterclockwise inward, starting at the lower right corner (left diagram). The transcription route (right diagram) is zig-zag diagonal starting at the lower left corner. The ciphertext becomes:

To decipher, you fill the in box following the zig-zag route and read the message using the spiral route.

Another type of transposition cipher uses a key word or phrase to mix up the columns. This is called columnar transposition. It works like this: First, think of a secret key word. Ours will be the word SECRET. Next, write it above the columns of letters in the square, and number the letters of the key word as they would fall if we placed them in alphabetical order. (If there are duplicate letters, like the "E", they are numbered from left to right.)

Now write the columns down in the order indicated by the numbers. The resulting ciphertext looking like this:

As you can see, this is just a different arrangement of the previous ciphertext, but at least it isn't in some regular pattern. We could have easily made it a little more difficult by filling the square following a more complicated path. We could also use a geometric shape other than a rectangle and combine substitution and transposition. The only problem that might occur is that the deciphering may become so complicated that it will remain a secret at the receiving end forever! Come to think of it, she never did meet me behind the gym...

Order of frequency of digraphs (two letter combinations): th er on an re he in ed nd ha at en es of or nt ea ti to it st io le is ou ar as de rt ve

Order of frequency of trigraphs: the and tha ent ion tio for nde has nce edt tis oft sth men

Order of frequency of most common doubles: ss ee tt ff 11 mm oo

Order of frequency of initial letters: T O A W B C D S F M R H I Y E G L N P U J K

Order of frequency of final letters: E S T D N R Y F L O G H A R M P U W

One-letter words: a, I, 0.

Most frequent two-letter words: of, to, in, it, is, be, as, at, so, we, he, by, or, on, do, if, me, my, up, an, go, no, us, am...

Most frequent three-letter words: the, and, for, are, but, not, you, all, any, can, had, her, was, one, our, out, day, get, has, him, his, how, man, new, now, old, see, two, way, who, boy, did, its, let, put, say, she, too, use...

Most frequent four-letter words: that, with, have, this, will, your, from, they, know, want, been, good, much, some, time, very, when, come, here, just, like, long, make, many, more, only, over, such, take, than, them, well, were...

Smith, Laurence Dwight. Cryptography, the Science of Secret Writing. New York, NY: Dover Publications Inc., 1943. A good account of codes and ciphers with many historical examples.

Konheim, Alan G. Cryptography: A Primer. New York, NY: John Wiley & Sons, 1981. A highly technical (and mathematical) book on more modern methods of code making and breaking.

Gaines, Helen Fouch. Cryptanalysis: A Study of Ciphers and their Solution. New York, NY: Dover Publications Inc., 1956. The title says it all.

Continued here:
Secret Language: Cryptography & Secret Codes | Exploratorium

LumbridgeCity – Bitcoin & Altcoin Trading and Digital …

Join Our Private Bitcoin Trading Community Sign up for reminders about Registration Week

Registration opens in 27 days, 11 hours, 8 minutes*, that is Sat, 01 May 2016 14:50:00 UTC space is limited, and registration finish quickly so we can get right to the lessons.

Soon we open registration and bring a few more people into our Bitcoin and Altcoin Trading community.

Activities are organized to guide participants through an introduction to lending and trading Altcoins on Poloniex, writing your own personalized trading action plan, all the way through to actually micro-trading your plan and updating your trading journal!

As the lessons progress and you learn different ways to grow your cryptocurrency holdings, the private forum, live chat and community groups will provide the support and encouragement to ensure you apply the lessons you learn, and move your new knowledge about growing your money into practical experience! The community will take you from your first wealth building plan and help you build a life-long habit of growing your money!

Private tutorial videos, altcoin trading case studies, trading risk control rules and how to make a trade plan, bitcoin lending tutorials, price charts and much more. Jump right into where the cryptocurrency markets are today and at the same time, take step by step tutorials on the basics of lending and trading altcoins on Poloniex.

Our eight week, step by step approach is organized help you move through a series of short altcoin trading lessons. You will gain an introduction to eachimportant section of more than 30 private tutorials in our membership area, and quickly gain new skills and strategies for making consistent profits!

Questions? Contact Me Personally!

info@lumbridgecity.com

To Your Success!

Linkbuilder

Home Terms Contact

Read the rest here:
LumbridgeCity - Bitcoin & Altcoin Trading and Digital ...

Wikileaks Mirror

Cease delaying and also cash searching for the Best Wireless Buzzer Rather, make an effort checking out to obtain the pointers as well as products that will definitely start youre the wireless bell you are searching for. No matter where []

For correct lead to our dinner table found review, we put 7 saws through a range of putting together and cutting tests. A dual material found conserves energy and time but additionally costs the buyer on average an additional $50 []

Embroidery is actually promptly acquiring in level of popularity once again More and more folks are actually realizing the exciting and also feeling of accomplishment they feel when generating something from the ground up or even manage to heal their []

You learn that saying, they only do not produce em like they used to? Im pretty particular the person who coined this was actually discussing cookware. Also warmth: hefty scale pots and pans is actually likewise a really good conductor []

Char-Broil is actually an independently had subsidiary of the W.C. Bradley co. which was started back in 1885 in Columbus, Georgia. When shopping for your following grill is just what kinds of meals you intend on food preparation, an additional []

Hey as well as thanks for visiting, your one-stop-shop for all relevant information pertaining to dehumidifiers. The dehumidifier additionally depends on the Peltier innovation, this performs certainly not possess any type of moving parts whatsoev er and that features an []

Read the original here:
Wikileaks Mirror

According to WikiLeaks, US government and George … – rt.com

Washington is behind the recently released offshore revelations known as the Panama Papers, WikiLeaks has claimed, saying that the attack was produced to target Russia and President Putin.

On Wednesday, the international whistleblowing organization said on Twitter that the Panama Papers data leak was produced by the Organized Crime and Corruption Reporting Project (OCCRP), "which targets Russia and [the] former USSR." The "Putin attack" was funded by the US Agency for International Development (USAID) and American hedge fund billionaire George Soros, WikiLeaks added, saying that the US government's funding of such an attack is a serious blow to its integrity.

Organizations belonging to Soros have been proclaimed to be "undesirable" in Russia. Last year, the Russian Prosecutor Generals Office recognized Soross Open Society Foundations and the Open Society Institute Assistance Foundation as undesirable groups, banning Russian citizens and organizations from participation in any of their projects.

Prosecutors then said the activities of the institute and its assistance foundation were a threat to the basis of Russias constitutional order and national security. Earlier this year, the billionaire US investoralleged that Putin is "no ally" to US and EU leaders, and that he aims "to gain considerable economic benefits from dividing Europe."

The American government is pursuing a policy of destabilization all over the world, and this [leak] also serves this purpose of destabilization. They are causing a lot of people all over the world and also a lot of money to find its way into the [new] tax havens in America. The US is preparing for a super big financial crisis, and they want all that money in their own vaults and not in the vaults of other countries, German journalist and author Ernst Wolff told RT.

Read more

Earlier this week, the head of the International Consortium of Investigative Journalists (ICIJ), which worked on the Panama Papers, said that Putin is not the target of the leak, but rather that the revelations aimed to shed light on murky offshore practices internationally. "It wasnt a story about Russia. It was a story about the offshore world," ICIJ head Gerard Ryle told TASS.

His statement came in stark contrast to international media coverage of the "largest leak in offshore history." Although neither Vladimir Putin nor any members of his family are directly mentioned in the papers, many mainstream media outlets chose the Russian presidents photo when breaking the story.

READ MORE: Panama leak reveals more about Western journalism than Vladimir Putin

We have innuendo, we have a complete lack of standards on the part of the western media, and the major mistake made by the leaker was to give these documents to the corporate media, former CIA officer Ray McGovern told RT. This would be humorous if it werent so serious, he added.

"The degree of Putinophobia has reached a point where to speak well about Russia, or about some of its actions and successes, is impossible. One needs to speak [about Russia] in negative terms, the more the better, and when there's nothing to say, you need to make things up," Kremlin spokesman Dmitry Peskov has said, commenting on anti-Russian sentiment triggered by the publications.

WikiLeaks spokesman and Icelandic investigative journalist Kristinn Hrafnsson has called for the leaked data to be put online so that everybody could search through the papers. He said withholding of the documents could hardly be viewed as "responsible journalism."

"When they are saying that this is responsible journalism, I totally disagree with the overall tone of that," the co-founder of the Icelandic Center for Investigative Journalism told RT's Afshin Rattansi in Going Underground, when asked about his reaction to the ICIJ head saying that the consortium is not WikiLeaks, and is trying to show that journalism can be done responsibly by not releasing the papers in full.

"They should be available to the general public in such a manner so everybody, not just the group of journalists working directly on the data, can search it," Hrafnsson said.

READ MORE: Russian investigators to launch criminal probe after Panama data leak

The WikiLeaks spokesman also told RT he's not surprised that there have been no big American names in the leaked 11.5 million documents of the Panamanian law company.

"It seems to be skewed at least a way from American interest. There's always a possibility that it's not a journalistic bias but simply a bias in the documents themselves," Hrafnsson said, adding that Mossack Fonseca "is simply one law firm in Panama servicing and providing tax haven companies mostly out of the BVI [British Virgin Islands]."

"It doesn't even give the entire picture," he concluded.

Excerpt from:
According to WikiLeaks, US government and George ... - rt.com

Support Julian Assange in his quest for Freedom

Oppressive states such as Ecuador crush the webs power Nick Cohen Knowledge alone is next to useless in countries whose rulers enforce self-censorship

Ecuadors bombastic president Rafael Correa. Photograph: Fabrizio Bensch/ReutersSunday 6 September 2015 00.05 BSTLast modified on Sunday 6 September 201500.06 BST

Julian Assanges captivity in the Ecuadorian embassy is full of ironies none of them funny which tell us much about the state of freedom of speech, little of it good.

Older readers will remember that the stardust of celebrity fell on Assange in the last decade when his WikiLeaks site published thousands of secret US government cables. He rapidly became infamous, to everyone except his groupies, when one Swedish woman alleged that Assange had raped her and another that he had sexually assaulted her. Assange did not have the courage to face his accusers. He insisted that the Swedish authorities were plotting to deport him to America. Lawyers gently pointed out that America could easily have extradited Assange from Britain, if it had wanted him.

Assange didnt listen to doubters. In June 2012, he sought asylum at 3B Hans Crescent, London SW1, and there he has remained, a prisoner of his own conspiracy theories. The embassy may have a grand address just round the corner from Harrods, but like so many London properties its a pokey flat. If you or I were trapped inside for years with the Metropolitan polices finest waiting to arrest us the moment we stepped outdoors, wed probably go mad.

According to confidential documents leaked by Ecuadorian journalist Fernando Villavicencio to BuzzFeed last week, Assange appears to be doing just that. He has fought with a security guard. He drinks too much and needs psychological support. His evident anger and feelings of superiority could cause stress to those around him, especially the personnel who work in the embassy, mainly women.

For the first time in my life, I feel sorry for Assange. But if you look beyond his degeneration and forget about the allegedly abused Swedish women many of his charming supporters have vilified, this bleak story carries a cheering moral.

WikiLeaks revealed American secrets and there was nothing Americans could do about it. Leftwing Ecuador defended a champion of freedom of information and gave him asylum. But in the age of transparency, its diplomatic cables are as open to inspection as Americas and it too has found its secrets online. However messy the web is, however many criminals and crackpots flourish online, our wired, anarchic world is surely more democratic than what came before. Old sources of power in states, churches and corporations can no longer control what we read and that is progress worth having.

Little about this comforting picture is true. If I can keep you in the cramped quarters of the Ecuadorian embassy for a moment longer, I will attempt to explain why. WikiLeaks did not just shed sunlight on dark corners of US foreign policy. Most of its journalists walked out when they learned that Assange was willing to abase himself before dictators, most notably the president of Belarus, who wanted access to US confidential information about dissident movements that threatened his rule.

Ecuadors rulers are not offering asylum to Assange because they believe in the right to hold power to account, but because Assange is as anti-American as they are. When its own citizens try to tell truth to power, Ecuadors love of liberty vanishes.

It is a petro-socialist authoritarian state. Not a dictatorship, I should add: there are still elections. But the regime hounds those who tell its citizens news it does not want them to hear. So relentless is its determination to control information it has even silenced the scientists at Ecuadors Geophysics Institute, for fear that their warnings of possible eruptions from the Cotopaxi volcano will cause panic . Legal penalties for insulting, or as we might call it criticising, the rulers enforce self-censorship. Traditional and new media do not want to go against Ecuadors bombastic president, Rafael Correa. The case of the embassy leaker, Fernando Villavicencio, makes my point. He complained about police brutality. His punishment was a libel action from the president, a prison sentence and a court order to apologise to the affronted leader.

I am not attempting an ideological assault on Latin American socialism, although I will note in passing that Venezuelas Chavista state is just as bad as Ecuadors failing state. The conservative governments of Orbns Hungary, Putins Russia and Erdogans Turkey all have democratic elements, but they all use the same straitjackets as Ecuador to confine democratic argument.

While a catatonic world was finally waking up to the Syrian refugee crisis, I was speaking to the great Turkish dissident Yavuz Baydar. A columnist on the Turkish daily Hrriyet had used the death of Aylan Kurdi to damn Erdogans treatment of the Turkish and Syrian Kurds, he told me. The state prosecutor immediately announced he would investigate the scandalous remarks and gross insults targeting Erdogan. Every other writer on new and old media got the message.

You will not understand how the hopes for the web have failed so miserably unless you grasp how Francis Bacon was wrong. Knowledge isnt power. Power comes from the freedom to use knowledge. Even if citizens in Ecuador or Turkeycan find information online the state does not want them to see, what good is it if they cannot use it in political campaigns without being arrested? They live in a state of informed impotence, in which they cannot pass on what they know. Without rights protected by an independent judiciary, their knowledge is close to useless.

Anyone who has worked in a hierarchical workplace, the closest thing to an authoritarian society most westerners experience, should understand their predicament. You know your manager is a disaster, a sex pest or a bully, but there is nothing you and your colleagues can do with that information if you fear that speaking out will wreck your careers.

What applies in the workplace applies with a vengeance in public life. Modern communications technologies create a comforting illusion. Because there are hundreds of billions of posts and tweets every year, you can gain the impression that stopping the torrent of information reaching an audience is as impossible as stopping the waves reaching the shore. But someone still needs to do the hard work. Someone still needs to be brave enough to break the story or blow the whistle before the tweeting and the posting can begin. Regimes from Belarus to Ecuador, from Venezuela to Turkey, know that, if they can frighten that someone, and deter others from thinking they should imitate that someone, the torrent will vanish like water down a sinkhole.

http://www.theguardian.com/commentisfree/2015/sep/06/internet-gift-world-oppressed-informed-impotence

View original post here:
Support Julian Assange in his quest for Freedom

30 Essential Pieces Of Free (and Open) Software for Windows …

Recently, I received a fresh new laptop from Dell. Upon receiving it, I did the traditional installation of Windows from scratch on it to remove a lot of the garbage that is preinstalled on Dells. Then I got really busy installing tons of great software that takes care of pretty much every software need I have. Not only was all of the software free, every piece of it was open source, which means that the code is peer-reviewed; no spyware here!

What follows is a list of thirty pieces of software that are the cream of the crop of open source software for Windows. Not only is every piece of it free, almost all of them directly replace expensive software packages.

Now, if only there were an open version of The Sims 2, I might go the whole way and switch to Linux

Replaces Internet Explorer If you havent switched to Firefox for your web browsing needs, do it now. It stops annoying popups and it has tons of amazing plugins that can make surfing the web even better. I could evangelize all day about Firefox, but one things for sure: the first thing I do on any new Windows machine is run Internet Explorer just long enough to download Firefox.

Replaces Microsoft Outlook or Eudora Thunderbird is an email client that has five big things going for it: its free, its full featured, its lightweight and runs quick, it has an unparalleled spam filter, and it protects you from those ridiculous phishing attacks by clearly indicating which emails send you to a bogus website. If youre not already using a web-based email solution, Thunderbird should be your client.

Replaces Microsoft Outlooks calendaring functions Might as well get the Mozilla trifecta out of the way by mentioning Sunbird, which is the Mozilla Foundations calendaring program. Its extremely easy to use (I figured out everything I needed in a minute or two) and easy to share your calendar with others. I consider a calendaring tool to be essential if youre using a laptop, and this is no different.

Replaces Microsoft Word Want a good word processor but find Microsoft Word too expensive? AbiWord is my favorite replacement for Word. Its lightweight (meaning it runs quickly) and includes pretty much every feature that I use regularly in a word processor, plus it can save files in formats that you can exchange with Word and WordPerfect users, plus open any of their files, too.

Replaces Microsoft Excel and Microsoft PowerPoint If you want to replace the rest of the Office suite, your best bet is OpenOffice. It includes very nice replacements for Excel and PowerPoint (and workable replacements for Access and other Office elements). In fact, I actually prefer their Excel and PowerPoint replacements to the real thing.

Replaces Norton AntiVirus or McAfee ClamWin is a slick anti-virus software thats quite easy to manage and is unobtrusive while keep your system free of viruses. Thats pretty much all I want from a package, so why pay money for McAfee to keep bugging me all the time?

Replaces AIM, Windows Messenger, etc. This is a very clean instant messaging program that allows you to be on AOL Instant Messenger, Windows (MSN) Messenger, and Yahoo Messenger simultaneously with one program. There are other free packages that do this, but Gaim is stable and clean and simple.

Original but essential From their website, BitTorrent is a peer-assisted, digital content delivery platform that provides the fastest, most efficient means of distributing, discovering, and consuming large, high-quality files on the Web. Our mission is simple: to deliver the content that entertains and informs the digital world. In other words, BitTorrent allows you to download large media files and also use your bandwidth to help others download these files. Search for media files you want and download em.

Replaces Adobe Photoshop This is a version of the GNU Image Manipulation Program that does a pretty solid job of imitating Adobe Photoshop a regular user of Photoshop (like me) can adapt to it quite quickly. Its very richly featured and runs quite well in fact, I see no reason to ever go back, even if Photoshop were free.

Replaces LimeWire, BearShare, etc. Sure, LimeWire and BearShare are free, but why not just get the same basic software without all of the spyware? Gnucleus is pretty much identical to those software packages but without all that extra junk that slows down your computer.

Replaces Windows Media Player, Quicktime, RealPlayer, etc. If you get tired of having tons of media players on your computer, get this package that runs pretty much every media type youll run across without breaking a sweat.

Unique but essential Juice lets you effortlessly subscribe to podcasts, organize them, and listen to them at your convenience. In conjunction with PodNova, I find it easier to use Juice to organize podcasts than using iTunes itself.

Unique but essential (for some) If youre interested in recording your own podcast (or just want to make your own voice recordings for whatever reason), Audacity and a microphone are pretty much all you need to get the job done. Im not much for podcasting (lets just say I dont have a radio voice), but I use Audacity for other voice recording purposes.

Unique but essential RSSOwl is one of many open source RSS readers. In other words, it enables you to use one program to keep track of the content of a lot of different blogs; if you read a lot of blogs, its the only way to keep tabs on all of them without devoting hours jumping from site to site. If you have a laptop, its preferable to using sites like Bloglines, but if youre on a desktop, a web-based feed manager might be better.

Replaces WinFTP Many people occasionally have a need to FTP files to other computers; if you ever have the need to transfer files in such a fashion, FileZilla will do the job slickly and quickly.

Unique but essential Keynote is basically designed specifically for the task of taking notes on a laptop. If you ever find yourself in a meeting or a presentation with your laptop open and want to jot down notes and organize them just a bit, Keynote is unquestionably the program for you. Its not good at quality word processing, but thats not the point. In my professional work, I find myself using Keynote almost as often as any other utility.

Replaces iTunes If youre not already committed to downloaded music from the iTunes Music Store, then MusikCube is the best choice available for a music organizer and player. It organizes your mp3s, makes it really easy and really fast to find them, and allows you to make some incredibly clever smart playlists.

Unique but essential Handbrake enables you to stick a DVD in your DVD drive and have the contents of that film stored to your hard drive in a form that can be read by pretty much any media player. I often use it to put a few movies on my laptop for travel purposes, so I dont have to worry about keeping track of DVDs while on the road.

Replaces mIRC X-Chat is a free IRC client. For those unfamiliar with IRC, its a place for technical people (and, as my wife loves to point out, nerds) to meet and discuss topics in an open environment. I often find it very useful when piecing through difficult technical issues.

Unique but essential KeePass is a program that securely stores and manages the abundance of passwords we all use on a daily basis. I have literally hundreds of usernames and passwords spread out all over the place; KeePass keeps them all for me and keeps them safe.

Unique but essential TrueCrypt enables you to convert a memory stick into a strongly encrypted data storage device, meaning that you can store personal data on it without worrying about losing it and having personal information get out and about. I use it to keep some of my most personal data off of my laptop and strongly secured, just in case.

Replaces Adobe Acrobat PDFCreator creates a virtual printer on your computer that, if you print a document to it from any program, creates a PDF of that document that can be read on any computer with Acrobat Reader on it. After installing PDFCreator, all you have to do is print like normal and out comes a PDF!

Unique but Essential Freemind is a mind mapping software program. In essence, it enables you to brainstorm and link together ideas quickly, creating maps of concepts similar to what you might do on a whiteboard. I find it incredibly useful when putting together ideas for new posts or planning small projects or assembling the backbone of a writing project.

Replaces Google Earth WorldWind is very similar to Google Earth in that it allows you to browse the globe. While it isnt strong for creating maps (but why not just use Google Maps for that?), it is utterly incredible for viewing three-dimensional landscapes of any place on earth.

Replaces Notepad Notepad2 is a replacement for the traditional Windows Notepad that just adds a few sweet little features: multiple documents; line, word, and character counts; and some highlighting of tags. In fact, Im using Notepad2 as I draft this post (after using Freemind to organize it).

Unique but useful HealthMonitor enables you to keep an eye on the health of your computer. It identifies slowdowns and other system issues quickly and lets you know (for example, it gives a popup if your system memory gets to a certain percentage of fullness, or if your hard drive has only 10 GB free). This can keep you out of trouble and also give you clues to problems your machine might be having.

Unique but useful Sometimes late into a writing session, my wrists get sore from too much repetitive movement. Workrave basically jumps in before this happens and locks down the computer for a while, preventing me from working too much and causing repetitive stress injury. Since Ive started using it, it hasnt significantly hurt my productivity at all and my wrists are thanking me!

Replaces Microsoft Project If you do any project management (or have a need to dip your toes in the water), GanttPV does a brilliant job of managing the task quickly, easily, and freely. If you need to move to MS Project later, you can export from GanttPV to Project, but once you start digging into GanttPV, youll likely have no reason to use Project.

Replaces Microsoft Money or Quicken GnuCash is a slimmed-down version of the bloated Microsoft Money and Quicken packages, but it contains all of the features I want for managing my money. The interfaces are incredibly simple it functions much like a checkbook ledger on your computer but theres a lot of meat hidden throughout the software.

Replaces Quake IV, Halo, etc. After all this downloading, youre going to need to blow off a little steam, and Ive yet to find a more enjoyable free game than this one. Its basically a third person combat game, but the graphics are spectacular and the game is quite engrossing.

If youve downloaded and installed all of these, youve got access to all the productivity software youll likely need, clean and open and best of all free.

A brand-new computer comes with a host of pre-installed software, some of which are only accessible as limited free trials. Fortunately, many of the best open source software are not only able to completely replace their paid counterparts but they also (arguably) perform better since they are peer-reviewed. If youre on the hunt for the best free software, start with our open source software list below:

Replaces Microsoft Office Apache OpenOffice provides word processing, spreadsheets, presentations, graphics, a formula editor, and database management applications, all of which generally offer the same functionalities and features as MS Office.

Replaces Internet Explorer A popular alternative to Chrome, more than 30% of web users use Firefox as their browser. Firefox stops annoying popups and has tons of amazing plugins that can make surfing the web more personalized and efficient.

Replaces Internet Explorer Google Chrome isnt an open source software but its a viable alternative to Firefox (if that isnt your thing). Its free, fast, and efficient and comes with an abundance of add-ons so you can customize it to your liking. Theres even an option to open an incognito window, which doesnt save your cache or browser history if prefer to keep things more private at home or in the office.

Replaces Microsoft Outlook or Eudora Thunderbird is an email client that has five big things going for it: its free, its full-featured, its lightweight and runs quick, it has an unparalleled spam filter, and it protects you from those ridiculous phishing attacks by clearly indicating which emails send you to a bogus website. If youre not already using a web-based email solution, Thunderbird should be your client.

Replaces Microsoft Calendar Meant to be used with Thunderbird, Lightning enables you to organize your schedule and important events in a calendar thats fully integrated with your email. You can manage and share multiple calendars, create recurring events, add to-do lists, invite friends to events, and subscribe to public calendars, including holidays.

Replaces Adobe Acrobat PDFCreator creates a virtual printer on your computer that, if you print a document to it from any program, creates a PDF readable on any computer with Acrobat Reader installed. It supports many Adobe PDF options, including password protection and 128-bit encryption. All you need to do is print and it creates a PDF!

Useful If you have multiple instant-messaging accounts, use Pidgin to use them all at once. It supports AIM, ICQ, Google Hangouts, Jabber/XMPP, MSN Messenger, Yahoo!, Bonjour, Gadu-Gadu, IRC, MXit, Novell, and more.

Replaces Microsoft Project If you do any project management (or need to dip your toes in the water), GanttPV does a brilliant job of managing the task quickly, easily, and freely. If you need to move to MS Project later, you can export from GanttPV to Project, but once you start digging into GanttPV, youll likely have no reason to use Project.

Useful Mind mapping is a key process in many businesses, and this mind mapper does a great job providing an easy-to-use hierarchical editor and other tools to help organize your ideas into one coherent overview.

Unique but essential (for some) VirtualBox is a desktop virtualization software, which functions to separate your physical desktop from your desktop space and applications so you can access it from anywhere. It also makes recovery of lost files much easier since all the components are saved in a data center. VirtualBox comes with impressive processing power so your desktop isnt slowed down.

Replaces Microsoft Windows Notepad Notepad++s minimalist, user-friendly style is pleasant to use and comes with features such as multi-view, multiple tabs for separate documents, word auto completion, zoom functions, and bookmarking. On top of that, their systems minimize carbon dioxide emissions by using less CPU power!

Useful With Greenshot, you can take full or partial screenshots and add text and shapes to it so your colleagues quickly understand what youre visually describing. Greenshot supports several image formats.

Replaces WinFTP Many people occasionally have a need to FTP files to other computers. FileZilla will do the job slickly and quickly, especially with their simple drag-and-drop functionality. FileZilla is especially efficient for batch transfers.

Replaces Quicken TurboCASH 5 is a small-business accounting package that includes such functions as invoicing, debtors, creditors, VAT accounting, balance sheet and income statements, and reporting. Its accessible to multiple users and companies.

Replaces Microsoft Money or Quicken GnuCash is a slimmed-down version of the bloated Microsoft Money and Quicken packages, but it contains all of the essential features for managing money. The interfaces are incredibly simple it functions much like a checkbook ledger on your computer but theres a lot of meat hidden throughout the software.

Replaces BitTorrent Ares Galaxy is a BitTorrent and chat software program with an easily accessible interface and a built-in audio/video viewer. You can share any types of digital file and publish your them through their own peer-to-peer network.

Replaces BitTorrent eMule is a peer-to-peer file-sharing client that includes robust search features, checks for file corruptions during downloads, and previews of downloads.

Replaces BitTorrent Tribler enables its users to discover and share video, audio, photos, and other files.

Replaces Photoshop, Paint Shop Pro GIMP (GNU Image Manipulation Program) is the most popular free alternative to Photoshop. It is known for its versatility, as you can use it as a simple Paint program or for more sophisticated capabilities, such as photo retouching, layering image rendering, and format conversion.

Replaces Maya, 3DSMax Blender is a 3D graphics-creation program that enables you to perform animation, modeling, rendering, post-production, real-time interactive 3D, and much more.

Replaces Microsoft Visio Very similar to Visio, you can use Dia to create a wide variety of diagrams, such as flowcharts and relationship charts. You can save your pieces to an XML format and export them to EPS or SVG formats.

Replaces Adobe Illustrator or CorelDraw Inkscape is a vector graphics editor that includes features such as shapes, paths, markers, clones, text, gradients, and patterns while supporting functionalities such as layers, node editing, bitmap tracing, and more. You can import JPEG, TIFF, and PNG files and export as PNG or other vector-based formats.

Replaces PageMaker, InDesign, QuarkXPress Scribus, a desktop publishing application, supports many major graphic formats as well as SVG import and export.

Useful VLC is a fast and powerful multimedia player that supports various audio and video formats, including but not limited to MPEG-1, MPEG-2, MPEG-4, DivX, and MP3, as well as DVDs and VCDs. It plays almost any file, CD, DVD, webcams, and other devices.

Useful SMPlayer is a free media player with the added ability to play and download YouTube videos. On top of that, if youre the type not to sit and commit to an entire movie, SMPlayer will simply replay where you left off, which is perfect for busy folks.

Unique but essential Handbrake enables you to stick a DVD in your DVD drive and have the contents of that film stored to your hard drive in a form that can be read by pretty much any media player. This is awesome for travel since you can store all your movies in your laptop instead of carrying around DVDs.

Unique but essential (for some) If youre interested in recording your own podcast (or just want to make your own voice recordings for whatever reason), Audacity and a microphone are pretty much all you need to get the job done. Audacity is also very useful for other voice recording purposes.

Useful Media Player Classic plays a wide swath of audio and video formats, including MPEG/MPEG-2/MPEG-4, DivX, Xvid, and CD/VCD/DVD media.

Essential KeePass is a lightweight and intuitive password manager for Windows, Linux, Mac OS X, and mobile devices. Your passwords are kept safe in an encrypted database, which you can quickly access with a master password.

Replaces BitLocker TrueCrypt enables you to convert a memory stick into a strongly encrypted data storage device, meaning that you can store personal data on it without worrying about losing it and having personal information get out and about.

Replaces Norton Antivirus You can hardly tell Bitdefender is running, as it works quietly but efficiently. Its excellent at blocking and removing malware as well as protecting your computer from phishing.

Useful HealthMonitor enables you to keep an eye on the health of your computer. It identifies slowdowns and other system issues quickly and lets you know (for example, it gives a popup if your system memory gets to a certain percentage of fullness, or if your hard drive has only 10 GB free). This can keep you out of trouble and also give you clues to problems your machine might be having.

Have a question for us or just want to pick our brain? Follow Simple Dollar on Facebook. We respond to every message.

More:
30 Essential Pieces Of Free (and Open) Software for Windows ...