Revelations continue to mount with regard to the capabilities of the U.S. National Security Agency, which, newly revealed documents show, has long been working to crack widely used Internet encryption technologies and “covertly influence and/or overtly leverage” technology firms’ products to make them exploitable. In this joint article by ProPublica and the New York Times, the damning details are piled ever higher, suggesting that the NSA can decrypt Internet traffic protected by SSL and VPNs, as well as encryption used in 4G-based smartphones. follow link
Add Slides to Pear Note from Other Applications
If you have some slides in any application, and you'd like to add them to a Pear Note document, there's no need to save them out and then import them into Pear Note. Instead, you can send them directly to Pear Note through a PDF service. For instance, if you had slides in Keynote, just:
- Select Print within Keynote.
- Click the PDF button.
- Select Send PDF to Pear Note.
This can also be used to import other document types into Pear Note to take notes on them as well.
Visit Useful Fruit Software
- ExtraBITS for 9 September 2013 (09 Sep 13)
The NSA’s Campaign to Undermine Internet Security