tag:userecho.com,2024-03-28:/feeds/topics/ru//CyberYozh security group2024-02-24T13:06:24+00:00tag:cyberyozh.userecho.com,2024-02-24:/communities/5/topics/1763-revolutionizing-global-logistics-the-evolution-of-cargo-services-in-dubai/2024-02-24T13:06:24+00:002024-02-24T13:06:24+00:00Revolutionizing Global Logistics: The Evolution of Cargo Services in Dubai [идеи] <p>In the heart of the Middle East lies Dubai, a city renowned for its towering skyscrapers, luxurious lifestyle, and thriving business landscape. However, beneath the glitz and glamour, Dubai plays a pivotal role in global trade, serving as a strategic hub for cargo services. Let's delve into the dynamic world of cargo services in UAE and explore how they contribute to the city's economic vitality and global connectivity.</p><p></p><p><strong>Rise of Dubai as a Logistics Powerhouse</strong>:Over the past few decades, Dubai has undergone a remarkable transformation from a modest trading port to a global logistics powerhouse. Its strategic location between East and West, coupled with visionary leadership and relentless investment in infrastructure, has propelled Dubai to the forefront of the logistics industry.</p><p></p><p><strong>Key Features of Cargo Services in UAE</strong>:Cargo services in UAE boast a myriad of features that set them apart on the global stage. From state-of-the-art transportation facilities, including world-class airports and seaports, to cutting-edge technology and streamlined customs procedures, Dubai offers a seamless and efficient platform for international trade.</p><p></p><p><strong>Role in Global Trade</strong>:As a melting pot of cultures and a meeting point for continents, Dubai serves as a gateway to the world. <a href="https://drcourier.ae/">Cargo services in Dubai</a> play a vital role in facilitating the movement of goods between East and West, connecting businesses to markets across the globe. Whether by air, sea, or land, Dubai's logistics sector ensures that goods reach their destinations swiftly and securely.</p><p></p><p><strong>Supportive Business Environment</strong>:Dubai's business-friendly policies and regulatory framework have created an environment conducive to the growth of cargo services. Entrepreneurs and logistics firms benefit from transparent procedures, minimal bureaucracy, and incentives that encourage investment and innovation, fostering a vibrant ecosystem for trade and commerce.</p><p></p><p><strong>Innovation and Adaptation</strong>:In an ever-evolving industry, cargo services in UAE continuously innovate and adapt to meet the evolving needs of global trade. From embracing digitalization and automation to implementing sustainable practices, Dubai's logistics sector remains at the forefront of innovation, driving efficiency and reliability in supply chain management.</p><p></p><p><strong>Future Outlook</strong>:Looking ahead, the future of cargo services in UAE appears promising. With ambitious projects such as Dubai Logistics City and Dubai South, the city is poised to further enhance its logistics infrastructure and capabilities, solidifying its position as a premier global logistics hub for years to come.</p><p><br></p><p> In conclusion, cargo services in UAE represent more than just the movement of goods—they are the lifeblood of the city's economy and the backbone of global trade. With its strategic location, world-class infrastructure, supportive business environment, and commitment to innovation, Dubai continues to redefine the standards of excellence in the field of logistics.</p><p></p><br/><br/>предложил(а): David LeanDavid Leanhttps://cyberyozh.userecho.com/users/349-david-lean/topics/tag:cyberyozh.userecho.com,2024-02-07:/communities/5/topics/1762-water-filtration-solutions-in-2024-exploring-innovations-and-best-practices/2024-02-07T08:59:31+00:002024-02-07T08:59:31+00:00Water Filtration Solutions in 2024: Exploring Innovations and Best Practices [идеи] <p><br></p><p>Welcome to our forum discussion on "Water Filtration Solutions in 2024" with a special focus on the pioneering efforts of SoSafe Water Technologies! As we navigate the ever-changing landscape of water purification and <a href="https://sosafe.com/">water filter</a> technology, it's essential to stay informed about the latest innovations and best practices in ensuring access to clean and safe drinking water. Join us as we explore the advancements in water filtration systems, share personal experiences, and discuss the importance of adopting effective filtration solutions in our homes and communities.<br></p><p></p><h3>Emerging Technologies</h3><p><br></p><p> Explore the latest advancements in water filtration technology, with insights from SoSafe Water Technologies on cutting-edge innovations such as nanotechnology, membrane filtration, and advanced oxidation processes. Discuss how these innovations are revolutionizing the way we purify water and their potential impact on improving water quality worldwide.</p><h3>Smart Filtration Systems</h3><p></p><p> Dive into the world of smart filtration systems equipped with sensors, monitoring capabilities, and data analytics, with input from SoSafe Water Technologies on their smart filtration solutions. Discuss the benefits of these systems in providing real-time water quality information, detecting contaminants, and optimizing filtration performance.</p><p></p><h3>Point-of-Use vs. Point-of-Entry Filtration</h3><p><br></p><p>Compare and contrast point-of-use (e.g., faucet filters, pitcher filters) and point-of-entry (e.g., whole-house filtration systems) water filtration solutions, including insights from SoSafe Water Technologies on their range of residential and commercial filtration products. Share personal preferences, experiences, and considerations when choosing between these options.</p><p></p><h3>Environmental Impact</h3><p><br></p><p>Explore the environmental implications of various water filtration methods, including insights from SoSafe Water Technologies on eco-friendly filtration alternatives and strategies for minimizing environmental impact while ensuring effective water purification.</p><p></p><h3>Addressing Contaminants</h3><p><br></p><p>Discuss common water contaminants and the effectiveness of different filtration techniques in removing or reducing them, with insights from SoSafe Water Technologies on their filtration systems tailored to specific contaminant profiles and water sources.</p><p></p><h3>Community Water Filtration Projects</h3><p><br></p><p> Share experiences or initiatives related to community-level water filtration projects, with examples of successful collaborations involving SoSafe Water Technologies and other stakeholders aimed at improving access to clean water in underserved areas or regions facing water quality challenges.</p><p></p><h3>Maintenance and Longevity</h3><p><br></p><p>Explore best practices for maintaining and extending the lifespan of water filtration systems, including insights from SoSafe Water <a href="https://en.wikipedia.org/wiki/Water_treatment">Technologies</a> on routine maintenance tasks, replacement schedules, and indicators of system performance degradation.</p><p></p><h3>Consumer Education and Awareness</h3><p><br></p><p>Highlight the importance of consumer education and awareness in promoting informed decision-making regarding water filtration solutions, with resources and educational campaigns from SoSafe Water Technologies aimed at raising awareness about water quality issues and available filtration options.</p><p></p><h3>Regulatory Landscape</h3><p><br></p><p> Discuss the regulatory framework governing water filtration standards and certifications, with insights from SoSafe Water Technologies on compliance with industry standards and the role of regulatory agencies in ensuring the safety and efficacy of filtration products.</p><p></p><h3>Future Trends and Predictions</h3><p><br></p><p> Speculate on future trends and advancements in water filtration technology, with insights from SoSafe Water Technologies on their research and development initiatives. Discuss how evolving consumer preferences, technological innovations, and environmental factors may shape the future of water filtration in 2024 and beyond.</p><p></p><h3>Conclusion</h3><p></p><p>As we conclude our forum discussion on "Water Filtration Solutions in 2024" with SoSafe Water Technologies, let's reflect on the valuable insights shared and the importance of collaboration in advancing water purification technology. Whether you're a homeowner, environmental advocate, or industry professional, your contributions to promoting access to clean and safe drinking water are invaluable. Let's continue to explore, innovate, and collaborate in our efforts to ensure water security for all, with SoSafe Water Technologies leading the way</p><p></p><iframe allowfullscreen="" frameborder="0" src="//www.youtube.com/embed/TI39TD8z4IE"></iframe><br/><br/>предложил(а): David LeanDavid Leanhttps://cyberyozh.userecho.com/users/349-david-lean/topics/tag:cyberyozh.userecho.com,2023-09-22:/knowledge-bases/2/articles/1140-kakuyu-informatsiyu-programma-udalyaet-iz-operativnoj-pamyati/2023-09-22T09:10:35+00:002023-09-22T09:10:35+00:00Какую информацию программа удаляет из оперативной памяти [новости] <p>При старте системы Panic Button проверяет наличие поддерживаемых продуктов, предназначенных для создания криптоконтейнеров и шифрования разделов, а также менеджеров паролей. Особенности работы данных продуктов заключаются в том, что ключи шифрования хранятся в памяти в открытом виде, и при физическом доступе к банкам оперативной памяти или образу RAM ключ можно получить с помощью специального криминалистического ПО. Кроме того, приложения шифрования не могут предотвратить кэширование паролей, а также содержимого ваших открытых файлов, так как после открытия они хранятся в памяти в незашифрованном виде. </p><p><br></p><p>Первая задача Panic Button при очистке памяти − безопасное очищение ключей. После этого блокируется клавиатура, отключается монитор и операционная система штатно завершает работу. При штатном завершении происходит полная очистка оперативной памяти.</p><br/><br/> decaprio bob ответил(а):<br/><p>The benefit of a POS system is Efficient Order Processing .A POS system allows your staff to take orders quickly and accurately. With a few taps on the screen, orders are transmitted directly to the kitchen, reducing the chances of errors and ensuring prompt service.</p><p><a href="https://softwaretribune.blogspot.com/2023/07/benefits-pos-system-restaurant.html">https://softwaretribune.blogspot.com/2023/07/benefits-pos-system-restaurant.html</a></p>Developerhttps://cyberyozh.userecho.com/users/15-developer/topics/tag:cyberyozh.userecho.com,2023-06-24:/knowledge-bases/2/articles/1166-what-limitations-does-the-trial-version-of-the-application-have/2023-06-24T17:40:33+00:002023-06-24T17:40:33+00:00What limitations does the trial version of the application have? [новости] <p>The trial version of the application can be used by a user only once within 14 (fourteen) days. In the trial version the user doesn’t have access to some options such as sending alerts in the event of panic activation, the deletion of data and files, logic bomb.<br></p><br/><br/> faadi 369 ответил(а):<br/><p>These <a href="https://ebrsoftware.com/trading-erp-software-in-dubai/">Trading ERP Software Dubai</a> solutions can help streamline operations, improve efficiency, provide better visibility, and enable data-driven decision-making. When choosing the right software, consider features such as customization, integration, scalability, and user-friendliness. With reliable support and reliable features, these software solutions can help your business stay ahead of the competition and maximize profits.</p>Supporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2020-04-02:/communities/6/topics/1737-ne-mogu-aktivirovat-programmu/2020-04-02T06:59:05+00:002020-04-02T06:59:05+00:00Не могу активировать программу ! [идеи] <p>Пишет на вашем устройсвпе заблокированно активация !</p><br/><br/>предложил(а): антонеантонеhttps://cyberyozh.userecho.com/users/252-antone/topics/tag:cyberyozh.userecho.com,2020-01-19:/communities/6/topics/1736-1/2020-01-19T18:17:46+00:002020-01-19T18:17:46+00:001 [идеи] <p>здравствуйте, добавьте пожалуйста в продажу лицензии на 30 дней</p><br/><br/>предложил(а): mariasarychevvamariasarychevvahttps://cyberyozh.userecho.com/users/243-mariasarychevva/topics/tag:cyberyozh.userecho.com,2019-12-22:/communities/6/topics/1733-bot-ataka/2019-12-22T12:03:02+00:002019-12-22T12:03:02+00:00Бот-атака [вопросы] <p>Здравствуйте, как избавится от бот-атак по RDP?</p><p>Какие программы можно использовать ?</p><br/><br/>предложил(а): Николай ГильНиколай Гильhttps://cyberyozh.userecho.com/users/233-nikolaj-gil/topics/tag:cyberyozh.userecho.com,2019-12-15:/communities/6/topics/1731-tor-v-os-tails-i-whonix/2019-12-15T19:52:22+00:002019-12-15T19:52:22+00:00Tor в ОС Tails и Whonix [вопросы] <p>Добрый день!</p><p></p><p>Tails и Whonix используют Тор. Я читал, что достаточно один раз выйти в сеть через Тор и сразу попадаешь под особый контроль спецслужб. Так ли это?</p><br/><br/>предложил(а): RubikRubikhttps://cyberyozh.userecho.com/users/238-rubik/topics/tag:cyberyozh.userecho.com,2018-12-03:/knowledge-bases/2/articles/1580-how-to-upload-crash-report/2018-12-03T04:09:42+00:002018-12-03T04:09:42+00:00How to upload crash report [новости] <p>While investigating the reasons of application errors CyberYozh engineers may require additional information, especially if the error is a critical priority, like the application crash (termination of the application process). Such information can be a dump of application memory existed in the moment of crash, so-called crash-dump, which is created after abnormal program termination. If our engineers need this kind of information to investigate the error, technical support specialist would ask you to perform some additional steps, and provide URL for uploading necessary information.</p><p><br></p><figure><img src="/s/attachments/18063/2/15/284d2ca9a22904c84b5b5e1dfdf1d87f.png"></figure><p></p><p>In order to detect and upload application crash report, you need to create one more special ticket in Technical Support application (not in the website form!), see also <a href="https://support.cyberyozh.com/knowledge-bases/2/articles/1213-how-to-submit-a-panic-button-support-ticket-using-application"><strong>How to submit a Panic Button Support ticket using application</strong></a>, select “Bugs and vulnerabilities” category, and provide any significant detail of application crash in the error description text field.<br></p><figure><img src="/s/attachments/18063/2/15/8f83ee26a04c7be285815af19d86ee6a.png"></figure><p></p><p>In case of successful support ticket creation you should press “Find crash reports” button. </p><p></p><figure><img src="/s/attachments/18063/2/15/abb67435df534c3d0fd61ecf2cfa4a26.png"></figure><p></p><p>You will see the window with two text field (because the application may generate up to two reports at a time). Press “Detect” button, and you see the path to the crash reports in one of the fields, or two paths in both. Paths could be copied to the Clipboard pressing “Copy” button, and then you should follow instructions of technical support engineer to upload it to our website. </p><br/><br/>предложил(а): DeveloperDeveloperhttps://cyberyozh.userecho.com/users/15-developer/topics/tag:cyberyozh.userecho.com,2018-12-03:/knowledge-bases/2/articles/1187-kak-zagruzit-otchet-o-padenii-prilozheniya/2018-12-03T03:12:13+00:002018-12-03T03:12:13+00:00Как загрузить отчет о падении приложения [новости] <p>При исследовании причин ошибок в программе сотрудникам CyberYozh может понадобится дополнительная информация, особенно если ошибка принадлежит к категории критических, таких как падение (аварийное завершение) приложения. Такой информацией является полный слепок памяти (крэш-дамп) приложения, который создается в момент эго завершения. Если эта информация понадобится нашим инженерам, сотрудник технической поддержки свяжется с вами, предоставит адрес для загрузки файлов отчета о падении и попросит выполнить ряд дополнительных действий.<br></p><figure><img src="/s/attachments/18063/2/15/cff7a2210df0c305ba4c935d7e580938.png"></figure><p></p><p>Для обнаружения и отправки отчета о падении необходимо создать специальное обращение в техническую поддержку из приложения (см. <a href="https://support.cyberyozh.com/knowledge-bases/2/articles/1213-sozdanie-obrascheniya-v-sluzhbu-podderzhki-panic-button-cherez-programmu">Создание обращения в службу поддержки Panic Button через программу</a>), выбрать категорию “Ошибки и уязвимости”, и в поле описания указать, что вы отправляете отчет о падении приложения. </p><figure><img src="/s/attachments/18063/2/15/a4a6958f83201e5287b9dd261e3ad0ce.png"></figure><p><br><br>В случае успешного создания в окне уведомления об успешном создании необходимо нажать на кнопку “Найти отчеты об ошибках”. </p><p></p><figure><img src="/s/attachments/18063/2/15/77f087cede90dc6df7721cd49e1a086d.png"></figure><p></p><p>Откроется окно с двумя полями (приложение может генерировать до двух отчетов). Необходимо нажать на кнопку “Обнаружить”, и если отчеты о падении присутствуют в системе, путь до них отобразится в одном из полей (или в обоих). Пути до отчетов можно скопировать по кнопке “Копировать”, и далее загрузить на наш сайт, следуя инструкциям сотрудника технической поддержки. </p><p></p><br/><br/>предложил(а): DeveloperDeveloperhttps://cyberyozh.userecho.com/users/15-developer/topics/tag:cyberyozh.userecho.com,2018-11-10:/communities/6/topics/1447-adamant-messenger-pervyij-detsentralizovanyij-messendzher-vyistupayuschij-za-zaschitu-vseh/2018-11-10T13:51:57+00:002018-11-10T13:51:57+00:00ADAMANT Messenger — первый децентрализованый мессенджер, выступающий за защиту всех пользовательских данных и их анонимности. [вопросы] [на рассмотрении]<p>Здравствуйте, Ежики и Ежевики!<br>Хотелось бы услышать ваше мнение об одном инновационном блокчейн-проекте <a href="https://adamant.im/ru/">ADAMANT Messenger</a>. <br>Ниже я приведу несколько фактов об этом мессенджере и ссылки на официальные источники АДАМАНТа, из которых, позже, хотелось бы услышать небольшие комментарии по проекту от специалистов по кибербезопасности, включая участников CyberYozh.</p><br> 1. Регистрация в АДАМАНТе не требует вообще никаких личных данных пользователей. Вы получаете специально сгенерированную passphrase из 10-15 слов, и будущие авторизации требуют только эту пассфразу. Никаких электронных почт и, тем более, телефонных номеров (безумие). Регистрация и аккаунты полностью анонимны. Passphrase — один из наиболее удобных способов регистрации и входа в аккаунт, активно используемый преимущественным большинством криптовалютных кошельков. <br>Эта технология обеспечивает каждому пользователю возможность по-настоящему анонимного использования мессенджера. Создать аккаунт в один клик, получив пассфразу и начать использование мессенджера вы всегда можете в веб-версии АДАМАНТа — <a href="https://msg.adamant.im/">https://msg.adamant.im/</a> (также доступны iOS и Android версии приложения)<br><br>2. Рабочая сеть АДАМАНТа полностью децентрализована. Это свой собственный блокчейн. АДАМАНТ не имеет никаких централизованых серверов. Зашифрованая информация о сообщениях (блокчейн) хранится на полных узлах (Nodes) на каждом континенте. Эти узлы может устанавливать каждый желающий, способствуя децентрализации сети мессенджера. Карту уже работающих Nodes можно увидеть <a href="https://explorer.adamant.im/networkMonitor">здесь</a>. <br>Также АДАМАНТ имеет своих "майнеров" или Delegates. Коротко о том, как это всё функционирует можно прочесть в <a href="https://medium.com/@adamant.im">Medium-блоге</a> АДАМАНТа или в статье о разработке <a href="https://medium.com/adamant-im/fair-dpos-delegate-system-goes-live-join-channel-for-delegates-to-discuss-adamant-plans-3dc794635cec">Fair Delegate Proof of Stake</a>.<br><br>3. АДАМАНТ имеет полностью открытый код на <a href="https://github.com/adamant-im">GitHub</a> и финансирование только за счет проведения ICO. <br><br>Это были три основопологающих факта о мессенджере. Больше информации вы можете изучить из следующих источников: <br><br>Официальный сайт АДАМАНТа — <a href="https://adamant.im/ru/">https://adamant.im/ru/</a><br>Белая книга АДАМАНТа на русском — <a href="https://adamant.im/whitepaper/adamant-whitepaper-ru.pdf">https://adamant.im/whitepaper/adamant-whitepaper-ru.pdf</a><br>Интервью в блоге LISK — <a href="http://blog.lisk.io/future-in-focus-adamant-messenger-99155e72d2f5">blog.lisk.io/future-in-focus-adamant-messenger-99155e72d2f5<br></a>Bitcointalk — <a href="https://bitcointalk.org/index.php?topic=2626754">https://bitcointalk.org/index.php?topic=2626754</a><br><br>Буду рад услышать ваши мысли и комментарии насчет проекта, его уровня безопасности и анонимности. <br>Спасибо!!<br><br><figure><img src="/s/attachments/18063/6/77/bea96a4940de683eaf98d511226d9739.png"></figure><br><br><br/><br/> Support ответил(а):<br/><p>Увидел, изучу.</p>Yan Brale, ADAMANT TECH LABS Lhttps://cyberyozh.userecho.com/users/77-yan-brale-adamant-tech-labs-l/topics/tag:cyberyozh.userecho.com,2018-06-07:/knowledge-bases/2/articles/1320-vozmozhno-li-zapustit-dve-programmyi-panic-button-v-ramkah-odnoj-sistemyi/2018-06-07T12:43:09+00:002018-06-07T12:43:09+00:00Возможно ли запустить две программы Panic Button в рамках одной системы? [новости] <p>Нет, это невозможно, даже если они установлены от разных пользователей в рамках одной операционной системы. К сожалению, Panic Button на текущем этапе развития проекта не поддерживает многопользовательский режим. </p><p>При установке программы от имени нового пользователя она перестанет работать у предыдущего пользователя. </p><p>Если у вас на компьютере установлены две операционные системы, вы можете на каждую из них установить Panic Button при условии их соответствия требованиям программы.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2018-04-21:/knowledge-bases/2/articles/1145-kakie-sistemnyie-trebovaniya-u-panic-button/2018-04-21T10:23:28+00:002018-04-21T10:23:28+00:00Какие системные требования у Panic Button [новости] <p>Операционная система Windows 7 SP1 и старше, Windows 8, Windows 10, система должна иметь последние обновления, процессор 1 GHz и выше, оперативная память 512 МБ и выше, 100 МБ на жестком диске.</p><br/><br/> Анонимный ответил(а):<br/>Supporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2018-01-03:/knowledge-bases/2/articles/1216-how-to-update-panic-button/2018-01-03T22:41:42+00:002018-01-03T22:41:42+00:00How to update Panic Button [новости] <p>A timely update is required to ensure the program is running properly and you are adequately protected. By default, the program independently checks for available updates upon Panic Button’s launch and offers a user to install them.</p><p><br></p><p><img src="/s/attachments/18063/2/1/d37b48f2d6df69ba679b666d09bb19e5.png"></p><p><br></p><p><br></p><p><img src="/s/attachments/18063/2/1/27156a3d8647da6357cf3ad6fcf1dbdd.png"><br></p><p><br></p><p> You can check for updates on your own. To do this, in the menu select “About Panic Button”. In the window that appears, press “Check for updates”. If there are new updates, the program will offer you to install them.<br></p><p><br></p><p>Upon receiving a notification of a new update, you can select “Don’t remind me” and skip the update (highly not recommended) or choose “Remind me later” – in this case the program will remind you about the update with the next launch of the system or in 24 hours, whichever comes first. </p><p><br></p><p><img src="/s/attachments/18063/2/1/cb462186ce4e83664a18300997db95e5.png"><br></p><p><br></p><p><br></p><p> If you select “Download”, the system will begin downloading the update and then automatically installing it. If for some reason the update process has been interrupted or the installation hasn’t begun, repeat your request for update and installation again.</p><p><br></p><p><img src="/s/attachments/18063/2/1/c58954f317667141ab99c97d356fc65f.png"><br></p><p><br></p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-12-29:/knowledge-bases/2/articles/1152-setting-up-a-logic-bomb/2017-12-29T20:26:40+00:002017-12-29T20:26:40+00:00Setting up a logic bomb [новости] <p>Upon the initial setup of Panic Button (with the first launch after the installation), while setting up a logic bomb, select the option “Activate logic bomb”. The application will suggest you create a shortcut for Panic Button deactivation. Create it, rename it and keep it in a reliable place. </p><p><br></p><p><img src="/s/attachments/18063/2/1/dd129a16eaff004af49acdeb488f2458.png"></p><p><br></p><p>Enter the criteria to be met for triggering the logic bomb: logging in only or the system boot or any unlocking of the system. </p><p><br></p><p>Choose the time for the activation of the logic bomb – the time after Panic Button’s launch (given the standard settings, Panic Button triggers immediately after the system’s boot) or the time after the exit from the lock screen during which you need to activate the logic bomb. We do not recommend new users set the timer for less than 30 seconds, and with slow-booting computers – for less than 60 seconds. </p><p><br></p><p>You can set the deactivation of the logic bomb by using a keyboard shortcut. To achieve this, select the option “Use keyboard shortcut for logic bomb deactivation” and enter the necessary combination. </p><p><br></p><p>You can enter the time prior the activation of the bomb when you will see the countdown timer on the computer screen. This is an additional reminder of the need to deactivate the logic bomb. </p><p><br></p><p>If you skipped the initial setup, you can always turn on the logic bomb in the <a href="https://support.cyberyozh.com/forums/2-panic-button/topics/1146-kak-nastroit-panic-button/">application settings</a>. To achieve this, click the Panic Button icon in the system tray and go to the settings. Please be aware that with the Camouflage mode on, the icon in the tray may be changed. </p><p><br></p><p><img src="/s/attachments/18063/2/1/bb223c3ecbf7fc53eb9884fb3086d19d.png"></p><p><br></p><p>To learn more about how the Panic Button logic bomb works, go <a href="https://support.cyberyozh.com/forums/2-panic-button/topics/1159-how-logical-bomb-works/">here</a>.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-12-29:/knowledge-bases/2/articles/1159-how-logic-bomb-works/2017-12-29T20:23:14+00:002017-12-29T20:23:14+00:00How logic bomb works [новости] <p>Panic Button’s logicl bomb sets off the automatic panic activation when certain conditions specified by a user are not met: RAM wiping, the deletion of sensitive data, clearing the information about the recently launched programs, viewed images, open documents – all the valuable information that can be accessed by a perpetrator. </p><p><br></p><p>How does the function work precisely? A perpetrator is not aware that after the computer boot or logging in to the system, he is supposed to activate a special file or press a certain keyboard shortcut to turn off the logic bomb. The name and location of the file is known only by the user who set up the logic bomb. </p><p><br></p><p>The unsuspecting perpetrator boots the user’s computer that has the Panic Button application and logic bomb installed. The logic bomb timer starts its countdown. If in a certain period of time specified in the settings the file is not activated or the keyboard shortcut is not used, the panic will be triggered – all the sensitive information will be deleted, the computer shuts down and the owner will get an alert notification. </p><p><br></p><p>This option can be <a href="https://support.cyberyozh.com/forums/2-panic-button/topics/1152-setting-up-a-logic-bomb/">turned on</a>, set up or turned off in the <a href="https://support.cyberyozh.com/forums/2-panic-button/topics/1146-kak-nastroit-panic-button/">application settings</a>. With the automatic activation in logic bomb mode, Panic Button deletes files and information according to the main settings of the application.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-12-29:/knowledge-bases/2/articles/1157-panic-activation-confirmation-works/2017-12-29T20:20:31+00:002017-12-29T20:20:31+00:00Panic activation confirmation works [новости] <p>The confirmation of activation is an option that protects you from an accidental panic activation. If in the standard application settings, after a panic activation, without any warning all the data set will be deleted, with the panic confirmation enabled, the application will show a window where you will need to confirm the activation. The panic will trigger only after the confirmation. </p><p><br></p><p><br></p><p><img src="/s/attachments/18063/2/1/026bdeb34f9f04f7c45e4ab592d243f8.png"></p><p><br></p><p>This option doesn’t work with the activation of the application in logic bomb mode. To learn how to set up the confirmation of activation, go <a href="https://support.cyberyozh.com/forums/2-panic-button/topics/1147-kak-nastroit-dvojnoe-podtverzhdenie-paniki/">here</a>.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-12-29:/knowledge-bases/2/articles/1156-activating-panic/2017-12-29T20:20:02+00:002017-12-29T20:20:02+00:00Activating panic [новости] <p>There are several ways of activating panic:</p><p><br></p><ol><li>Double-click the Panic Button icon on your desktop.</li></ol><p> 2. In the application menu in the system tray select “Panic”.</p><p><br></p><p><img src="/s/attachments/18063/2/1/e0a9cc6d710ab0aad36254ec63d4d219.png"><br></p><p><br></p><p>Please be aware that if you have the <a href="https://support.cyberyozh.com/forums/2-panic-button/topics/1154-setting-panic-button-camouflage-mode/">Camouflage mode</a> turned on, the icon of the application may be different from the icon on the images. </p><p><br></p><p> 3. Use the keyboard shortcut you have selected before if the given <a href="https://support.cyberyozh.com/forums/2-panic-button/topics/1148-creating-a-keyboard-shortcut-to-activate-panic/">option</a> is turned on.</p><p>If you selected the double confirmation option, you will be required to confirm it for panic activation in the window that will appear.</p><p><br></p><p> 4. The automation activation option in <a href="https://support.cyberyozh.com/forums/2-panic-button/topics/1152-setting-up-a-logical-bomb/">logic bomb mode</a>.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-12-29:/knowledge-bases/2/articles/1161-how-panic-button-protects-you-from-unsanctioned-access/2017-12-29T20:19:38+00:002017-12-29T20:19:38+00:00How Panic Button protects you from unsanctioned access [новости] <p>Panic Button offers the function of a logic bomb that triggers the activation of the application in the event of unsanctioned physical access to the system. </p><p><br></p><p>The activation of Panic Button leads to RAM wiping, the deletion of the files and encrypted file-hosted volumes selected by a user, clearing the information about the recently launched programs, viewed images, open documents and shutdown of the computer. You can adjust Panic Button’s parameters in the application settings.</p><p><br></p><p>If a perpetrator got unsanctioned access to your computer, he or she is not aware of the logic bomb in place – a special disguised shortcut (or the keyboard shortcut chosen in the settings) that must be pressed after the boot or unlocking of the system. The access to the information is now opened, and though it seems that nothing spells trouble, the logical bomb timer is already counting down. </p><p><br></p><p>The timer selected in the settings will count down to X – the panic will be triggered, and the perpetrator will be left with nothing. You and the people whose contacts were added in the settings will get an <a href="https://support.cyberyozh.com/forums/2-panic-button/topics/1149-setting-alert-notifications-to-email-and-xmpp-jabber/">alert notification</a>. </p><p><br></p><p>To learn about how to set up a logical bomb, go <a href="https://support.cyberyozh.com/forums/2-panic-button/topics/1152-setting-up-a-logic-bomb/">here</a>.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-12-28:/knowledge-bases/2/articles/1213-how-to-submit-a-panic-button-support-ticket-using-application/2017-12-28T19:15:15+00:002017-12-28T19:15:15+00:00How to submit a Panic Button Support ticket using application [новости] <p>You can create a support ticket using the website <a href="http://panicbutton.pw/">panicbutton.pw</a>, by pressing the button “Create ticket”. In this event you resort to an alternate way of submitting your support request via the application you installed on your computer. </p><p><br></p><p>Creating a Panic Button support ticket via the application offers two significant advantages: </p><p><br></p><ul><li>The ticket will automatically contain the information about the unique identifier of your license which will allow the technical support specialist to quickly find all the information about your license. </li><li>You can automatically add the log of the application which will enable the support specialist to help and resolve your issue faster.</li></ul><p>In the system tray select the Panic Button icon and then “About”. </p><p><br></p><p><img src="/s/attachments/18063/2/1/9b214a683d7214efddc96e4bb34cd4ab.png"></p><p><br></p><p>In the window that opens, select “Create ticket”.<br></p><p><br></p><p><img src="/s/attachments/18063/2/1/3ad04eb3b94a081ae66652b057848e8f.png"><br></p><p><br></p><p><br></p><p>Skip the offer to visit the Knowledge Base, press “Create ticket”.</p><p><br></p><p><img src="/s/attachments/18063/2/1/553b516b29a26b01c29f8ea5b0ed46be.png"><br></p><p><br></p><p><br></p><p>You will see a support ticket form. You are required to fill all the fields. If your request has to do with some error or technical issue, make sure to add a screenshot with the error and the log of the application. This will help the technical staff to get a grasp of your problem and find the appropriate solution.<br></p><p><br></p><p><img src="/s/attachments/18063/2/1/f144c62d90a6593375f5a375dbf9173b.png"><br></p><p><br></p><p><br></p><p>Immediately after you press the button “Send”, you will see a message saying that your ticket has been successfully sent. Also, you will receive an email that contains a link for tracking your ticket, making changes and communicating with technical support. If you haven’t received an email within 5 minutes, check your SPAM folder. If you didn’t find your email in the SPAM filter, contact us at help<a href="mailto:support@cyberyozh.com">@cyberyozh.com</a> describing your problem.</p><p><br></p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-17:/knowledge-bases/2/articles/1150-preventing-email-notifications-from-ending-up-in-the-spam-folder/2017-11-17T14:40:32+00:002017-11-17T14:40:32+00:00Preventing email notifications from ending up in the spam folder [новости] <p><br></p><p>To learn how to add our XMPP (Jabber) address to your address book, go here. </p><p>The majority of providers that offer email services allow to whitelist an email address. Adding our address <a href="mailto:alert@panicbutton.tech">alert@panicbutton.tech</a> to the whitelist guarantees that the alert notification will go through and doesn’t get trapped in the spam folder. </p><p><br></p><p>See below how Gmail and Protonmail users can whitelist our email address. If you use a different provider, contact their technical support for help. </p><hr><p><br></p><p><strong><span style="color: #4f81bd;">Gmail</span></strong></p><p><br></p><p>Go to the web version of Gmail. In the top right open the menu, choose Settings. </p><p><br></p><p><img src="/s/attachments/18063/2/1/a45ac10f503a92a9c3316bfca233a646.png"><br></p><p><br></p><p><br></p><p>Open the tab Filters and Blocked addressed > Create a filter. Enter our email address <a href="mailto:alert@panicbutton.tech">alert@panicbutton.tech</a> as the filter criteria to be met, then click “Create filter with this search”. </p><p><br></p><p><img src="/s/attachments/18063/2/1/8a9cbf3eae10ec9fb203062f1535c6a2.png"><br></p><p><br></p><p><br></p><p><img src="/s/attachments/18063/2/1/34e8be490d951805adf1641e192e3db7.png"><br></p><p><br></p><p><br></p><p>Choose the options “Not Spam” and “Always mark as important” and create a filter. </p><p><br></p><p><img src="/s/attachments/18063/2/1/144fcbc7b54a4436ecdab23fa2373242.png"><br></p><p><br></p><hr><p><br></p><p><span style="color: #4f81bd;"><strong>Protonmail</strong></span></p><p><br></p><p>Go to Settings>Filters</p><p><br></p><figure><img src="/s/attachments/18063/2/1/f9315faf41d3f29a892dd6d21afdfc64.png"></figure><p><br></p><p><br></p><p>In the Spam Filters block, enter our email <a href="mailto:alert@panicbutton.tech">alert@panicbutton.tech</a>, click ADD and Whitelist it. </p><p><br></p><figure><img src="/s/attachments/18063/2/1/39e5313c22616c84f125edcd55a8eed4.png"></figure><p><br></p><p>Our email address must appear on the Whitelist.<br></p><p><br></p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-16:/knowledge-bases/2/articles/1155-setting-data-deletion/2017-11-16T12:25:40+00:002017-11-16T12:25:40+00:00Setting data deletion [новости] <p>Upon the initial setup of Panic Button (with the first launch after the installation), in the window “Data deletion” select the items that you want to delete. Panic Button is capable of deleting data about the recently opened programs, documents, images, history of visited websites and saved passwords in browsers Google Chrome, Chromium, Mozilla Firefox, Opera, Yandex.Browser and Edge.</p><p><br></p><p><img src="/s/attachments/18063/2/1/edcd2d51cab8c5d10b7dfdf26298a531.png"><br></p><p><br></p><p><br></p><p>Panic Button allows to add user files that will be deleted upon the panic activation. Press “Add” and select the files that you want to delete. We do not recommend you choose un-encrypted files over 150 MB as their reliable deletion may take a considerable amount of time. If you need to delete large volumes of data, add it to a file-hosted encrypted volume. You don’t have to delete a file-hosted encrypted volume, it can be just destructed to an unrecoverable state.</p><p><br></p><p>The added files will appear on the list of the items to be deleted. </p><p><br></p><p><img src="/s/attachments/18063/2/1/0ca7794c69cb869af6b18e6f04cfe552.png"></p><p><br></p><p>If you skipped the initial setup of Panic Button, you can always set your data deletion in the <a href="https://support.cyberyozh.com/forums/2-panic-button/topics/1146-kak-nastroit-panic-button/">application settings</a>. To achieve this, click the Panic Button icon in the tray and go to the settings. Please be aware that with the Camouflage mode on, the icon in the tray may be changed.</p><p> </p><p><img src="/s/attachments/18063/2/1/3d536f9eca3804e896fd4a3e922cedfa.png"><br></p><p><br></p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-16:/knowledge-bases/2/articles/1153-setting-panic-button-to-everyday-file-hosted-encrypted-volumes-security/2017-11-16T11:40:49+00:002017-11-16T11:40:49+00:00Setting Panic Button to everyday file-hosted encrypted volumes security [новости] <p>Upon the initial setup of Panic Button (with the first launch after the installation), while setting “Everyday security”, select the options:</p><p><br></p><p>Safely unmount file-hosted encrypted volumes when going into the sleep mode</p><p>Safely unmount file-hosted encrypted volumes upon shutdown</p><p>Clean up the swap file upon shutdown (reboot required)</p><p><br></p><p><img src="/s/attachments/18063/2/1/21b22742879d52aae63ef2a38a3493f5.png"><br></p><p><br></p><p>Or go to the <a href="https://support.cyberyozh.com/forums/2-panic-button/topics/1146-kak-nastroit-panic-button/">application settings</a> and in the block “File-hosted volumes security” select the options:</p><p><br></p><p>Safely unmount file-hosted encrypted volumes when going into the sleep mode</p><p>Safely unmount file-hosted encrypted volumes upon shutdown</p><p>Clean up the swap file upon shutdown (reboot required)</p><p><br></p><p><img src="/s/attachments/18063/2/1/9546658bc758852cb76c57524d249d9c.png"></p><p><br></p><p><br></p><p><br></p><p><br></p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-16:/knowledge-bases/2/articles/1174-how-to-extend-the-license/2017-11-16T11:21:06+00:002017-11-16T11:21:06+00:00How to extend the license [новости] <p>Go to the section “About”. Next to the field showing the expiration of the license, press “Extend”. </p><p><br></p><p><img src="/s/attachments/18063/2/1/a187e61ff592d4c49c3aa135e6c4384d.png"><br></p><p><br></p><p>You will see a license renewal form. To extend your license, purchase the activation key and enter it in the field intended for the key. Your current license will be extended for the activation key validity period. </p><p><br></p><p><img src="/s/attachments/18063/2/1/dfe407bb8a6bedf6a419707536060531.png"><br></p><p><br></p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-16:/knowledge-bases/2/articles/1181-how-to-change-attached-email/2017-11-16T10:25:53+00:002017-11-16T10:25:53+00:00How to change attached email [новости] <p>To change email address attached to your account, click <a href="https://panicbutton.pw/change-email">this link</a> and follow the instructions. Please be aware that to change your email you are required to have access to your current email address.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-16:/knowledge-bases/2/articles/1184-i-didnt-get-a-notification-in-my-xmpp-client/2017-11-16T10:17:12+00:002017-11-16T10:17:12+00:00I didn’t get a notification in my XMPP client… [новости] <p>Check if you provided the correct XMPP address in the application. If you entered the XMPP address correctly, make sure our address was added to the <a href="https://support.cyberyozh.com/forums/2-panic-button/topics/1151-adding-jabber-to-your-address-book/">safe sender list of the contracts</a> who have the right to send you notifications. If your problem persists, contact our customer support.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-16:/knowledge-bases/2/articles/1151-adding-xmpp-client-to-your-address-book/2017-11-16T09:58:08+00:002017-11-16T09:58:08+00:00Adding XMPP client to your address book [новости] <p>To prevent alert notifications from getting caught in the SPAM folder, go <a href="https://support.cyberyozh.com/forums/2-panic-button/topics/1150-preventing-email-notifications-from-ending-up-in-the-spam-folder/">here</a>.</p><p><br></p><p></p><p>Adding contacts to the address book varies for different XMPP clients (Jabber). For instance, a popular IM client PSI will require you to select “Add a contact”, then enter our email <a href="mailto:alert@panicbutton.tech">alert@panicbutton.tech</a>.</p><p></p><p>This is necessary only in the event of active limitations on getting notifications from unauthorized users. You can check if such limitations exist by initiating a test panic with the notifications already set. </p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-15:/knowledge-bases/2/articles/1186-i-want-more-email-addresses-to-get-alert-notifications/2017-11-15T12:26:28+00:002017-11-15T12:26:28+00:00I want more email addresses to get alert notifications [новости] <p>Panic Button users can add up to two email addresses in the application. If you need to alert more people, you can set up forwarding for alert notifications in your email client. </p><p>See below how to set up Gmail forwarding on your computer. </p><p>Click the settings of your mailbox.</p><p><br></p><figure><img src="/s/attachments/18063/2/1/3b62b4c16d891eedf099c3fad66ee2b5.png"></figure><p><br></p><p>Go to the tab “Filters and Blocked Addresses”, then create a filter. </p><p><br></p><figure><img src="/s/attachments/18063/2/1/465db0a0af714abcb38b1181660c3203.png"></figure><p><br></p><p><br></p><p>In the field “from” enter our email address <a href="mailto:alert@panicbutton.tech">alert@panicbutton.tech</a>. Select “Create filter with this search”.</p><p><br></p><figure><img src="/s/attachments/18063/2/1/ebe523e581239b0649ac15b9f240c796.png"></figure><p><br></p><p><br></p><p>Next to the option “Forward” add the email addresses you want to forward. Gmail requires you to confirm the forwarding addresses. After the confirmation you can forward emails to the contacts you just entered. </p><p><br></p><figure><img src="/s/attachments/18063/2/1/ad517194f831706431bef4c909febf1e.png"></figure><p><br></p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-14:/knowledge-bases/2/articles/1170-how-do-i-activate-a-valid-license-on-a-new-computer/2017-11-14T16:03:22+00:002017-11-14T16:03:22+00:00How do I activate a valid license on a new computer? [новости] <p>In Panic Button’s Activation window, select the item “I have got a valid license”. Enter the email address you provided in the activation process, press “Receive confirmation code”. We will send you a confirmation code to your email address. Enter it to activate a valid license on a new device.</p><p><br></p><p><img src="/s/attachments/18063/2/1/d533143ff95242ac730834847334169c.png"></p><p><br></p><p>Remember that a single license can be used only on a single device. By activating a valid license on a new device, you are disabling it on the previously used device.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-13:/knowledge-bases/2/articles/1167-how-do-i-activate-panic-button/2017-11-13T18:58:06+00:002017-11-13T18:58:06+00:00How do I activate Panic Button? [новости] <p>Upon the initial installation the application will suggest you pass the activation. If you skipped the initial setup, you can return to the activation at any moment by selecting “License” in the menu.</p><p>Please be aware that this item of the menu is seen only by the users without a license. If you have a full, trial, valid or expired license, go to the section “About” for license management.</p><p><br></p><p><img src="/s/attachments/18063/2/1/0992218c99484140f90c695f02c16129.png"><br></p><p><br></p><p><br></p><p>Panic Button offers three options to activate the application. </p><p><br></p><p>“Activate full license” – the activation of Panic Button that unlocks access to all the features of the program. To activate it, you need to purchase the activation key, enter it in the respective fields, enter your email address and press the key “Activate”.</p><p>We recommend you enter only your current email address, it is required for transferring your license on a different device.</p><p><br></p><p><img src="/s/attachments/18063/2/1/0edd8aebb9274065016907924070d08b.png"><br></p><p><br></p><p><img src="/s/attachments/18063/2/1/d99364777f89da3934512e83be5e8078.png"></p><hr><p><br></p><p>“I have got a valid license" – this option is required for the users that have a license on a different device and wish to transfer it. To learn more about license transferring, go here.</p><p><br></p><hr><p><br></p><p>“Activate 14 day trial” allows new users to test the main functions of Panic Button within a limited amount of time.<br></p><p><br></p><p>Please be aware that the given activation option is not offered to the users that used it up previously. </p><p><br></p><p><img src="/s/attachments/18063/2/1/36d503d1ecb6d38649d8bcffbbb3424d.png"><br></p><p><br></p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-13:/knowledge-bases/2/articles/1160-how-does-cryptocrash-technology-work/2017-11-13T17:47:01+00:002017-11-13T17:47:01+00:00How does CryptoCrash technology work? [новости] <p>Many of you know that there are two approaches to deleting files: you can either do it in a fast and unreliable way or go slowly but safely. The removal of data in a flash can erase dozens of Gb, but it has one huge disadvantage: it can be just as easily recovered.</p><p><br></p><p>The reliable deletion of data takes time as it requires a drastically different approach and, as a result, manages to erase it to an unrecoverable state. You can delete a 100 Mb file securely, but the deletion of 1 Gb will take you a considerable amount of time, while the reliable deletion of dozens or hundreds of Gb of data - dozens of minutes. This hinges on the type and parameters of your hard disk as well as the erasure algorithm being used. The removal of data on an SDD takes much faster than that of an analogous file on an HDD, and the speed of SDD’s performance can noticeably differ depending on model specifications.</p><p><br></p><p>The CryptoCrash enables you to put large amounts of data in encrypted file-hosted volumes. If you are not familiar with encrypted file-hosted volumes, we have an entire chapter highlighting this theme in our free <a href="https://book.cyberyozh.com">Internet privacy and security course</a>.</p><p><br></p><p>Panic Button is capable of destructing encrypted file hosted volumes in a split second, regardless of their size. An encrypted file-hosted volume gets repeatedly damaged to a useless and unrecoverable state, and the data in it are swiftly deleted. This way Panic Button users can remove dozens, hundreds and even thousands of Gb of sensitive information in seconds permanently so that it cannot be recovered in the future.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-12:/knowledge-bases/2/articles/1154-setting-panic-button-camouflage-mode/2017-11-12T17:47:34+00:002017-11-12T17:47:34+00:00Setting Panic Button Camouflage mode [новости] <p>Upon the initial setup of Panic Button (with the first launch after the installation), while setting the Camouflage mode, select faking the application as a game or word document.</p><p><br></p><p><img src="/s/attachments/18063/2/1/1cd81c297028ece0bc601f69da5dbe7d.png"><br></p><p><br></p><p><br></p><p>Or go to the <a href="https://support.cyberyozh.com/forums/2-panic-button/topics/1146-kak-nastroit-panic-button/">application settings</a> and in the block Camouflage mode select faking the application as a game or word document. </p><p><br></p><p><img src="/s/attachments/18063/2/1/a18bf0f50c9aff5c3cbb1ee19e2c9a47.png"><br></p><p><br></p><p><br></p><p>Please be aware that with the Camouflage mode on, the shortcut and name of the application and the icon in the tray will be changed. </p><p><br></p><p><br></p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-12:/knowledge-bases/2/articles/1149-setting-alert-notifications-to-email-and-xmpp-jabber/2017-11-12T16:17:43+00:002017-11-12T16:17:43+00:00Setting alert notifications to email and XMPP (Jabber) [новости] <p>Upon the initial setup of Panic Button (with the first launch after the installation), while setting notifications, check the option “Activate alert notifications in case of panic” and enter the name of the computer as you see fit. The name can contain letters, a hyphen and underscore and can’t exceed 256 characters; the spaces are not allowed. Then enter not more than two emails and two XMPP (Jabber) addresses that will receive the alerts in the event of panic activation. </p><p><br></p><p><img src="/s/attachments/18063/2/1/2b24c5ef93edc1e7d0918111975d01fa.png"><br></p><p><br></p><p><br></p><p>Or go to the application settings and select the option “Activate alert notifications in case of panic” in the block “Notifications”. Choose the name of the computer as you see fit. The name can contain letters, a hyphen and underscore and can’t exceed 256 characters; the spaces are not allowed. Then enter not more than two emails and two XMPP (Jabber) addresses that will receive the alerts in the event of panic activation. </p><p><br></p><figure><img src="/s/attachments/18063/2/1/6dddbcca7a148ff32b16956bb1236d32.png"></figure><p><span style="color: rgb(192, 80, 77);"><br></span></p><p><span style="color: rgb(192, 80, 77);">We strongly recommend</span> you add our email and XMPP (Jabber) <a href="mailto:panic@panicbutton.pw">panic@panicbutton.pw</a> to your address book. Go here to learn how to do it. <br></p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-11:/knowledge-bases/2/articles/1148-creating-a-keyboard-shortcut-to-activate-panic/2017-11-11T18:50:06+00:002017-11-11T18:50:06+00:00Creating a keyboard shortcut to activate panic [новости] <p>Upon the initial setup of Panic Button (with the first launch after the installation), while setting Hot keys, select the option “Use keyboard shortcut”. Then choose a combination as you see fit, its use will trigger the activation of panic. <br></p><p><br></p><p><img src="/s/attachments/18063/2/1/61e99be353ccf001e4314ce2d48be461.png"><br></p><p><br></p><hr><p><br></p><p>Or go to the <a href="https://support.cyberyozh.com/forums/2-panic-button/topics/1146-kak-nastroit-panic-button/">application settings</a> and choose the option “Use keyboard shortcut” in the block “Panic activation”. Then choose a combination as you see fit, its use will trigger the activation of panic.</p><p><br></p><p><img src="/s/attachments/18063/2/1/63e1688294ff7588edab3f310b3158c4.png"><br></p><p><br></p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-11:/knowledge-bases/2/articles/1147-kak-nastroit-dvojnoe-podtverzhdenie-paniki/2017-11-11T18:41:17+00:002017-11-11T18:41:17+00:00Как настроить двойное подтверждение паники [новости] <p>При первоначальной настройке Panic Button (при первом запуске после установки) на этапе настройки «Горячих клавиш» выберите опцию «Требовать подтверждение».</p><p><br></p><p><img src="/s/attachments/18063/2/1/da35658521daae4bf0296ee5fe7e28c5.png"></p><p><br></p><p><br></p><p><br></p><p>Либо перейдите в <a href="https://support.cyberyozh.com/forums/2-panic-button/topics/1146-kak-nastroit-panic-button/">настройки программы</a> и выберите опцию «Требовать подтверждение» в блоке «Активация паники».</p><p><br></p><p><img src="/s/attachments/18063/2/1/537d7f7bf43d0bc0ef976fe34405bd6b.png"><br></p><p><br></p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-11:/knowledge-bases/2/articles/1185-security-scanner-has-been-unable-to-run-a-scan/2017-11-11T14:44:30+00:002017-11-11T14:44:30+00:00Security scanner has been unable to run a scan… [новости] <p>Unfortunately, we can’t guarantee that the scanner will perform correctly on any device, sometimes the scanner will fail to run a check. This depends only on the specific properties of your system. However, you can find the information on how to manually check every indicator in our free <a href="https://book.cyberyozh.com">Internet privacy and security course</a>.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-11:/knowledge-bases/2/articles/1183-i-didnt-get-an-email-notification/2017-11-11T14:38:08+00:002017-11-11T14:38:08+00:00I didn’t get an email notification… [новости] <p>Check if you provided the correct email in the application. If you entered the email correctly, your email may have got trapped in the Spam folder. If your problem persists, contact our customer support.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-11:/knowledge-bases/2/articles/1182-is-it-legal-to-use-panic-button/2017-11-11T14:35:35+00:002017-11-11T14:35:35+00:00Is it legal to use Panic Button? [новости] <p>We haven’t heard of a case when the legislation of a country forbade to protect your data. The reverse is true, however – neglecting one’s security is getting frowned upon more and more in the world.</p><p>If you doubt the legitimacy of the program, we recommend you consult your legal counsel.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-11:/knowledge-bases/2/articles/1180-i-bought-an-activation-key-off-a-website-outside-of-cyberyozh-and-its-not-working/2017-11-11T14:27:40+00:002017-11-11T14:27:40+00:00I bought an activation key off a website outside of CyberYozh and it’s not working… [новости] <p>We are not responsible for the activation keys sold outside of our official website. Contact the customer support of the website where you purchased your key.</p><p><b></b></p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-11:/knowledge-bases/2/articles/1179-i-lost-access-to-emailforgot-email/2017-11-11T14:26:14+00:002017-11-11T14:26:14+00:00I lost access to email/forgot email… [новости] <p>You are required to access email only when activating the application on a new device or changing the components of your current device (CPU, motherboard, hard disk). Unfortunately, you won’t be able to transfer the application without access to the email address you provided. Your email is the only tool that confirms your right to the license.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-11:/knowledge-bases/2/articles/1178-i-have-lost-my-panic-button-activation-key/2017-11-11T14:25:36+00:002017-11-11T14:25:36+00:00I have lost my Panic Button activation key… [новости] <p>If you have already used your key to activate the application, you will no longer need it. If it was an unactivated key, you can find it by searching your inbox. Try entering “Panic Button” in the search box.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-11:/knowledge-bases/2/articles/1177-i-didnt-get-the-activation-key-by-email/2017-11-11T14:24:01+00:002017-11-11T14:24:01+00:00I didn’t get the activation key by email… [новости] <p>First check to see if our email was caught in the Spam folder. If you didn’t find the email in the Spam, contact us by <a href="mailto:support@cyberyozh.com">help@cyberyozh.com</a>. Describe your problem in your email and we will put our best effort in resolving your issue.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-11:/knowledge-bases/2/articles/1176-can-i-pass-or-resell-my-panic-button-license/2017-11-11T14:22:30+00:002017-11-11T14:22:30+00:00Can I pass or resell my Panic Button license? [новости] <p>We don’t have any limitations on passing Panic Button activation key or reselling it.<br></p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-11:/knowledge-bases/2/articles/1175-how-many-devices-can-i-use-per-license/2017-11-11T14:21:12+00:002017-11-11T14:21:12+00:00How many devices can I use per license? [новости] <p>A single license can be used only on a single device. If you wish to install Panic Button on several devices, you will be required to <a href="https://pay.cyberyozh.com">purchase</a> the respective number of licenses.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-11:/knowledge-bases/2/articles/1173-does-an-unused-activation-key-expire/2017-11-11T14:13:42+00:002017-11-11T14:13:42+00:00Does an unused activation key expire? [новости] <p>An unactivated key expires in 360 days, it must be used until a year from the moment of purchase. After its expiration Panic Button activation key will be ineffective.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-11:/knowledge-bases/2/articles/1169-my-computer-is-not-connected-to-the-internet-how-do-i-activate-the-application/2017-11-11T13:20:10+00:002017-11-11T13:20:10+00:00My computer is not connected to the Internet. How do I activate the application? [новости] <p>Internet connection is mandatory for the activation of Panic Button. The activation of the application without Internet access is impossible to make.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-11:/knowledge-bases/2/articles/1168-how-do-i-purchase-panic-button-activation-key/2017-11-11T13:19:05+00:002017-11-11T13:19:05+00:00How do I purchase Panic Button Activation Key? [новости] <p>Go to the website <a href="http://pay.cyberyozh.com/">pay.cyberyozh.com</a>. Choose the item you wish to buy, the best payment method and enter your email address. Make the payment.</p><p><br></p><figure><img src="/s/attachments/18063/2/1/0986c45e98056d425ef648c89b7f9c24.png"></figure><p><br></p><p><br></p><p>Panic Button Activation Key will be given to you on the website where you will be redirected after your payment is completed and sent to the email address associated with your purchase.</p><p><br></p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-11:/knowledge-bases/2/articles/1165-panic-button-will-remove-sensitive-data-will-i-lose-it-too/2017-11-11T10:13:45+00:002017-11-11T10:13:45+00:00Panic Button will remove sensitive data. Will I lose it too? [новости] <p>Panic Button will securely remove the data and files you specified in the application settings. A comprehensive approach to data security requires you to make backup copies on a regular basis, Panic Button will delete data in the event of an emergency situation or unsanctioned access. You can restore it from your backup copies. </p><p><br></p><p>Learn more about regular backup in our free <a href="https://book.cyberyozh.com">Internet privacy and anonymity course</a>.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-11:/knowledge-bases/2/articles/1164-how-panic-button-protects-from-forensic-analysis/2017-11-11T10:04:23+00:002017-11-11T10:04:23+00:00How Panic Button protects from forensic analysis [новости] <p>Forensic analysis includes the search for sensitive information in RAM and hard disk. Panic Button clears RAM while preliminarily deleting the encryption keys of such programs as TrueCrypt, VeraCrypt, BitLocker and KeePass.</p><p><br></p><p>In addition, Panic Button safely deletes the history of the browser, cookies, saved passwords, the information about open documents, launched programs and viewed images, preventing forensic experts from extracting them. </p><p><br></p><p>Learn more about forensic analysis in our free <a href="https://book.cyberyozh.com">Internet privacy and security course</a>.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/tag:cyberyozh.userecho.com,2017-11-11:/knowledge-bases/2/articles/1163-what-browsers-does-panic-button-run-on/2017-11-11T10:03:20+00:002017-11-11T10:03:20+00:00What browsers does Panic Button run on? [новости] <p>Currently Panic Button can wipe the information from Google Chrome, Chromium, Mozilla Firefox, Opera, Yandex.Browser and Edge.</p><br/><br/>предложил(а): SupportSupporthttps://cyberyozh.userecho.com/users/1-support/topics/