07:30:00 pm , Categories: Computer Tips

Are you being phished?

Link: https://www.malwarebytes.com/phishing/

Read this article from Malwarebytes and then visit the main link to see even more insights to protect you.



Phishing is a method of tricking you into sharing passwords, credit card numbers, and other sensitive information by posing as a trusted institution in an email or phone call.

All about phishing

What is phishing?

Phishing is the crime of deceiving people into sharing sensitive information like passwords and credit card numbers. As with real fishing, there's more than one way to reel in a victim, but one phishing tactic is the most common. Victims receive an email or a text message that imitates (or “spoofs”) a person or organization they trust, like a coworker, a bank, or a Government office. When the victim opens the email or text, they find a scary message meant to overcome their better judgement by filling them with fear. The message demands that the victim go to a website and take immediate action or risk some sort of consequence. 

If users take the bait and click the link, they're sent to an imitation of a legitimate website. From here, they're asked to log in with their username and password credentials. If they are gullible enough to comply, the sign-on information goes to the attacker, who uses it to steal identities, pilfer bank accounts, and sell personal information on the black market.

“Phishing is the simplest kind of cyberattack and, at the same time, the most dangerous and effective.”

Unlike other kinds of online threats, phishing does not require particularly sophisticated technical expertise. In fact, according to Adam Kujawa, Director of Malwarebytes Labs, “Phishing is the simplest kind of cyberattack and, at the same time, the most dangerous and effective. That is because it attacks the most vulnerable and powerful computer on the planet: the human mind.” Phishers are not trying to exploit a technical vulnerability in your device's operation system—they're using “social engineering. From Windows and iPhones, to Macs and Androids, no operating system is completely safe from phishing, no matter how strong its security is. In fact, attackers often resort to phishing because they can't find any technical vulnerabilities. Why waste time cracking through layers of security when you can trick someone into handing you the key? More often than not, the weakest link in a security system isn't a glitch buried in computer code, it's a human being who doesn't double check where an email came from.

The latest phishing news

Bad romance: catphishing explained
A new kind of Apple phishing scam
Compromised LinkedIn accounts used to send phishing links via private message and InMail

History of phishing

The origin of the name “phishing” is easy enough to trace. The process of performing a phishing scam is much like actual, aquatic fishing. You assemble some bait designed to deceive your victim, then you cast it out and hope for a bite. As for the digraph “ph” replacing the “f,” it could be the result of a portmanteau of “fishing” and “phony,” but some sources point back to another possible origin.

In the 1970s, a subculture formed around the practice of using low-tech hacks to exploit the telephone system. These early hackers were called “phreaks”—a combination of “phone” and “freaks.” At a time when there weren't many networked computers to hack, phreaking was a common way to make free long-distance calls or reach unlisted numbers.

“Phishing is the simplest kind of cyberattack and, at the same time, the most dangerous and effective.”

Even before the actual “phishing” term took hold, a phishing technique was described in detail in a paper and presentation delivered to the 1987 International HP Users Group, Interex.

The use of the name itself is first attributed to a notorious spammer and hacker in the mid-1990s, Khan C Smith. Also, according to Internet records, the first time that phishing was publicly used and recorded was on January 2, 1996. The mention occurred in a Usenet newsgroup called AOHell. At the time, America Online (AOL) was the number one provider of Internet access, with millions of log-ons daily.

Naturally, AOL's popularity made it a target for fraudsters. Hackers and software pirates used it to communicate with one another, as well as to conduct phishing attacks on legitimate users. When AOL took steps to shut down AOHell, the attackers turned to other techniques. They sent messages to AOL users claiming to be AOL employees and asked people to verify their accounts and hand over billing information. Eventually, the problem grew so bad that AOL added warnings on all email and instant messenger clients stating "no one working at AOL will ask for your password or billing information."

“Social networking sites became a prime phishing target.”

Going into the 2000s, phishing turned its attention to exploiting online payment systems. It became common for phishers to target bank and online payment service customers, some of whom—according to subsequent research—might have even been accurately identified and matched to the actual bank they used. Likewise, social networking sites became a prime phishing target, attractive to fraudsters since personal details on such sites are useful for identity theft.

Criminals registered dozens of domains that spoofed eBay and PayPal well enough that they passed for the real thing if you weren't paying close enough attention. PayPal customers then received phishing emails (containing links to the fake website), asking them to update their credit card numbers and other personally identifiable information. The first known phishing attack against a bank was reported by The Banker (a publication owned by The Financial Times Ltd.) in September 2003.

By the mid-2000s, turnkey phishing software was readily available on the black market. At the same time, groups of hackers began to organize in order to orchestrate sophisticated phishing campaigns. Estimated losses due to successful phishing during this time vary, with a 2007 report from Gartner stating that as many as 3.6 million adults lost $3.2 billion between August 2006 and August 2007.

“In 2013, 110 million customer and credit card records were stolen from Target customers.”

In 2011, phishing found state sponsors when a suspected Chinese phishing campaign targeted Gmail accounts of highly ranked officials of the United States and South Korean governments and militaries, as well as Chinese political activists.

In perhaps the most famous event, in 2013, 110 million customer and credit card records were stolen from Target customers, through a phished subcontractor account.

Even more infamous was the phishing campaign launched by Fancy Bear (a cyber espionage group associated with the Russian military intelligence agency GRU) against email addresses associated with the Democratic National Committee in the first quarter of 2016. In particular, Hillary Clinton's campaign manager for the 2016 presidential election, John Podesta, had his Gmail hacked and subsequently leaked after falling for the oldest trick in the book—a phishing attack claiming that his email password had been compromised (so click here to change it).

In 2017, a massive phishing scam tricked Google and Facebook accounting departments into wiring money, a total of over $100 million, to overseas bank accounts under the control of a hacker.

Types of phishing attacks

Despite their many varieties, the common denominator of all phishing attacks is their use of a fraudulent pretense to acquire valuables. Some major categories include:

Spear phishing

While most phishing campaigns send mass emails to as many people as possible, spear phishing is targeted. Spear phishing attacks a specific person or organization, often with content that is tailor made for the victim or victims. It requires pre-attack reconnaissance to uncover names, job titles, email addresses, and the like. The hackers scour the Internet to match up this information with other researched knowledge about the target's colleagues, along with the names and professional relationships of key employees in their organizations. With this, the phisher crafts a believable email.

For instance, a fraudster might spear phish an employee whose responsibilities include the ability to authorize payments. The email purports to be from an executive in the organization, commanding the employee to send a substantial payment either to the exec or to a company vendor (when in fact, the malicious payment link sends it to the attacker).

Spear phishing is a critical threat to businesses (and governments), and it costs plenty. According to a 2016 report of a survey on the subject, spear phishing was responsible for 38% of cyberattacks on participating enterprises during 2015. Plus, for the U.S. businesses involved, the average cost of spear phishing attacks per incident was $1.8 million.

“A verbose phishing email from someone claiming to be a Nigerian prince is one of the Internet's earliest and longest-running scams.”

Clone phishing

In this attack, criminals make a copy—or clone—of previously delivered but legitimate emails that contain either a link or an attachment. Then, the phisher replaces the links or attached files with malicious substitutions disguised as the real thing. Unsuspecting users either click the link or open the attachment, which often allows their systems to be commandeered. Then the phisher can counterfeit the victim's identity in order to masquerade as a trusted sender to other victims in the same organization.

419/Nigerian scams

A verbose phishing email from someone claiming to be a Nigerian prince is one of the Internet's earliest and longest-running scams. According to Wendy Zamora, Head of Content at Malwarebytes Labs, “The Nigerian prince phish comes from a person claiming to be a government official or member of a royal family who needs help transferring millions of dollars out of Nigeria. The email is marked as ‘urgent' or ‘private,' and its sender asks the recipient to provide a bank account number for safekeeping the funds.”

In a hilarious update of the classic Nigerian phishing template, British news website Anorak reported in 2016 that it received an email from a certain Dr. Bakare Tunde, who claimed to be the project manager of astronautics for Nigeria's National Space Research and Development Agency. Dr. Tunde alleged that his cousin, Air Force Major Abacha Tunde, had been stranded on an old Soviet space station for more than 25 years. But for only $3 million, Russian space authorities could mount a flight to bring him home. All the recipients had to do was send in their bank account information in order to transfer the needed amount, for which Dr. Tunde will pay a $600,000 fee.

Incidentally, the number "419" is associated with this scam. It refers to the section of the Nigerian Criminal Code dealing with fraud, the charges, and penalties for offenders.

Phone phishing

With phone-based phishing attempts, sometimes called voice phishing or “vishing,” the phisher calls claiming to represent your local bank, the police, or even the IRS. Next, they scare you with some sort of problem and insist you clear it up immediately by sharing your account information or paying a fine. They usually ask that you pay with a wire transfer or with prepaid cards, so they are impossible to track.

SMS phishing, or “smishing,” is vishing's evil twin, carrying out the same kind of scam (sometimes with an embedded malicious link to click) by means of SMS texting.

“The email makes an offer that sounds too good to be true.”

How to identify a phishing attack

Recognizing a phishing attempt isn't always easy, but a few tips, a little discipline, and some common sense will go a long way. Look for something that's off or unusual. Ask yourself if the message passes the “smell test.” Trust your intuition, but don't let yourself get swept up by fear. Phishing attacks often use fear to cloud your judgement.

Here are a few more signs of a phishing attempt:

The email makes an offer that sounds too good to be true. It might say you've won the lottery, an expensive prize, or some other over-the-top item.  

  • You recognize the sender, but it's someone you don't talk to. Even if the sender's name is known to you, be suspicious if it's someone you don't normally communicate with, especially if the email's content has nothing to do with your normal job responsibilities. Same goes if you're cc'd in an email to folks you don't even know, or perhaps a group of colleagues from unrelated business units.
  • The message sounds scary. Beware if the email has charged or alarmist language to create a sense of urgency, exhorting you to click and “act now” before your account is terminated. Remember, responsible organizations do not ask for personal details over the Internet.
  • The message contains unexpected or unusual attachments. These attachments may contain malware, ransomware, or another online threat.
  • The message contains links that look a little off. Even if your spider sense is not tingling about any of the above, don't take any embedded hyperlinks at face value. Instead, hover your cursor over the link to see the actual URL. Be especially on the lookout for subtle misspellings in an otherwise familiar-looking website, because it indicates fakery. It's always better to directly type in the URL yourself rather than clicking on the embedded link.

Here's an example of a phishing attempt that spoofs a notice from PayPal, asking the recipient to click on the “Confirm Now” button. Mousing over the button reveals the true URL destination in the red rectangle.

Here's another phishing attack image, this time claiming to be from Amazon. Note the threat to close the account if there's no response within 48 hours.

Clicking on the link leads you to this form, inviting you to give away what the phisher needs to plunder your valuables:

How do I protect myself against phishing?

As stated previously, phishing is an equal opportunity threat, capable of showing up on desktops, laptops, tablets, and smartphones. Most Internet browsers have ways to check if a link is safe, but the first line of defense against phishing is your judgement. Train yourself to recognize the signs of phishing and try to practice safe computing whenever you check your email, read Facebook posts, or play your favorite online game.

Once again from our own Adam Kujawa, here are a few of the most important practices to keep you safe:

  • Don't open e-mails from senders you are not familiar with.
  • Don't ever click on a link inside of an e-mail unless you know exactly where it is going.
  • To layer that protection, if you get an e-mail from a source you are unsure of, navigate to the provided link manually by entering the legitimate website address into your browser.
  • Lookout for the digital certificate of a website.
  • If you are asked to provide sensitive information, check that the URL of the page starts with “HTTPS” instead of just “HTTP.” The “S” stands for “secure.”It's not a guarantee that a site is legitimate, but most legitimate sites use HTTPS because it's more secure. HTTP sites, even legitimate ones, are vulnerable to hackers. 
  • If you suspect an e-mail isn't legitimate, take a name or some text from the message and put it into a search engine to see if any known phishing attacks exist using the same methods.
  • Mouseover the link to see if it's a legitimate link.

As always, we recommend using some sort of anti-malware security software. Most cybersecurity tools have the ability to detect when a link or an attachment isn't what it seems, so even if you fall for a clever phishing attempt, you won't end up sharing your info with the wrong people.

All Malwarebytes premium security products provide robust protection against phishing. They can detect fraudulent sites and stop you from opening them, even if you're convinced they're legitimate.

So stay vigilant, take precautions, and look out for anything phishy.

See all our reporting on phishing at Malwarebytes Labs. 



  08:56:00 pm , Categories: Tutorials

how to turn off Safe Mode on your Android

Link: https://joyofandroid.com/

Today I’m talking about how some of us enter into safe mode and sadly, get trapped.

Safe mode isn’t troubled itself. In fact, it helps us solve our device issues. However, regardless of how helpful safe mode is, sometimes it can leave us stuck with nowhere to go.

However, there is hope. The web offers a lot of methods for turning off safe mode on Android. I’ve rounded up 10 of them that are proven effective in solving this inevitable problem.

I’m starting off with the simplest ways, so I recommend trying each method as you go down this list so you aren’t trying something unnecessarily difficult when a much easier solution would have done the job just fine.

Related: How To Boot Your Android into Safe Mode


1. Restart

Restart is our go-to method to solve all kinds of phone issues. If your phone lags, you immediately restart your device.

It’s also the simplest way to turn off safe mode on your Android phone.

    1. Press and hold the power button.

      Press and hold power button

    2. From the menu presented, select Restart/Reboot. Some devices, however, only have the Power Off option.

      Restart option android phone in safe mode

    3. If your phone has the Restart option, it should power up automatically after it goes off.

      If you don’t, just press the power button again once it’s off to turn the phone back on.


2. Using the Notifications Panel

So what if the phone is still stuck in safe mode even after you’ve performed a restart. It’s time to pay attention to the notifications panel.

    1. Pull down the notifications panel.

    2. Tap the Safe Mode button to turn it off. Please note, though, that some phones don’t have this feature on their phones.

      Safe mode enabled on notifications bar


    3. If you’re among the lucky ones whose smartphones have the Safe Mode button on the Notifications Bar, you should see that the device automatically restarts to get you out of safe mode after you disable it. I’ve seen this feature on a Samsung Galaxy phone, so if you own one, you should be seeing it on the notifications panel, too.

      Option to disable safe mode


3. Key Combinations (Power + Volume)

Sometimes, in order to make a trick work, you should combine multiple elements. The same thing works with turning off the safe mode in Android. Pressing the Power key together with the Volume rocker might be the help you need.

  1. Turn off the smartphone.

  2. Once you’re sure it’s off, press and hold the Power button until you see the logo on the screen, then release.

  3. Quickly press the Volume Down button and hold it for few seconds until you see the message “Safe Mode: OFF” or something similar.

4. Cut Off All Power

If you still cannot turn off your Android’s Safe Mode, try this. The following method rules out any residual power remaining in your phone, as well as resetting the SIM card.

  1. Take off the back case and remove the battery. Of course, this only works for phones with a removable battery.

    Remove battery from android phone

  2. Dislodge the SIM card.

    Remove sim card from android phone

  3. Reinsert the SIM card.

  4. Replace the battery.

5. Wipe the Cache of an App

If you suspect that an app is causing your issue, but can’t bear the thought of uninstalling it, you can try this method first. It’s simple and it works in almost all Android devices.

  1. Go to Settings and look for the Apps menu. My phone calls the Apps menu as Application Management. It doesn’t matter, though.

    Look for the application management menu

  2. Find the corrupted app and select it. Let’s say, my Facebook app is corrupted. Please note that I neither have any problem with Facebook nor Mark Zuckerberg. Just kidding!

    Supposing Facebook app is corrupted

  3. Choose Clear cache.

    Facebook app clear cache

6. Clear App Data

While this method is similar to the last one, this approach is a little more drastic because you will clear both the cache and any personal preferences such as your login or settings.

  1. From Settings, look for the Apps menu.

    Look for the application management menu

  2. Select the corrupted app by pressing on it.

  3. Tap on Clear data.

7. Uninstall the Corrupted App or Apps

I’m sorry it’s come to this, but any app that has you locked into Safe Mode really isn’t usable anyway. You will, at least, regain access to your other apps and hopefully, help you get out of safe mode.

Apparently, after you take out the oddball, you may want to make use of an app killer so your apps won’t be draining your battery anymore. Take a look at our list of the best app killers out there for recommendations.

  1. Go to Settings.

  2. Find and select the Apps menu.

  3. Tap on the corrupted app that you want to disable.

  4. Tap Uninstall.

    Facebook app uninstall

This method is great if you’re only going to uninstall a single application, but if you can’t identify which particular app is the culprit or want to go ahead and eliminate some other apps at the same time, you can try reading our post that offers quick methodsto do so.

8. Wipe the Cache of Your Entire Device

We started out small-scale and that didn’t work. So with the next few methods we are going to pull out the big guns, so to speak, and wipe your device’s cache.

  1. Enter recovery mode.

    Go to recovery mode on android phone

    On many devices, recovery mode can be accessed by turning your phone off, then pressing and holding the power and volume up buttons at the same time. You can select recovery mode with the volume down button.

    On a Samsung phone, you have to turn your phone off. Now press the Volume Up, Home, and Power buttons simultaneously. When the phone vibrates or when you see the Samsung logo, release the Power button only. Only when you see the Android Recovery screen appear should you release the Volume Up and Home buttons.

  2. Use the Volume Down button to choose “Wipe cache partition” and the Power button to select it. Your device should instruct you to reboot.

    Recovery mode wipe cache partition option

9. Perform a Factory Reset

Here comes the dreaded factory reset. For starters, factory reset involves deleting everything from your phone- photos, documents, apps, contacts, and messages- and restoring the device to its original state.

Warning: Make a backup first or you will lose anything you have added to the device. You might want to look into supplemental backup apps to ensure that your photos, SMS, videos, and other data are not lost forever.

Via the Settings menu:

  1. Go to the Settings.

  2. Look for the Backup and Reset menu. You can create a backup of some of your data here. However, this is not a 100% backup.

    Look for backup and reset menu

  3. Select Factory data reset or Delete all user data.

    Factory data reset option in settings

  4. Read the disclaimer and tap on Reset Phone. Don’t panic if the phone reboots after you click on the reset option. This is normal.

  5. Once the phone turns on, you can see that all data has been wiped out.

  6. Via the Recovery Mode:

    Enter the Recovery Mode. (Please refer to Method 8)

    Go to recovery mode on android phone

  7. Once you’re in the recovery mode, hold the Power button and press the Volume Up key once and release the power button.

  8. Press the Volume Down button until the Wipe Data/Factory Reset gets highlighted. Tap on the Power key to select it.

    Recovery mode wipe data factory reset

  9. Once finished, choose Reboot system now.

    Recovery mode reboot system now

If you check “Automatically Restore” your phone should take care of the last few steps for you.

10. Troubleshoot Hardware

Let’s say you dropped your device in water. Unless your device is waterproof, this is bad news for your phone. If you have tried the methods above, but safe mode still isn’t going anywhere, it could be that the hardware is causing the issue.

Warning: If you have a warranty, now would be the time to use it instead. Do not disassemble your phone unless you know what you are doing! If you don’t feel comfortable, let someone else handle it. If you know or you can see that something needs to be cleaned, and you feel OK about doing it, perform this step.

  1. Remove and clean any faulty hardware.

    Clean and fix stuck power button

  2. Test the buttons, particularly the Power and Volume buttons, to ensure they are working properly and that none remains stuck. The volume buttons are often responsible for locking in Safe Mode.

    Test power and volume buttons


Most of the time you should be able to simply restart your phone and exit Safe Mode. The rest of the methods can be useful but it’s just not quite that easy. Stuck buttons, bad updates, seedy or buggy applications, and defective hardware can all lead to this issue. Apps may conflict with each other and even the operating system itself can have issues.

Just remember that as frustrating as this experience might have been, Safe Mode is not an enemy. It has been around on desktop computers for a very long time as a means to troubleshoot or recover from a crash safely.

Which method works best for you? Still stuck in Safe Mode? Do you know a method not listed here? Tell me more about it below.

And if you’re still curious about Safe Mode, check out our Ultimate Guide to Safe Mode!


Go visit their site for more wonderful information to wrangle that Android that you enjoy and depend on so much.


  03:02:00 pm , Categories: Resources

La Femme New Poser Base Figure Free for a limited time

Link: https://www.renderosity.com/mod/bcs/la-femme-base-figure-for-poser-11/135377?AID=598

She is FREE for now with a minimum order of $3.00

La Femme 1 for Poser will become your go-to figure in Poser 11.

Available exclusively at Renderosity, the new figure takes advantage of the development team's collective century of design experience to make use of all the features and power found in Poser 11.

Team member Denise Tyler said she thinks the digital arts community will be pleasantly surprised with La Femme for Poser.

"I had hopes with each new figure that came out for Poser and as much as I appreciated all the work that people put into it, yet that 'it' factor was missing in them," she said, adding La Femme was designed with the "it factor" in mind from the start.

Read more here

Get her here

Check her out and there are already a bunch of items for her now that are reasonably priced


  09:43:00 pm , Categories: Fantasies Realm Market

Pretty Maids for the Wedding Extravaganza [Exclusive]

Link: http://fantasiesrealm.com/market/Designers/OldFashionedWoman/

Pretty Maids

Artistic render showing dresses and shoes.

Wedding Extravaganza Series by Old Fashioned Woman

This series covers all 3 of Evilinnocence's Wedding Belle's: Bliss, Hope and Joy.

There are 8 textures for each one of the dresses as well as a total of 40 textures for the Sling Back shoes by idler168(8 textures for each of the 5 pairs in the set)

We have in this series the wedding dresses and also coming soon coming soon are the flower girl for K4 and M4 Tux.


 PC and Mac compatible

Poser 6+

 DS 3+

Wedding Belle's Bliss

Wedding Belle's Joy

Wedding Belle's Hope

5 Pairs of Sling-back Pumps




  12:59:00 am , Categories: Fantasies Realm Market

Halloween 2018: The Red Portal - Other Side - HD Backs

Link: https://fantasiesrealm.com/market/Designers/Arts-4-Sale/Halloween-2018-The-Red-Portal-Other-Side-HD-Backs

ヾ(⌐■_■)ノ NAME OF THE PRODUCT ヾ(⌐■_■)ノ

 - "Halloween 2018 - The Red Portal - Other Side - HD Backgrounds"
    -> (a4sFRName: "Halloween 2018 - Le Portail Rouge - L'Autre Côté - Arrière Plans HD")


 Howdy people !

  This is a set of 28 Halloween backgrounds in HD Flavor (3000 * 2000)
  And do you know what?

  We also offering you all RAWS renders as bonus content!
   (in that case you can infinitely rework as your convenience each renders like you want!)
  Did you remember the product we offered primarly as a freebie to
   the Halloween 2018 special event organized by  The Fantasies Attic
  (You can download our freebie we're talking about for free, don't wait!), and use that free product as an add-on to this one!

  We mean, now that you have the Entrance through the red portal, then also get the Other Side!

    on the theme of an Halloween and precisely underground temple location.

  Also, as our new product line,

     The fact is, now, we opted for a new vision of what a Background would be !
     Based on Beta testers of our private Discord server, yeah!

  So, for that product you will see 7 backgrounds all with 4 different post-production works!
  For a total of 28 Backgrounds..
   Ahem.. NO!


  With the bonus included you also have all 14 RAW RENDERS from both versions (Entrance and Other Side) !

  And 1 surprise background ;)

  We hope you will love them, and most important, create freeky epic stunning things with that.

   Or.. just... enjoy this product :) ?

  Also, you can find on our store at Fantasies Real Store (https://fantasiesrealm.com/market/Designers/Art-4-Sale)
   our other exciting products!

  Have fun and Happy Halloween 2018 !!!

(。◕‿◕。) PRODUCT CATEGORY|(ies) (。◕‿◕。)
 - Graphics Arts Resources
 - Halloween
 - Backgrounds
 - Epic

 (╯°□°)╯︵ ┻━┻ PRODUCT USAGE(s) FORBIDDEN (╯°□°)╯︵ ┻━┻
 - Second Life (sorry but their politic does not match with our product license)
 ლ(╹◡╹ლ) PRODUCT USAGE(s) PERMITTED ლ(╹◡╹ლ)
 - Digital Games
 - Printed Games
 - Scrapbooking
 - Digital Reading Book
 - Printed Reading Book
 - Digital Artistic Art
 - Printed Artistic Art

      take a look at the "PRODUCT USAGE(s) ADVICES"
                                           section below in this file for more ideas to use them!)

 \(^O^)/ PRODUCT TARGET(s) \(^O^)/

 - Any 2D/3D graphics artistics creation applications
   (like: Corel Paint Shop Pro series, the Gimp, Adobe Photoshop series, DAZ Studio, Poser etc..)
 - Any 2D/3D graphics game creation engines
   (like: Game Maker series, RPG Maker series, Clickteam (Multimedia) Fusion 2.5+ etc, Unreal Engine, Unity..)
 - Any 2D/3D tabletop/board game creation engines
   (like: Tabletop Simulator, Tabletopia etc..)

 - Any 2D/3D graphics storytelling engines
   (like: Ren'Py, TyranoBuilder Visual Novel Studio, Visual Novel Maker, Manga maker ComiPo!, etc..)

 - Any 2D/3D graphics game tools engines
   (like: BrashMonkey Spriter Pro, Smith Micro Manga Studio series etc..)
 - and... indeed ... any 2D/3D SOFTWARE that respect that license and its applied license aswell !

FRM Designers

Fantasy Attic Sponsors