A good article about password insecurity

Posted in All Posts on January 7th, 2016

This link will lead you to a good article about the insecurity of passwords.  It includes a true horror story and some good suggestions as to how to improve password security in particular and the security of your digital life in general.

http://www.wired.com/2012/11/ff-mat-honan-password-hacker/

It’s a long article but a worthy read if you are so inclined. Check it out.

 

404 Errors

Posted in All Posts on January 7th, 2016

Folks, if you are getting a lot of “404 Page not fund errors” on this website, it is because we have removed a number of obsolete articles from this blog.  Please adjust your Favorites accordingly.

A Constitutional Amendment to protect privacy

Posted in All Posts, Online Security, Privacy on April 15th, 2015

This is what we need:  A constitutional amendment to protect privacy in the digital age!

http://www.seattletimes.com/opinion/how-to-protect-privacy-in-the-digital-age-a-constitutional-amendment/

I could not agree more with the author of this article.

A browser so private it pissed off google!

Posted in Online Security, Privacy, Security Tools on March 25th, 2015

As soon as I ran across this, I had to check it out.  Many browsers have plug-in’s or add-on’s or extensions that an help to privatize your browsing experience on the Internet, but Epic is a browser that does much of this by default.  It even has a built in proxy that can be toggled on and off.

Evidently the privacy features the Epic browser irritated google to such an extent that it has engaged in significant action against its developers.  Among other things, google evidently cut off all advertising revenue from Epic’s website.  Heaven forbid that someone might actually attempt to promote and maximize privacy on the Internet!  Google evidently takes serous offense when somebody actually develops a browser that interferes with its god given right to track everything you do on the Internet!

If you value your privacy, we suggest that you not only install and use this browser, but also consider donating to the cause.

For more information:

https://epicbrowser.com/

https://epicbrowser.com/

Please note that in the post 9/11 environment; short of never using the Internet, nor a cell phone, etc. etc., nor going out in public, it is virtually impossible to be a private citizen.  So mind your p’s and q’s, if you know what I mean.

Anti-Exploit Software

Posted in All Posts, Anti-Malware Tools, Exploits, Updates on June 12th, 2014

Malwarebytes announced general availability of its new Anti-Exploit software, which is appropriately called ANTI-EXPLOIT.  While this software is brand new, Malwarebytes has been testing and developing it for some time.  We have tested it and we recommend it.  This software presently is for Windows computers only.

It can be found at the following link:

http://www.malwarebytes.org/antiexploit/

One of the primary attack vectors on any computer is via exploits of software programming defects. Once a defect is found by an attacker, it can basically open the door to full control of your computer.

This is why it is so important to update all software as soon as updates are available, whether you have a windows computer, an Apple computer, an iPhone, Widows phone or Android phone or any of the various tablets.  The reason companies spend lots of money producing updates is that they are critical for maintaining the product.  In the past updates usually primarily provided new features.  These days, they primarily plug security holes.

 

Anti-Keylogger software

Posted in All Posts on May 30th, 2014

We now strongly recommend an addition security tool for all PC users.  It is software that encrypts the keystrokes (and more) on your computer.  This adds one more layer of defense, and we are all for adding more layers of defense.

There are a number on the market, but a couple that come to mind are provided by ZEMANA and by Raxco.  But feel free to do your own research.

About those “Terms and Conditions…”

Posted in All Posts, General, Privacy on November 4th, 2013

We live in a digital world where much of our lives are an open book.  Most every entity that we interact with in this increasingly digital world requires that we accept their “Terms and Conditions”.  But who the heck reads all that fine print?  Almost nobody.

What do they do with all this data?    And so what?

Well, here is the “so what?”:   http://vimeo.com/57182041

This link leads to a preview of the documentary “Terms and Conditions May Apply”.

Note: Unfortunately this link leads to a “preview”.   It really is worth the rental to see the full documentary, but hopefully the full video will soon be available for free.

 

Your Smartass Blabbermouth Phone

Posted in All Posts, General, Privacy, Safe e-Commerce, Wireless Network Security on September 1st, 2013

Smart phones are great devices – but they leak lots of data about you, and your probably have no idea how much.

It is about time we pay more attention to this. It is time for consumers to demand comprehensive and thorough privacy legislation and regulation of this industry. Phone manufactures should be held accountable for and held liable for producing phones that leek private information.

As a case in point, please refer to this article:

http://www.nbcnews.com/technology/your-phone-blabbing-your-location-anyone-who-will-listen-8C10989061

And this is just the tip of the iceberg – so to speak.  One small example.

At least the example in the article has a solution.

TURN OFF YOUR FRIGGING WIRELESS

Most phones have a setting for this.

Trackless Search

Posted in Online Security, Privacy, Security Tools, Wired Network Security, Wireless Network Security on December 14th, 2011

A new, trackless search engine has recently arrived on the block -er pond.

The new critter is called duckduckgo.

Yes, really.  Duckduckgo.com.  Wierd, funny, (is this a joke, huh?)
And somewhat memorable, and evidently no joke.

She, or he (gender of duck yet to be determined) purports to respect your privacy by not remembering everything you do, as opposed to those neighborhood busybodies, Bing and Google, who love to gossip by passing on your search terms to sites that you visit.

Not only does she promise to not save your search history, she promises to not even save your IP address, nor pass on your search terms (in most circumstances), nor assign a ‘unique identifier’.

WHAT? A search engine that isn’t out to make money off your lack of direction in life, your need for speed, your thirst for knowledge, your seeking of truth, or at least the best price on the latest gizwangbam gadget?

And not only that, she will also encrypt your search by merely adding an “s” onto http. Whoa, doggies!  Er, Whoa duckies!

How about that, folks?

Give ‘er a spin!

https://duckduckgo.com

While you are at it, check out her privacy page for an enlightening discussion about search engine privacy, or rather, the lack of it.

http://duckduckgo.com/privacy.html

 

The well protected browser

Posted in All Posts, Online Security, Safe e-Commerce, Security Tools, Wired Network Security, Wireless Network Security on November 11th, 2011

How to craft a well protected browser:

Practically  speaking, anonymity is very difficult to achieve on the web, but with some small effort, you can increase your privacy significantly.

Here is the recipe:

  • the latest version of the Firefox browser (if you can keep up with their fast-track version cycle!)
  • Always make sure that Adobe Flash is updated to the latest version.
  • Firefox plugins
  1. Better Privacy
  2. Ghostery
  3. NoScript
  4. Https-Everywhere
  5. Adblock Plus

Then set the browser options to:

  1. Set the cashe to a relative small size, say 10 MB.
  2. Delete cashe on exit (temporary files)
  3. Delete history on exit.
  4. Delete cookies on exit. Note: also set Better Privacy to delete ‘super cookies’ (flash cookies) on exit.
  5. Select the “do not track” option (under the privacy tab)
  6. Use a password manager such as RoboForm

Don’t forget!  You are still not private or anonymous. So be nice.

Remember “Practice Safe Computing”

_____________________________________________________________________________________________________________