Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

14 Tips to be safer on Public Wi-Fi (‘hotspots’)

A couple reading reco’s for mobile Internet users.

* 14 Public Wi-Fi Hotspot Security Tips You Need

Sometimes you need it so bad, you don’t care if it is clean or dirty. You don’t care who has been there before or what viruses they’ve left behind. I speak, of course, of public Wi-Fi hotspots, aka honeypots for weak-willed souls desperate for a sense of connection. Look, it’s okay to connect to strange networks. Just use protection, cover your tracks, and follow PCMag’s 14 Tips for Public Hotspot Security. Be safe out there.” Read more..

I disagree with what the author wrote there a bit.. it’s really not ‘okay’ to use public wi-fi.. (that’s why I put ‘safer’ where the Industry puts ‘safe’) but I know you’re going to. One of the main reasons is “53 percent can’t tell a secure network from an insecure one.”
That’s so shockingly stupid clueless in 2017 .. do we need to remove these devices from the hands of the masses?

* * *

Today’s quote:A paranoid is someone who knows a little of what’s going on.” ~ William S. Burroughs

Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

August 17, 2017 Posted by | advice, cellular, computers, consumer electronics, how to, Internet, mobile, privacy, security | , , , , , , , | Leave a comment

Start over

This is not “news”, but this ‘news article’ is why I’ve been saying –> scrap it ALL. Start over.

This time with security/privacy in mind.

To understand this, you need to know that “vulnerabilities” means “insecure computer code”. You need to note the idea “being found” and think “tip of the iceberg”, and you have to understand that NONE of the ‘computer languages’ are even designed to be secure. Were a ‘Programmer’ to try to write a hacker-proof ‘app’, they couldn’t because the Language, and the “libraries’ it uses are weak. Anywho.. bringing you this stuff is killing my ratings, but here’s the evidence .. um, article:

* ‘Unrelenting’ rise in vulnerabilities, Risk Based Security reports

We are on track for another record-breaking year in the pace of vulnerability disclosures, said a new report from Risk Based Security.Read more..

*     *     *

Today’s quote:No matter what people tell you, words and ideas can change the world.” ~ Robin Williams

Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

May 30, 2017 Posted by | computers, consumer electronics, cyber crime, hackers, Internet, News, privacy, security, software, tech | 5 Comments

Today’s ‘Must Read’

Folks, not only does everyone need to read this article, but pass it along to their friends and family.

* How your connected home or office is a gift for hackers, criminals, and cyber spies

The Internet of Things needs to learn how to secure devices — and fast.Read more..

[ Note: I also highly recommend clicking on some of the embedded articles.. Like, the Snowden one.. ]

Related articles: (In my way of thinking..)

* Britain has passed the ‘most extreme surveillance law ever passed in a democracy’

The law forces UK internet providers to store browsing histories — including domains visited — for one year. Not only that, the law also gives the intelligence agencies the power to hack into computers and devices of citizens.Read more..

* Distracted minds: 3 tips to disconnect from tech and increase productivity

Adam Gazzaley, neurologist and author of The Distracted Mind: Ancient Brains in a High-Tech World, explains how multitasking damages focus, and offers advice for workplace productivity.Read more..

.. But the truth is, no one’s going to read those. And no one’s going to change their thinking or behavior. I’m wasting my time.

* * *

Today’s quote:No act of kindness, no matter how small, is ever wasted.” ~ Aesop

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

November 17, 2016 Posted by | advice, computers, consumer electronics, cyber crime, Cyberwarfare, gadgets, hackers, Internet, Internet of Things, mobile, networking, News, privacy, security, tech | , , , , , , , | 2 Comments

Own an Android? Read this!

It just keeps getting better and better..

* Pre-installed Backdoor On 700 Million Android Phones Sending Users’ Data To China

Do you own an Android smartphone? You could be one of those 700 Million users whose phone is secretly sending text messages to China every 72 hours. You heard that right. Over 700 Million Android smartphones contain a secret ‘backdoor’ that surreptitiously sends all your text messages, call log, contact list, location history, and app data to China every 72 hours.” Read more..

This is why you don’t let your enemy build your stuff.. And it’s as predictable as the sunrise. It might sound paranoid, but it wouldn’t surprise me if this (type thing) isn’t on every device made there (maybe dormant) and it’s why I won’t buy Lenovo.

November 16, 2016 Posted by | advice, Android, cellular, consumer electronics, cyber crime, Cyberwarfare, gadgets, News, privacy, security | Leave a comment

Eating my words :( — Uninstall Web of Trust now

Folks, long time readers may remember, years ago now (decades in computer years) I recommended a ‘safe surfing’ browser add-on. A tech news headline – arrived today – has me regretting that.

* ‘Web Of Trust’ Browser Add-On Caught Selling Users’ Data — Uninstall It Now

Browser extensions have become a standard part of the most popular browsers and essential part of our lives for surfing the Internet. But not all extensions can be trusted. One such innocent looking browser add-on has been caught collecting browsing history of millions of users and selling them ..” Read more…

[ NOTE: even if you never heard of WoT, reading the article is a good education on the kind of spying the tech companies have been doing. ]

My love affair with technology is officially over.

Today’s quote:The best preparation for tomorrow is doing your best today.” ~ H. Jackson Brown, Jr.

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

November 8, 2016 Posted by | advice, browsers, computers, Internet, News, privacy, tech | , , , , , | Leave a comment