14 Tips to be safer on Public Wi-Fi (‘hotspots’)
A couple reading reco’s for mobile Internet users.
* 14 Public Wi-Fi Hotspot Security Tips You Need
“Sometimes you need it so bad, you don’t care if it is clean or dirty. You don’t care who has been there before or what viruses they’ve left behind. I speak, of course, of public Wi-Fi hotspots, aka honeypots for weak-willed souls desperate for a sense of connection. Look, it’s okay to connect to strange networks. Just use protection, cover your tracks, and follow PCMag’s 14 Tips for Public Hotspot Security. Be safe out there.” Read more..
I disagree with what the author wrote there a bit.. it’s really not ‘okay’ to use public wi-fi.. (that’s why I put ‘safer’ where the Industry puts ‘safe’) but I know you’re going to. One of the main reasons is “53 percent can’t tell a secure network from an insecure one.”
That’s so shockingly stupid clueless in 2017 .. do we need to remove these devices from the hands of the masses?
* * *
Today’s quote: “A paranoid is someone who knows a little of what’s going on.” ~ William S. Burroughs
Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
5 tips for keeping your kids safe online
A reading reco for you today.
* Keep your children safe online
“No parent wants their child to fall prey to the dangers online, but it’s hard to know exactly how to protect young ones today. From malware to video game addiction, it can seem like the Internet is a vast sea of dangers.
We’ve mapped out the most important online threats for kids today, as well as laid out our top five tips on how to help your little one safely navigate the web. Address the issue of online safety now and help your child develop the digital smarts they need to stay out of harm’s way.” Read more..
* * *
Today’s quote: “Did I offer peace today? Did I bring a smile to someone’s face? Did I say words of healing? Did I let go of my anger and resentment? Did I forgive? Did I love? These are the real questions. I must trust that the little bit of love that I sow now will bear many fruits, here in this world and the life to come.” ~ Henri Nouwen
Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All weq really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
Happy 4th of July
And, 5 Quick Tips for photographing fireworks
I love fireworks! (And I love 3 day summer weekends!)
Happy Birthday America
Independence Day is the national day of the United States.
In the United States, Independence Day, commonly known as the Fourth of July, is a federal holiday commemorating the adoption of the Declaration of Independence on July 4, 1776, declaring independence from the Kingdom of Great Britain. Independence Day is commonly associated with fireworks, parades, barbecues, carnivals, fairs, picnics, concerts, baseball games, political speeches and ceremonies, and various other public and private events celebrating the history, government, and traditions of the United States.
Today’s quote:
“Four score and seven years ago our fathers brought forth on this continent, a new nation, conceived in Liberty, and dedicated to the proposition that all men are created equal.
Now we are engaged in a great civil war, testing whether that nation, or any nation so conceived and so dedicated, can long endure. We are met on a great battle-field of that war. We have come to dedicate a portion of that field, as a final resting place for those who here gave their lives that that nation might live. It is altogether fitting and proper that we should do this.
But, in a larger sense, we can not dedicate — we can not consecrate — we can not hallow — this ground. The brave men, living and dead, who struggled here, have consecrated it, far above our poor power to add or detract. The world will little note, nor long remember what we say here, but it can never forget what they did here. It is for us the living, rather, to be dedicated here to the unfinished work which they who fought here have thus far so nobly advanced. It is rather for us to be here dedicated to the great task remaining before us — that from these honored dead we take increased devotion to that cause for which they gave the last full measure of devotion — that we here highly resolve that these dead shall not have died in vain — that this nation, under God, shall have a new birth of freedom — and that government of the people, by the people, for the people, shall not perish from the earth.” ~ Abraham Lincoln’s Gettysburg Address
(I have heard tales told where, in the golden olden days, students were required to memorize and recite this Address.. but then, I have heard that they were required to learn Latin too.. Today I hear tales that students cannot even read this Address.. Bah. Just musing out loud.)
We here at T4E Headquarters (me, myself, and I) wish you a joyous and safe holiday.
“July 4th, with its brilliant fireworks displays, gives shutterbugs plenty of photo ops–follow these tips to get the best shots.” Read more..
Bonus 1: The 4th is a great time to get out to one of our National Parks. If you cannot do that, perhaps setting your desktop “wallpaper” to a spectacular image might be a good “second option”. (Some awesome nature photography here.) Public domain Desktop wallpaper from US National Parks
Bonus 2: If you like fireworks too.. 20 Incredible Photographs of Fireworks Reflected in Water
Copyright 2007-2014 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
And please, never forget – one person can make a difference.
Find a way to make someone’s day today.
(Best advice I ever heard? Don’t sweat the small stuff.)
New tech security resource
Also, a $99 “PC Stick” (That comes with Windows 10)
Sharp-eyed readers will have noticed that I, for the first time in ages, have added a new referral link to my ‘blogroll’; CNet’s recently announced Security and Antivirus Center. I recommend taking a look-see.
* The best security apps and expert advice
“Today we’re thrilled to launch our new Security and Antivirus Center. Our goal: to give you the tools and tactics you need to protect your privacy, your data, and your devices. You’ll find guides, reviews, and how-tos, including tips on banishing bloatware from your PC, tweaking your browser settings for better security, and building better passwords. We’re especially pleased to present our Best recommendations: we’ve tested security software and services and have declared a winner for best VPN, best password manager, and best cloud backup. Come check it out and let us know what else you’d like to see.” Read more..
Other Items (of possible interest):
* The best tool for protecting your kids (or employees) from malware and porn
“One of the industry’s best security tools gives a hand to frazzled parents.” Read more..
[Note: worth reading even if you are not a parent, IMHO.]
* Archos $99 PC Stick is latest Windows computer that fits in your pocket
“The French device maker joins Lenovo and Intel in offering a miniature system that connects to your HDTV via HDMI, but its version is cheaper and will ship with Windows 10 pre-installed.” Read more..
Today’s quote: “It’s tough to make predictions, especially about the future.” ~ Yogi Berra
Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
Excellent Internet Safety How To Tips
Folks,
The folks at Emisoft have posted an very nice, very informative article – with a Halloween theme, to make it fun – which provides security knowledge I think every web surfer should know. Please read this, and forward it on to your friends and families.. especially the naive, clueless, and careless ones (you know who they are). Pay special heed to Fact#3.
Internet Zombie Defense Training, or: How Not to Become a Bot
Going on the Internet can be like walking through a post-apocalyptic city, where half the people you pass want to eat your brain.
In the post-apocalyptic city, these “people” are called zombies.
On the Internet, these zombies are infected computers, and we call them bots.
Bots and botnets are one of the most fundamental (and frightening) concepts of modern day malware. They are, very literally, networks of infection that allow their masters to hijack thousands of victims’ computing resources, to carry out any number of nefarious deeds or attacks over the Internet, for financial gain.
Don’t want to get bit? Then read below (and aim for the skull).
Fact 1: A group of zombies is much scarier than just one
Imagine going one-on-one with some undea
d ghoul. Do you hit it in the head, or just run away? Either way, you’re probably going to live to see another day. That’s how it works in the movies, at least. Individual zombies are pretty weak, but, in hordes, they are terrifying.
Strength in numbers applies to botnets as well. With botnet malware, the aim is to infect as many devices as possible. Once infected, devices become linked to a “Command and Control” server, which can issue remote commands.
Fact 2: Zombies like brains
Botnet masters connect their victims to Command and Control servers because botnet masters like brains. The more brain, i.e. computing, power a botnet master has at their disposal, the better. This is because botnets are used to carry out coordinated attacks, which combine the computing resources of thousands of machines. Such attacks have one primary motive: to make money for the botnet master, or for a paying customer who has requested the botnet master’s criminal services.
Fact 3: Zombies are evil
Like zombies, malicious botnets are pure evil. They exist solely to make money by wreaking havoc and destruction on everyone else.
Spambots hijack infected computers’ ability to email, as well as stored contact lists, to send out massive amounts of spam. Spam can be anything from annoying advertisements for sex products and diet pills, to malicious links and attachments that act as the “bite of the bot.” The increasing popularity of social media websites has now also attracted computing’s undead to places like Facebook and Twitter, where compromised profiles can be abused to spread comment spam.
Clickfraud botnets tell infected computers to go to a website and click on ads owned by the botnet master – or a client of the botnet master – making money for criminals AND slowing down your device by consuming RAM.
DDOS attacks tell thousands of infected bots to visit the same website at the exact same time, overloading the targeted site to the point of collapse. These “zombie swarms” are carried out to blackmail successful websites or to (illegally) take down the competition.
Bitcoin mining botnets such as Linkup can turn your PC into a mindless slave that dedicates its resources to creating various forms of cryptocurrency and making someone else rich.
Illegal material download or propagation can be carried out by bot computers without their owner’s knowledge or consent. In this scenario, the infected bot acts as a proxy, so that criminals can be criminals without having to leave evidence on their own device. Instead, the illegal activity – and potentially the blame – is shifted to you.
The ability to steal your financial information or identity usually comes included. “Command and control” means command and control, and, in addition to being used as a weapon, a bot computer can be told to share its stored information or its user’s activity with the botnet master, in numerous ways.
Fact 4: Zombies don’t know that they’re zombies
And if you’re implicated in a botnet, you probably won’t know that your computer has become a bot. Your device will very literally be hijacked and told to perform malicious actions without your consent, behind the scenes.
Fact 5: Zombies like to limp around and drool
Nevertheless, one of the best ways to spot a zombie is its characteristic limp. If your computer becomes a bot, the situation will be much the same. An infected computer is most often a slow computer, as botnet masters’ primary objective is to steal the infecteds’ computing power. Accordingly, if your computer is acting slower than usual, you may be surfing with the undead. To find out, a simple CRTL + ALT + DELETE and a perusal of the Task Manager can be revealing, however bot detection is not always so simple. Most modern botnet masters make explicit efforts to counteract user detection. It is also important to note that even uninfected PCs carry out a number of important background tasks without explicit user consent, and that disabling these tasks in a fit of botnet paranoia can be just as disabling as actual infection!
Fact 6: Zombies lurk in the shadows
In most zombie-ridden after-worlds, you can spot members of the undead rotting and groaning from a mile away. This is not the case with botnets. Unlike zombies, botnets rely on deception, and they are typically propagated as Trojans or through social engineering. Botnet malware may deliver its payload through a malicious attachment disguised as something it’s not, or via a link to a fake website that surreptitiously initiates a “drive-by” download. Botnet masters may also disguise their creations as what appear to be useful apps – even security apps! – to get users to download and become part of their scheme.
Fact 7: Once you get bitten by a zombie, you are not the same
In many a zombie-flick, it often happens that one of the main characters gets bitten and infected. At this point, there is usually some (very brief) debate over whether or not the once-trusted comrade should be nixed. Typically, a cool headed hero will rise to action and do what needs to be done, much to the hysteria of his or her less rational team mates. “It needed to be done,” the hero will then explain. “He just wasn’t the same.”
With botnets, the situation is quite similar. You may know (and love) your PC or your mobile device with every beat of your digital heart, but once it becomes a bot it is no longer the same. The infected device will have a mind of its own, and it will no longer be that “trusted friend.” Any information you share with it will become accessible to the botnet master, and all that extra computing power you invested in will be consumed, as your device becomes a slave.
If you suspect your computer has become a bot- don’t wait. Contact our experts immediately, before the infection spreads. Zombie assassination is always free to anyone who requests it. Why? Because we like doing it.
Fact 8: Zombies have one big weakness
You’ve got to smash their brains.
With botnets, this doesn’t mean taking a hammer, a bat, a shotgun, or your post-apocalyptic weapon of choice to an infected device – but, it does mean getting inside the head of a botmaster. One need not understand the technical specifics of botnets proper to achieve a solid defense – just like no one really knows how zombies work, technically. For the average user, just knowing that botnets exist is almost enough on its own to avoid infection. From there, it is simply a matter of identifying the most common infection mediums…and not walking around the graveyard after dark.
Always use your brain – Whether it’s a website, an “urgent email,” or a personal messages sent through social media, always think before you click – otherwise your machine may be turned into a thoughtless, clicking machine! If you plan to download pirated software or media, you should also know that you will regularly be brushing shoulders with the undead.
Always take care of your weapons – Just like in the movies, it’s you against the somnambulant horde. The leaner, the faster, and the more efficient your weapons (i.e., software and applications) can be, the lower the odds you’ll get turned into a walker. Botnet masters specifically design their creations to exploit known weaknesses in popular software, so as to infect as many devices at once as possible. Avoiding infection is often as simple as enabling auto-updates on all of your main applications, and flat out discarding those programs you do not use so that you don’t have to worry about vulnerabilities. As an added benefit, this practice will increase the overall performance of your machine.
Always travel in a group – Fact #1 applies to the good guys too. Zombie slayers and botnet bruisers are strongest in groups. If you notice a strange background task operating on your PC, you should Google it and see what other people have to say. For specific files, you can also use Emsisoft’s isthisfilesafe.com.
Today’s quote: “I actually think that the most efficacious way of making a difference is to lead by example, and doing random acts of kindness is setting a very good example of how to behave in the world.” ~ Misha Collins
Copyright 2007-2014 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
And please, never forget – one person can make a difference.
Find a way to make someone’s day today.
(Best advice I ever heard? Don’t sweat the small stuff.)
Internet Psychology
I often marvel at the thought processes I see displayed, and marvel further at the fact that such things as shown below actually produce the desired results.
What are people thinking? How does the human mind work? Why would someone send these emails? (Why did they use all caps?)
The answers lie in the fact that such frauds steal $105 BILLION USD’s annually (that’s what’s been reported.. but I suspect that’s just the tip of the iceberg). And it’s hard for me to remain positive, upbeat and optimistic about Man’s future when I know that people actually are going to contact Isar Aqilah’s ‘lawyer’ …
Have you heard the term “social engineering”? If not, click here and learn an important thing to know in our modern world. (If you do know, forward this on to friends/family who you suspect are clueless, please.) Because it seems everyone is doing it.
And this is a bigger threat to “national security” than anyone’s willing to face. (So let’s pretend it’s not there. Maybe it will go away.)
Today’s quote: “Every good act is charity. A man’s true wealth hereafter is the good that he does in this world to his fellows.” ~ Moliere
Fun video: It’s been a while since I put up one of these..
Copyright 2007-2013 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.