Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Today We Fight Back

Today is the “Day We Fight Back” (against mass surveillance), here are some tips for staying anonymous online; a way to express your concern for online privacy; and a quick test of your “privacy IQ”.

* Please see https://thedaywefightback.org/ and use the form let your Representatives know you’re fed up – that you deserve to have your basic privacy respected.

http://myprivacyiq.com/ A short 10 question quiz. Do you know how to enhance your online privacy?

How to Stay Anonymous Online

How do you take back control of your own personal privacy online? Is it even possible? One 2013 Pew study reported that 60 percent of Americans have given up on that idea entirely. Ultimately, the only way to stay truly anonymous online is to not go online at all. Since that’s not really an option for most of us, here’s a rundown of what you can do to minimize the spying, the targeted advertising, and ID theft as you explore the world online.” Read more..

(Yes, folks. It’s not just about government spying; it’s also about how much big companies like Google, Facebook, and Microsoft have collected about you in order to serve up targeted ads.)

Welcome to the Information Age.

Today’s quote:There are two primary choices in life: to accept conditions as they exist, or accept the responsibility for changing them.” ~ Denis Waitley

Copyright 2007-2014 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
And please, never forget – one person can make a difference.

February 11, 2014 Posted by | advice, cyber crime, Google, how to, Internet, Microsoft, privacy, security, social networking, tech | , , , , , , , , , , , , , , | Leave a comment

If You Have An Android Phone, Read This

Adrian Kingsley-Hughes has posted an article that all smart phone owners should be aware of, and Android owners should read very carefully. It contains a list of apps that have been poisoned to “root” your phone and steal all your info.. and maybe do more than that. Worse (scarier), these apps are on the app Marketplace. And, I may have downloaded one.

Stolen apps that root Android, steal data and open backdoors available for download from Google Market

“To many of its fans, the openness and freedoms offered by the Android mobile operating systems is one of its main selling points. But that openness come with a price – it makes it easy for nefarious types to sneak malware into apps. And that’s exactly what they are doing.”

I am going to provide his list of infected apps, but just because you don’t see one you recognize as having installed doesn’t mean you should skip reading his article (click here to read it). It contains info we all should know.

  • Falling Down
  • Super Guitar Solo
  • Super History Eraser
  • Photo Editor
  • Super Ringtone Maker
  • Super Sex Positions
  • Hot Sexy Videos
  • Chess
  • 下坠滚球_Falldown
  • Hilton Sex Sound
  • Screaming Sexy Japanese Girls
  • Falling Ball Dodge
  • Scientific Calculator
  • Dice Roller
  • 躲避弹球
  • Advanced Currency Converter
  • App Uninstaller
  • 几何战机_PewPew
  • Funny Paint
  • Spider Man
  • 蜘蛛侠
  • Bowling Time
  • Advanced Barcode Scanner
  • Supre Bluetooth Transfer
  • Task Killer Pro
  • Music Box
  • Sexy Girls: Japanese
  • Sexy Legs
  • Advanced File Manager
  • Magic Strobe Light
  • 致命绝色美腿
  • 墨水坦克Panzer Panic
  • 裸奔先生Mr. Runner
  • 软件强力卸载
  • Advanced App to SD
  • Super Stopwatch & Timer
  • Advanced Compass Leveler
  • Best password safe
  • 掷骰子
  • 多彩绘画
  • Finger Race
  • Piano
  • Bubble Shoot
  • Advanced Sound Manager
  • Magic Hypnotic Spiral
  • Funny Face
  • Color Blindness Test
  • Tie a Tie
  • Quick Notes
  • Basketball Shot Now
  • Quick Delete Contacts
  • Omok Five in a Row
  • Super Sexy Ringtones
  • 大家来找茬
  • 桌上曲棍球
  • 投篮高手

Toward the bottom of his article is a link to another of his articles, which describes what you need to know to keep your phone safer.

Again, this is important enough that I am asking you to read the article (click here to read it) and forward it to all your friends and family who own smart phones. Android, and Google’s app Marketplace are not the only targets of the cybercriminals. Apple’s store is no better off, and they do not vet their apps for malware.

Makes me glad I haven’t used my phone to check my balance…

Related: Study: Cybercrime cost firms $1 trillion globally (that would be in 2010..)

Data theft and breaches from cybercrime may have cost businesses as much as $1 trillion globally in lost intellectual property and expenditures for repairing the damage last year, according to a new study from McAfee.

Make no mistake: the Evil Doers are going after all Internet-connected devices.

It’s a brave new world.

How nice. Someone is trying to send me a free computer. I like free computers.

Copyright 2007-2011 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


March 2, 2011 Posted by | advice, Android, Apple, computers, cyber crime, gadgets, hackers, Internet, mobile, News, rootkits, software, tech | , , , , , , , , , , , , , , , , , , , | 4 Comments

Video: To Catch An ID Thief*

When you think of the Internet underground, you probably don’t think about Burbank or Ventura, Calif.. But if you want to see what’s going on in the Web’s darkest corners, the Ventura Freeway is where you need to go…

I have been a fan of Bob Sullivan’s MSNBC Red Tape Chronicles for a while now, and recently I had the time to go through some of his older articles, and I came across one I had missed — A Portal On Credit Card Crime.

I highly recommend that you read this article.

On it, I also found links to a Dateline special undercover series titled “To Catch an ID Thief”, which I had also missed. It too, is a “must read”, er.. “must see”. So I have provided links to the videos. (You will need to enable Flash.)

Amazing stuff here. I hope you’ll watch and learn, and tell your friends.

'To Catch an ID Thief'
‘To Catch an ID Thief’

2: Underground den of thieves
2: Underground den of thieves

3: 'Hansen Discount Electronics'
3: ‘Hansen Discount Electronics’

4: CH delivery
4: CH delivery

5: Where's Wendy?
5: Where’s Wendy?

6: Harsh truth
6: Harsh truth

Today’s free link: Free Lifetime License for SUPERAntiSpyware Professional – 20 to Give Away

Today’s free download: If you are considering building your own website, or are interested in free WYSIWYG web-authoring tools, a nice tool is the free version of Web Easy Professional, by V-Comm.

*Orig post: 5/8/09

Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix

Share this post :

July 29, 2009 Posted by | computers | , , , , , , , , | Leave a comment

Cybercriminals Target Clueless Vacationers

laptop_beach “This guy doesn’t know it, but he’s putty in the hands of cybercriminals. The newest trend in Internet fraud is “vacation hacking,” a sinister sort of tourist trap.

Cybercriminals are targeting travelers by creating phony Wi-Fi hot spots in airports, in hotels, and even aboard airliners.

Vacationers on their way to fun in the sun, or already there, think they’re using designated Wi-Fi access points. But instead, they’re signing on to fraudulent networks and hand-delivering everything on their laptops to the crooks*.”

Please click here to read the rest of this story, and find out what you need to know before you use public “hotspots”.

* emphasis mine.

Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix

Share this post :

July 20, 2009 Posted by | advice, computers, cyber crime, Internet, News, Portable Computing, security, tech | , , , , , , , , , , , , , , | 3 Comments

Hacker Theft Could be the Largest Credit Card Crime in History

Hackers breach Heartland Payment credit card system

Heartland Payment Systems hpy on Tuesday disclosed that intruders hacked into the computers it uses to process 100 million payment card transactions per month for 175,000 merchants. The number of victims is still unknown.

Heartland’s disclosure coincides with reports of heightened criminal activities involving stolen payment card numbers. Security firm CardCops has been tracking a 20% year-over-year increase in Internet chat room activity where hackers test batches of payment card numbers to make sure that they’re active.

To read the full news story, click here.

My two cents: This is why, folks, you don’t want to get all excited about “cloud computing”, or allow your governments to create large “databases”.. like a “national health registry”, or “crime database”.. and why I don’t use “online backup” to store my files.
Why trust someone else’s server? The Conficker outbreak shows you how well servers get patched..

I feel bad for the folks at HPS.. the cost to “clean this up” is going to be astounding.. For more on that see, Credit card hackers find new, rich targets.

Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix

Share this post :

January 22, 2009 Posted by | computers, cyber crime, News, tech | , , , , , , , , , , | Leave a comment

Interview with an ID thief

This CNN special report interviews spammer Jason Carpenter. Though it is dated, it is interesting.

November 29, 2008 Posted by | advice, computers, cyber crime, e-mail, hackers, Internet scam, Phishing, phraud, security | , , , , , , , , , | 6 Comments