Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Guide for securing Windows 10

Folks, for those of you have ‘upgraded’ to Windows 10 (and for those of you who will soon) this tutorial is a ‘must read’. (I even reco it for those of us who plan on sticking with Win7 until the wheels fall off. It says a lot about tech and the Internet.)

* How to secure Windows 10: The paranoid’s guide

Worried sick over Windows 10’s privacy settings? There’s a lot you can do to lock them down, but you will lose some functionality along the way.Read more..

Other items of interest:

* Attackers can access Dropbox, Google Drive, OneDrive files without a user’s password

The so-called “man-in-the-cloud” attack is said to be a common flaw in most cloud-based file synchronization services.” Read more..

* Could cyberwar knock us back to the Stone Age?

If the United States were involved in a major cyberwar, just how badly would it be hit? Could the U.S. survive? Could modern civilization survive? In this thought experiment, David Gewirtz explores such a scenario in-depth.” Read more..

[ if you can even think to ask the question.. the answer is ‘yes’. ]

Today’s quote:I have an advanced degree in procrastination and another one in paranoia.” ~ Joanne Harris

Want more? Nuclear nightmare: Industrial control switches need fixing, now

Researchers at Black Hat USA have disclosed critical SCADA/ICS vulnerabilities in switches actively used in industrial control management systems, such as substations, factories, refineries, ports, and other areas of industrial automation.” Read more..

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

August 7, 2015 Posted by | how to, Internet, News, security, tech, Windows, Windows 10 | , , , , | Leave a comment

How To Set Your Browser To Surf More Safely – Picture Tutorial*

How to Configure Internet Explorer to Stay (More) Secure Online: Step-by-Step

The Internet is an amazing place. It is the world’s largest man-made object. It has changed and enhanced our lives in countless ways. Like most things, it has it’s “good side” and it’s “bad side”. I think you need to know: cyber-criminals are ruining the Internet, and stealing billions of dollars a year in the process (that we know about.. think “tip of the iceberg”).

Instead of simply telling you “be safer”, I have a link to a step-by-step slideshow tutorial: How to configure Internet Explorer for secure surfing.

The pictures make it very easy to follow, and performing the steps can prevent many online attacks against your computer.

“With assistance from the United States Computer Emergency Response Team (US-CERT), this slideshow will walk you through the steps to configure Microsoft’s Internet Explorer to limit the damage from hacker attacks.”

lockdown_ie

click for slideshow

In this digital age, we are all connected, and each of us plays an important role in securing cyberspace.” So do your part. Make sure your web browser is “hardened” against online attacks. Click and learn!

Today’s free download: For further browser security, I recommend installing Spyware Blaster as well as the steps above. It works well with your existing protections.

SpywareBlaster doesn’t scan for and clean spyware–it prevents it from being installed in the first place. SpywareBlaster prevents the installation of ActiveX-based spyware, adware, dialers, browser hijackers, and other potentially unwanted programs. It can also block spyware/tracking cookies in IE, Mozilla Firefox, Netscape, and many other browsers, and restrict the actions of spyware/ad/tracking sites. With the built-in Check for Updates feature, you can help ensure your protection is up-to-date. SpywareBlaster also includes a System Snapshot feature, which lets you take a snapshot of your computer in its clean state and later revert, undoing many changes made by spyware and browser hijackers.

Related: Earlier I posted a slideshow tutorial for the web browser Firefox (see, Safer Internet Surfing Cont. – Tutorial: Tweak Firefox for Greater Security)

Folks, to find out more about cyber-security, and connect to more educational resources, click here.

* Orig post: 10/18/10

Copyright 2007-2011 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


July 11, 2011 Posted by | advice, browsers, computers, cyber crime, how to, IE 7, ie 8, IE 9, Internet, security, tech | , , , , , , , , , , , , , | Leave a comment

Reader Question Answered: Disposing of Floppies

Proper Way To Erase Floppies If You Don’t Have A Working Drive

Q: Paul I am hoping you can tell me what I should do. I have boxes of old floppy disks and I want to get rid of them. I want to delete the files on them, but I no longer have a computer that has a floppy drive. How can I erase these disks without a drive?

A: Dear Reader,
Let my start my reply by commending you for being aware that it is very important to remove (aka “erase”/”delete”/”shred”) the data from any “memory device” before you dispose of it.

The proper method for destroying files is to run a “shredding” program, (sometimes called “secure delete” — which repeatedly writes a random series of 1’s and 0’s onto the memory) as simply formatting, deleting (or Trash-ing) the files is not enough.
(See, What You Need To Know About “Delete”*.)

Since you do not have a working 3.5″ Floppy drive (the floppy having gone the way of the dodo) you will need to use an “alternative” method to destroy your files and/or the diskettes themselves — and there are many of these. Probably the simplest is to touch the floppy to a reasonably large magnet (such as you will find on the back of old stereo speakers).

A few other methods
Some of the more “heavy duty” document shredders have a slot for shredding CD’s, and some of those can shred floppies. Consult the booklet that came with the shredder.

One fella I know clamps several into a vice, and then drills several good-sized holes; while another cuts them in half with a chop saw (please be careful.. and wear eye protection..).

You can bend them until they snap open, remove the soft brown disk, and cut it in half with scissors.

You can take them to a trusty tech, or Data Destruction service, and pay a modest fee. This last is my reco for most folks.

Today’s free download: Many “utility suites” (and also many “security suites”) have a “secure delete” function, so you may already have a file shredder. But if you don’t, and are planning on disposing of/donating old tech gear, you can download File Shredder

“If you’re looking for a reliable utility for utterly erasing files from your hard drive, you’ll be pleased with File Shredder’s performance. This free tool’s attractive interface is designed for ease of use, and even novices will comprehend its functions right off the bat.”

Copyright 2007-2011 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


March 30, 2011 Posted by | advice, computers, hardware, how to, security | , , , , , , , , , , , , | 6 Comments

Step-by-Step Security Tutorial – Firefox

How to Configure Firefox to Stay (More) Secure Online: Step-by-Step

If you are interested in Tech, and visit Websites such as this one, it will not be very long before you read about Firefox. And, it won’t be long before you see NoScript mentioned. Odds are, you already have (loyal T4E readers surely have!). Safer surfing is a popular topic here.

Today, instead of simply telling you “be safer”, I have a link to a step-by-step slideshow tutorial: How to Configure Mozilla Firefox for Secure Surfing

“With assistance from the United States Computer Emergency Response Team (US-CERT), we’ve created this slideshow to help you configure Mozilla’s Firefox Web browser to stay secure and safeguard your privacy while surfing.”

firefox_security

click for slideshow

(Internet Explorer users, click here for your slideshow tutorial)

In this digital age, we are all connected, and each of us plays an important role in securing cyberspace.

It Is National Cyber Security Awareness Month

So do your part. Make sure your web browser is “hardened” against online attacks.

Related: Block IFRAME For Added Protection

Copyright 2007-2010 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


Share this post :

October 23, 2010 Posted by | advice, browsers, computers, Firefox, how to, Internet, security | , , , , , , , | 2 Comments

Step-by-Step Security Tutorial – Internet Explorer

How to Configure Internet Explorer to Stay (More) Secure Online: Step-by-Step

The Internet is an amazing place. It is the world’s largest man-made object. It has changed and enhanced our lives in countless ways. Like most things, it has it’s “good side” and it’s “bad side”. I think you need to know: cyber-criminals are ruining it. And stealing billions of dollars a year in the process (that we know about.. think “tip of the iceberg”).

Instead of simply telling you “be safer”, I have a link to a step-by-step slideshow tutorial: How to configure Internet Explorer for secure surfing

“With assistance from the United States Computer Emergency Response Team (US-CERT), this slideshow will walk you through the steps to configure Microsoft’s Internet Explorer to limit the damage from hacker attacks.”

lockdown_ie

click for slideshow

In this digital age, we are all connected, and each of us plays an important role in securing cyberspace.

It Is National Cyber Security Awareness Month

So do your part. Make sure your web browser is “hardened” against online attacks.

Today’s free link: If IE is your main browser, I recommend installing Spyware Blaster as well as the steps above.

SpywareBlaster doesn’t scan for and clean spyware–it prevents it from being installed in the first place. SpywareBlaster prevents the installation of ActiveX-based spyware, adware, dialers, browser hijackers, and other potentially unwanted programs. It can also block spyware/tracking cookies in IE, Mozilla Firefox, Netscape, and many other browsers, and restrict the actions of spyware/ad/tracking sites. With the built-in Check for Updates feature, you can help ensure your protection is up-to-date. SpywareBlaster also includes a System Snapshot feature, which lets you take a snapshot of your computer in its clean state and later revert, undoing many changes made by spyware and browser hijackers.

Related: Earlier I posted a slideshow tutorial for the web browser Firefox (see, Safer Internet Surfing Cont. – Tutorial: Tweak Firefox for Greater Security)

Folks, to find out more about cyber-security, and connect to more educational resources, click here.

Copyright 2007-2010 © “Tech Paul” (Paul Eckstrom). All Rights Reserved. jaanix post to jaanix.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


Share this post :

October 18, 2010 Posted by | advice, browsers, computers, Firefox, how to, IE 7, ie 8, IE 9, Internet, Microsoft, Phishing, phraud, privacy, security, software | , , , , , , , | 7 Comments

Sandboxie License Winners Announced

I consider Sandboxie an essential and primary tool for protecting my machines from cybercrimals.”

Sandboxie’s creator, Ronen Tzur, has graciously and generously donated five licenses to me, to award to my readers. I sincerely thank him for that.

SecurityNowLogo GizmoAward MajorGeeksLogo

Some Benefits of the Isolated Sandbox

  • Secure Web Browsing: Running your Web browser under the protection of Sandboxie means that all malicious software downloaded by the browser is trapped in the sandbox and can be discarded trivially.
  • Enhanced Privacy: Browsing history, cookies, and cached temporary files collected while Web browsing stay in the sandbox and don’t leak into Windows.
  • Secure E-mail: Viruses and other malicious software that might be hiding in your email can’t break out of the sandbox and can’t infect your real system.

To paraphrase: What happens in the sandbox stays in the sandbox.

Note: Sandboxie is NOT a replacement, nor substitute, for traditional anti-Malware (antivirus+anti-Spyware) but is used in conjunction with. I highly recommend that first time users see, Tutorial: Getting Started with Sandboxie. This is a serious security tool and taking the time to learn how it works is well worth it! Using Sandboxie is simple, there’s just a few things to know.

Ronen has always offered this (essential, IMHO) security tool free, for which he has long earned a big tip of my Geek hat. It consistently wins “Best” and “Top” mentions on the reputable download sites, and is one of the few titles I think is worth upgrading to “Pro” (paid). The Sandboxie website is here, try it out yourself!

Without further ado: Congratulations to..

sand_wins

The lucky winners will be sent an e-mail containing their license key, with the subject “Sandboxie Winner”. (You may need to check your Junk folder.)

Again I thank Ronen for making this giveaway possible!

Copyright 2007-2010 © “Tech Paul” (Paul Eckstrom). All Rights Reserved. jaanix post to jaanix.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


Share this post :

July 16, 2010 Posted by | advice, computers, e-mail, Internet, security, software | , , , , , , , , , , | 20 Comments

Block IFRAME For Added Protection

If you are interested in Tech, and visit Websites such as this one, it will not be very long before you read about Firefox. (In fact just this week I posted an article.) And, it won’t be long before you see NoScript mentioned. Odds are, you already have.

NoScript is a small program you download and add ‘into’ Firefox to enhance its functionality (these small programs are known variously as “add-ons”, “plug-ins”, and “extensions”– different words for the same concept.)

NoScript gets mentioned in the Tech media a lot because it is a security tool that automatically “blocks” (prevents from running) certain web page ‘elements’ (scripts) — Java, Flash, JavaScript, and XSS– from running unlesNSOptss you click the Option button and select “Allow”, or “Temporarily allow”.

Which puts you in control, and goes a long ways toward preventing “drive-by downloads“, and other malicious Internet attacks and activity from occurring should you happen to visit a Website which has been .
(I don’t mean to depress you, but the current state of the Internet is so insecure that this can be, literally, any Website.)

By default, NoScript is a powerful tool (to read the NoScript “About” page, ) and for many people is the primary reason they have made the switch to Firefox.
(I’ll let you in on a little secret; it is one way to measure a user’s “savvy”.. look for a Firefox icon.)

Tip of the day: Enhance your NoScript protection by turning on the IFRAME blocker feature.
IFRAMES are another dynamic Web element that cyber-criminals are now using as an “attack vector” (aka “method”) with great success. Like the scripts mentioned above, IFrame attacks can happen invisibly and automatically. Oh, the joys of Web 2.0!

1) In Firefox, click on “Tools”, then “Add-ons”
Add-ons 
2) Scroll ’till you find NoScript, and click the “Options” button. (If you have not yet installed NoScript, click the “Get Add-ons” icon in the upper-left.)
NoScript
3) Click on the Plugins tab. Place a check in the “Forbid <IFRAME>” checkbox.

That’s it. You’re done. Now when you visit a site that uses IFrames, you will have to approve them (aka “whitelist”) before they’ll appear.

[Note: the scripts and tools (Web 2.0 “features”) mentioned in this article are NOT in themselves bad or dangerous, and it is thanks to them that the Web is such a rich and interactive environment.. but, in the wrong hands they can — and are — being used with criminal intent.]

Today’s free link: One of the more disturbing (outright alarming, if you ask me) hacker uses of IFrame attacks is the alteration of Search Engine results (Yes, you can’t truly trust Google, Yahoo!, or MSN anymore) and Internet Security blogger Bill Mullins has posted an excellent article on this subject, Fake/Redirected Search Results – Consequences for You

* Firefox users: Update 3.0.3 available today.

Copyright © 2007-8 Tech Paul. All rights reserved.jaanix post to jaanix

Share this post :

September 27, 2008 Posted by | advice, anti-spyware, browsers, computers, cyber crime, Firefox, hackers, how to, Internet, PC, security, software, tech, Web 2.0 | , , , , , , , , , , , | 17 Comments