11 free tools to protect your online activity from surveillance

http://mashable.com/2014/10/29/private-internet-tools/
The documentary Citizenfour, which debuted to a limited release on Friday, offers the closest look yet at Edward Snowden, the whistleblower who exposed the National Security Agency spying scandal. In the film, Snowden and the journalists he works with go to great lengths to shield their correspondence from unwanted eyes.

Though Laura Poitras’ film explores a very extreme circumstance — a massive leak of top-secret information to the press — it’s as good a reminder as any that we live in a time of widespread government surveillance, and you can’t be sure who’s intruding on or monitoring your Internet activity and communications.

SEE ALSO: Private Browsing Settings Aren’t as Private as You Think

You might want more privacy online for any number of reasons — you could be a journalist reporting on a sensitive topic, like Poitras and Glenn Greenwald, or you might just want more peace of mind in light of the NSA revelations. To better protect yourself, here are 11 tools (presented in no particular order) to help you encrypt data, block intrusive trackers or remain altogether anonymous on the web. Note that this is by no means an exhaustive list of what’s out there, and no security measure is 100% effective. All of the tools listed here are free.
1. Tor Project
Tor is a free software program that allows people to use web connections anonymously. Widely considered to be one of the best privacy tools on the web, Tor can be downloaded as a software package, and there’s a Tor-enabled browser available. It’s difficult to track information that passes through Tor — so much so that Russian President Vladimir Putin has put up a $110,000 reward for anyone who can crack its secrets.

Where to get it: Direct download https://www.torproject.org/

2. The Guardian Project
The Guardian Project creates open-source apps to help people communicate privately. All of the group’s software is downloadable for free for Android smartphones. For secure web browsing, there’s a privacy-friendly browser called Orweb that works with a Tor-enabled proxy called Orbot for mobile. There’s also a private messaging service called ChatSecure, an app for private phone calls and a pixel-destroying camera tool to blur faces in photos. This project is almost worth a list all its own.

Where to get them: Google Play, Amazon or direct download https://guardianproject.info/apps

3. DuckDuckGo
duckduckgo
IMAGE: DUCKDUCKGO
DuckDuckGo is a search engine that doesn’t track or share any of your information. If you’re looking for better privacy, use this over Google.

Where to use it: Duckduckgo.com https://duckduckgo.com

4. HTTPS Everywhere
When you’re browsing the web, you’ll notice that URLs typically have the “http://” prefix, if not the more secure version: “https://” (HTTP Secure). The HTTPS Everywhere browser plugin works with Chrome, Firefox and Opera, and it attempts to automatically switch any HTTP web address over to HTTPS, which encrypts communication between you and the server to protect against eavesdropping or impostors.

Where to get it: Google Play or direct download https://www.eff.org/https-everywhere

5. Ghostery
Ghostery allows you to keep tabs on companies that track your visits to websites. With this browser extension, you can block companies from collecting your browsing data. Ghostery has a popup option that displays a message each time you visit a site with a list of who’s tracking you.

When I visited Amazon.com, for example, Ghostery showed me I was being tracked by these entities:

tracker
Where to get it: Direct download https://www.ghostery.com/en/

6. Privacy Badger
Privacy Badger is a browser extension that can block third-party advertisers, but it has a moral compass. If Privacy Badger suspects a tracker is overstepping its bounds by tracking what you’re doing without your permission, the extension stops the advertiser in its tracks. It’s all based on the principle of user consent: If the advertiser breaks the rules, Privacy Badger cuts the cord.

Where to get it: Direct download https://www.eff.org/privacybadger

7. GPG

 

You may have heard of PGP (Pretty Good Privacy), an encryption program developed in the early ’90s to make email conversations more secure. It’s a bit outdated, though. The better option is GPG. The GNU Privacy Guard system allows you to encrypt and sign your data. Each party has a pair of “keys,” one public and one private. The sender, in this case, sends the email to the receiver’s public key, but this encrypted message can only be deciphered if the receiver enters his or her private key (that is known only to them) upon reception of the communication.

BONUS: Mashable explains Shellshock
What is Shellshock? | Mashable

 

The video above is a quick tutorial on using GPG with public key encryption to prevent the interception of your communication. The video tutorial was created by Snowden (that’s his jumbled voice you’re hearing) and sent to Greenwald before the NSA leaks.

Where to get it for Windows: Direct download http://www.gpg4win.org/

Where to get it for Mac: Direct download https://gpgtools.org/

Android, Apple Vulnerable To Hackers

FREAK security flaw Android, Apple using vulnerable to hackers
https://www.icpea.com/freak-security-flaw-android-apple-using-vulnerable-hackers-286569?utm_source=dlvr.it&utm_medium=gplus#prettyPhoto
#Freak #NSA – FREAK security flaw made Android, Apple users vulnerable to hackers – Many Apple and Android users had been left vulnerable to hackers for more than a decade due to a former U.S. government policy, according to cybersecurity researchers.

photo-Freak security flaw

Freak security flaw

The security flaw, called FREAK, made visitors to a multitude of websites — including U.S. government-managed Whitehouse.gov, NSA.gov and FBI.gov — susceptible to cyberattacks that break secure Internet connections, according to The Washington Post.

Thousands and thousands of websites had been vulnerable to attacks. Safari and the default Android browser — but not Chrome — are affected. FBI.gov and Whitehouse.gov have been repaired, but NSA.gov — somewhat ironically — remains vulnerable. Meanwhile, Apple and Google have been working on a fix for the FREAK flaw.

An Apple spokesperson told Mashable that a fix for iOS and OS X would be available through software updates next week. Google is is encouraging all websites to disable support for the export certificates, a spokesperson for the search giant said. The company has also “developed a patch to protect Android’s connection to sites that do expose export certs and that patch has been provided to partners.”

The flaw resulted from a former U.S. rule that was lifted in the 1990s but had a lingering impact. The rule forbid exporting products with strong encryption, according to the researchers who discovered the flaw. To make sure it wasn’t assisting strong cybersecurity in other countries, the U.S. shipped “export-grade” products abroad.

Readmore : FREAK security flaw made Android, Apple users vulnerable to hackers

crawling with scams

https://www.informovies.com/google-play-books-crawling-292399
Google Play Books is crawling with scams too – It’s not just the app store
#Play #Apps – It’s not just the app store – Google Play Books is crawling with scams too – As we’ve observed countless times, there are both pluses and minuses to the way Google handles allowing apps onto Google Play. On the plus side, it’s insanely easy to get your app added. On the minus side, it’s insanely easy for scammers to get malicious apps onto the store as well.

photo-bitcoinexaminer.org

bitcoinexaminer.org
SCAMS

Now Android Police has found that it’s not just the app store that’s a haven for scams – it’s Google Play Books as well. Essentially, Android Police discovered that Play Books is loaded with books that are billed as supposed “guides” for games that promise cracked Android application packages (APKs) but that actually deliver malware and phishing scams.
“After becoming aware of this problem, we spotted almost a dozen sellers of these phony ‘guides,’ but that’s probably just scratching the surface,” Android Police explains. “One of the most prolific is Monster Guides Editor Pro, but several of the others may be run by the same people due to the similarities in naming.

There’s also Johnny Bravo, leon Master, and more. These publishers list several dozen games (and a few apps) for sale, usually at $0.99 -$3.00 each. Most of them are significantly cheaper than the legitimate paid versions.”

IT’S THE LIEBSTER AWARD!

 

 

 

photo-liebster award

Thank You For The Cool Trophy, Really!

Well looky here, I have been nominated for the prestigious, much coveted and fought over, LIEBSTER AWARD! I truly have to give my thanks and appreciation to Shruti of Shruti Insights, for offering me this unexpected and awkwardly wonderful opportunity. She has offered me a chance to experience a shot at the Golden Ring, the Kewpie Doll, the Final frontier of Fame and Glory in the ” Blogosphere “. I certainly would never have attempted, or volunteered for Honors such as these, on my own, so again Thank you for the inspiration, and privilege, only using my fear of shotguns or Wrathful, and thoroughly disappointed Friends, to make a man of me, and Accept this One Giant Leap For Mankind Test. Shruti, you’re the best!
So there are rules to all of this. Apparently in order to be a big shot around these parts, I have to play by THESE RULES.
Put the Liebster Award logo on your blog.
Thank and tag the blog who nominated you.
Answer their questions and come up with 10 new ones for you nominees.
Nominate 8 blogs with less than 200 followers, let them know you’ve nominated them and link them in your post.
No tag-back.

 

So Shruti, with much pounding of heart, I will under take this feat, and I Thank You sincerely for your having Faith and Belief in my abilities!

These are the Ten questions I get to answer!
1.Among your blog posts, which one is your favourite?
Well thank you for asking! My favorite post was a story I wrote a couple of years ago, called ” The Waiting Game”, and It was basically a true story about circumstances I had no control over. I only embellished it a tad.

2.At what time of the day do you usually write a blog post?
That is tricky because I post whenever I am either inspired by an idea, or feel like I’m not delivering enough, or not giving people what they want.

3.What is your favourite word in your native language?
Wow, I wish you hadn’t asked me that. I don’t believe I have a singular favorite word. My favorite phrase is ” Papa, I love you! ”

 

4.What do you like to eat in the morning?
That is an easy one, as I don’t eat in the early day. Usually I start getting hungry about 2 or 3 in the afternoon, and I’m a guy so it really doesn’t matter what it is, as long as it can be wolfed down easily.

 

5.Choose one: tea, coffee, milk, hot chocolate. Why do you choose it?
Coffee with cream and sugar. But again, I drink freshly ground dark French Roast. Oh I’m sorry, you asked why? I grew up with good coffee in the S.F. bay area, and I’ve learned coffee really is the cheapest beverage, aside from water, and I don’t like water as fish do things in it.

 

6.Do you have a close friend? Is there one thing that you can only do with that friend?
I am married to my bestest, closest friend, and the thing we do together, I am not allowed to publicly speak about!

 

7.What is your favourite book and why do you like it?
That’s a hard one, but I can safely say my nearly favorite book, if I can only name one is BattleField Earth, by L. Ron Hubbard. I like that it’s long and involved, even though some of it is rather childish, I enjoy humanity taking back their home, and making a difference out in the cosmos.

 

8.What do you really want to learn but you haven’t got the time to do it?
Everything! I want my education to always continue. Right now I want to learn how to make my site work for me. The part about not enough time, unfortunately takes presidence over everything.

 

9.What do you miss from your childhood?
I miss my mommy! She died when I was 9, and I had to grow up because of that.

 

10.Where will you go if you just feel bored at home?
I am not at home at present. In December, I had to come down here to Reno Nevada to help take care of my family. I don’t get bored at home, as I live on 20 acres, in the mountains, and if the trailer feels cramped I just go outside.

 

Now it’s time to make my own nominations for the LIEBSTER AWARD, so I hope I don’t lose any friends over this!
Random Musings And Wanderlust 
Bittersweet Sensations  babyruthbeer
https://girlonstreamblog.wordpress.com/

Dr. J M Landin @ RedNewtGallery

LIZZIE BRIGHT  @  http://lizziebright.com/
Victoria Iskak   @  Raindrops & Fireflies
Margaret  @  Suds & Kisses
mboki_m  @  learning web development

 

And now, finally I get to ask my nominees their most dreaded and difficult to answer, questions.

1) Now that you are here in the magical realm of the blogosphere, what do you want?

2) What is your inner animal?

3) On your blog, are you public, or private, in regard to your personal self?

4) Are you happy in your present place in this life?

5) If I could give you one wish, what would that be?

6) What would be your ideal job?

7) Do you have a favorite kind of pet?

8) Are you able to discuss, religion, politics, or feelings openly, with strangers?

9) Knowing what you know now, what would you have done differently, and of course, why?

10) How many fingers am I holding up?

I told you these would be formidable questions, even though I didn’t word it that way. I didn’t want to scare you away. And in advance, Thank You for playing, now take your dang football and go home!

Blue Screen Of Death

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
I once had a problem ( sounds like an old Beatles song ) and had to fix my old pc, the hard way. It took me two weeks of looking up information and calling various computer geeks and manufacturers. None of these folks would help me unless I was willing to shell out a pile of bucks.

 

 

photo -Blue Screen Of Death

Blue Screen Of Death -Google images/

muddypoodles.com2963 × 1702Search by image

To find out what’s causing the blue screen / programming conflict, you’ll have to : Turn off the computer.
Press the start button and immediately press the F8 key ( several times ) until you get one of the ADVANCED BOOT MENU screens.
Follow all prompts to get to Safe-Mode.

In Safe-Mode open all of the programs you normally use, including all of the programs in your start-up folder. ( Some programs will not open in Safe-Mode ) If the problem that caused the blue screen hasn’t showed up, you can figure the default settings for the operating system are all fine.

Safe-Mode doesn’t run all of the programs on your system, ( only enough to run Windows ) so if the problem isn’t found in Safe-Mode, you’ll have to go through all of the programs on your system.

In Safe-Mode you can check out what is in your computer in the way of programs and the processes involved with them.

Safe-Mode does not let you connect to the Internet, so I had no idea the problem I was having was with a conflict between the wireless devices. I kept trying to start my computer in different modes and removing unwanted programs and apps.

Had I really recognized what was happening when I tried to start the system, I could have saved myself tons of messing around. The trick is to turn on the system and watch the computer come to life. As each start-up program comes to life, an icon in the tray displays that it is ready and then the next one comes up. ( There may be as many as 50 or 60 processes trying to start ) I saw the Netgear program try to start, and then the blue screen, but it was one of the last programs to load up. I should have watched the start-up closely from the beginning and paid attention to what was trying to load up.

Once the conflict has been eliminated your system should act just fine again. If you’ve removed programs and decided they weren’t the problem after all, try to re-install them, but make a log on what changes you are making. That will help if the blue screen comes back! Keeping a log of the changes you make to your system and the reasons for it, can make a real difference as to how your system operates. Just as you’re always told to back up your work, meaning make back ups, you should create a log of all changes to your computer, and refer to it when something doesn’t work the way is should.

Rusty Garner-Smith

05/09/2012

reinstall Teredo tunneling pseudo interface part 1.

I mentioned last week the fact that I caught a bug. It was adware, and I cleaned it up with 4 plus hours of deleting and scanning and cleaning again. Now I keep finding more things going wrong with the old pc. Suddenly a webpage would get unresponsive, and navigation became difficult.
I ran another set of scans and sure enough, more adware, so I cleaned it up and the next time I went forth into Webville, I had the same symptoms again. That’s when I received a message about how my computer needed an updated piece of hardware.

Teredo tunneling pseudo interface is the gadget that tells other computers who it is. It might have worked fine forever except there are too many computers for an old interface. The net is expanding and a new interface has been employed.
I told my machine to fix the problem and it said it couldn’t. So I tried a couple of times and decided to get an answer out there. I couldn’t get Microsoft to do anything, and other sites kept saying, here download this…
I almost installed a couple of different supposed to be fixes, when I saw these products were another attempt to infect my pc even more. I started checking reviews on the fix I needed and found my answers. I will post the answer after this so if you don’t want to look at it, I won’t blame you.

Danger Will Robinson Danger

Laptops And Smartphones’ Low-Power Signals Leak Data | Video
by NSF
Side-channel emissions from laptops and smartphones can be detected from a several feet away and transmit data even when not connected to the internet. If you keep important records or valuable information on your laptop or smartphone, you had better watch this.
http://www.livescience.com/49731-laptops-and-smartphones-low-power-signals-leak-data-video.html

Spy Watch : Is Your Computer Protected?

 

 

photo - webpage

WTF my view online

I am running another scan on my “old, outdated, nearly obsolete computer. I haven’t been downloading much since the big adware thing hit me. I’m not sure that anyone is safe out there. Which security systems should you use?

I am told over and over, by marketers and the likes, ” don’t use free anti-virus or security programs”, as they’re not safe. The impression is free programs are substandard, or a diluted version of the real thing. I believe both views are correct in some cases…..

I have bought different programs such as Symantec and McAfee in the past, and wondered if those programs were actually worthwhile. They pretended to do the jobs they were supposed to do, but when it came time to renew the subscription, all of a sudden the computer is infected and full of viruses and trojans and worms etc.

Chances are the various programs do, what they’re promising to do and only give that hype to get you to buy that service again. If that’s the case I don’t need that kind of pressure on my mind. But….

I did a scan with Trend Micro Housecall and that program found 10 or 12 bad problems. I deleted them of course only to have my pc acting up again as soon as I went on-line. So I scanned the computer again and was notified everything was clean.

Not knowing any better I figured everything was fine, and proceeded to go on-line and had the same problems all over again. It got so bad with, slowness, hyper-links that shouldn’t be there, pop-up ads, and a computer tech program slamming into my browsing experience.

I called the number and got a tech to look at my machine. I’ll relate that tale later, but for now I’ll tell you the end result of his findings. He poked around and showed me how I had 21000 error messages, and showed me some adware stuff in the files. He did not fix the problem, but told me I could buy something that would fix it and said it would cost me about $500 to be right with the net again.

I got it all fixed sort of, meaning now it’s an ongoing task to kill the beasts that got me. I did what my previous article said and spent 4 1/2 hours cleaning the system. And I did that with a free system, although I will send Malwarebytes a donation.

Here is that link again for those who think they need it. http://malwaretips.com/blogs/remove-coolsalecoupon-virus/

HTML Tutorial 3 – Adding Images & Backgrounds To Your HTML Website

Some people understand how to do tasks better if it is in a visual format. My experience is, I understand and remember more if I read and then rewrite it. Since I did manage to figure out how to put video on the site, I will bring more video to you.

This is a short video showing in pictures  how to add imagery to your site, through the HTML code, that makes your site look the way it does.

I hope this is helpful, and you should expect more of these articles on this site.