OCS banner and logo
Keeping clients' computers safe and profitable for over 25 years



Home Forms About Current Newsletter subscribe 
Search All Articles

Browse by Category


powered by pmc2m
 

Security Articles

Alternative Search Engines

November 2017 – Though Google dominates search, there are many different and better search engines. Here are some excellent search engines that respect your privacy and provide equivalent or sometimes better results than you'll get from either Google or Bing.

Searx: Search Heaven

November 2017 – Searx is an open source privacy protecting search engine that provides better results than you will get from Google or Bing. It pulls information from as many as 70 different engines.

Image Backups

November 2017 – Include complete images in your backup regimen. This also means making and being able to find rescue media.

iStorage Encrypted Drives

November 2017 – iStorage provides physical hardware encrypted secure USB drives coming in all shapes and sizes. An excellent option if you need physically encrypted USB drives.

The Equifax Debacle

October 2017 – The Equifax security debacle is an illustration in shocking incompetence.They didn't patch their software. They didn't know millions of files were exfiltrated from their system. They didn't report it when they found out. Their eventual response was also incompetently done. The Keystone cops would have done better.

Everyone should place a Fraud Alert

October 2017 – Everyone should place a Fraud Alert on their credit reports. The process is simple and free. It requires lenders to verify your identity, usually by a phone call, if someone tries get credit in your name.

Doing a Credit or Security Freeze

October 2017 – I did a credit or security freeze to reduce the problem of identity theft. Here is all you need to know to determine if you should too.

Macrium Image Guardian

October 2017 – Macrium Reflect has a new Image Guardian that protect your images from Ransomware attacks. Also, the free version is now available for single commercial workstations.

Showtime was mining with your computer!

October 2017 – Showtime hijacks your computer to do cryptocurrency mining!

Password Insights

September 2017 – What have we learned after examining millions of hacked passwords and what does it tell you about how to construct your own passwords?

Internal Controls

September 2017 – Internal controls protect you from fraud, some theft and employee embezzlement. Here are some basics.

Free Mobile Apps

September 2017 – What are you really paying for "free" apps?

Tunnelbear VPN Service security audit

September 2017 – Tunnelbear VPN has demonstrated industry leadership, security consciousness, and transparency with their decision to pay for an external audit and publish the results. This is an excellent VPN service choice.

Firefox File Share

September 2017 – Firefox has an excellent secure simple free file sharing service. It is great. No need to setup an account. It works for large files. It is secure. Wow.

KeePass Quick Entry Plugin

August 2017 – This KeePass plugin lets you re-open your KeePass file with a short password if you can do it in one try.

Clean up your Google App Permissions

August 2017 – Over the years we give more and more apps permission account for something. Occasionally you should and clean up the ones that don't make sense.

Password protect your email program

August 2017 – Adding a simple pin or password to your Email app can provide another level of protection without very much inconvenience.

Banning Backdoors

August 2017 – A European Parliament committee has proposed a law to ban backdoors and enforce end to end encryption.

MemInfo, Useful free tool

July 2017 – Meminfo is a small graphic guage that shows memory usage in real-time. It is very handy information to have.

Two Useful Keepass Improvements

July 2017 – Keepass's new Password Quality report is an excellent way to check the quality of your passwords and redo those that fall short.Another new feature is listing duplicate passwords.

Don't save passwords in browsers

July 2017 – Letting your browser save passwords for you is a bad idea. It is either very inconvenient or it is insecure. This article shows how various browsers handle saving your passwords and why you shouldn't let them.

18 Security cameras insecure

July 2017 – Security flaws in OEM Security camera maker used by many different companies. They are not getting patched.

HP computers come with keylogger!

June 2017 – Over 90 HP laptops and Desktops come with a keylogger to open your passwords to hackers. This appears to have just been a stupid mistake by Conexant who makes audio chips and HP has provided patches.

My Newsletter's email links

June 2017 – My newsletters contain trackers. Here's what they are doing, and why, and how to opt out.

Faster and easier website login with KeePass

June 2017 – Keepass's Selected Autotype function explained and demonstrated. A better way to login.

How to detect email scams

May 2017 – How to spot email scams in 5 minutes. For scam emails are shown and how to spot them as scams in this 5 minute video.

1903 Wireless Hack!

May 2017 – The first wireless hack occured in 1903 when Nevil Maskelyne hacked Marconi's wireless transmission demonstration from Cornwall to the Royal Institution in London 300 miles away.

Privacy and tracking

May 2017 – A look at three mechanisms for tracking us on the Internet as well as an explanation of various types of cookies. Many links to privacy testing services are provided.

AnySoft Keyboard for Android

May 2017 – Excellent Android keyboard which keeps your typing private. You can think of it as a privacy keyboard. Many options and keyboard styles.

Spideroak Purge Tool

May 2017 – I've created a simple purge tool to reduce the number of previous versions SpiderOak One Backup retains.

Privacy

April 2017 – A review of who and what is tracking you and what you can do about it.

Qwant: A great privacy search engine

April 2017 – Qwant is a fantastic privacy search engine which does not track you or record your searches.

Will a VPN solve my privacy issues?

April 2017 – Will a VPN solve privacy and tracking issues. What is a VPN? What is it good for?

Second copy 9 is available

April 2017 – Second copy 9. An update to my favorite backup program.

Backup Power Recommendations

April 2017 – Uninterrupted power supply options. A look at 3 recommended UPS solutions for different purposes.

Ransomware Made Easy

March 2017 – Why are ransomware attacks skyrocketing? What can I do about it? Ransomware is being marketed to hackers so they can attack more people more easily and even get technical support and client managment.

Cliqz Browser

March 2017 – Cliqz is a new safer, faster privacy protecting, ad-blocking browser based on the Mozilla Open Source project. It has received funding from Mozilla and is very fast and stable.

Password Hacking Basics

March 2017 – How do hackers crack passwords and what do their basic techniques mean to you? How do you make passwords they cannot crack?

Critical Chrome Problem

February 2017 – Chrome has a vulnerability where your vital address and credit card information can be stolen. Here is the fix.

IOT - Security Risks

December 2016 – Massive botnets consisting of security cameras, routers, printers and even refrigerators are attacking legitimate sites and bringing them down. What the problem is and why it will not stop soon.

NSA's Upstream Surveillance Explained Simply

December 2016 – A short history of FISA and upstream surveillance in short cartoon format from the ACLU

Malwarebytes Update to Version 3

December 2016 – Malwarebytes has been updating users from version 2 to version 3 but this has caused confusion with many of my clients. Here's how to return to the free version for those who do not want to pay for it or receive continuous protection.

Podesta's Mistakes - Let me count the ways

November 2016 – Podesta's DNC email hack was shocking because of the total lack of basic security understanding exposed. He violated so many simple rules. Here's what you can learn from his bad example.

Web of Trust - Untrustworthy

November 2016 – The Web of Trust browser add-on, has been found to be selling personally identifiable information on users. Furthermore, there might be serious bugs that aren't addressed. I've removed it. Here's why and an alternative.

How to make a secure password

November 2016 – Sometimes you need to remember a password that is also secure. For example, the password to your password safe. Here is a method you can use.

VeraCrypt Audit

November 2016 – VeraCrypt, the best successor to TrueCrypt has been well audited. They found some issues most were fixed. VeraCrypt remains an excellent option, but be sure and upgrade to the latest version.

Testing Your Router

October 2016 – Your router is the wall between you and a cesspool of evil stuff on the Internet. It is prudent to test it occasionally and to check for firmware updates.

Yahoo Earns 5 Strikes

October 2016 – Yahoo has earned 5 strikes. It is time to consider perhaps they should be out. They have lost my trust.

SpiderOak New Pricing

October 2016 – Spideroak has new pricing

Monthly maintenance instructions

September 2016 – I've posted detailed instructions to go along with my monthly maintenance form. This should guide you through doing the normal monthly maintenance tasks to keep your computer running smoothly.

Spideroak Simple File Share

September 2016 – SpideroakOne Backup makes it very quick and simple to share a single file that you have backed up.

Check your Backups

September 2016 – Things change. If you don't check that your backups are working and backing up what you want, you might be disappointed when what you want is not there when you need it.

Wordpress Security issues

September 2016 – Wordpress and other simple website creation tools are not a panacea that will allow you to quickly make a website and forget about it. You will need to maintain it and update your site's security, or risk having your clients sucked into a miscreant's lair.

Protect our Elections

August 2016 – We need to protect our election process from hackers and cyber attacks from anywhere, including the makers of the machines. Here's how.

A Hackers Revenge

August 2016 – They messed with his mom. He made them pay.

Interesting News

July 2016 – CityGroup seems to be claiming it has trademarked Thankyou. It is suing at&t for using "AT&T thanks" in their loyalty program. Also buy stampedo ransomware service for just $39 for a lifetime license. It's really easy to use.

Spotting Email Scams

July 2016 – Here is a simple set of 3 techniques for easily spotting most email scams. I've also made a short video demonstrating the techniques.

Checking Downloaded Files

June 2016 – Verify that the file you have is from the company you that you thought it was, and does not contain a virus.

Cloud storage considerations

June 2016 – Before you store your information or your clients', you should consider the security of the online storage service. Here are the principles you need to know.

Google's Find my phone

June 2016 – Google has an easy way to find, ring, lock or even wipe a missing phone.

Brian Krebs 3 Rules for Internet Safety

June 2016 – These three simple rules will go a long way to protecting you on the Internet.

News this month

June 2016 – Home robots are making real progress, and Snowden on the state of surveillance.

How to check out websites and files

May 2016 – There are lots of sites on the Internet that you can use to check out a website you are considering doing business with or getting something from.

To Suite or not to Suite?

May 2016 – With security, as with many things in life, simpler is better. When security companies try and do everything, usually, some of it is done poorly. You are better off getting specific programs to do specific things.

Interesting News

May 2016 – A gun that looks like a smart phone, and Chrome stops supporting Vista.

Mobile App of the Month

May 2016 – Kaspersky Labs' QR Scanner checks for dangerous links in QR Code targets.

Will Congress Make Security Illegal?

April 2016 – The Draft Burr-Feinstein Bill essentially makes good security illegal. It cannot work, will not help, but will hurt our security. Legislating that pigs will fly, won't make them fly. Here's an explanation and links to action you can take.

Interesting News

April 2016 – Uber's transparency report, An amazing 60 minute section on cyber security, and Google's report on hacked websites - 16,500 per week.

Some Software Updates

April 2016 – Here are some updates you might have missed as Ninite doesn't cover them. - GWX Control Panel, Chaos Software, SpideroakOne, Nod32.

Apple Abandons Quicktime

April 2016 – Apple has given up on Quicktime for Windows, and despite known vulnerabilities will not patch it anymore. If it is on your computer, uninstall it and find an alternative.

Setup a Guest network

March 2016 – Gain better security by setting up a guest network for your guests and Internet connected devices like Roku, Xbox or Nest.

Get Hacked on NYTimes

March 2016 – Ransomware is being distributed on the NY Times, BBC, MSN and other legitimate sites. We will explain ransomware and how to reduce your exposure.

Interesting News

March 2016 – New movie about drone attacks. How NSA's Skynet program uses cell phone data to target drone attacks and a Girl's iPhone bursts into flames above the Pacific.

Interesting news stories

February 2016 – Interesting news stories about a new edition of Monopoly without paper money and information about choosing the right padlock.

Just say no!

February 2016 – Frequent scam with people calling you to try and get you to let them into your computer to "help you".

Stop Windows 10 Spying

January 2016 – Microsoft has brought the phone tracking customer spying from the phone to the desktop PC. Here's how to control it.

Some interesting news stories

January 2016 – 2 news stories: Isis is using its own secure messaging application, so the are safe from the NSA backdooring normal programs, and the EFF has released their annual report on which online companies and working to help preserve our privacy.

Disable Flash Always On

December 2015 – Flash is dangerous. Having it running and ready to activate at all times is a mistake. Force it to "ask to activate".

Experts Versus Non-Experts

November 2015 – Google researchers compare regular users with security experts to reveal differences on security practices and beliefs. We can all learn from how we differ from the experts.

Proper Password Encryption

October 2015 – A simple clear overview of the concepts for encrypting passwords and using the result to encrypt data. I use Keepass as an good example.

Review your passwords

October 2015 – Passwords tend to stick around for years, so it is necessary to review them and update them occasionally. You need to get rid of any that are too short or duplicated.

Trustgo Android Mobile Security Discontinued

October 2015 – I've recommended Trustgo Android antivirus in the past. It has been discontinued. I now recommend Avira. Here's why.

Get your My SS Account now, before someone else does

September 2015 – It is a good idea to setup your My Social Security Account online now. Though it is likely to be hacked. If you do not setup your account, someone else is likely to set one up using your name and steal your benefits.

Passive Key hacks

September 2015 – Most cars using passive key technology to unlock and start cars can be easily hacked. Here's how it is done and how to prevent it.

Preventing the StageFright Attack

August 2015 – What is the Android vulnerability called StageFright and how can you avoid it.

Backup your Google stuff

August 2015 – Two ways to make local copies of your Google saved files. This makes copies of Google drive, Contacts, Calendar, Photos and much more.

Adblockers are necessary

August 2015 – When you go to most news websites about 40% of the data they send you is advertising. This slows your browsing down and increases your cell data fees. But even worse, there is often malware embedded in their advertising. Adblockers are necessary for safe and fast Internet access.

Window 10 Wifi Sense

August 2015 – Wifi sense makes no sense and should be stopped. This article explains the differences between the fantasy and the reality of this kind of childish nonsense.

$30 device to bypass the lock for cars

August 2015 – Link to an Engadget article about how to use a $30 device to bypass the pass codes for most locked cars and some garage doors.

Recommended Windows Programs

July 2015 – My recommended Programs for Windows with links to get them.

Potentially Unwanted Programs

June 2015 – How to prevent PUPS (potentially unwanted programs) sometimes called Foistware. Simple rules and techniques to reduce your exposure to unwanted software installations.

Wonderful Keepass Plug-in

June 2015 – AutoTypeSearch, a Keepass plug-in, pulls up a search if the Auto-Login fails to find a match. This allows you to quickly find and login even when Auto-type fails.

Use Mailwasher Pro to stop spam

May 2015 – Mailwasher Pro is an excellent spam blocking tool used by over 8 million people. It has been around for 14 years and is very well refined.

Auto Login with Keepass

May 2015 – Keepass allows you to log into a website or program with the press of a hotkey (CTRL-Alt-A). This article shows you how to adjust it if the default conditions don't work.

Remove Gadgets

May 2015 – Microsoft discontinued gadgets because of severe security problems including allowing hackers to take complete control of your computer. But, many people didn't get the message and still have gadgets running. Remove them.

Paypal Account Recovery

March 2015 – Paypal allows anyone who controls your email account to take control of you Paypal account. So you need good email passwords.

Stop Using the Android Browser

March 2015 – Android's stock browser is security challenged. Google will not patch it for versions below 4.3 (KitKat). It should not be used.

Credit Report Freeze - Stop Financial Identity Theft

March 2015 – You can stop credit bureaus from reporting on your credit. This will stop creditors from lending to anyone who appears to be you. Identity theft is usually done by taking out credit or renting an apartment in your name. Who might benefit from this and how is it done/

Give someone your Master Password

March 2015 – Password safes are a must, but it is important that someone you trust has your master password to your password safe just in case you get hit by a bus or a toilet seat falls on your head, or something else untoward.

Interesting Phishing scam

March 2015 – Here is a new phishing scam and some prevention techniques.

Backup Your Google Drive

February 2015 – Why you need to make a local backup of your Google Drive and how to do it.

Amazon Account Recovery

February 2015 – How Amazon quickly and easily allows you, or any hacker with access to your email, gain access to your Amazon account and reset your password and then your recovery email address.

SpiderOak New Pricing

February 2015 – Spideroak has changed their pricing structure, providing a lower cost less storage option and a higher cost more storage option, but eliminating the current $100/yr for 100 GB option. Current users with current accounts do not need to change and their option will be honored.

Lenovo Installs Superfish Malware on New Laptops

February 2015 – Lenovo installed very dangerous malware on new laptops from Septmeber 2014 to February 2015. Here's what it is. How to test for it and how to remove it.

The Best Articles of 2014

December 2014 – My own picks for my best articles of 2014 in case you might have missed any.

Google Account Recovery

December 2014 – How does Google handle account recovery (when someone claims to have lost their password) and what you should do to check your settings.

Recent Major Company Breaches

October 2014 – Many major companies experienced security breaches recently losing millions of people's private information. What happened to whom? What attacks will be coming. What can you do?

Have I been Hacked?

October 2014 – Two safe places to check and see whether your email address was compromised in any of a number of security breaches.

Mozilla is protecting their code from the NSA

October 2014 – Mozilla is protecting themselves from an NSA forced backdoor followed by a gag order. Here's how.

Certificate Revocation

October 2014 – What is certificate revocation? How does it work? Why you should change the Firefox Default.

SpiderOak Backup

October 2014 – SpiderOak is a great online backup program, but it needs to be cleaned up some and updated occasionally.

How to Wipe your phone

August 2014 – Before you sell your phone, you need to get your stuff off it. Here's how to do it properly.

Patching your router

August 2014 – Recent research indicates that about 80% of the best selling routers have serious security flaws. Routers are rapidly adding many new features, but even more rapidly adding security flaws. Here is some help patching your router.

Phone Passwords

August 2014 – Phone lockscreen passwords are a hassle. One way to avoid them is to use an App locker instead.

New forms available

August 2014 – I have many useful computer related forms available for you to use.

Passwords on phones and tablets

June 2014 – Easy password entry using Keepass2Android on phones and tablets.

Truecrypt Issues

June 2014 – Lots of controversy surrounds this most accepted encryption program as it shut its doors.

Check Your Backups

June 2014 – It isn't enough to just setup a backup for your computer. You need to check your backups and make sure they are really backed up.

Check your mobile Browser

June 2014 – A site to check whether your browser is implementing SSL (TLS) properly.

Heartbleed Vulnerability. What is it? What to do?

May 2014 – The heartbleed vulnerability is a major problem creating both panic sensationalism and real serious potential problems. We look at what it is, and what to do.

How to use the OCS Website

April 2014 – The OCS Website, http://steveshank.com is a valuable resource. Here's how to get the most out of it.

Hover Before You Click

April 2014 – How to check out links without clicking them to prevent infections from email.

Has you account been compromised?

April 2014 – Troy Hunt's site lets you see if your account has been compromised. It checks 160 million accounts to see if you email address is listed.

Computer Maintenance Basics

February 2014 – How to perform all the monthly maintenance tasks needed to keep your computer safe and profitable.

Private Browsing

February 2014 – How to browse the internet like a bird and leave no trace.

I Wipe Hard Drives

February 2014 – I offer a reliable hard drive wiping and computer recycling service.

KeePass Portable

February 2014 – KeePass offers a good portable version and along with the Kingston traveler flash drive, you can alwas have your passwords with you.

Moda Health Insecurity

February 2014 – A letter I wrote to Moda Health regarding the completely incompetent security. I wish there was a way to get this information to someone who could do something.

Government Security

February 2014 – Is Government security an oxymoron or simply a contradiction in terms? A partial list of government sites that have been hacked recently.

Help With Regular Computer Maintenance

December 2013 – Monthly maintenance should be done on all computers. This includes checking for possible problems and updating. I offer this as a service, but explain here what needs to be done.

Adding Image Backups to your routine

December 2013 – In addition to data backups and online backups, image backups should be standard practice. They allow you go get up and running quickly if the hard drive fails, or Windows goes nuts, or you get a virus.

Stagger your credit reports

December 2013 – Rather than doing all three credit reports once a year; stagger them and do one every 4 months.

Get a second Malware Opinion

December 2013 – In addition to your regular real-time malware anti-virus product, I recommend a monthly check with another product from another vendor. Here's a list of free options for that second opinion.

Time to stop using Windows XP

October 2013 – April 8, 2014 is the end date for Microsoft Support of Windows XP and Office 2003. You must stop using them if you are connected to the Internet.

Password Cracking Improvements

October 2013 – Password cracking has been improving very fast requiring stronger and stronger passwords to be safe.

Daily Computer Maintenance

October 2013 – If you do not turn your computer off at night, you should follow these steps every evening.

Website Automates fake IDs

October 2013 – There is now a website that automates the creation of fake ID scanned copies.

Printing from Keepass

October 2013 – How to print from Keepass password safe. This article shows you how to print single entries, groups, or the entire database as well as to configure your output.

Collection of Articles about the Snowden Papers

October 2013 – The Snowden papers represent one of the most important events in modern American and possibly world history. Here are some links I've found most interesting.

Testing Your Secure Connections

August 2013 – SSL Labs provides a tool to check your secure connections to the Internet. I show how to interpret the test and recommend using it on your banks, credit cards, medical centers, and anyone who holds your credit card information.

Syncing Keepass with Mobile Devices

August 2013 – How to sync your Keepass safe between your phone, tablet and desktop computers

Switch from Secunia to Ninite Updater

August 2013 – Ninite Updater is an excellent service to quickly and safely update your most important software. I recommend using it instead of Secunia PSI.

TrustGo Security

August 2013 – TrustGo is an Android antivirus and security app that provides good protection as well as lots of other security features including lock, find and wipe.

Petition Government to stop spying on citizens

August 2013 – 2 petitions that form a strong movement to reel in some of the NSA activity of spying on American citizens. Each taking a different approach. Each done by a strong respected organization.

Using Truecrypt

June 2013 – Truecrypt is excellent for encrypting your files, however, there are many different ways to use Truecrypt to work properly given specific objectives. This article explores a few of them.

My Favorite Android Tablet Apps

June 2013 – These are my current (May 29, 2013) favorite Android Apps for my tablet. Perhaps you'll find something new in here.

Who's got your back?

June 2013 – The Electronic Frontier Foundation's (EFF) 2013 annual report on how major online companies either fight or do not fight for our online privacy.

How Miscreants make money by hacking your PC

April 2013 – Miscreants can make money from attacking your computer even if you just use it for email. Sometimes people don't think they are a target because the information on their computers is not valuable. They are wrong. Here's why.

Enable Click to Play

April 2013 – Due to the continuous litany of threats from browser plug-ins like Java and Flash it is important to set those plug-ins off by default. This will prevent "drive-by" attacks. Fortunately both Firefox and Chrome make it easy to do this. Here's how.

Maintenance Service

April 2013 – To keep your computer safe and profitable, it is necessary to do monthly maintenance. Here is the checklist I use to do it, and some explanation of how it works. I also offer a service where I'll do it for you every month, or quarterly, or I can simply work with you as needed to teach you exactly how to maintain your own computer.

9 Rules for safe Computing

April 2013 – 9 simple rules for keeping your computer safe from viruses and malware.

Secure Internet While Traveling

February 2013 – When connecting to uncontrolled hotspots at cafes or motels you gain a lot of security by using an SSL VPN service to protect your communications from eavesdroppers.

Safe Log ins

February 2013 – People log in to websites backwards. This causes them all sorts of problems. Email gets hacked. Passwords lost. Problems logging in. All this will end if you create your passwords and log in to important sites frontwards, instead of backwards. You begin with your password safe, then the website.

Yahoo Mail Turn on SSL

February 2013 – Yahoo Mail now has the option to access your email using SSL. You should enable this option. It is much more secure. Here's how.

Interesting Outsourcing Event

February 2013 – American Infrastructure Employee secretly outsources his job to a Chinese contracting firm. This throws his company's security team into a panic as their secure VPN channel is being used by unknown Chinese, despite requiring two factor authentication.

Zeus Trojan

December 2012 – The Zeus Trojan is one of the most widespread Botnet Trojans ever created. The code has been sold and the software is now well documented and supported along with add-on modules and feedback for new features.

Turn Off New Vipre Auto Update

December 2012 – Vipre Internet Security now offers security updates for other software. However, it is implemented poorly and should be turned off. Currently it is more likely to hurt than to help.

SpiderOak Tips

December 2012 – Managing File content in Spideroak Backups. Making sure you do not waste space, or have thousands of copies of a file.

Use Firefox's Plugin Checker

December 2012 – Use Firefox's Plugin Checker to keep all you plugins patched.

Three Interesting Books

December 2012 – Two Tech thrillers by Mark Russinovich and a biography by Kevin Mitnick are reviewed

Check your System Tray

October 2012 – It is critical that people learn to check their system tray as many programs are trying to alert you regarding problems they see. I review messages coming from my system tray.

Understanding Password Storage

October 2012 – How are passwords stored? What are hash tables and salting? What are the clues that a website is using insecure methods?

Rules for Online Storage

October 2012 – 4 simple rules for safely using online storage.

More DropBox Security Issues

October 2012 – What the latest DropBox security breach tells us about the company. What did they do wrong?

Keepass Custom Fields

August 2012 – KeePass offers custom fields for each entry. These can be very useful for Security Questions and account numbers that may need to be filled in on a website. They allow you to select the field and copy it without having to scroll through the notes and hightlight and copy.

New Secunia

August 2012 – Secunia has updated to version 3. This new version does a better job of updating you automatically.

Firefox Plugin Check

August 2012 – Browser plugins are modules added to your browser to enhance its capability. For example to play flash video or run Java applications. Sometimes these plugins should be updated. Firefox's Plugin Check, enables you to check and update your Firefox Plugins.

Why government cyber attacks hurt us

June 2012 – The computer security landscape has changed since governments began buying exploits from hackers and paying over $100,000 for an exploit. This changes the economics of hacking and will make the Internet more dangerous.

The Economics of Malware

June 2012 – An examination of how the Flashback Virus that attacked 600,000 Macintosh computers generated about $3.5 million for its owners. It snagged Google searches and grabbed the ad-click revenue from them.

LinkedIn Breach

June 2012 – LinkedIn lost the hash of 6.5 million passwords, and this breach has some lessons for all of us. You need to make passwords that are unbreakable even if the hash is stolen.

Security Breaches

June 2012 – Security breaches are so common, that Robert Mueller, current director of the FBI says that there "are two types of companies those that have been hacked and those that will be." I found a couple of sites that list the major breaches so far this year.

Imaging Your Hard Drive

April 2012 – Doing a monthly image of your entire hard drive allows you to quickly get up and running in case of a bad virus infection, Windows going crazy, or hard drive failure. It provides an additional data backup as well.

Forms you can use

April 2012 – I have a few forms that should help you working with security and your computers. They are in PDF format and freely available for use.

Interesting Websites

April 2012 – 4 websites I found particularly interesting. Google Art Project, checking your lifespan and life expectancy and SpotCrime, checking the crime in your neighborhood.

Turn Off WPS

February 2012 – When configuring your router, it is important to turn off WPS because it is a gigantic security hole. Here's how.

Excellent New Email Attack

February 2012 – This is a clever new email phishing attack that very much impressed me.

21st Century Passwords

December 2011 – Making strong passwords for small form factor devices

Check your scam detector

December 2011 – A test to determine if you can detect scams on the Internet.

How Windows Gets Infected

December 2011 – How does Window's computers get infected and what can you do about it.

What is Java?

December 2011 – What is Java and why do you need to keep it up to date.

No. Never buy from an Ad

December 2011 – Why you should never click on any link to buy anything

Introduction to KeePass

October 2011 – An introduction to Keepass password safe.

Why switch to KeePass

October 2011 – Reasons to quit using OCS Passwords and move to Keepass password safe.

How to switch to KeePass

October 2011 – Switching from OCS Passwords to KeePass.

KeePass Quickstart

October 2011 – A Quickstart Guide to Keepass password safe.

How to make a good master password

October 2011 – How to make a good master password.

Creating Passwords with KeePass

October 2011 – How to create passwords with Keepass password safe.

HotKey Login with KeePass

October 2011 – How to setup Keepass to log you into websites with the press of a single hotkey.

Getting the most from KeePass

October 2011 – Important tools for making KeePass even more effective.

Video Links to KeePass

October 2011 – Screencasts I've made to help with getting the most from KeePass.

Dropbox Issues

August 2011 –

Android Security Issues

August 2011 – Android security issues and a new Android antivirus answer

Costs reduced for Cyber Criminals

August 2011 – New low cost and free software make becoming a cyber criminal cheap and easy.

DropBox Insecurity

June 2011 – Why Dropbox is insecure and more secure options.

Minimizing your online backup size

June 2011 – How to reduce the size of your backup with MySecureBackup.

Quarterly Maintenance Checks

June 2011 – An OCS service: Quarterly Maintenance Checks

Security News

June 2011 –

An Insecure Router Could Send You to Jail

June 2011 – What you need to know to secure your router and what could happern if you don't.

Safest way to Escape Rogue Antivirus Programs

April 2011 – What to do if you are attacked by a Rogue Anti-virus program.

2 Online Site Scanners

April 2011 – 2 online site scanners

Japan Donation Scams

April 2011 – Making sure you don't get trapped by Donation Scams

Gawker Security Breach

February 2011 – What we can learn from the Gawker Security Breach

Internet Explorer, Insecure Again!

February 2011 – Microsoft continues to ignore security flaws in Internet Explorer.

New MySecureBackup Login

February 2011 – Mysecurebackup gives you a new and better way to login to your account and access files.

New Secunia PSI

February 2011 – Secunia and updated and improved the already great Secunia PSI

Excellent Firefox Security Extension

February 2011 – SSL Personas is a wonderful 'in your face' security extension for Firefox

More Open Wifi Problems

December 2010 – Firesheep adds to the growing issues surrounding open wifi hotspots

Windows Remote Library Execution

December 2010 – How to patch Windows Remote Library execution flaw.

Mirrored Hard Drives

December 2010 – It is very inexpensive to have mirrored hard drives in new computers, and it provides big benefits.

Layered Security 2010

September 2010 – A detailed overview of all the different layers necessary to prodtect your computer. Including routers, anti-malware products, anti-virus, intrusion detection and more.

Preventing Rogue Antivirus Programs

September 2010 –

Excluding Folders from Vipre's Active Protection

September 2010 –

Reducing Your Online Backup Size

July 2010 – Reducing Your Online Backup Size

PDF Encryption

July 2010 – PDF Encryption

SSL Part 2: Certificate Authorities

July 2010 – How SSL Works: Part 2- Certificate Authorities

News

May 2010 – Security News

How SSL Works

May 2010 – How SSL Works

Secure Internet Connections while Traveling

May 2010 – How to set up a trusted connection to the Internet while traveling.

Renewing Nod32

May 2010 – Great product, but not easy to renew your license. Sunbelt's Vipre is an excellent alternative.

Adobe Acrobat Security Issues

March 2010 – Adobe Security Issues

Email Security Tip

March 2010 – Email Security, spotty phishing

David Cornelius Addition

March 2010 – Finding the Java control panel in 64 Bit Windows

Blink card

January 2010 – RFID Credit Cards

Mozilla plugin security

January 2010 – Mozilla Browser Plugin Checking

Security Issue

November 2009 – Secure Login

Paypal Security

November 2009 – Paypal Security

Spam Works!

August 2009 – Spam Works!

Controlling Firefox Updates

August 2009 – Controlling Firefox Updates

MySecureBackup

August 2009 – My Secure Backup

News

July 2009 – MRI Machines infected with Conficker Worm

Noscript

July 2009 – NoScript

Hard Drive Maintenance

July 2009 – Hard drive Maintenance

Update Secunia

July 2009 – Update Secunia

Basic Rules for Browsing

July 2009 – Simple Rules for Browsing

Security Tip

July 2009 – Security Tip, Financial email address

MS - Here we go again

July 2009 – Microsoft OneClick, another debacle

Critical Paypal Fix

May 2009 – Paypal Security Flaw

A Virus Threat

May 2009 – A Virus Threat

Identity Theft Economics

May 2009 – Identity Theft Economics

Security Myths Exposed!

March 2009 – Security Myths Exposed!

Security Truths Exposed!

March 2009 – Security Truths Exposed! How they trick you into installing malware and what the malware economy is like.

Security Alert

March 2009 – Updating Certificates - MD5 Alert

Phishing test

December 2008 – A Phishing Test

Two New Security Threats

December 2008 – Two new security threats

TrueCrypt Updated

December 2008 – TrueCrypt update

2 Firefox Tips

October 2008 – Two Firefox Tips

Security News and Tips

October 2008 – Security News and Tips

Testing Passwords

September 2008 – Testing passwords

Updating Traps

September 2008 – Avoid Updating Traps

OpenDNS

July 2008 – OpenDNS

PSI - Secunia program

July 2008 – PSI- Secunia Program

Layered Security

May 2008 – Layered Security

Site of the Month

May 2008 – Site of the Month

Ibackup Updates

May 2008 – Update Your Ibackup

News you Can't Use

May 2008 –

Q&A - Update Flash?

May 2008 – Updating Adobe Flash Player

Security News

January 2008 – BotMaster Controls 250,000 Zombies

Safer USB Drives

January 2008 – Safer USB Drives

How to Decipher Links

July 2007 – Being able to read and decipher links and email addresses can help you avoid online phishing scams.

WEP Needs to Die

June 2007 –



 
 
  Copyright © 2005-2017 Steve Shank--ALL RIGHTS RESERVED
Please direct questions/suggestions about website to the webmaster