|
Post by Handy on Nov 10, 2019 17:39:52 GMT -5
DryCreek They gamble on people feeling guilty and paying out of fear.
I agree with DryCreek.
The password that got hacked on one of my accounts now has a Bio-Hazard symbol and I can't access the site so I assume the hackers took over the whole site. I haven't used that site in 10 years and I am guessing the site owner didn't have a strong password.
|
|
|
Post by DryCreek on Nov 10, 2019 18:26:51 GMT -5
Food for thought from the world of security...
Reusing passwords is a really bad idea. Using simple passwords is also a really bad idea. Trying to remember a ton of complex, unique passwords is also a really bad idea.
A good idea... use a password safe like 1Password, SplashID, etc. to store your passwords securely. The better ones have browser plug-ins that will automatically paste in the site’s password for you once you enter the code to unlock the password safe. And they will sync between your laptop, phone, tablet, etc. - because losing this file makes for a Really Bad Day.
If you do this, then it makes a lot of sense to use super-strong, random passwords, like 20 characters long. You’re just copy & pasting, so make it count! And no reason not to make every site it’s own password.
Then, the only passwords you need to remember are the ones to unlock the password program, your laptop, and your phone. You can remember 3 really good passwords, like 1YellowBird&Snuffleupagus!
|
|
|
Post by Handy on Nov 15, 2019 15:57:06 GMT -5
If people are concerned about web sites not being secure, perhaps you should investigate how many companies are tracking your Internet activities. I upgraded some software on my computer and one free program I have been using is CCleaner www.ccleaner.com/ccleanerI run this program before and after every Internet session. Why so often? It supposedly wipes out the tracking cookies(?) websites place on your computer and more important to me, websites that you never thought had the privilege of tracking you. I do not have a Facebook, twitter, or Amazon accounts but they all show up as tracking agencies. I do not use Microsoft Explorer but they track me. Just using the CCleaner in a basic mode claims to remove the trackers but they are back almost every time I start a new Internet session. I understand if I used a VPN service it might make tracking me more difficult but since I am not an internet expert, here is a link to describe a VPN and its advantages. www.ccleaner.com/news/blog/what-is-a-vpn-and-why-do-i-need-one
|
|
|
Post by lessingham on Nov 18, 2019 5:45:15 GMT -5
It is probably a long redundant site then. I hope I am blackmail proof as I really do not give a stuff what people think of me. It is the old saying, dog bites man is not news, man bites dog is. Midfle aged guy jerks off to internet porn, yawn.
|
|
|
Post by Handy on Jan 2, 2020 9:35:07 GMT -5
Yesterday I was on the Internet and 9 different companies were following me. Today I only logged on to IKIASM and the same 6 companies were tracking me again. 19 other request were registered in my privacy tracker app. One day I had 34 or 38 companies tracking my internet usage. According to Privacy Badger, here are the companies tracking ne and most likely you. Privacy Badger was developed by the "Electronic Frontier Foundation supporters.eff.org/donate/support-privacy-badgergoogleleads g doubleclick.net staticdouble click .net www.google-analytics.comwww.google.comcdn.viglink.com www.youtube.com
|
|
|
Post by Handy on Oct 27, 2020 9:10:37 GMT -5
I logged on to my email account today and 56 different companies are following me on the Internet. I suggest that everyone should have Privacy Badger add on. Others privacy add ons are Ghostery (49 tracking me) and Privacy Possum Privacy Badger was developed by the "Electronic Frontier Foundation
|
|
|
Post by Handy on Mar 27, 2021 13:25:16 GMT -5
This is not about computer security but about making your computer a little faster. Someone gave me a desktop computer that was painfully slow. I erased everything and started over with a new Windows 10 (W10) install and then because W10 has many features I would never use, I deleted those features with a highly recommended program "Revo uninstaller." That helped process (new W10 + getting rid of the bloat wear) but the computer was still slow. I added RAM from 4 GB to 8GB. That helped a little. Next I changed the traditional hard drive with spinning disks to an Intel brand solid state drive. That helped a little more. Changing the CPU was next possible change but it is soldered to the mother board. There is only so much speed with a person can get out of a 1.6 mHz CPU. I bought all of the parts used so I have less than $40 in the computer. I also decided to change the hard drive in my main computer and replace it with a new $40 250GB PNY SC900 brand SSD (solid state drive). now things are really fast to load and to switch between programs or tasks. There were several hard drive cloning programs advertised as "free" but only one was actually "free" and worked. It was "Macrium Reflect." I am self taught so no expert but I will advise and endorse a few of my "go-to" programs which I download from www.filepums.comSkip using the "pro" versions, Look for and UN-click the options, do not select or unselect the "start at boot" option. Starting at boot slows down your computer. Do not agree to send feedback. The less data you send the better. CCleaner (run daily) Glary Utilities (run daily) Revo uninstaller (use instead of windows program removal) Super Antispyware (not required if you run CCleaner and Glary Utilities everyday) Macrium Reflect (only when you need to clone a harddrive.
|
|
|
Post by jerri on Mar 27, 2021 23:34:41 GMT -5
Thanks, Handy. Do you use malwarebytes? or does Ccleaner take care of that? I use Ccleaner on my other devices.
|
|
|
Post by Handy on Mar 28, 2021 0:50:00 GMT -5
I use malwarebytes (MWB) about once or twice a month in manual mode. I had a paid version for a year that ran all of the time but I didn't see the need to have it running all of the time. It might have blocked a suspected malware intrusion once in the year I had it running all of the time. CCleaner I think, mostly removes temporary files and doesn't do what MWB does. Many place a person visits on the Internet install temp files on your computer. I used Superantispyware on friends computer and found over 3,000 files that supposedly track and report back to companies to say what you looked at. I dislike anyone following my Internet usage. When I use CCleaner at the end of the day or in the middle of the day, I very rarely have anything show up when I run Superantispyware so maybe once a month I run Superantispyware just to be sure no company is following and my computer is not reporting where I go on the internet. CCleaned does not eliminate the companies that are following me in live following mode. Right nowPrivacy Badger shows 5 different companies are following me while I am on ILIASM. On other sites, up to 35 companies might be live following me and everyone else that is on that particular site. The Glary Utilities program is my favorite program. Glary has a feature that tells me if a new version of several programs has been released. It is also good for many other things too numerous to mention here. All programs have a learning curve so it takes time to get the benefits of each program. I use Windows Defender anti-virus because I was to;d by my computer professional friend and some other people in the know, some of the companies that make other anti-virus programs are not as fast at discovering computer virus.
On my house phone I have spam blocker running at the phone company level, but that is another annoyance I have to deal with. Five to ten nuisance calls a day are eliminated.
When I first started using computers I bought the programs and many of the up-dated in the software market. I became very disappointed with up-dates so I rarely buy the big company name up-dates. I used to somewhat own programs and now companies want to rent you the software for a year. I am still running software I bought in 2000 but I update all of the free stuff very regularly. I do buy new tax software every year but my record keeping / business software is from 2010 and 2011.
|
|
|
Post by lwoetin on Mar 28, 2021 3:03:00 GMT -5
I am tempted to add an SSD drive for Win10 and programs but I am too lazy and it takes too much time probably. I'm okay with waiting for win10 to start up and programs to switch. It might be personality defect of mine. If it ain't broke...
|
|
|
Post by Handy on May 11, 2021 1:20:02 GMT -5
I like SSDs
On a serious note, but put to humor, Watch John Oliver's interview with Edward Snowden. The first 14 minutes give some back ground but the real humor (but a very serious topic to me-Internet and phone spying) /comical part starts a little after the 14 min mark.
Government Surveillance: Last Week Tonight with John Oliver (HBO 2015)
|
|
|
Post by Handy on Oct 31, 2021 12:34:59 GMT -5
Windows 11? Any opinions and willl W11 be more secure and less prone to viruses, crooks encrypting my computer or stealing some of my data? I have two different W10 computers but I do not think the CPU has some of the features needed to run many of the new security features.
Most of the names for different functions are new to me
Go down the page to "1. Download Microsoft's PC Health Check here. Open the file, agree to the terms of service and click Install. Make sure the box is checked that says Open PC Health Check, and click Finish. " to download the test file.
www.microsoft.com/security/blog/2021/06/25/windows-11-enables-security-by-design-from-the-chip-to-the-cloud/With Windows 11, we’re making it easier for customers to get protection from these advanced attacks out of the box. All certified Windows 11 systems will come with a TPM 2.0 chip to help ensure customers benefit from security backed by a hardware root-of-trust. The Trusted Platform Module (TPM) is a chip that is either integrated into your PC’s motherboard or added separately into the CPU. Its purpose is to help protect encryption keys, user credentials, and other sensitive data behind a hardware barrier so that malware and attackers can’t access or tamper with that data. PCs of the future need this modern hardware root-of-trust to help protect from both common and sophisticated attacks like ransomware and more sophisticated attacks from nation-states. Requiring the TPM 2.0 elevates the standard for hardware security by requiring that built-in root-of-trust. TPM 2.0 is a critical building block for providing security with Windows Hello and BitLocker to help customers better protect their identities and data. In addition, for many enterprise customers, TPMs help facilitate Zero Trust security by providing a secure element for attesting to the health of devices. Windows 11 also has out of the box support for Azure-based Microsoft Azure Attestation (MAA) bringing hardware-based Zero Trust to the forefront of security, allowing customers to enforce Zero Trust policies when accessing sensitive resources in the cloud with supported mobile device managements (MDMs) like Intune or on-premises. Raising the security baseline to meet the evolving threat landscape. This next generation of Windows will raise the security baseline by requiring more modern CPUs, with protections like virtualization-based security (VBS), hypervisor-protected code integrity (HVCI), and Secure Boot built-in and enabled by default to protect from both common malware, ransomware, and more sophisticated attacks. Windows 11 will also come with new security innovations like hardware-enforced stack protection for supported Intel and AMD hardware, helping to proactively protect our customers from zero-day exploits. Innovation like the Microsoft Pluton security processor, when used by the great partners in the Windows ecosystem, help raise the strength of the fundamentals at the heart of robust Zero Trust security. Ditch passwords with Windows Hello to help keep your information protected. For enterprises, Windows Hello for Business supports simplified passwordless deployment models for achieving a deploy-to-run state within a few minutes. This includes granular control of authentication methods by IT admins while securing communication between cloud tools to better protect corporate data and identity. And for consumers, new Windows 11 devices will be passwordless by default from day one. Security and productivity in one. All these components work together in the background to help keep users safe without sacrificing quality, performance, or experience. The new set of hardware security requirements that comes with this new release of Windows is designed to build a foundation that is even stronger and more resistant to attacks on certified devices. We know this approach works—secured-core PCs are twice as resistant to malware infection. Comprehensive security and compliance. Out of the box support for Microsoft Azure Attestation enables Windows 11 to provide evidence of trust via attestation, which forms the basis of compliance policies organizations can depend upon to develop an understanding of their true security posture. These Azure Attestation-backed compliance policies validate both the identity, as well as the platform, and form the backbone for the Zero Trust and Conditional Access workflows for safeguarding corporate resources. This next level of hardware security is compatible with upcoming Pluton-equipped systems and also any device using the TPM 2.0 security chip, including hundreds of devices available from Acer, Asus, Dell, HP, Lenovo, Panasonic, and many others.
|
|