Don’t Buy Windows Vista

If you don't want bad press, try making a better product.
(Image used under: Fair Use doctrine)

That seems to be an undercurrent (or more than an undercurrent) of thought on the web. Here is a list of 10 good reasons not to buy Vista.

The point about Windows being released with the need for a hardware upgrade is something I can relate to. When XP came out and I was still working retail, they were recommending a Pentium 333Mhz with 256Mb of RAM. I told people not to even try XP without a bare minimum of 400Mhz and 512Mb of RAM.

My experience is that they list what it takes to make the computer not fail when loading, not what it takes to make it run decently. And from Badvista.org, where I found the link to the top 10 list, I also found this article:

Vista is being marketed to content producers, not consumers... These changes won’t enhance user security unfortunately as they were designed to protect only “premium content ?... The new Vista scheme signals to me that they have exhausted new customer acquisition and are now focused on milking their existing market.

Ouch. Well, if you don't want bad press, try making a better product.

Tags: , , ,

RFID Tattoos for Soldiers

Uh. Oh." (Image used under: Creative Commons 2.0 [SRC])

Hmm…. Prime cuts of meat… and military personnel. In the same sentence. I realize that military people have a reduced set of rights compared to civilians, but they deserve respect, not to be tagged like a piece of meat.

"It could help identify friends or foes, prevent friendly fire, and help save soldiers' lives," he said. "It's a very scary proposition when you're dealing with humans, but with military personnel, we're talking about saving soldiers' lives and it may be something worthwhile."

Tag our soldiers with wireless beacons? Sez one militant to another "That guy looks American." Other: "Yeah, I scanned his chip, he is". First Militant: "Ok, let's shoot him".

Tags: , , ,

Trying to “Fix” the No-Fly List

Monday, March 4th, 2019 (No comments yet)
Privacy, US Goverment
Too bad if you're innocent, you're not flying anyway.
(Image is in the Public Domain)

In a Washington Post article, they address the problem of false positives, where an innocent person is "wrongly detained" because their information is similar to someone's on the no fly list.

A specific example in the article is of Keiran O'Dwyer, a veteran American Airlines pilot who has been stopped and questioned over 80 times since 2003. They say that besides him, there are around 15,000 people, per week, that apply for redress for being mistakenly targetted due to TSA's screening systems.

An agency official said in an interview that the system, launched in February 2006, has eliminated about 17,500 detentions involving people entering the country at airports, seaports and at land borders. It is part of what the government says is an effort to prevent terrorism while not inconveniencing travelers or violating their privacy and civil liberties, though it is not yet applied to domestic flights.
Tags: , , ,

Tax Refund Loan Scam is Completely Avoidable

Monday, March 4th, 2019 (No comments yet)

Listen folks, have a little patience. If you’re going to get a refund, that’s great, but don’t under any circumstances give part of it away to a tax preparer. It’s just throwing away money.

Tags: , , ,

TJ Maxx and Marshalls Hacked (Yawn)

Monday, March 4th, 2019 (No comments yet)
Businesses, Privacy, Security
You wouldn't have lost it if you didn't take it in the first place.
(Image used under: Creative Commons 2.0 [SRC][Mod])

In a not so surprising story, some large chain stores have been hacked and had their databases of customer information stolen creating a risk for their customers.

The end result is that consumers are often left completely in the dark when data breaches occur, wondering if they dodged a bullet, or if the inconvenience and frustration of fraud is simply waiting to hit them at a later date.

I hate these stories. If they didn't store so much data in the first place, this wouldn't even be a problem.

Tags: , , ,

Domino’s Exposed for Taking and Storing Customer Data Forever

Monday, March 4th, 2019 (No comments yet)
Businesses, Privacy
Data collection is everywhere; including the pizza store
(Image used under: Creative Commons 4.0 [SRC])

In the Washington Post was a nice article explaining how even a normal average citizen can be tracked during her whole day through technology that exists right now. From the article:

Domino's tracks her name, phone number, address, and size and type of pizza ordered. Unless a store decides otherwise, the data are held forever. That way, Domino's can provide more personalized service -- "Hi, Ms. Bernard, would you like your regular -- mushroom and sausage?"

She didn't ask them to store it, and they didn't ask her permission, they just took it. No company should be allowed to do this unchecked.

Bernard's credit card companies know her income and her shopping habits. They can share her information with affiliates without her permission and need not stop even if she asks them to.

Cheery.

Tags: , ,

Warantless Wiretapping Gets Oversight?

Monday, March 4th, 2019 (No comments yet)
Privacy, US Goverment
Maybe, just maybe, people should be free from surveillance if they're not doing anything wrong?

Read about it here.

The question is, what will happen now that it's being monitored by the court that should have been monitoring it in the first place? Why is Bush allowing this? It can only be because he thinks they won't do anything about it.

Tags: , ,

Best Buy Fights the Devil

Sunday, March 3rd, 2019 (No comments yet)
Businesses, Privacy
Best Buy wants to know if you're a good person or a bad... for profits anyway.
(Image used under: Fair Use doctrine)

Sixwise gives and in-depth review of Best Buy's plan to "actively…eliminate " what they call "devil" customers. I've written about this before, but I like how they list specific actions that could land you on the "blacklist".

Most notably, this is the advent of "customer reports" similar to credit reports where you will be assigned a number based on profitability and treated accordingly. If you don't want to see that happen, make sure you let your legislation know.

Tags: , ,

Pretexting Becomes Illegal

Monday, March 4th, 2019 (No comments yet)
Businesses, Privacy

From the Ars Technica article:

Under the new law, anyone attempting to "knowingly and intentionally" acquire the phone records of a third party by making false representations to a phone company or selling such illegally obtained records will face up to ten years in prison and fines.

Is it just me or does this seem really wrong? Why did we have to make a law about this? Wasn't it obviously a bad thing already?

Tags: ,

FBI Aren’t Snooping Alone – CIA and Military Take and Keep Info

Monday, March 4th, 2019 (No comments yet)
Privacy, US Goverment
If you're not doing anything wrong, the government should leave you alone!
(Image is in the Public Domain)

Here's a snippet from Ars Technica about how it's not just the FBI abusing power these days. From the article:

Wired's Ryan Singel adds a bit more to the story with the tidbit that the Pentagon plans to hang on to the records and feed them into TALON, the database project that the military uses for the data-mining part of its anti-terrorism efforts. Great! This is especially encouraging in light of the comments of Pentagon officials quoted by the Times who claim that these records are typically used to knock names off of the suspects list. In other words, they look at the records, determine that Mr. Smith is completely innocent, has no ties to terror, and got his money legitimately, then they promptly feed his data into an anti-terror database.
Tags: , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

computer security Tutorial
|INDEX|next: Spyware Scanners

Security Software

Make sure you have a up-to-date Anti-Virus Program to protect you against bad websites or files.
Sometimes spyware gets in your computer and the anti-virus won't stop it. Use a spyware scanner to find and remove spyware and adware.
Use a software firewall to detect bad code on your computer when it tries to connect to the Internet.
Always keep your system up to date with security patches or none of the rest of your security software will matter.
Use an encryption tool to protect your important data when storing or transmitting it.
Switch to Firefox for your web browsing and you'll be better protected from Internet threats.

Safe Computing Practices

Don't get tricked by fake alerts or clever webpages into downloading viruses or spyware!

... or check out any of my other guides and tutorials by clicking here!

Anti-Virus

A virus can come from files, e-mails, web pages, or even devices you plug in (like thumbdrives or printers) and destroy your files or your computer once they get in. An anti-virus is software designed to detect and prevent that from happening.

[Click for full description]

Spyware Scanners

Learn how to detect and remove spyware and adware using a free scanning tool.

[Click for full description]

Software Firewall

Learn what a firewall is and why you want one on your computer.

[Click for full description]

Operating System Updates

Make sure to keep your operating system up-to-date with security patches or else none of the rest of your security software will be able to protect you.

[Click for full description]

File Encryption

Learn how to protect your important files on your computer or when transmitting them with free tools for file encryption.

[Click for full description]

Mozilla Firefox - Internet Browser

There are many browser choices out there. Read why I think Firefox is one of the best.

[Click for full description]

Fake Alerts

Maybe you've done everything right and you're computer is sufficiently fortress-like, but then you or someone in your family falls for a simple scam that tricks them into directly installing the bad guy's virus! Learn how to spot and ignore fakes!

[Click for full description]