WellPoint Data Breach Due to Carelessness

Surprise, surprise. A company has giant data breach due to negligent security, but not to worry! They'll protect you by offering you credit monitoring for one year free!

Credit monitoring is a waste of your time and is likely only offered to make it seem like they're doing something for you when they probably don't. I wouldn't be surprised to find out that the credit monitoring companies have a "data breach plan" where companies can get a bulk discount by offering monitoring to all their victims.

It's a classic win-win-lose. The breach company wins PR points, the monitoring companies continue to make money for not providing any real service, and we all lose.

If you're worried about id theft, just freeze your credit reports!

Tags: , , ,

How to Save Your DVDs From the Kids by Ripping Them to Your Computer

(Image is in the Public Domain)

With the kids constantly losing, scratching, or breaking DVDs, I've been looking into building a home media center for a while. I'll get my DVD's, copy them to the computer, and play them from there (kind of like Hulu or Netflix on-demand). If you think that sounds like a great idea, check this out:

Are you looking to for a way to play your media DVDs without rifling through your collection and swapping discs? Today we’ll take a look at ripping a DVD to your hard drive and playing it with some popular media players.
There are some easy tools available for copying DVDs to your computer

This doesn't go into the particulars of how to build a good machine or hook it to a TV, but it's a great start for the software side of it. They recommend some software that costs money, but there are always alternatives or if it's good enough, it might be worth the money anyway.

Tags: , ,

Twitter Warned By Government For Security Breaches

(Image used under: Creative Commons 2.0 [SRC])

So it's not just Facebook that's full of holes and privacy issues. Twitter has been warned by the Federal Trade Commission for their "serious lapses in data security".

The FTC had originally accused the social media service of making private tweets and the login credentials of users easily available to "hackers" between January and May of 2009. During that time, someone was able to gain administrative access to Twitter's system (and therefore access to thousands of user accounts, passwords, direct messages, and more) simply by using password-guessing software. That user reset numerous user passwords, allowing others to access those accounts.

As is always the case, when not required to provide adequate security or privacy, most companies will do what they can get away with and no more. If there's no penalty for doing a bad job, don't be surprised when they don't.

Tags: , , ,

Big Bang Theory – Bazinga

Bazinga! A graphic representation of one of the funnier moments in the Big Bang Theory show
(Image source is unknown)

This is my first post in a continuing series I'm going to call "Geek Culture". Like many other societal groups in the world, geeks have certain tendencies, traits, features, and history. I've decided that now might be a good time to begin sharing some with you.

First up: some fan art (artist unknown) from one of my all-time favorite shows – bbt

I don't know where this came from, but the furthest I can trace it so far is here.

Tags:

Government Employees Have No Privacy on Government Devices

(Image is in the Public Domain)
The city obtained a transcript of Quon’s messages during an investigation to determine whether officers were using their pagers for personal messages. The transcripts showed that Quon had been exchanging sexually explicit messages with his wife, his girlfriend and another SWAT team member.

In the end, the US Supreme Court ruled that for government employees at least, there is no privacy for your use of government furnished equipment.

To me, this is no shocker. What does surprise me is that this made it all the way to the Supreme Court! This guy really wanted someone to blame since obviously someone who's cheating on his wife AND his two girlfriends shouldn't be pointing fingers at himself.

Tags:

Owning Apple Products May Be More Dangerous Than You Think

Apple Corp.
(Image used under: Creative Commons 2.0 [SRC])

As illustrated by The Oatmeal, you may suffer more than you imagined for loving your apple products. Take a look and decide for yourself though it does get a little raunchy in parts (fair warning).

Tags: , , ,

Police Calm Rioting Teens Peacefully With Ice Cream Music

(Image used under: Creative Commons 2.0 [SRC])

This is much better than beatings and bullets:

Nursery rhymes set to music are deeply uncool. Just ask the bottle-throwing teenagers on the Twinbrook estate on outskirts of west Belfast. Ice cream music was played to them as they misbehaved and it stopped them.

The rest of the article talks about how they were trying to solve the issue with humor and not violence, and yet these police heroes instead got scolded by their command. Not only was this awesome, there are many other examples where a non-violent solution was effective.

Further down in the article is an example where a Los Angeles gang was removed from an area by renaming the street "Gay Street" and "Pansy Square". A commenter mentions that a New York bus terminal was cleaned up by playing classical music instead of rock. And of course there's the Arizona sheriff who found that making prisoners wear pink underwear made them less likely to fight each other.

Tags: ,

12 Year Old Boy Uses World of Warcraft Skills to Save Sister’s Life

(Image used under: Fair Use doctrine)

So you think all those online games rot your brain, make you slovenly, and are a complete waste of time? You're still right, but there are some unexpected benefits it seems.

A Norwegian boy who apparently plays the popular online game, World of Warcraft, used the skills he learned in the game to save his sister and then himself from an angry Moose.

Hans and his sister got into trouble after they had trespassed the territory of the moose during a walk in the forest near their home. When the moose attacked them, Hans knew the first thing he had to do was ‘taunt’ and provoke the animal so that it would leave his sister alone and she could run to safety. ‘Taunting’ is a move one uses in World of Warcraft to get monsters off of the less-well-armored team members.

Once Hans was a target, he remembered another skill he had picked up at level 30 in ‘World of Warcraft’ – he feigned death. The moose lost interest in the inanimate boy and wandered off into the woods. When he was safely alone Hans ran back home to share his tale of video game-inspired survival.

Tags: , ,

Australian Government Getting Worse and Worse

(Image is used under the Pixabay license)

Australia has so much Big Brother nastiness going on, sometimes they make even the UK look tame!

The newest development comes where the government is demanding service providers to store all e-mail and possibly web browsing history for all its subjects citizens.

According to the directive, where internet access is concerned, this means the ISPs must retain the user ID of users, email addresses of senders and recipients of email, the date and time that users logged on and off from a service, and their IP address — whether dynamic or static applied to their user ID.

Like most ideas of this nature, it's sold with a plausible premise of catching criminals, but if innocent people are to accept such an invasion, it must first be shown that:

  1. The data actually DOES help catch bad guys.
  2. The data won't be abused and misused by the government.

In the US, we fail most consistently on the second. I don't know, but I'm going to guess that Australia's track record isn't a lot better.

Tags: , ,

Smart Money Advice – How To Afford Anything

(Image used under: Creative Commons 2.0 [SRC])

This is some great stuff:

If big business has its way, which it usually does since those with the gold make the rules, business will suck every penny you have out of you until you can't earn any more and are left dead or dying. This is the way a competitive economy works: there are winners and there are losers.

The great thing about America is that anyone who wants to can achieve anything, limited only by their imaginations, but the bad thing is that those who just want to slide along in life usually slide off a cliff to the benefit of those who are paying attention.

Here he explains how to buy whatever you want, but to do it intelligently and cheaply. He drives better cars than his friends, but paid far less. He saves tons of money so he can afford to buy the toys he wants. He avoids credit and worthless expenditures.

Sounds good to me 🙂

About the only thing I disagree with is his stance on TV and video games. I happen to learn quite a lot from those. A whole lot. Really! It's totally not a waste of my time…

Ok, maybe it is, but he spends all his time working on cars. Everyone has to have their hobbies.

Anyway, read it. It's fun and interesting like this section here:

I got lucky with my wife. She's even cheaper than I am, but she's rare. Want to know how cheap she is? She hates flowers because she can't bear knowing that they die in a week and then the money is gone. She'd rather just have the money. I sometimes leave a $20 on the counter. When she asks "what's this?" I respond "flowers." She then gets all smiley. Marriage is weird.

Oh, and extra points to the author for doing advertising right! Way to go!

Tags: ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

computer security Tutorial
|INDEX|next: Spyware Scanners

Security Software

Make sure you have a up-to-date Anti-Virus Program to protect you against bad websites or files.
Sometimes spyware gets in your computer and the anti-virus won't stop it. Use a spyware scanner to find and remove spyware and adware.
Use a software firewall to detect bad code on your computer when it tries to connect to the Internet.
Always keep your system up to date with security patches or none of the rest of your security software will matter.
Use an encryption tool to protect your important data when storing or transmitting it.
Switch to Firefox for your web browsing and you'll be better protected from Internet threats.

Safe Computing Practices

Don't get tricked by fake alerts or clever webpages into downloading viruses or spyware!

... or check out any of my other guides and tutorials by clicking here!

Credit Freeze

Setting a credit report freeze is the fastest and most effective way to actually block and reduce your risk of ID Theft. And it's free.

[Click for full description]

Anti-Virus

A virus can come from files, e-mails, web pages, or even devices you plug in (like thumbdrives or printers) and destroy your files or your computer once they get in. An anti-virus is software designed to detect and prevent that from happening.

[Click for full description]

Spyware Scanners

Learn how to detect and remove spyware and adware using a free scanning tool.

[Click for full description]

Software Firewall

Learn what a firewall is and why you want one on your computer.

[Click for full description]

Operating System Updates

Make sure to keep your operating system up-to-date with security patches or else none of the rest of your security software will be able to protect you.

[Click for full description]

File Encryption

Learn how to protect your important files on your computer or when transmitting them with free tools for file encryption.

[Click for full description]

Mozilla Firefox - Internet Browser

There are many browser choices out there. Read why I think Firefox is one of the best.

[Click for full description]

Fake Alerts

Maybe you've done everything right and you're computer is sufficiently fortress-like, but then you or someone in your family falls for a simple scam that tricks them into directly installing the bad guy's virus! Learn how to spot and ignore fakes!

[Click for full description]