Welcome!
If you have an account, please:
Log in
Stay Informed
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

How can I help you?
Contact Jeremy

How to Get Easter Egg Dye off Your Hands

(Image is in the Public Domain)

Why are there so many top ranked answers for how to get the dye out of your or your kids' hands that just don't help? Dishsoap? Baking soda or toothpaste plus lots of scrubbing? Feh. Well, consider that baking soda does provide great cleaning power and abasion, but vinegar is what they use to disolve the dye .... [Click here to read the rest of this post]

Tags: , , ,

Add context option to open file in administrator level Notepad

It works in Win 10 too!
(Image used under: Creative Commons 3.0 [SRC])

One of the more irritating oversights in Windows 7 is that when you open configuration files from Windows Explorer (txt, ini, etc), they open in Notepad as expected, but when you go to save, only then do you realize that you didn't have admin rights and your work is wasted.

Sick of .... [Click here to read the rest of this post]

Tags: , , , , ,

What Does Lexis Nexis Know About Me?

Lexis Nexis - The bottomless pit of user data
(Image used under: Creative Commons 3.0 [SRC] [Mod])

LexisNexis (which acquired ChoicePoint) is the largest data-broker in the world. They create vast profiles on people and use that information to create various reports that they sell to companies of all kinds. These reports are used to make decisions about renting, insurance and more. In the .... [Click here to read the rest of this post]

Tags: , , ,

Sequoia Voting Machines Hacked to Play Pac-Man

Sequoia, Diebold... e-voting has a long way to go.
(Image is in the Public Domain)
This is your Sequoia touch-screen voting machine with Pac-Man hacked onto it without disturbing any of the "tamper-evident" seals supposedly meant to protect it from hackers...

Apparently, they put tamper seals on the ports and plugins, but NOT the case itself. Therefore, the university was able .... [Click here to read the rest of this post]

Tags: , ,

Man Hunts and Beats Teen for Mocking Him Online

(Image is in the Public Domain)

For anyone who's participated in forums, online games, or any other system where you can communicate with random strangers, you've probably encountered people who make you angry. Some are just people who you don't get along with legitimately, and some are "trolls"; people who toy with others for their amusement.

What makes people trolls is generally the .... [Click here to read the rest of this post]

Tags: , , , ,

Facebook Tracks You Even When Logged Out

(Image used under: Creative Commons 2.0 [SRC])

So yesterday, we learned that OnStar tracks you even if you're not a customer and today, we learn that Facebook will track and monitor your web usage without your knowledge or permission… even if you're not logged in.

The social network is quietly retracting a cookie that continued to report your Facebook user .... [Click here to read the rest of this post]

Tags: ,

OnStar To Spy On People

(Image used under: Creative Commons 2.0 [SRC] [Mod] [Comp])

OnStar was recently admonished by several senators for its plan to spy on people (even non-customers).

OnStar is apparently hoping to create a new revenue stream by collecting data about the movements of OnStar-equipped cars. Obviously, this data set will be more comprehensive—and, therefore, more lucrative—if it includes data from former .... [Click here to read the rest of this post]

Tags: ,

4th Amendment Summary by the EFF

Can you refuse search or not? It would be good to know your rights.
(Image is in the Public Domain)

You can't use rights you don't know about or don't understand. The Electronic Frontier Foundation has posted a summary of your 4th amendment rights to deny the government permission to search you or your belongings (digital or otherwise).

It's good to know what you can .... [Click here to read the rest of this post]

Tags: , , , ,

Citibank Unable to Afford Secure Web Design

Really Citibank?

When I teach, I explain how most of the breaches and problems you hear in the world aren't about clever hackers or sophisticated attackers, but instead about weak security. This has just become my new go-to example.

Basically after you logged into your account as a Citi customer, the URL contained a code identifying your account. All you had to do .... [Click here to read the rest of this post]

Tags: , , , ,

China Forcing Prisoners to Play Video Games for Money

Photo shamelessly stolen from the source article

I've always thought that prisoners should be made to work to support themselves and others. Maybe the Chinese have hit on something with this:

"Prison bosses made more money forcing inmates to play games than they do forcing people to do manual labour," Liu told the Guardian. "There were 300 prisoners forced to play .... [Click here to read the rest of this post]

Tags: ,

If you want to learn more about my professional background, click here to learn more. Otherwise, let’s get started - how can I help?

Online learning
On-site learning
Read my blog

Data Abuse

Data brokering is the practice of collecting as much data as possible about customers or visitors into profiles. Then the data is sold, shared, or lost in data breaches to be used in targeted marketing or ID Theft.

[Click for full description]

How to Steal Identities - Why It's So Easy

Just why is it so easy to steal identities? Where is all this information coming from!?

[Click for full description]