Useful Tools

One of the hardest things you can ever do is work at something without having the right tool available (as any mechanic, craftsman, cook, etc can tell you).

Here you will find tools to make Windows and the Internet work the way it should have in the first place. Judging on the popularity of this section, I'm not the only one that thinks so.

Windows Tools

Sometimes Windows says it won't delete, rename a file and won't let you do anything about it. Unlocker says you can.
Truecrypt - A free utility to encrypt files or even full disk drives.
When you first get a computer that's loaded with crap software like free trials and junk, you wish there was a tool to make removing them easier. Well... tada!
To make sure your computer is safe and secure, keep all your software up to date.

Internet Tools

IP Checker - Shows your IP address and other information that your browser tells us about you.
10 Minute Mail - A web-based temporary e-mail account for recieving validation e-mails.
BugMeNot - Don't even bother using the fake mail to get an account if you can bypass the login entirely.
The Internet Archive - A project that attempts to record every version of every website ever.

IP and HTML Headers Check

Did you know that whenever you visit a site, your browser helpfully supplies a wealth of information about you to that site? It does this for a lot of reasons that are very legitimate, but the same information can leak data about you that you don't want others to have. Most importantly, this website and any other that you visit can store the information permenantly and use it however we see fit (not that I do, but I could).

Here's some of what your browser told me about you:

Browser/Operating System

All this does is tell me what kind of browser and operating system you're using. On the legitimate end, I can make modifications on my page to handle various peculiarities of different browsers so the page will work the same for everyone. On the other hand, I can use that information to launch an automated attack against you which will be really easy since I know exactly what browser, operating system, and the versions of each.

Blocking OS Info

In theory, this should be pretty easy to block without affecting your Internet browsing. I thought there'd be a simple plugin or browser option for it, but I haven't found it yet. Let me know if you know of something.

Your IP Address

If your IP address isn't being blocked or routed somehow, this tells me approximately where you are in the world and what Internet service you use. This will also usually tell me exactly what computer is connected which, in turn, could tell me which person.

Since businesses can't afford to keep changing IP addresses all the time, I can also be fairly certain that you belong to X or Y company or government agency. So, if you're someone in law enforcement (for example), maybe I hide my hacks and bad information when I see you coming. If you're from a competitor company, I show prices much lower than normal to hopefully mess up your pricing research. There's a lot I can do if I know who's connecting to me.

Blocking IP

The only way to block your IP address is to use a proxy of some kind. This is where you connect with a computer and that computer gets webpages for you and returns them to you. The proxy computer acts as a shield that keeps the Internet from knowing who it's actually dealing with.

Where You Came From

Called the "referrer", this value tells me the site you just came from if you used a link to get here. The legitimate function is that I can tell who's linking to me and do traffic analysis. However, this also gives me useful information that you might not want to give me.

For example, if you came from a search engine, you'll probably see your search terms listed (which means I can see it too). That's not likely a big deal in most cases, but in some cases it's worse. If your company has a web page called:

http://www.company.com/competitors/hostile_takeover_targets.html

Now say on this page, you list a few links to the homepages of companies you're about to take down. If anyone in your organization clicks on one of those links, the target company will see that webpage as the referrer. This gives advance warning which is probably what you don't want.

Blocking Referrer

This is one of the easier ones as you only need to type web addresses manually or cut and paste. Referrer is only sent if you click on a link. Therefore, if you right-click, choose "Copy Shortcut" and paste it into the address bar instead (or anything else that will get you there without actually clicking on it), you will eliminate the referrer value.

The Giant Rabbit Hoax

There are many photoshopped and altered photos on the net. The easiest way to find them is to type "not photoshopped" into Google because people are big fat liars. One that constantly makes the rounds and is often listed as "amazing not photoshopped rabbit" is one of those times.

It's FAKE.
This is the real one

The photo on the right is very hard to find on the net because the ones showing him at odd angles increasing his apparent size are so much more fun, but the fact is that the rabbit is big, but not THAT big. Whether camera angle, photoshop or both, it's fake and obviously so. Can we please stop spreading the lies now?

Tags: , , , ,

Georgia Gets Credit Freeze Law August 1st

Last year, credit reporting companies "voluntarily" implemented credit freezes in all states in a desperate attempt to prevent more states from passing laws with worse terms than they wanted (that's my theory anyway). Now Georgia has passed just such a law. Starting August 1st, people will be able to freeze their credit for only $3, a full $7 less than the $10 the credit reporting companies allowed in their "voluntary" plan. Even better:
The new law also eliminates a major objection of retailers and other grantors of instant credit: that freezing a file was too much of a hassle for someone applying for an in-store credit card or car loan on the spot. Under the law, consumers will be able to "thaw" their files temporarily, and credit bureaus are required to comply within 15 minutes of the request — a first in the country.
Good. Now they have no excuse for making the thawing process more difficult for any other state. Tags:

FBI Director Evades Questions From Congress On FBI Torture

(Image is in the Public Domain)

I got this e-mail from a member of congress who I must have contacted at some point because I'm on his mailing list. Anyway, I think the point that he makes is valid. By the own words of the director of the FBI, if the CIA were torturing prisoners, the FBI would have a responsibility to investigate, but they didn't. Congressman Wexler pressured him to answer why and he evaded it.

Here's the email:

This morning, during a hearing in the House Judiciary Committee, I questioned FBI Director Robert Mueller on his agency's response to claims – made by his own FBI agents – that the CIA was torturing prisoners. I wanted to find out why, if the FBI's own agents had alleged illegal actions were taking place, there was no investigation into the CIA's illegal and immoral practices.

Mueller's responses, which I would like you to read below, create new concerns and call for further investigation in the days ahead.

I believe Mr. Mueller owes more to Congress and the American people than the half-answers he gave in his testimony today.

I would urge you to contact the editors and news departments of your local media and ask them to look into the responses below. It is critical that this discussion takes place beyond emails and blogs – and is covered by the mainstream media.

In two weeks the Judiciary Committee will be holding hearings to investigate the fact that the highest levels of the Bush Administration sanctioned and ordered the torture of prisoners in United States custody. This is intolerable and we must vigorously oppose this policy that demeans our nation and offends our conscience.

Please read the below transcript of my exchange with Mr. Muller.

This is a deeply troubling interchange which should be alarming to all Americans.

Congressman Robert Wexler

DONATE

—————————-

(TRANSCRIPT:)

Robert Wexler: Thank you Mr. Chairman. Mr. Director, in January of 2006, the New York Times reported that the NSA wireless wiretapping program had produced thousands of leads each month that the FBI had to track down, but that no Al-Qaeda networks were discovered. During a July 17, 2007 briefing, FBI deputy director John Pistole indicated that the FBI was not aware of any Al-Qaeda sleeper cells operating in the United States. In August of 2007 Congress passed the Protect America Act, giving the intelligence community greater access to electronic communications coming into and out of the United States. I have two questions in this regard.

RW: Has the FBI found any sleeper cells yet? One…

RW: Two. Has the NSA’s wireless wiretapping programs either before the Protect America Act or after led to the prosecution and conviction of any terrorists in the United States?

Robert Mueller: Well, as to your first question as to whether we have found affiliates or, as you would call them, cells of Al-Qaeda in the United States, yes we have. Again, I cannot get into it in public session, but I would say yes we have. With regard to the relationship of a particular case or individual to the terrorist surveillance program, again that is something that would have to be covered in a closed session.

RW: Alright, Mr. Director. An LA Times article from October, 2007 quotes one senior federal enforcement official as saying quote “the CIA determined they were going to torture people, and we made the decision not to be involved ? end quote. The article goes on to say that some FBI officials went to you and that you quote “pulled many of the agents back from playing even a supporting role in the investigations to avoid exposing them to legal jeopardy ? end quote.

RW: My question Mr. Director, I congratulate you for pulling the FBI agents back, but why did you not take more substantial steps to stop the interrogation techniques that your own FBI agents were telling you were illegal? Why did you not initiate criminal investigations when your agents told you the CIA and the Department of Defense were engaging in illegal interrogation techniques, and rather than simply pulling your agents out, shouldn’t you have directed them to prevent any illegal interrogations from taking place?

RM: I can go so far sir as to tell you that a protocol in the FBI is not to use coercion in any of our interrogations or our questioning and we have abided by our protocol.

RW: I appreciate that. What is the protocol say when the FBI knows that the CIA is engaging or the Department of Defense is engaging in an illegal technique? What does the protocol say in that circumstance?

RM: We would bring it up to appropriate authorities and determine whether the techniques were legal or illegal.

RW: Did you bring it up to appropriate authorities?

RM: All I can tell you is that we followed our own protocols.

RW: So you can’t tell us whether you brought it; when your own FBI agents came to you and said the CIA is doing something illegal which caused you to say don’t you get involved; you can’t tell us whether you then went to whatever authority?

RM: I’ll tell you we followed our own protocols.

RW: And what was the result?

RM: We followed our own protocols. We followed our protocols. We did not use coercion. We did not participate in any instance where coercion was used to my knowledge.

RW: Did the CIA use techniques that were illegal?

RM: I can’t comment on what has been done by another agency and under what authorities the other agency may have taken actions.

RW: Why can’t you comment on the actions of another agency?

RM: I leave that up to the other agency to answer questions with regard to the actions taken by that agency and the legal authorities that may apply to them.

RW: Are you the chief legal law enforcement agency in the United States?

RM: I am the Director of the FBI.

RW: And you do not have authority with respect to any other governmental agency in the United States? Is that what you’re saying?

RM: My authority is given to me to investigate. Yes we do.

RW: Did somebody take away that authority with respect to the CIA?

RM: Nobody has taken away the authority. I can tell you what our protocol was, and how we followed that protocol.

RW: Did anybody take away the authority with respect to the Department of Defense?

RM: I’m not certain what you mean.

RW: Your authority to investigate an illegal torture technique.

RM: There has to be a legal basis for us to investigate, and generally that legal basis is given to us by the Department of Justice. Any interpretations of the laws given to us by the Department of Justice…. (talking over each other)

RW: But apparently your own agents made a determination that the actions by the CIA and the Department of Defense were illegal, so much so that you authorized, ordered, your agents not to participate. But that’s it.

RM: I’ve told you what our protocol was, and I’ve indicated that we’ve adhered to our protocol throughout.

RW: My time is up. Thank you very much Mr. Director.

Could we get a little accountability over here?! Please?

Tags: ,

Another Class Action Suit Against Lifelock

(Image used under: Fair Use doctrine)
This time, it's in New Jersey.

On its Web site, www.lifelock.com, the company reports that it places requests for fraud alerts with credit bureaus on behalf of its clients. "If someone is trying to use your personal information, you will be contacted by the creditor that is issuing the line of credit," LifeLock says. "If you receive a call and you are not the one applying for credit, the transaction should be stopped immediately." But creditors are not required to contact applicants even if they have fraud alerts in their files, says the Pasternak lawsuit. The Experian lawsuit makes a similar argument. The Pasternaks also blast LifeLock’s $1 million guarantee, claiming that the fine print renders it virtually worthless.
Tags: ,

Scientology Given Free Reign on Ebay

(Image used under: Creative Commons 3.0 [SRC])

For some reason, eBay has given the cult of Scientology free access to their servers so they can delete auctions that would have allowed people to get emeters for less money. Of course, the reason for the cult to want to do this is very clear (money), but why eBay would cooperate with them is another matter entirely.

Tags: ,

Build-a-Bear And Your Child’s Sensitive Information

I’ve built several bears with my kids, but I always balk at the part where they’re supposed to put in their information. They just don’t need that much personal data about my kid. Instead, I put in MY personal e-mail address so that if it did get “lost” and recovered, they would be able to e-mail me at the least, though we’d probably just replace it anyway… Tags: , ,

Ohio E-Voting Report: Surprise! It Doesn’t Work!

I should make a song. I'll call it "Duh" and repeat the word "duh" over and over. Then I'll send it to all the state election boards who have been using e-voting. Here's an excerpt from Ars Technica's writeup of this startling revelation:
To put it in every-day terms, the tools needed to compromise an accurate vote count could be as simple as tampering with the paper audit trail connector or using a magnet and a personal digital assistant," Brunner said in a statement. Note that Brenner here is describing machines that have been in use in Ohio since before the 2004 presidential election. This isn't some glimpse of how bad things might be in November 2008. It's a look at how bad they've been all along.
*sigh* Tags:

Head of FTC Has Conflict of Interest in Google/Doubleclick Merger

Warning! Warning! You have found a RANT. Articles in this section are sounding boards for my frustrations. They usually (more like always) lack impartiality and may include arguments and "facts" that may not be supported.

With time I may calm down and make this a real article, but for now, you have been warned...

Deborah Platt-Majores, who I think of an incompetent failure due to her work on the Presidentially decreed ID Theft Taskforce has shown herself to more on the dishonest rather than the incompetent side. Though she has a clear conflict of interest in the upcoming Google/Doubleclick merger evaluation (her husband works for the lawfirm that represents them), she has refused to recluse herself while at the same time, evidence of the law firms involvement with Doubleclick has been "mysteriously disappearing" from their website. But, of course, no matter how obviously wrong this is, nothing will be done about it because of the legacy of non-accountability set by Bush. Thanks Bush! You've really been an inspiration to all the greedy, self-serving a-holes who'd sell out all the little people for a little more power and money. Tags: , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

passwords Tutorial
|INDEX|next: Password Tips and Tricks

Making Good Passwords

To understand what makes a good password, let's talk about what makes a bad one first.
Making good passwords can be complex, but here are some tips and tricks that will make it easier.

Password Protection

Once you've taken the trouble to make a good password, the next step is to keep it safe!
Now that you've done all this work, you have to learn the most important rule of all: DON'T GIVE THEM AWAY!

... or check out any of my other guides and tutorials by clicking here!

Unlocker - Delete Or Modify Locked Files in XP

Take control of your own files. When XP says you can't delete, rename, or move a file, this utility forces it to do it anyway!

[Click for full description]

Truecrypt - Free Encryption Utility to Protect Your Files

Encrypting your files or whole hard disk is easy and effective with a free tool called Truecrypt.

[Click for full description]

PC Decrapifier

Many pc makers load up computers with worthless software (crapware). This tool fixes it.

[Click for full description]

Secunia PSI

Secunia is a software update scanner that can help keep your system protected by using only the most recent versions of everything.

[Click for full description]

IP and HTML Headers Check

Use this page to show and learn how to limit the various data about you that your browser supplies to every page you visit.

[Click for full description]

10 Minute Mail - Self Destructing E-mail Service

One way of protecting your e-mail is to not give it out. That can be hard when it seems everyone asks for you to validate e-mails sent to your account. That's where a self destructing e-mail account comes in handy!

[Click for full description]

Bug Me Not - Login Avoidance Tool

For sites the require registration, but don't really need it, save time and see if someone has left a common-use login and password at BugMeNot

[Click for full description]

The Internet Archive

If you want to see what the Internet used to be, use the archive.

[Click for full description]

Bad Passwords

To understand what makes good passwords, first check out some of the worst passwords out there and what makes them so bad.

[Click for full description]

Password Tips and Tricks

It's impossible to expect someone to make good passwords by just giving them some rules. There are tricks that make your passwords secure and easy for you all at the same time.

[Click for full description]

Password Protection

It's really a skill to come up with secure passwords that you can remember. Once you've learned how, remember that it doesn't matter how good you are if you don't protect your password properly.

[Click for full description]

Password Mugging

A disturbing new practice among websites and services is where they ask you for your user name and password to other sites. I call this "Password Mugging"

[Click for full description]