Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

Amazon.com Kicking Customers Out of the Store

(Image is used under the Pixabay license)

Amazon.com has been closing accounts that have "too high a percentage of returns" or "[ship] to too many different addresses".

I've never liked Amazon.com's policies but this kind of anti-customer activity is even worse than Yahoo. To be fair, there's not much detail on which accounts have been closed and what counts as abuse to them, but .... [Click here to read the rest of this post]

Tags: , ,

Possible Trend: Movies on USB Drives

To the movies!
(Image is in the Public Domain)

Ghostbusters has become the first movie to be distributed on a USB drive. It includes a strong form of DRM that they hope will prevent people from copying it. Whether that proves more effective than the DRM they've tried on DVDs remains to be seen.

.... [Click here to read the rest of this post]

Tags: ,

Stealing Cellphone Data Takes Only Seconds

Digital Pickpocketing
(Image used under: Creative Commons 2.0 [SRC])

There's a small device that when plugged into many cellphone brands (and the list is growing) that can copy all data on the phone. In other words, if someone wanted to know every bit of data you have on your phone, they could ask to "borrow it for second", plug this thing in when you weren't looking and .... [Click here to read the rest of this post]

Tags:

How RFID Tags in Products You Own Can Be Used to Track You

(Image used under: Creative Commons 2.0 [SRC])

Katherine Albrecht has written has written an article for Scientific American that everyone should read. For those who don't already know her, she's the leader of CASPIAN and one of the world's foremost experts on RFID privacy issues.

Here is a mini summary of some of the major points:

Tags:

Beware Google Browser’s License Agreement

Read the terms, don't like what you see.
(Image used under: Creative Commons 2.0 [SRC])

As I suspected, a product from a company like Google shouldn't be trusted without scrutiny. They've developed a new open-source Internet browser to compete with Firefox and Internet Explorer, but if you read carefully, you might notice this:

You retain copyright and any other rights you already hold in .... [Click here to read the rest of this post]

Tags: , ,

One-sided Agreements Don’t Always Survive in Court

(Image is in the Public Domain)

I really hate the kinds of things companies pull in their contracts and terms of service. Even more I hate when people say, "you signed it so quit complaining!" What they don't seem to understand is that even if the information is there, that doesn't mean that people can understand it or its implications. Thus was the case in .... [Click here to read the rest of this post]

Tags: , , ,

How to Fly If You’re On the “No Fly List”

(Image is in the Public Domain)

Bruce Schneier explains how easy it is to get past security and fly on a plane even if you're on the supposed "no fly list"

Buy a ticket in some innocent person's name. At home, before your flight, check in online and print out your boarding pass. Then, save that web page as a PDF and use .... [Click here to read the rest of this post]

Tags: , ,

Stupid Virginia Slapped By Judge

What should we do about privacy problems? Attack the person who found the problem!
(Image source is unknown)

When Betty Ostergren, otherwise known as the "Virginia Watchdog" and on of my personal heroes, started posting social security numbers and other private data about state senators, she turned a few heads.

She got the information from the state's own public records websites where the senators were quick to .... [Click here to read the rest of this post]

Tags: , , ,

Diebold Finally Admits Voting Machines Lose Votes

(Image is in the Public Domain)

Though they originally blamed it on anti-virus software on the machines, Diebold has admitted that it was coding error that leads its machines to drop votes. Hopefully that will help in the lawsuit against Diebold and encourage others states to recoup their losses as well.

.... [Click here to read the rest of this post]

Tags: , ,

Save on Textbooks

Save some money. Always a good thing.
(Image used under: Creative Commons 2.0 [SRC])

Funny that I was just talking about this with someone yesterday, but today there's an article on Lifehacker about saving money on textbooks. I have used their first suggestion, Bigwords.com many times myself though I've often found even better deals by simply looking for a previous edition book. For example, if your class .... [Click here to read the rest of this post]

Tags: ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

computer security Tutorial
|INDEX|next: Spyware Scanners

Security Software

Make sure you have a up-to-date Anti-Virus Program to protect you against bad websites or files.
Sometimes spyware gets in your computer and the anti-virus won't stop it. Use a spyware scanner to find and remove spyware and adware.
Use a software firewall to detect bad code on your computer when it tries to connect to the Internet.
Always keep your system up to date with security patches or none of the rest of your security software will matter.
Use an encryption tool to protect your important data when storing or transmitting it.
Switch to Firefox for your web browsing and you'll be better protected from Internet threats.

Safe Computing Practices

Don't get tricked by fake alerts or clever webpages into downloading viruses or spyware!

... or check out any of my other guides and tutorials by clicking here!

Anti-Virus

A virus can come from files, e-mails, web pages, or even devices you plug in (like thumbdrives or printers) and destroy your files or your computer once they get in. An anti-virus is software designed to detect and prevent that from happening.

[Click for full description]

Spyware Scanners

Learn how to detect and remove spyware and adware using a free scanning tool.

[Click for full description]

Software Firewall

Learn what a firewall is and why you want one on your computer.

[Click for full description]

Operating System Updates

Make sure to keep your operating system up-to-date with security patches or else none of the rest of your security software will be able to protect you.

[Click for full description]

File Encryption

Learn how to protect your important files on your computer or when transmitting them with free tools for file encryption.

[Click for full description]

Mozilla Firefox - Internet Browser

There are many browser choices out there. Read why I think Firefox is one of the best.

[Click for full description]

Fake Alerts

Maybe you've done everything right and you're computer is sufficiently fortress-like, but then you or someone in your family falls for a simple scam that tricks them into directly installing the bad guy's virus! Learn how to spot and ignore fakes!

[Click for full description]