Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

Today’s bad news: Microsoft Snip tool soon to launch with the PrintScreen Key

(Image used under: Creative Commons 2.0 [SRC])

Changes like this always make me wonder about Microsoft's motto: "Empower every person to do more…" How am I "doing more" when I spend my time fighting with changes no one asked for and no one needs?

Granted, we probably needed a faster and more convenient method of opening the Snip tool than WIN+SHIFT+S, but what's wrong with .... [Click here to read the rest of this post]

Tags: , , , ,

What Golden Tree teaches us about listening

Golden Ginko Tree - Wikimedia commons cc3.0
Japan's second-largest tourist agency was mystified when it entered English-speaking markets and began receiving requests for unusual sex tours. Upon finding out why, the owners of Kinki Nippon Tourist Company changed its name.
(source)

The saga of the Golden Tree travel agency was a memorable lesson in my college marketing class. As was the Chevy "Nova"'s entry into .... [Click here to read the rest of this post]

Tags: , , , , ,

SIIG KVM and USB C hub – Managing remote work is so much easier now!

SIIG USB-C 2-Port KVM Switch MST Docking Station with PD 65W
(See online!)

So I put some effort into getting my home office put together. I have dual monitors nicely raised to the right eye height. I have a motorized standing desk, nice keyboard, mouse… the works! But the main issue was switching between my home computing and my work. I had one laptop for each .... [Click here to read the rest of this post]

Tags: , ,

John Oliver’s Breakdown of Data Brokering – What it is, why you should care, and a small side-order of Congressional blackmail

Of course John didn't actually blackmail anyone, but he made a valid point that sometimes the only way for things to get done is for Congress to feel the problem actually affects them. To prove his point of how vile and dangerous unregulated data-brokering is, he used completely legal and commonly used techniques to get data about several members of .... [Click here to read the rest of this post]

Tags: , ,

Razer Cynosa V2 Gaming Keyboard – A risky buy, a regretful return

Razer has a name, but that's all
(See online!)

A few years back, I bought a Razer mouse and was floored to discover that it required an online account signup with Razer just to download the drivers to make it work. Their extortive practices weren't the end as the rubber grip on the mouse fell off a while later while Microsoft and other brand mice lasted .... [Click here to read the rest of this post]

Tags: ,

Asus ROG GM703 – Two year review

Asus gaming machine. It turned out to be pretty good, but two years later, I'm looking for something new.
(See online!)

At the time I bought this, ASUS and MSI were the two top contenders. Both were solid brands with good history and all the features I wanted, but MSI has a weird obsession with making the keyboard perfectly rectangular at the expense of shoving all .... [Click here to read the rest of this post]

Tags: , , , ,

Netflix Misses the Easy Marks

Netflix! Bro! You can be SO much better than this.

One of the reasons that Google because THE Internet search engine (though DuckDuckGo is better because it protects privacy) is because they have clean, no frills interface and they WORK. They get the job done. Those two key features made it the juggernaut that it is. Netflix is basically on the same path except for a few .... [Click here to read the rest of this post]

Tags: ,

MeWe: Privacy based Facebook alternative – A Review

MeWe: A Facebook alternative based on protecting your right to privacy.

It's been great watching DuckDuckGo rise as a major Google competitor. I've been thrilled to see Firefox taking a more aggressive approach to protecting people as a way to combat the invasiveness of Chrome. Now we might finally have a solution to the Facebook problem. "Which problem", you might ask?

If you didn't already know, Facebook .... [Click here to read the rest of this post]

Tags: ,

Research Group Concludes that Coca-Cola Paid for Favorable Research To Evade Responsibility for Obesity

Tastes like disease
(Image used under: Creative Commons 2.0 [SRC])

According to a Cambridge study "Coca-Cola sought to obscure its relationship with researchers, minimise the public perception of its role and use these researchers to promote industry-friendly messaging."

Specifically, Coca-Cola has been found to be manipulating public information to minimize their part in the obesity crisis and instead blame exercise instead of sugary drinks. The paper mostly .... [Click here to read the rest of this post]

Tags:

Sony Camcorders – Once the King, Now the Jester

In the early 2000's I worked at Best Buy and was impressed how much better Sony camcorders were than the competition. Faster focus, better zoom, better durability, Nightvision, and so on. They were the only brand I've ever bought: a few 8mm ones, a miniDV, and finally an HDR thingy in 2013. That's where the problems started.

First, I was pretty annoyed that nightshot was no longer a feature on .... [Click here to read the rest of this post]

Tags: , , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

DuckDuckGo - New Search Engine Choice or Dud?

DuckDuckGo.com
(Image is in the Public Domain)

Every now and then, there's a new search engine released that tries to play with the big boys, but they often fail. Usually its because of speed, maybe financial backing, sometimes user interface, but most often because they don't do the job well.

So here's one that may be worth some attention. Like Google, they focus on keeping very minimal and having a nice interface. But unlike Google, they make an effort to help you find what you are actually looking for:

They also include some summary information right in the search making it possible to skip visiting the site at all if you don't need to or at least getting a better feel for what the site is about before going. And according to their About page, they store NO personal information (which has long been a complaint of mine about Google).

So far, they're doing a lot right, but with Google having just released HTTPS for searches, the competition is even stiffer. I wish them luck.

Check them out yourself here.

Data Brokering

Data brokering is the practice of collecting as much data as possible about customers or visitors into profiles. Then the data is sold, shared, or lost in data breaches to be used in targeted marketing or ID Theft.

[Click for full description]

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]