Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

Sue a Big Company In Small Claims Court

(Image used under: Creative Commons 2.0 [SRC])

The Consumerist has an article about a reader who has taken big companies to small claims court several times to get resolution to his problem. His average cost is about $24 and 45 minutes of time.

See, in all cases, he hasn't even had to go to court: the company calls him up the day before .... [Click here to read the rest of this post]

Tags: ,

MySpace Protections Meaningless if Teens Don’t Use them

(Image used under: Fair Use doctrine)

Consumeraffairs.com did a study of whether they could locate teen girls on MySpace and the results aren't surprising.

By doing simple searches with no special tools or gimmicks, they were easily able to find profiles of girls that were set to public (meaning anyone could read them) that contained more than enough information to find and contact them or .... [Click here to read the rest of this post]

Tags: ,

Reminder: DO NOT Use Tax Refund Anticipation Loans

These guys are scum sucking thieves. Don't give them your money. And I'm not talking just about no-name place, I mean ALL of them. Do not use payday loans, tax refund anticipation loans, or anything similar.

.... [Click here to read the rest of this post]

Tags: ,

Super Black Material Absorbs 99% of All Light

(Image used under: Creative Commons 3.0 [SRC])

I've always thought this could be done though I figured it would have to involve a light electric field and a fabric of some kind. Either way, it's going to make it pretty easy for military types to sneak around at night.

.... [Click here to read the rest of this post]

Tags:

Tennessee School to Force “Financial Literacy” on Students

(Image used under: Creative Commons 2.0 [SRC])

Good. Avoiding credit, reading the fine print, and how not to fall for scams would be a good start.

.... [Click here to read the rest of this post]

Tags: , ,

Trick Automated Callers Into Never Calling You Again

(Image is used under the Pixabay license)

From the, "that's freaking brilliant!" department, someone figured out that there's a phone tone that means "vacant circuit", or in layman's terms, there's no phone here. When an automated dialer gets that, they erase the phone number from their records so they don't waste their valuable time and money (as if ours wasn't). So what he did was .... [Click here to read the rest of this post]

Tags: , , ,

USB 3.0 Coming

(Image is in the Public Domain)

Information about the coming USB 3 format is now available. Of course it's far faster than the previous version (about 10 times as fast), but the important nugget is that the connector is backwards compatible with USB1 and 2. That means that you can plug USB 3 devices into older systems and you can plug your old devices into .... [Click here to read the rest of this post]

Tags:

2009 Federal Budget to Be Posted Online

George W. Bush
(Image used under: Fair Use doctrine)

I can't remember the last time I heard of a good decision being made in relation to Bush's name, but here's one. The budget will be posted online to save money and ease access by people wanting to browse through the monolithic document.

.... [Click here to read the rest of this post]

Tags: , ,

How to Hack a Diebold Voting Machine – Picture

(Image is in the Public Domain)

I found this picture on Digg.com that has an easy 5 step process to hacking the voting machines to do your bidding. Remember when you go to vote soon, to thank your state's voting commission if they are using these well known, hackable, substandard, and completely worthless machines. Better yet sue them for incompetence or corruption (or both).

.... [Click here to read the rest of this post]

Tags: , ,

Next Generation DVD Format War Nearly Over

(Image is in the Public Domain)

Historically, Sony has been on the losing end of format wars, but in this case, they appear to have won. Two of the major movie studios have decided to go with the Blu-Ray DVD format over the HD-DVD.

.... [Click here to read the rest of this post]

Tags: ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

computer security Tutorial
|INDEX|next: Spyware Scanners

Security Software

Make sure you have a up-to-date Anti-Virus Program to protect you against bad websites or files.
Sometimes spyware gets in your computer and the anti-virus won't stop it. Use a spyware scanner to find and remove spyware and adware.
Use a software firewall to detect bad code on your computer when it tries to connect to the Internet.
Always keep your system up to date with security patches or none of the rest of your security software will matter.
Use an encryption tool to protect your important data when storing or transmitting it.
Switch to Firefox for your web browsing and you'll be better protected from Internet threats.

Safe Computing Practices

Don't get tricked by fake alerts or clever webpages into downloading viruses or spyware!

... or check out any of my other guides and tutorials by clicking here!

Anti-Virus

A virus can come from files, e-mails, web pages, or even devices you plug in (like thumbdrives or printers) and destroy your files or your computer once they get in. An anti-virus is software designed to detect and prevent that from happening.

[Click for full description]

Spyware Scanners

Learn how to detect and remove spyware and adware using a free scanning tool.

[Click for full description]

Software Firewall

Learn what a firewall is and why you want one on your computer.

[Click for full description]

Operating System Updates

Make sure to keep your operating system up-to-date with security patches or else none of the rest of your security software will be able to protect you.

[Click for full description]

File Encryption

Learn how to protect your important files on your computer or when transmitting them with free tools for file encryption.

[Click for full description]

Mozilla Firefox - Internet Browser

There are many browser choices out there. Read why I think Firefox is one of the best.

[Click for full description]

Fake Alerts

Maybe you've done everything right and you're computer is sufficiently fortress-like, but then you or someone in your family falls for a simple scam that tricks them into directly installing the bad guy's virus! Learn how to spot and ignore fakes!

[Click for full description]