Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

RFID Tracking Students By Tagging Their Uniforms

(Image used under: Creative Commons 2.0 [SRC])

Nothing like treating people like animals to be tagged and tracked. Of course, it's much easier to start by tracking kids because they don't have much choice in the matter and when they grow up, they'll be less resistant to the practice. Enter surveillance society…

But let's not get ahead of ourselves. They portray the tests as successful, .... [Click here to read the rest of this post]

Tags: , ,

Microsoft Messes Up Again, Installs Unwanted “Feature”

(Image used under: Creative Commons 2.0 [SRC])

Microsoft slipped another bomb into their "critical updates" in the form of a Windows Desktop Search. The reports say that besides being an unwanted feature, it has been slowing machines down considerably.

The worst part is that somehow Microsoft thinks they can change the way our machines work without our consent. But this wouldn't be the first time.

.... [Click here to read the rest of this post]

Tags: ,

Comcast May Get Sued for Blocking Certain Types of Traffic

(Image used under: Fair Use doctrine)

Comcast has been in the news recently for blocking high-bandwidth traffic in an attempt to keep people from using their Internet "too much". If we're lucky, this story about them possibly getting sued for it is true. As bad as Comcast is in service and customer service, it would be nice to hold their feet to the fire when .... [Click here to read the rest of this post]

Tags: , ,

5 Expenses You Should Cut Until Your Credit Debt is Under Control

(Image used under: Creative Commons 3.0 [SRC])

This is a nice article explaining the five major monthly bills you should be ditching until you are debt-free (on your credit cards and accounts anyway). Included is the whining they know you'll do when you hear their recommendation:

5) Cable. Your Excuse: "But, but, but I need cable! I get a good deal! It's .... [Click here to read the rest of this post]

Tags: ,

Identity Theives Use Mostly Low-Tech to Steal Your Identity

(Image is in the Public Domain)

Due to the data breaches and high profile cases of laptops gone missing, people can easily forget that ID theft is easy to pull off without high technology skills.

[the study] found that, by and large, much of today's identity theft is still carried out using old-school methods, such as mail theft and dumpster diving. Thieves .... [Click here to read the rest of this post]

Tags:

Comcast Actively Blocks High-Bandwidth Traffic

(Image used under: Fair Use doctrine)

I already reported on Comcast blocking Peer-2-Peer filesharing traffic, but apparently they've extended the blocks to enterprise software (in this case, Lotus Notes).

When Lotus Notes users attempt to send e-mail with larger attachments over Comcast's network, Notes will drop its connection. Instead of a successfully sent e-mail, they're greeted with the error message, "Remote system no .... [Click here to read the rest of this post]

Tags: , , ,

New Video Game Forces Adware Functionality to Play

(Image used under: Creative Commons 2.5 [SRC])

Hellgate, a soon-to-be-released video game includes a license agreement that forces players to accept the harvesting of identifying information from their machine. This is part of an in-game advertising scheme that, so far, doesn't quite reach the level of what the Penny Arcade cartoonists prophesied, but it's getting closer.

.... [Click here to read the rest of this post]

Tags: , ,

Senator Blocks FISA Bill Because of Telco Immunity!

Finally! Some guts!

Senator Chris Dodd will block the FISA renewal bill as long as it grants retroactive immunity for their involvement in the illegal spying. Of course, the FISA bill should have been blocked anyway. I didn't read through it, but Bush signed it.

.... [Click here to read the rest of this post]

Tags: , ,

Vista Out of Memory Bug When Copying Files

(Image used under: Fair Use doctrine)

Vista apparently runs out of memory when copying over 13,000 files in one go without any warning. While that is a lot of files, this seems to be a fairly large bone-head mistake. First of all, why can't Microsoft figure out that file transfers should be pausable and resumable (same as when downloading from the Internet). Of course, even .... [Click here to read the rest of this post]

Tags: ,

Verizon Helped Spy On Us

(Image used under: Fair Use doctrine)

Adding another nail to the coffin for citizen trust in Verizon (assuming there was any to begin with), it turns out that they did in fact participate in the illegal spying program.

Let the lawsuits begin…

.... [Click here to read the rest of this post]

Tags: ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

computer security Tutorial
|INDEX|next: Spyware Scanners

Security Software

Make sure you have a up-to-date Anti-Virus Program to protect you against bad websites or files.
Sometimes spyware gets in your computer and the anti-virus won't stop it. Use a spyware scanner to find and remove spyware and adware.
Use a software firewall to detect bad code on your computer when it tries to connect to the Internet.
Always keep your system up to date with security patches or none of the rest of your security software will matter.
Use an encryption tool to protect your important data when storing or transmitting it.
Switch to Firefox for your web browsing and you'll be better protected from Internet threats.

Safe Computing Practices

Don't get tricked by fake alerts or clever webpages into downloading viruses or spyware!

... or check out any of my other guides and tutorials by clicking here!

Anti-Virus

A virus can come from files, e-mails, web pages, or even devices you plug in (like thumbdrives or printers) and destroy your files or your computer once they get in. An anti-virus is software designed to detect and prevent that from happening.

[Click for full description]

Spyware Scanners

Learn how to detect and remove spyware and adware using a free scanning tool.

[Click for full description]

Software Firewall

Learn what a firewall is and why you want one on your computer.

[Click for full description]

Operating System Updates

Make sure to keep your operating system up-to-date with security patches or else none of the rest of your security software will be able to protect you.

[Click for full description]

File Encryption

Learn how to protect your important files on your computer or when transmitting them with free tools for file encryption.

[Click for full description]

Mozilla Firefox - Internet Browser

There are many browser choices out there. Read why I think Firefox is one of the best.

[Click for full description]

Fake Alerts

Maybe you've done everything right and you're computer is sufficiently fortress-like, but then you or someone in your family falls for a simple scam that tricks them into directly installing the bad guy's virus! Learn how to spot and ignore fakes!

[Click for full description]