Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

29,000 Sex Offenders on Myspace Get the Boot

For those who were wondering, there were almost 30,000 sex offenders on MySpace who were computer literate enough to use the service, but dumb enough to use their real names. How many are still there using fake names I wonder.

Tags: , , , ,

Use Virtual Credit Cards to Control How Companies Use and Store Your Credit Card

A virtual credit card is a short term working credit card that has restrictions such as payout amounts, time of use, or merchants who are allowed to debit it. Using these, if the company you're buying from data-brokerings you for your card number, it won't matter because the number they have is worthless after the set period of time or number of transactions etc. JTAG ERROR: No lifehacker_ht index defined.... [Click here to read the rest of this post]

Tags:

Harry Potter Leaker May Be Found Due to Hidden Data in His Images

Here's a warning to you all: companies hide tracking information in your media and if you don't know about it and do something about it, you may get some pretty nasty results. Now, in this case, it's a good thing because there's no justification for leaking Harry Potter BEFORE it's public release. That just hurts the writer and others involved. But if this wasn't immoral activity but protected free speech, .... [Click here to read the rest of this post]

Tags: ,

Sender Controlled E-mail – Self Destructing or Single Read E-mail

Ever send an e-mail and then have second thoughts? What about wanting to make sure that the e-mail you send doesn’t get shared beyond your original recipient. Using the same technique that spammers do to bypass filters and verify e-mail accounts, BitString uses images for the content of messages. Since the reader has to load the image (which is stored on the BitString server) to view the message, if the .... [Click here to read the rest of this post]

Verichip – The Human Tracking RFID People – A Summary

Verichip is the first major company to try to make a market out of implanting people with a hard to remove tracking device. They tout it as a "security" device in that it can be used for proximity detection in sensitive areas and can be used to link to medical information in an emergency where the patient can't speak for themselves (for a yearly fee of course). Considering that the .... [Click here to read the rest of this post]

Tags:

SAIC Security Goof Threatens 580,000 Military Personnel

A common story. With a common worthless response:

SAIC spokespeople said that several employees were placed on leave after the incident was disclosed, and that it contracted data security company Kroll Inc. to provide free identity theft protection for all affected individuals for one year.
Aww. How nice. Now it looks like they're doing something. .... [Click here to read the rest of this post]

Tags:

Opt Out of Comcast Arbitration While You Can

While I usually throw out anything Comcast sends with the bill, this time I noticed an arbitration notice that says that you only have a little bit of time to opt out before you become bound to an arbitration agreement. What does that mean? It means that you're giving up your right to sue them for incompetence (which is a pretty big deal considering how incompetent they can be). If .... [Click here to read the rest of this post]

Tags: , ,

RIAA Loses Again – Everyone Cheers

There’s too many points to summarize without copying the content directly, but here’s a small post with a lot of links to information about a girl who moved to dismiss a RIAA lawsuit and seems to have won.

Tags:

Hunting Down a Virus Writer – Fun For Everyone!

This guy took personal offense to a virus writer who's stupid prank messed up the computer of one of his friends. So he decided to hunt the virus writer down using only information he was able to find on the Internet with Google. He goes through where he looked, what he found, and what it meant. Important lesson: This is how easy it is to profile you online. JTAG ERROR: .... [Click here to read the rest of this post]

Tags: , , ,

Hotmail Deletes Attachments to Save Bandwidth?

Very interesting:

It has long been suspected that there is a silent policy that makes Hotmail automatically delete the majority of attachments to save on bandwidth and internal disk space. Therefore it really doesn't matter if every client has access to 2GB of storage since they don't deliver the attachments to fill that space up anyway. If that truly is the case, then Microsoft may be liable for .... [Click here to read the rest of this post]

Tags:

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

warranties Tutorial
|INDEX|next: Extended Warranties
First, always learn what coverage you get for free from the manufacturer.
When offered an extended warranty, make sure you understand the basics.
They want you to buy it, but is it as easy to use as they say?
Know beforehand what circumstances and terms put the purchase of a warranty in your favor
Once you need to use the warranty, make sure you know the steps to take.
Finally, learn why you should even bother with this mess.
Now it's time to make the decision of whether to buy or not.

... or check out any of my other guides and tutorials by clicking here!

Manufacturer Warranties

Products you purchase in the store almost always have warranties already. Depending on how good it is, you could be completely wasting your money buying an extended one when the default one will do.

[Click for full description]

Extended Warranties

What is an extended warranty and how do you know when you see one?

[Click for full description]

Surprise! You're Not Covered

If you're going to spend your money on a warranty, first consider all the factors.

[Click for full description]

Learning the Warranty Odds

Learn what important aspects of a warranty you need to look for to make sure you're getting a good deal.

[Click for full description]

How to Use Your Warranty

Once it's time to use your warranty, make sure you know how to navigate the system.

[Click for full description]

Warranty Successes

Read some examples of how I've personally used warranties in my favor over the years.

[Click for full description]

Warranty Decision

In the end, how do you decide whether to buy the warranty or not?

[Click for full description]