Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

29,000 Sex Offenders on Myspace Get the Boot

For those who were wondering, there were almost 30,000 sex offenders on MySpace who were computer literate enough to use the service, but dumb enough to use their real names. How many are still there using fake names I wonder.

Tags: , , , ,

Use Virtual Credit Cards to Control How Companies Use and Store Your Credit Card

A virtual credit card is a short term working credit card that has restrictions such as payout amounts, time of use, or merchants who are allowed to debit it. Using these, if the company you're buying from data-brokerings you for your card number, it won't matter because the number they have is worthless after the set period of time or number of transactions etc. JTAG ERROR: No lifehacker_ht index defined.... [Click here to read the rest of this post]

Tags:

Harry Potter Leaker May Be Found Due to Hidden Data in His Images

Here's a warning to you all: companies hide tracking information in your media and if you don't know about it and do something about it, you may get some pretty nasty results. Now, in this case, it's a good thing because there's no justification for leaking Harry Potter BEFORE it's public release. That just hurts the writer and others involved. But if this wasn't immoral activity but protected free speech, .... [Click here to read the rest of this post]

Tags: ,

Sender Controlled E-mail – Self Destructing or Single Read E-mail

Ever send an e-mail and then have second thoughts? What about wanting to make sure that the e-mail you send doesn’t get shared beyond your original recipient. Using the same technique that spammers do to bypass filters and verify e-mail accounts, BitString uses images for the content of messages. Since the reader has to load the image (which is stored on the BitString server) to view the message, if the .... [Click here to read the rest of this post]

Verichip – The Human Tracking RFID People – A Summary

Verichip is the first major company to try to make a market out of implanting people with a hard to remove tracking device. They tout it as a "security" device in that it can be used for proximity detection in sensitive areas and can be used to link to medical information in an emergency where the patient can't speak for themselves (for a yearly fee of course). Considering that the .... [Click here to read the rest of this post]

Tags:

SAIC Security Goof Threatens 580,000 Military Personnel

A common story. With a common worthless response:

SAIC spokespeople said that several employees were placed on leave after the incident was disclosed, and that it contracted data security company Kroll Inc. to provide free identity theft protection for all affected individuals for one year.
Aww. How nice. Now it looks like they're doing something. .... [Click here to read the rest of this post]

Tags:

Opt Out of Comcast Arbitration While You Can

While I usually throw out anything Comcast sends with the bill, this time I noticed an arbitration notice that says that you only have a little bit of time to opt out before you become bound to an arbitration agreement. What does that mean? It means that you're giving up your right to sue them for incompetence (which is a pretty big deal considering how incompetent they can be). If .... [Click here to read the rest of this post]

Tags: , ,

RIAA Loses Again – Everyone Cheers

There’s too many points to summarize without copying the content directly, but here’s a small post with a lot of links to information about a girl who moved to dismiss a RIAA lawsuit and seems to have won.

Tags:

Hunting Down a Virus Writer – Fun For Everyone!

This guy took personal offense to a virus writer who's stupid prank messed up the computer of one of his friends. So he decided to hunt the virus writer down using only information he was able to find on the Internet with Google. He goes through where he looked, what he found, and what it meant. Important lesson: This is how easy it is to profile you online. JTAG ERROR: .... [Click here to read the rest of this post]

Tags: , , ,

Hotmail Deletes Attachments to Save Bandwidth?

Very interesting:

It has long been suspected that there is a silent policy that makes Hotmail automatically delete the majority of attachments to save on bandwidth and internal disk space. Therefore it really doesn't matter if every client has access to 2GB of storage since they don't deliver the attachments to fill that space up anyway. If that truly is the case, then Microsoft may be liable for .... [Click here to read the rest of this post]

Tags:

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

computer security Tutorial
|INDEX|next: Spyware Scanners

Security Software

Make sure you have a up-to-date Anti-Virus Program to protect you against bad websites or files.
Sometimes spyware gets in your computer and the anti-virus won't stop it. Use a spyware scanner to find and remove spyware and adware.
Use a software firewall to detect bad code on your computer when it tries to connect to the Internet.
Always keep your system up to date with security patches or none of the rest of your security software will matter.
Use an encryption tool to protect your important data when storing or transmitting it.
Switch to Firefox for your web browsing and you'll be better protected from Internet threats.

Safe Computing Practices

Don't get tricked by fake alerts or clever webpages into downloading viruses or spyware!

... or check out any of my other guides and tutorials by clicking here!

Anti-Virus

A virus can come from files, e-mails, web pages, or even devices you plug in (like thumbdrives or printers) and destroy your files or your computer once they get in. An anti-virus is software designed to detect and prevent that from happening.

[Click for full description]

Spyware Scanners

Learn how to detect and remove spyware and adware using a free scanning tool.

[Click for full description]

Software Firewall

Learn what a firewall is and why you want one on your computer.

[Click for full description]

Operating System Updates

Make sure to keep your operating system up-to-date with security patches or else none of the rest of your security software will be able to protect you.

[Click for full description]

File Encryption

Learn how to protect your important files on your computer or when transmitting them with free tools for file encryption.

[Click for full description]

Mozilla Firefox - Internet Browser

There are many browser choices out there. Read why I think Firefox is one of the best.

[Click for full description]

Fake Alerts

Maybe you've done everything right and you're computer is sufficiently fortress-like, but then you or someone in your family falls for a simple scam that tricks them into directly installing the bad guy's virus! Learn how to spot and ignore fakes!

[Click for full description]