Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

Google is Most Popular – From the “Well Duh!” Department

(Image used under: Creative Commons 2.0 [SRC])

Recent polls show that Google is the most popular search engine by far. Depending on the rater, Google served between 50 and 70 percent of all web searches with Yahoo running from 15 to 30 and MSN at around 6 percent. The Microsoft number is the one that interests me.

Overall, the rankings have to be .... [Click here to read the rest of this post]

Tags: ,

RFID Manufacturer Tries to Hide Vulnerability Instead of Fix It

(Image used under: Creative Commons 2.0 [SRC])

You already know that RFID chips can be easily cloned (which is really embarrassing when a company has implanted one into you because it's supposed to be more secure that way…). Now, one company is trying to silence a researcher from presenting his demonstration of how it's done at the upcoming Black Hat conference. Fortunately, an ACLU lawyer .... [Click here to read the rest of this post]

Tags: ,

Microsoft “Dirty Tricks” Archive

(Image used under: Creative Commons 2.0 [SRC])

The Register has been following the story of a massive archive of "dirty tricks" that Microsoft performed during a lawsuit. Recently, the archive disappeared from the Internet, but now it's back in the form of torrents.

.... [Click here to read the rest of this post]

Tags: , ,

Smart Cameras Spell Privacy Disaster

(Image is in the Public Domain)

So now they're using smart cameras to analyze you based on your not just appearance, but the way you walk, and your actions.

A student walked into the middle of the room, dropped a laptop case, then walked away. On the laptop screen, a green box popped up around him as he moved into view, then .... [Click here to read the rest of this post]

Tags: , ,

EPIC Hosts Independent Review of Citizen Trust In Government Agencies

(Image is used under the Pixabay license)

In an independent study, Ponemon (not to be confused with Pokemon) conducted a survey of over 7000 people accross the nation as to what their trust level was for various government agencies. Specifically, do we trust the government to safeguard our personal information?

Not surprisingly, once you're out of the top 5, the trust level is in the .... [Click here to read the rest of this post]

Tags: , ,

IRS Looks at eBay Users’ Earnings

(Image used under: Creative Commons 2.0 [SRC])

Ars Technica has an article about the IRS wanting eBay to turn over information on its users' earnings. This pretty much sums up the issue:

With so many people making part or all of their living through eBay, the government wants its cut. This isn't an issue of any new taxes, but an attempt to collect .... [Click here to read the rest of this post]

Tags: , ,

Simple Attack Against Home Routers

(Image used under: Creative Commons 2.0 [SRC])

Schneier writes about a recent attack against home routers that takes advantage of the fact that most people never change the default passwords on their equipment.

One of his commenters said it best:

It has long been standard security practice that when logging in to a new system with a default password, the first required step .... [Click here to read the rest of this post]

Tags: ,

“Violent Games = Violence” Studies Come Under Fire

(Image used under: Creative Commons 2.5 [SRC])

In an analysis of studies done showing violent video games leading to real world violence, Dr. Christopher Ferguson explains that current work doesn't take into account real-world situations and other violence factors such as family life.

The overall conclusion is that there does appear to be a connection between violent games and violent thoughts in a .... [Click here to read the rest of this post]

Tags: ,

TSA’s Backscatter X-Ray Goes to Phoenix’s Sky Harbor International Airport

Privacy.org points to an article explaining that the backscatter x-ray will be fielded in Phoenix. This X-ray device can penetrate clothes, but not skin making a pornographic video of them. Yes this allows the TSA to see if you're carrying bombs or guns, but it also removes your clothing.

Update 5/22/2008

It turns out that the technology can be used as described, but the .... [Click here to read the rest of this post]

Tags: , , ,

Windows Vista Recommended RAM Size – Wrong Again

(Image used under: Fair Use doctrine)

When XP came out, I noticed that the cheapies (the really skanky brands) had 256MB of RAM while all the others came with 512. This is because 256 was the minimum recommended RAM size from Microsoft so it was technically "acceptable". The fact is, just because it runs doesn't mean it runs well. Well Vista is the same, only .... [Click here to read the rest of this post]

Tags: , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

web posting dangers Tutorial
|INDEX|next: Spyware Scanners
Chat, Instant Messaging, Forums, and Internet Blogs are fun, but make sure you post carefully.
Sometimes spyware gets in your computer and the anti-virus won't stop it. Use a spyware scanner to find and remove spyware and adware.
Use a software firewall to detect bad code on your computer when it tries to connect to the Internet.
Always keep your system up to date with security patches or none of the rest of your security software will matter.
Use an encryption tool to protect your important data when storing or transmitting it.
Switch to Firefox for your web browsing and you'll be better protected from Internet threats.

... or check out any of my other guides and tutorials by clicking here!

Spyware Scanners

Learn how to detect and remove spyware and adware using a free scanning tool.

[Click for full description]

Software Firewall

Learn what a firewall is and why you want one on your computer.

[Click for full description]

Operating System Updates

Make sure to keep your operating system up-to-date with security patches or else none of the rest of your security software will be able to protect you.

[Click for full description]

File Encryption

Learn how to protect your important files on your computer or when transmitting them with free tools for file encryption.

[Click for full description]

Mozilla Firefox - Internet Browser

There are many browser choices out there. Read why I think Firefox is one of the best.

[Click for full description]