Are you facing a hurricane in your area? Or do you want to be able to communicate with friends and/or relatives during a hurricane and soon after? If so, read Zello Walkie Talkie: Why App Downloads Are Soaring Ahead of Hurricane Florence in the Yahoo web site at: https://yhoo.it/2p3WBTM. You can also read my previous articles about Zello by starting at: https://privacyblog.com/?s=zello.
The next update to Windows 10, to be released in October, is expected to “warn” users to never install Microsoft’s biggest web browser competitors: Chrome or Firefox. The pop-up message reportedly says that these two big-time competitor are not as safe and secure as Microsoft’s own Edge browser. Don’t believe it. Experience has shown the opposite to be true: Both Chrome and Firefox have proven to be more secure than […]
Tor is probably the best-known privacy network and also one of the best at protecting your personal data. It is free software for enabling anonymous communication. According to Wikipedia: The name is derived from an acronym for the original software project name “The Onion Router”. Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user’s location and usage […]
Huge changes are coming from Microsoft. A new rumor is going around that claims Microsoft is switching from SELLING Windows to RENTING it instead. Some users think it will be an improvement while others believe it will be a major step backwards to computing in the way it was done in the 1970s when very expensive mainframes did all the computing and all data input and output by humans was […]
Do you use the LoJack anti-laptop theft tool? If so, you definitely need to read an article in The Register at: http://bit.ly/2JPqfVe.
In my recent article, US Hospital Pays $55,000 to Hackers after Ransomware Attack, I referred to “all good backup products.” That obviously leads to the question, “Which backup products are good ones?” I do not have a list of all good backup products for all operating systems, especially for those that are designed for use in large data processing centers. I am sure there must be dozens of such products. […]
News stories over the past few years about the unconstitutional actions of the National Security Agency (NSA) and other government agencies should serve as a wake-up call for all of us. Yes, there are many people and organizations trying to obtain information about you. From hackers in third-world countries, to companies trying to sell you products, to semi-secret agencies of the U.S. Government, it seems as if nearly everyone is […]