Swamp Geek
  Login or Register HomeDownloadsYour Account   
Navigation 
Site Info 
Last SeenLast Seen
  • 77coffee
  • kguske
Server TrafficServer Traffic
  • Total: 5,607,660
  • Today: 874
Server InfoServer Info
  • Apr 03, 2025
  • 06:18 am CDT
 
 
Reviews, comparisons, and opinions about the latest technology products, services, trends and anything of interest to the thick glasses crowd!
Computer Security More about
Swamp Tech

Originally published October 22, 2003:

Taken from a PC Magazine article, this article addresses all aspects of PC security, including data protection, communication protection, and physical protection.References:Computer Cops 

First, do this right NOW: block W2K, NT and XP pop-up spam messages (not the same as pop-ups from web pages) by disabling the Windows Messenger. To do this, open Control Panel, Administrative Tools, Services, then right click Messenger and go to Properties. Set Start-up Type to Disabled and press the Stop button. (Firewalls should also stop them, but may not if they are initiated via an email). 

There are multiple approaches to protecting data:

  • Encryption
  • Steganography
  • Data erasers
  • Activity Tracking Removal (Covering your tracks)
  • Secure USB drives
  • PDA protection

Encryption - used to prevent people from reading files without knowing a password
Key attribute: encryption level: 64-, 128-, 256-bit keys (64 is good enough, and higher is better)
Utilities: FileAssurity (www.articsoft.com)

Steganography - hiding documents inside multimedia files with a password and special software required to extract
Key Attribute: Unless you're a criminal or terrorist, use file encryption instead.

Data erasers - repeatedly overwriting files so they can't be recovered (e.g. when you sell your computer)
Key Attribute: DoD standards support
Utility: Eraser (free) www.heidi.ie 

Activity Tracking Removal - covering your tracks by removing the various histories left behind (auto-complete, web history, cookies, run history, find history).
Key Attributes: remove all types, integrate with data erasers, interface / ease-of-use, browser plug-in history removal support
Utilities: Window Washer (www.webroot.com), AbosluteShield Internet Eraser Pro (www.internet-track-eraser.com), Windows Trace Remover (www.bulletproofsoft.com) 

Secure USB drives - highly portable, easily lost requires security
Key Attributes: technology (e.g. fingerprint,password), software installed on drive or host
Alternative: data encryption of files on USB drive
Products: ThumbDrive, ThumbDrive Touch (www.trekstorusa.com), USB007 (www.sub007.com) 

PDA protection - physical (not worthy of consideration) and software protection for handheld devices
Key Attribute: encryption support, password database with desktop synchronization
Utilities: eWallet (www.iliumsoft.com), Signature Wallet (www.cic.com), Passwords Plus (www.dataviz.com) 

There are many ways to secure and protect your electronic communications (Internet browsing, email, IM):

  • Antivirus tools
  • Firewalls
  • Wireless security
  • Secure e-mail
  • Private information on public PCs
  • Antispam
  • Secure Browing
  • Anonymous browsing
  • Secure IM
  • Antispyware 

Antivirus tools - incredibly only 90% of PC users use these tools to stop viruses, worms, and Trojan horses (why not 100%??)
Key Attributes: frequent updates, effectiveness, cost
Utilities: AVG (free) (grisoft.com) 

Firewalls - software or hardware tools for blocking inappropriate access from or to a computer, most broadband routers have built-in hardware firewalls
Key Attributes: access control features, cookie blocking, effectiveness
Utilities: Zone Alarm (free) (ZoneLabs.com), Sygate (free) (Sygate.com) 

Wireless security - important for wireless users in high-density areas, includes technologies like password key-based WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) and MAC filtering (allows only specified wireless cards to access)
Key Attributes: features (WEP, WPA, Mac Filtering), cost 

Secure e-mail - encryption, digital signatures, public key access
Key Attributes: ease-of-use, security options
Utilities: Zip Lip (free) (ziplip.com), HushMail (free) (hushmail.com), FileAssurity (articsoft.com), SecExMail (bytefusion.com) 

Private information on public PCs - if you use public Internet access, this removes passwords, surfing history, temp files and other personal information - requires a USB device and USB port on public computer
Key Attributes: Cost, only one choice?
Utilities: P.I. Protectory Mobility Suite (imaginelan.com) 

Antispam - delete, prevent, and / or take action against spam and those who send it
Key Attributes: challenge / response (delays incoming email by forcing sender to identify himself - something spammers won't want to do), cost, accuracy (false positives, missed), integration with mail client
Utilities: SAProxy (free) (statalabs.com) 

Secure Browing - block ActiveX controls, pop-up ads - but most features are already built into open source browsers like Netscape / Mozilla and Opera
Key Attributes: integration with Internet Explorer
Utilities: Secure IE (secureie.com) 

Anonymous browsing - prevent web sites from tracking your IP address, previous page, cookies and your ISP / network admin or hackers from watching where you go
Key Attributes: traffic / data encryption, browser integration
Utilities: Anonymizer (free restricted) (anonymizer.com) 

Secure IM - prevent others from accessing your instant messages (which are totally unsecure) but must be running on BOTH ends
Key Attributes: digital signatures, encryption
Utilities: SimpLite (free) (secway.fr), IMsecure (free) (zonelabs.com) 

Antispyware - identify and disable or remove adware programs and cookies, keystroke loggers, and Trojan horses
Key Attributes: cost, accuracy
Utilities: SpyBot Search and Destroy (free) (security.kolla.de) 

The physical security of PCs can be protected in several ways:

  • Physical laptop security
  • Tracking utilities
  • Surveillance
  • Hardware Authentication 

Physical laptop security - use the security slot to lock the laptop to an immovable object, install an alarm, or track a stolen laptop
Key Attributes: cannot recommend 

Tracking utilities - Laptop LoJack
Key Attributes: notification method, file encryption / deletion
Utilities: cannot recommend 

Surveillance - keystroke loggers and video surveillance (track what others are doing on your PC)
Key Attributes: web, email, IM support; email webcam snapshots, motion detection, alarm
Utilities: cannot recommend 

Hardware Authentication - fingerprint / iris authentication, typically via USB device
Key Attributes: portability (passwords stored ON device)
Utilities: cannot recommend

Remember your passwords and protect your privacy Comment
Swamp Tech

Originally published August 1, 2003

Hopefully, you use different passwords for websites, ISPs, software / file protection (Quicken / Money), and other things that can identify you or cost you money. Unfortunately, most people use passwords that can be guessed easily by hackers or others.

Several utilities can help you generate passwords and keep track of all your user IDs and passwords, credit card numbers, email addresses, PIN and other info you'd like to secure, including these free programs:

Why is it called "Spam?" Comment
Swamp Tech

Originally published August 1, 2003.

From PC World: The spam designation - referring to unsolicited e-mail - comes from a Monty Python's Flying Circus skit, circa 1970. A couple tries to order breakfast in a cafe where every menu item includes Spam. Meanwhile a clutch of helmet-headed Vikings break into song, chanting "Spam, Spam, Spam, Spam" and drowing out everyone in the joint.

Man vs. Robo Callers More about
Swamp Tech

After getting about 10 calls in 1 day from a robo caller selling some shady insurance, I'd had enough. I answered the call and asked the person, "Why do I keep getting calls from this..." Click.  The bastard hung up.

This annoying scene plays over frequently on both home and mobile phones. In this case, the calls came from 201-204-xxxx numbers.  Almost every call came from a different number, but they all had the same area code and exchange.

Rise of the Machines

How do these digital scumbags sleep at night?  Unfortunately, probably pretty well. Even though this was not "Steve" from Pakistan telling me he was from Microsoft and here to help, but a North American (possibly Canadian) accent, the scam is practically the same - and just as frustrating.  Yes, my number is registered with the Federal Trade Commission's National Do Not Call Registry. That's about as effective as asking Central American dreamers to obey immigration laws. But unlike illegal immigrants whose (sympathizer) votes help keep politicians in office, robo callers annoy everyone without preference to ideology. And right now, there isn't much you can do about it. Or is there?

Hasta la vista, baby!

A quick review of mobile phone apps and services yielded some possible solutions with varying degrees of success.  The CTIA guide "How to Stop Robocalls" is helpful.  Consumer Reports recommends using a call blocking app like NoMoRobo ($2 / month) or a service provided by your carrier, like Verizon's Caller Name ID with call blocking ($3/month). None of the call blockers let you block calls using this combination, though open source NoPhoneSpam (free, Android only, hasn't been updated in over 2 years).  Though some of the mobile apps work for free, the saying applies: If you are paying for a product, you (and your data) are the product.  In this case, the apps get access to your call history (which isn't too bad) and your contacts, with the excuse that they need to verify if a caller is known to you. Right. And you can get a bargain on beach front property in Arizona.

Since I get spam calls at home, too, I checked with my carrier, MagicJack. I was pleasantly surprised to find a different approach that I'll call "phone captcha" and MJ calls "automated call screening."  Basically, all callers must enter the specified random digit before the call rings through. Yes, this might cause issues for legitimate robo calls coming from schools, doctor's offices, airlines, etc. But it's like that most get those calls on their mobile phones. A mobile app, provided by the carrier or by an independent company, should be able to implement this feature for free as in beer.  You could easily add a list of approved callers (or match them to your contacts - you are the product!) to automatically allow calls through.  But unless it was provided by the carrier, it might need to ring at least once to trigger the screen.

It will be interesting to see how these tools and services evolve, especially if Congress stops campaigning long enough to actually pass legislation to address this.  If they do, I'll be back.

SwampGeek Android TV & Fire TV apps - December 2017 More about Read More...
Android

Android TV apps continue to evolve and expand, even as old favorites like Kodi decline.  Here are the SwampGeek recommended Android TV & Fire TV apps for December 2017.        

Click the image to view screenshots of the December 2017 Android TV Apps

Although popular Kodi plugins have disappeared, others have evolved and been renamed in order to continue providing links to content.

New Android apps, also supported by Fire TV and Fire TV Stick, offer good alternatives to the ever popular Kodi, including:

  • Terrarium TV - probably the best alternative, but must be downloaded from backup sources as the GitHub download has been removed
  • Stremio - available in the Play Store
  • Pluto TV (untested)
  • Cloud TV (untested)
  • TubiTV (untested)
  • YouTube
  • (commercial) Amazon Prime Instant Video (not available in the Play Store for Android phones, tables and TV boxes for newer Android versions)
  • (commercial) Netflix
  • (commercial) WatchESPN (requires cable subscription account login)

Many other apps can enhance your Android TV for Amazon Fire devices...

 Read More...
SwampGeek Guide to Windows Safe Browsing, Security, Privacy Comment
Swamp Tech

With increase of online usage, the number and sophistication of attacks against personal computers are on the rise. The How-To Geek offers some excellent advice on "Basic Computer Security: How to Protect Yourself from Viruses, Hackers, and Thieves." This primarily focuses on real-time and reactive detection and blocking.  It also suggests being aware of scams, avoiding malicious links in email (assuming you know they're malicious), and how to protect your information when using the Internet and email.

But it leaves out other important ways to protect yourself and your computer, including recovery / backups and preventive (vs. reactive) blocking of malicious software (aka malware).  These can be especially important in the age of ransomware, encryption, spoofing, phishing, pharming, and the old stand-bys from the 1980s: adware, keyloggers, spyware, trojan horses, viruses and worms. 

Here are the SwampGeek recommendations to protect yourself against malware, invasion of privacy, drive failures and more using powerful, free software:

 

SwampGeek Quick Guide to Cutting the Cable Cord with Kodi More about
Swamp Tech

 

Here are the simple steps, many with video, to cut the cable cord with Kodi:

  1. Use a commercial VPN, like Private Internet Access, to keep your ISP at bay. ($40 / year or less, for up to 5 devices, including routers, which count as 1 device no matter how many are connected)
  2. Purchase the TP-LINK TL-WR841N Wireless N300 Home Router (~$20) to host VPN
  3. Install DD-WRT on the TP-LINK TL-WR841N to configure VPN
  4. Configure Private Internet Access VPN via PPTP on DD-WRT
  5. Purchase the Amazon Fire TV Stick ($40)
  6. Install Fire TV Stick, connect to a router with VPN installed, and disable "Collect App Usage Data"
    • From the Fire TV home screen, select Settings, Application, Collect App Usage Data (off) 
    • Note from the "If you aren't paying for it, you're the product" department:  To use Amazon Underground apps and in-app items you are required to enable the "Collect App Usage Data" setting on your device.  This allows you to download and use Amazon Underground apps, games and in-app items for free.
  7. Install Firestarter and Kodi (without Firestarter, Amazon makes accessing Kodi on a Fire TV device really hard)
    Update: Use this link to install Firestarter: http://bit.ly/1NzPaKE
  8. Use the Config Wizard for Kodi (aka Hub Wizard) from TVaddons.ag to configure the Fire TV platform
Out of Control iPhone Data Usage More about
Swamp Tech

Out of Control iPhone Data UsageBe careful what you wish for...

For years, iPhone users have envied Android's ability to monitor and control devices, both manually and automatically.  The demise of unlimited data plans forced smartphone owners to pay attention to how their phones use data. iOS 6 added the ability to monitor total data usage independently of carriers like AT&T. iOS7 added the ability to monitor and control usage by application, but the price may have been too steep.

iPhone users are reporting problems with significant mobile data usage, and some are offering suggestions to limit data usage by removing many features that separate smartphones that would be pitiful if there were ways to address the issues without jailbreaking the phone.

The Breakdown by Usage Type chart shows my Verizon family plan usage by line.  The first and 4th lines are college students living away from home. Both have wifi access when they aren't in class. The first line, a Moto X running Android Kit Kat, normally has more usage than the 4th, an iPhone 5s. Why does the iPhone have almost 5 times the usage of an Android phone that likely has more usage?

Here's what I've learned so far:

  • iOS applications still use mobile data, even if connected to a wireless network, including:
    • iTunes and app updates
    • Facetime
    • Text messaging (by default)
  • You can turn off mobile data by application, but sometimes it comes back.
  • You can manually turn off mobile data, but the only way to automate that is by jailbreaking the phone.
  • Wireless access is deactivated when the phone sleeps, but iOS updates and other background activities will still happen using mobile data.
  • Poor reception will cause the phone to continuously connect (this happens on all smartphones).
  • The mail app will continuously attempt to send unsent mail from the Outbox.

To be fair, I had a similar problem with the Amazon store (not to be confused with the Amazon app store) on an Android phone.  It synchronized 100MB of data, images and information on every product I viewed on the Amazon website), even though I didn't use the app on my phone. That isn't trivial (and I suspect it would happen on any phone with the Amazon store), but it pales in comparison with what I estimate to be the 5GB of phantom data usage on the iPhone.

Unfortunately, for now it seems the best option is to manually turn off mobile data unless, and only if, it's necessary.  I'll update this as we learn more...

 

Open Source CMS Social Media Marketing Review Comment Read More...
Swamp Tech

 While working on a social media marketing plan for RavenNuke™ CMS (content management system), a review of three major CMS applications provided some interesting insights into different approaches for similar software, including Drupal, Joomla and Wordpress.

This compares the main navigation, about and getting involved pages, social media marketing (links, calls to social media action, etc.), use of major social media functions (Facebook, Twitter and Google Plus), and marketing support.  Although the main navigation, about, and getting involved pages aren't specifically intended to support social media marketing, this content provides insight into the important messages these projects want to make on the project website - and in social media marketing efforts.  The links to major social media functions enable quick reference to see how well the actual social media content support those efforts.

 Read More...
Cubby = Dropbox + Windows Live Mesh + Crashplan Comment Read More...
Swamp Tech

Cloud storage and synchronizing services pop up and disappear almost as quickly as Instagram's employees became mega millionaires.  Who remembers Apple's MobileMe, Microsoft's Foldershare, MyBloop (unlimited storage), oosah, XDrive, or HP's Upline?  More recently, Motorola acquired and is shutting down ZumoDrive, which even has mobile clients unlike its many predecessors.

Perennial cloud storage favorites DropBox and Box.net have a new competitor: Cubby from remote access powerhouse LogMeIn (currently in limited Beta testing by request).  With 5GB free online storage, file versioning and built-in synchronization that lets you choose whether or not to use online storage, Cubby has most of the best features of DropBox, Windows Live Mesh / SkyDrive and Crashplan.  What's the catch?

 Read More...


Page 5 of 7 (63 total stories) [ << | < | 1 | 2 | 3 | 4 | 5 | 6 | 7 | > | >> ]  

Old Articles