Check Out Our Blogs!
In the right column you can click a keyword to find a topic you want to read about.
James Sloan, Justin Cooke, and Brian S. Staveley
view-source:http://www.therealnewsonline.com/default-image.html
I am writing this piece because too many people feel too secure when it comes to electronics like their computers. The situation is far from it. The Internet is full of bad people who want to make money any way possible. Some ways they do is is by putting malware on your computer and recording keystrokes, or by stealing your emails full of your information. Then there is crime from even higher. Crime as high a level as Google and Facebook. They install tracking pieces of information called cookies, that log all the websites you visit, and they compile some of that information and sell it to third parties advertisers who make advertisements relevant to you. Ever notice why some ads seem like they know what you want? They know who you are and what you like. Here are some of the ways to protect your information from third parties, and how to make your computer more secure.
The internet isn't like the days where you would see an email and know right away that it is a scam. Much like the Nigerian scam emails from the 90s and early 2000s. Did you know that it is not like anymore. Now, there are huge corporations paid to steal your information so they can make profits? Google is one of them. It isn't limited to what you do on the Internet. Now, there are programs that come with crap to install like those toolbars, and all they do is log information. Information gathering has come a long way since the 90s. We are in an age, where even the most trusted corporations are out to get your information. Basic Networking: • If you set up your own wireless connection, make sure you use WPA2 encryption instead of WEP because WEP is weaker than WPA, and a really long password. It doesn't matter if it isn't an easy password to remember. You want to prevent people from accessing your router or network. So you could write it down on a piece of paper and hide it. You only really need to enter the password once, and your computer will remember the password by itself. That WPA2 encryption means that the data sent from your computer to the router has more encryption and is less easy to be read and hacked. Also set up a a strong password to access the router. If someone has hacked your wifi password, they can mess around on your router and do unwanted things on it. So make sure you set up a good strong password for the router as well. • DO NOT USE OR SEND PRIVATE DATA ON PUBLIC NETWORKS!!! I will only say that once. Seriously. If you are going to access Facebook at Starbucks or something, you have to use some type of encryption. You can use an SSH tunnel (requires skill to set up), a Virtual Private Network, or even a SOCKS proxy. Also when you are on a public wifi, make sure all the sites that use private data is using the HTTPS protocol. You can look at the address bar and if it says https://website.com, you are good. There are people who steal data from public wifis. There is a Firefox extension that can do this for you. It is called Firesheep. It scans data sent over the wireless connection for cookies that hold password information to common websites. Websites like Facebook, Youtube, Myspace. etc. That means that the guy at Starbucks could steal your passwords and do unwanted things on your accounts. You should also never do banking or anything dealing with your money on public wifis. Not unless you have one of those forms of protection encrypting your connection to the bank(s). • You can find out which VPN providers care about the anonymity of their users here. Make sure you do research on a VPN that you decide to get. Some VPN providers have sent browsing information to law enforcement officials. There are VPN programs out there. Hotspot Shield is a free software that creates a VPN for you to use for free, but comes with ads on every website you visit on the free version. • HOSTS File: You can read about the HOSTS file here and how you can use it to block out advertising sites, data mining websites, pornographic sites, whatever you want. You can find a HUGE list of bad websites to add to your hosts file here. You do not have to add all of them, but I would recommend adding 127.0.0.1 google-analytics.com for sure. This is part of Google and what they do is capture the websites you visit, and many sites have this data miner on there. With using the HOSTS file, some websites may load faster because some of these ads that are blocked take a while to load since most of them use flash. Also, blocking off too many sites can break some websites causing them not to run properly. • If you use a Homegroup to share files between computers on your network, make sure you have a pretty good password. You don't want to share files with an unknown computer on your network. Operating System: • Make sure that your system is updated to the latest version and that it has all the required files installed. • If you don't have the most recent version of your operating system, at least update the system files to their current versions. • Update old drivers as well. You can download free driver checker programs from the Internet. Make sure you get them from reputable sources. Don't be clicking on ads and downloading supposed driver checkers from there. Not unless you want a virus or something. You can find some driver checkers at Download.com or Softpedia. Most of them will make you pay to download the recent drivers to your computer. You can also check out the Driverpack Solution. Another site to check out is http://driverpacks.net/. • If you are on Windows, install a good anti-virus program, even though they really give you a false sense of security. There are too many viruses, trojans, worms, etc. made everyday that most anti-viruses won't stop them all. Only a certain percentage of those risks are dected by anti-virus programs. That doesn't mean you shouldn't still have one. Good anti-virus programs include: Microsoft Security Essentials, Avast, Avira, Kaspersky, ESET NOD32, Bitdefender. Avoid McAfee and Norton. • Yes, Macs do get viruses. Although they are rare. Apple covers up the fact that they can get viruses, so you do not hear of Mac viruses often. • Install or tweak your firewall. If you are on Windows, you should think about getting a third party firewall since Windows Firewall isn't too good. I recommend getting Zonealarm. • Easy to use Linux distros: Linux Mint, Ubuntu, and Ubuntu's derivatives (different desktop enviornments). I HIGHLY recommend using one of those distros if you only use your computer for browsing the web. They are real secure and get less viruses compared to Windows. But if you love Windows and want to try out Linux, you can install Linux with Windows using WUBI for the Ubuntu derivatives and this method for Linux Mint. You can always dual boot using partitions. Internet Browser: • Instead of Google Chrome, use Chromium. Chrome is built on Chromium and there is no significant difference between the two browsers but Chrome updates itself and Flash without your permission. That is a characteristic of a botnet. Chrome feels it does not need your permission to make changes to itself. Firefox is okay. • Avoid using Internet Explorer as your main browser. It's a good browser, it just doesn't have much to offer in terms of addons and extensions to make it better or more secure. • Extensions that are a must have for your browsers are Ghostery (anti-tracker) [Available on most browsers], Noscript (Javascript tweaker) [Firefox], Google Sharing (Anti-Google data mining) [Firefox], Better Privacy (cookie cleaner) [Firefox], Track Me Not (anti-data mining) [Firefox & Chrome], Adblock Plus (ad blocker) [Firefox, Safari, Chrome] HTTPS Everywhere (encryption) [Firefox] • Disable Java, not Javascript, in your browsers. Java is not really secure and this is exploited by hackers on websites. You can have it installed, just disable it when browsing the Internet. Java applets are not that common on the web today so you really don't need it when browsing the web. Software • Use open source software if you can. That means they are free and you can modify the source code. You can trust open source over proprietary which is closed source software. Closed source software are usually bundled with crap you don't need and may even need adware and spyware to run. • Encrypt sensitive documents and files using encryption programs like Safehouse Explorer and Truecrypt. Truecrypt can allow you to create a hidden drive and you could store files in it. Truecrypt can also encrypt a partition or drive. • Microsoft Bitlocker built into Vista Ultimate and 7 Ultimate, also provides drive encryption and it will also encrypt flash drives. • If you are prone to forgetting passwords, there are password “lockers” that will store your passwords. You only need to remember one password. An example of this is Keepass. • One must have program is CCleaner for the cleaning of unwanted files from your computer. It will clean up temp files, your recycle bin, browsing histories, memory dumps, bad registry files etc. • Tor is an anonymizing program that will make you anonymous while browsing the Internet. It will NOT encrypt any traffic so it is not recommended for anything involving serious private data like banking. You can read a little bit more about Tor here. • Peerblock is a program that blocks bad connections from connecting to your computer. It is used mainly when downloading torrents. • There are two portable VPN programs that you can buy which will have your VPN settings and use them between computers. Portable VPN Portable VPN • You can use these programs for setting up SSH Tunnels. Putty Myentunnel Tunnelier • You can use Teamviewer to remotely login to other computers or you can use this to create a VPN between two computers. Available for Windows, Linux and Mac OSX. You can even remotely login to a computer using a mobile phone. • Two programs that get around Internet firewalls, censorship, and makes you anonymous are Ultrasurf and Freegate. Freegate is not available in the US. • Extreme Password Generator Pro can create difficult to crack passwords if you can't think of any. It has different options for you to use. • Wipefile is a program that can wipe files and folders and they can not be recovered. This is a must have if you deal with sensitive information and you need to delete them. • DBAN is a bootable disk image that you can burn and with DBAN you can wipe out your hard drive when you want to sell your computer, or you have a lot of sensitive information that you need to get rid of. • Revo Uninstaller is an amazing program used to uninstall files from Windows, and it scans for any stray files and registry edits that did not get removed during the uninstall process. • System Explorer Process Explorer Process Hacker • Autoruns is a program for Windows, that will search the computer for programs, files and services that run at the startup of the computer. You can use this program to disable the automatic run of malicious programs and services. • Virtual Box and VMware Player are two amazing programs where you can install an operating system into! You can run Windows 7 and install Windows XP into one of those two programs and you can use some applications that may not run on Windows 7 and you can run them in a virtual machine. You can use virtual machines to install suspicious apps that you do not want on the host machine. You can run other operating systems like Linux, FreeBSD, Mac OSX and Solaris. Changes inside the virtual machine will not affect the host system. • Sandboxie is a program where you can install apps in an isolated space that will not make permanent changes to the operating system. You can install an internet browser and you can be rest assured that you will not get anymore infections to your computer. It is like running a program in a literal sandbox and it will not make changes outside the sandbox. • VMWare Thinapp is exactly like Sandboxie for the professional crowd. You can even make programs portable by using this program. • Dropbox is a cloud web file hosting service that you can use to backup some of your files for school or work. One thing to consider is not to upload sensitive data because they have looked at files before. • Gnupg.org You can send encrypted emails with software found here. It is a little complicated to set up. Websites • There is no reason that we should keep using Facebook. They do not care about our privacy because they sell our private data to third parties. They also give data to law enforcement agencies. Google does the same. Just check out Gmail and look at the ads. They will always be relevant to what our emails are about because they data mine as well. There are alternatives out there like: DIASPORA. It is still in its Alpha phase, but it should be good enough to use as an alternative to Facebook. • Disconnect all apps from Facebook. If you have apps on Facebook they will post to your wall the articles you read from news sites, the songs you are listening to on Pandora and Spotify, what games you are playing, etc. • Portableapps.com is a good site that has applications that you can put on your flash drive. All of the settings are saved to the flash drive and not the computer itself. They are all optimized to do this. Some apps include Firefox, Chrome, Thunderbird, VLC among others. You do not need to be admin to install these to the flash drive. • Portablefreeware.com is like portableapps.com but without the optimization. They do have a lot of apps to choose from and details as to it leaves traces on the computers you use them on. • Google search engine alternatives: DuckDuckGo, Ixquick, Yahoo, Altavista, Excite, Lycos, Hotbot. Google Maps alternatives: openstreetmap.org maps.nokia.com • Encrypted email hosts: lavabit.com gmx.com hushmail.com (hushmail has sent information to law enforcement officials ) • I2P2.de I2P is a layer of anonymity for many of the programs you use. It isn't perfect but it will make things harder for hackers and third parties • FreeNet Project You can share, browse and publish files only accessible through freenet. Money/Currency • Paypal Alternatives: http://www.ehow.com/way_5481191_alternatives-paypal.html http://www.screw-paypal.com/alternatives/top_pick.html • Bitcoins • Prepaid cards: http://www.theprivacyguy.com/anonymous-credit-debit-cards/ Other things to know • Use flash drives and external hard drives to store files that you don't want on your computer. These can be sensitive files in case your laptop gets lost or stolen. • Install a fresh OS when you buy a new or used computer. I say this because sometimes computers come pre-installed with a bunch of crap that normal people have no use for. That includes manufacturer bloatware. They can also contain keyloggers or other mailicious applications. You can start fresh and install all of your favorite apps on a new operating system install. • TRENDNET camera IP vulnerability. TRENDnet cameras have vulnerabilities that allow hackers to view what is being streamed by the cameras. If you have one of those cameras, update the firmware from here. Seriously, I have seen some of the feeds, and on two instances I saw bedrooms and one had a crib where a family kept their baby. It was some scary stuff. • Be careful when you use your smart phones. They have GPS and other stuff that can track down your locations and keep records of them for long period of time. Some phones even have a keylogger called Carrier IQ as seen here. Worrying about your privacy on the Internet DOES NOT MAKE YOU A TERRORIST. You are smart enough to know that there are bad people who want to do bad things with your information. That is a hypocritical statement by the Fraudulent Bureau of Idiots. They really care about their privacy otherwise anyone will seize their sensitive documents. http://publicintelligence.net/do-you-like-online-privacy-you-may-be-a-terrorist/ Having privacy means you own your information and not a third party. I don't get how people brush this off and not necessary. You wouldn't want people going through your mail nor to go through your house without your permission. That also means that whatever is in your house can be written down and sold to someone else without you knowing and you do not see a dime about it.
42 Comments
2/25/2012 07:36:46 am
Great Article. Very useful information. I myself am going to use this alot. I am def guilty of unsecure browsing in public places. Look forward to your next blog!
Reply
2/29/2012 11:20:53 pm
I would like to take the ability of thanking you for the professional advice I have constantly enjoyed browsing your site. I'm looking forward to the commencement of my university research and the overall preparing would never have been complete without consulting your blog. If I can be of any help to others, I'd personally be ready to help as a result of what I have discovered from here.
Reply
3/4/2012 06:35:04 pm
I was really encouraged to seek out this web site. I desired to thank you for this unique examine. I certainly savored every tiny little bit of it and I've you bookmarked to look at new stuff you post
Reply
3/9/2012 08:53:44 am
Thank you guys! I am glad you are all enjoying the site. This tech type blog was written by Alan Mendoza. I'll be sure to pass the word on! New blog by me coming tonight.
Reply
3/15/2012 10:20:51 pm
That is a number of inspirational stuff. For no reason knew that opinions could be this varied. Thanks for all the enthusiasm to provide such helpful information here.
Reply
3/16/2012 10:39:45 pm
I am going to be honest here: this post is excellent! I learned a bunch of new, fascinating information. If you could send me your newsletter link, I would be very happy! Keep writing like this, and you will be well-known in no time.
Reply
3/18/2012 10:08:10 pm
Thanks so much for giving me an update on this subject matter on your website. Please know that if a brand new post becomes available or in the event that any adjustments occur on the current article, I would be considering reading more and knowing how to make good use of those methods you talk about. Thanks for your time and consideration of other people by making this website available.
Reply
5/6/2014 10:16:25 pm
The tips you have given here for keeping our data safe during internet access and ensures safe internet browsing is really beneficial for all computer users.. This information is quite elaborate and helpful..
Reply
3/21/2012 12:01:11 am
We still can not quite assume that I could often be one of those reading through the important ideas found on this blog. My family and I are really thankful for the generosity and for giving me the chance to pursue the chosen career path. Appreciate your sharing the important information I acquired from your web site.
Reply
3/26/2012 11:08:52 pm
I loved as much as you’ll receive carried out right here. The sketch is tasteful, your authored material stylish. nonetheless, you command get got an nervousness over that you wish be delivering the following.
Reply
4/4/2012 11:30:57 pm
Your all amazingly sweet and thoughtful of others in addition to the fact that reading your blog posts is a good delight if you ask me. And exactly what a generous surprise
Reply
4/8/2012 06:19:13 pm
Great post. I just stumbled upon your blog and wanted to say that I have really enjoyed browsing your blog posts.
Reply
4/11/2012 09:55:05 pm
This is the perfect blog for anyone who wants to know about this topic. It contains truly information. Your website is very useful. I admire the valuable advice you make available in your expertly written content. I want to thank you for this informative read; I really appreciate sharing this great.
Reply
4/12/2012 05:43:42 pm
This is nice post which I was awaiting for such an article and I have gained some useful information from this site. Thanks for sharing this information.
Reply
4/16/2012 06:05:19 pm
I actually added your blog to my favorites and will look forward for more updates. Great Job, Keep it up.
Reply
4/16/2012 06:07:26 pm
While this subject can be very touchy for most people, my opinion is that there has to be a middle or common ground that we all can find. I do appreciate that you’ve added relevant and intelligent commentary here though. Thank you!
Reply
5/11/2012 03:21:17 pm
this is what I am looking for many days.this is really a great concept and I would like to give you lots of thanks for sharing such a nice and innovative creation.Also in this blog you notes the basic part of business purpose which is really great lyj
Reply
5/27/2012 11:12:29 pm
If you are struggling with your damaged raid system then you may visit data retrieval.com web site to recover failed or inaccessible data. This is a company specialize in all kinds of raid configurations and it has extensive experience to give successful solution of raid data recovery service for you.
Reply
9/27/2012 02:04:17 am
A fantastic blog with a lot of useful information. I would love to get updates from you. Keep blogging. All the best.
Reply
1/3/2013 05:01:31 am
Great blog! The information you provide is quiet helpful, why I was not able to find it earlier. Anyways I’ve subscribed to your feeds, keep the good work up.
Reply
4/20/2013 01:56:39 am
A fantastic blog with a lot of useful information.Great Job, Keep it up.
Reply
7/10/2013 01:00:22 am
Good Blog !!!Maybe in time I will consider having this as my blogging platform. Even though lots of people saying this platform is hard to handle.
Reply
7/18/2013 01:03:50 am
Perfect piece of writing rich information about "Networking devices- Virtual network". I have been looking for such a post for a long time. This is an excellent post. I learned a lot about what you talking about. Not sure if I agree with you completely though. Thanks again.
Reply
9/17/2013 08:47:38 pm
The information that you shared about "Computer technology" in your blog is useful for any genre of people. Though you have focused on teenagers still adult can also take the benefit out of it.
Reply
11/5/2013 07:49:04 pm
It is really going to help me a lot. Thanks for sharing your thoughts so clearly
Reply
7/22/2013 11:45:23 pm
What a great competition to hold. Thanks for keeping us up to date. I just went through some of your previous posts and now following you on Twitter and FB Fan Page. Keep up the great work. Thanks Good luck
Reply
9/10/2013 09:34:46 pm
Thanks for sharing this interesting post with all of us. I really enjoyed it.This post covers every minute detail about the subject, it is really informative. I found this post to be of great use, it will help me with my research.
Reply
9/25/2013 04:39:28 am
This is nice post which I was awaiting for such an article and I have gained some useful information from this site. Thanks for sharing this information.
Reply
5/18/2020 01:21:05 am
Entertainment can be more fun with Hulu as here you get access to a world full of your favorite TV shows. Here will get the opportunity to enjoy the latest content that you can stream in any of your devices supporting the app. Get your free trial and access to your device in the
Reply
5/18/2020 01:22:18 am
Garmin Express is an extremely versatile software application available for both Windows and Mac devices. However, you are required to check the specified requirements and ensure your system conforms to it. This is extremely important for flawless setup and unmatched performance.
Reply
5/19/2020 01:08:04 am
<a href="http://webrootdownload.me/">Webroot Download</a> is a cloud-based antivirus software that protects your system against viruses and other online threats. This software offers complete security of your device from malware and viruses. Moreover, it protects you during web surfing sessions by blocking harmful sites.
Reply
5/19/2020 01:08:52 am
this is a nice post---In case you are facing any issue with norton.com/nu16 then we recommend you get in touch with Norton Support. A team of technicians is 24/7 available to assist you with your issues.
Reply
5/19/2020 01:09:35 am
Such a beautiful post thanks for sharing-McAfee.com/Activate is a comprehensive, and intelligent cybersecurity suite that safeguards you, your data, identity, privacy and all your devices at all times. It gives you the advantage of protecting all the devices of a household with a single subscription. It seamlessly integrates “antivirus, privacy, and identity” tools and features that are capable to crush the most advanced security threats.
Reply
5/19/2020 01:10:13 am
Unique information you provide us thanks for this -norton.com/nu16 When it comes to antivirus and security applications for their computers, many users choose Norton Security. Norton is a well-known security company that has been collaborated by many big brands for more security. You must have seen the name of the Norton offering security to the websites and more.
Reply
5/19/2020 01:11:08 am
this is nice psot thanks for sharing this ----We will provide any antivirus installation error solution you can use this support service team members and find a solution to complex issues related to antivirus.
Reply
11/16/2022 07:40:49 pm
Reply
11/17/2022 06:56:06 am
Is Zelle Faster Than Venmo? While both peer-to-peer applications are quick, Zelle is faster than Venmo. Zelle transfers are almost instantaneous. Venmo funds can take up to three days, unless you pay a 1.5% fee for an instant transfer. These transfers are available in minutes.
Reply
12/27/2022 01:59:16 am
PayPal is one of the many payment processing platforms that allow individuals and businesses to and fro of money. This platform is a one-stop destination for those users who are looking to receive payments from their buyers as well as those who want to make payments for their shopping.
Reply
5/29/2023 04:21:07 am
The instant that you have registered into the pay pal prepaid log in platform subsequently a account is regarded as verified and it surely will be then prepared to really make the trades, you're able to obtain the payment, and create the payment or assess the total amount by the real history.
Reply
2/22/2024 01:09:23 am
Reply
Leave a Reply. |
Scroll Down For Tags For Quick Access To The Content You Are Looking For!
Brian S Staveley
Brian S Staveley is
the founder and creator of both The Real News Online and The Dose Of Reality Radio Show. Brian began researching these matters in late 2010 and launched his first of several radio ventures shortly after. Brian also produces all the radio shows on this network as well as the work on the website. His main areas of research would be media fakery, govt. and media hoaxes, false flags, 9/11, NASA, Flat Earth, Scientism, Mandela Effect, and more. RIP
|