Help Support my Blog!

Virgin Mobile USA
Glasses USA
Amazon
Newegg
VPN4ALL
Netflix
Hulu
CafePress

 

Subscribe to Paul’s Tech Talk Affiliate Marketing Blog

Subscribe to Paul’s Tech Talk Science Fiction Blog

Subscribe to Paul’s Tech Talk Scams Blog

  • Acer 11.6
    Acer 11.6" Laptop 2GB 16GB | C710-2856
    Acer

    Currently  in process review this Acer Chrome book and boy is it nice!

Navigation
Sponsors
Sunday
Nov032013

The End to all Games : Ender's Game Review!

Ender’s Game

I was all set to go see the movie Ender’s Game!  I even talked about it in May that I wanted to go see this movie but I will say I wasn’t expecting this to blow me away!   I will say this before I get to far into this and spoil it for anyone.   If you haven’t seen the movie and you hate spoilers, please move on and do not read anymore.   I doubt I will be able to not spoil it the plot.   If you haven’t read the book, Ender’s Game and you have an Android, then you should read the book either before or after the movie.   It will help explain some of the things that was not touched on in the movie.   Some of the common questions that I had were quite obvious:

Did Petra Arkanian (Hailee Steinfeld) fall in love with Ender Wiggins(Asa Butterfield)?

The Backstory about Valentine (Abigail Breslin) and Peter (Jimmy ‘Jax’ Pinchak)?

As you can see this is answered in the books more or less, but I will not spoil some of these questions by answering them to my readers.    

In the moment when I truly understand my enemy, understand him well enough to defeat him, then in that very moment I also love him.”  —Orson Scott Card

As we start off the movie, that is the quote you see on the screen.   This quote is monumental to the book and movie, because you will see the conclusion of that quote from beginning to the end and understand just how hard it was for Ender to do what he did and see his agony when he discovers a very fatal secret that was kept from him and his team until the very end.   That I will not spoil because it is a key story plot that must be read or watched to fully understand the outcome of the full book or movie.   

Character Development

I couldn’t blog about this without at least touching on the characters a little and talking about them.  In the movie the development of Ender Wiggins and how he got where he got to was constantly changing and increasing in difficulty due to the need for him to be a leader.   This was about him and this battle with the bugs as some would say but it was also something that in the movie was never forced upon you and it kept my attention.   The details they used on the big screen were in essence almost exactly the same in the book.   I doubt I was the only one but I saw each chapter on the screen as it was playing and it was like a WOW moment when I realized that.   They created the movie almost like the book, chapter by chapter and I am impressed.

We had some big name actors Harrison Ford from Star Wars, Abigal Breslin from various films like “Definately, Maybe” and “Nim’s Island” and ofcourse Ben Kingsley who played in Iron Man 3.   Each one of them brought a unique presence to the movie and helped draw you into the story line.   I must say I was impressed with their abilities and how they made you believe they were who they said they were.

Graphics of Movie!

I must say they didn’t over do any of the CGI and I am quite curious how they actually did the Zero Gravity, and all that.   I cant’ wait to see the behind story of all that because it fascinates me and makes me wonder if it was some CGI and some actual weightlessness that they did to makes you believe they were actually in Zero Gravity and not on earth.   I won’t go any farther than that to try to not spoil it for anyone but it was very well done with the Graphics and the battle scenes were actually believable.   

Conclusion

I have talked about this as thoroughly as I could without giving any major plots away and it is rated PG-13 with minor violence and VERY little language.  So it is up to you who you will allow to go see this movie but I have to say if you read the book you won’t be surprised at anything that you see in the movie.   I do think this movie is a MUST “Go See” and the idea of boycotting this movie because of the Anti-Gay ideas of the Author is simply ridiculous because every writer who ever wrote anything has some view or idea that you may not like and it is hypocritical to think you can change who he was just by boycotting a good movie.   

Tuesday
Oct292013

How to move your number to another cellular service!

Cell phone life

Portabilitly is required!

When the FCC made the rule LNP (Local Number Portability), it gave consumers the right to keep your number as long as you are staying in the same area.   So if you have decided to move to another cellular phone service, then you are in luck.   

I was in Walmart, and I heard one person tell the Walmart service employee that they needed to get another phone because they wanted to keep their number.   I interjected because I was curious as to why they wanted to keep with their current service if they did not have the phones they wanted.  I also suggested they could easily go to Virgin Mobile US and still keep their number.   They were quite surprised because the service they were using never told them they could keep their number.

Although this is a common ploy by any cellular phone company, because they want you to spend money on them and not pay another service that could be better or even worse.

The Steps to move your number!

It isn’t hard to do but I guess some people just don’t understand how to do it!

  • Call the new service and find out what you need to have to move your number to their service!
  • Until you have decided to move your number please DO NOT cancel your current service!
  • If yout terminate your service from a contractual wireless phone company, then you may need to pay for the early termination fee. If you want to go with No contract phone companies here are a few that might work!
    • Straight Talk Bring your own Phone Plan
    • Virgin Mobile US
    • T-Mobile
    • MetroPCS

As you can see there are a several few Cellular Companies that you can use to pay as you go and not have to worry about any contracts!  It can take up to one day to move the number to the new service but don’t worry, if it is important you may want to tell people to call someone who can get a hold of you in case of an emergency but I don’t see that happening!

Unlocked Cell Phones

Having an unlocked cell phone will make the process much easier and thus you may not need to buy a new cell phone.   You will however have to find out from the new service provider if you will need to buy a new phone from the new carrier.   I always tell people you should buy an unlocked cell phone and that will make it easier to move from one provider to another if you so choose to!

If you do these things you should not have any problems.   If you do have problems you can always file a complaint with the FCC online.   It will help if you provide all the important information to give to help you solve your problem.

 

Thursday
Oct242013

How Cryptolocker (Ransomware) gets installed and how to remove it!


Cryptolocker Virus!


I have been watching what has been going on in the past few days and thought it was high time I tell you about this nasty little worm or virus! It has been many months since I have talked about this and I wanted to help you understand how you might of been infected. If you have been infected and want to remove it, you can easily remove it by using Malwarebytes Pro, Which is a sponsor of my blog. The Malwarebytes Blog has some interesting stuff about what this bug really does to your files and what it encrypts!

Drive by download


Some would say it is coming from emails but I suspect it will get much worse before it gets better. If they are making money they will probably start advertising that you have a virus and when you click on the image you will be taken over to actually have the virus or worm as some would call it. It all started when scammers started infecting systems and doing the defederpageblock and others like that. They found they could actually make money by scaring people into paying. I even tried to help people by offering some great Antivirus And Antimalware tools to help fight off this types of infections.

So how are some ways to get infected? The basic ways are simple opening email links if you don’t know the sender. This is the most common approach by any scammer or spammer because you can’t really see where that link is going or even if they are trying to use a script.

Social Media is the next biggest way that you might get infected by clicking links in Twitter, Facebook, LinkedIn, and sites like that. You have to be careful but most of the time you can expand the URL by using a service like LongURL. I sometimes use this to find out where a shortened bitly link or twitter link is going to take me.

Googling or Searching is the next way an attacker would install this type of software on your system. They would just use scripts, known vulnerabilities, to force install or silent install this type of software in your system and if you were using something like NoScript you would be much safer than if you didn’t!

Installing untrusted software can lead to you getting infected by this virus and others if you think you have to have a piece of software for something then please do not use your Windows Admin account to install this on. You should try to see what others are saying about a particular software or application. It isn’t always going to be fool proof but it will at least slow it down.

Now these are a few ways you could get infected if you were trying to get infected with this nasty virus. Which case you would be paying 300 US dollars or 2 bitcoins which is how they want to keep getting paid. So if you don’t want to find your pictures, and important data encrypted, please put them on a recordable dvd and put them up! This would be one step to help fight this little problem.

I havent’ heard if it has infected any Apple, Android, or Linux Operating systems it looks to be primarily Windows Systems. I can assure you it will happen to these other OS in the coming months so don’t think you aren’t immune to this and other malwares or viruses. With Android having exploits in the wild you can bet they will targeted soon to encrypted your contact list and your pictures. This would be my next bet!

Saturday
Oct192013

Top 3 Science Fiction Books to Read on the Android! (Authors Included)

Attic Clearout

Peter F. Hamilton

One of the best Science Fiction Authors I have read in the past few months.   I’ve started to read the Pandora’s Star and can’t get enough of any of his books!  He keeps me wanting more from his books, and nothing keeps my attention like his books!

P2160004

Orson Scott Card

With the Movie Coming, Ender’s Game is one of those books you must read and then maybe even read other books by this author.   I am getting ready for the movie but would love to know the story and more!

The Hunger Games.

Suzanne Collins

If you loved the Hunger Games Movie then the Hunger Games Book should be on your list of books to read to get ready for the Catching Fire Movie coming out in the coming months.  If you haven’t read any of her books, it should be one of the many you may want to read next week!

As you can see I have been getting ready for some movies that are to due to hit the theatres next few weeks and I simply love some of these movies and thought it would be nice to see the differences.  So if your like me, these are something that must be read in order to understand the movie plots!

Monday
Oct142013

Top 5 Android Apps to install for Streaming Shows and Movies!

Do you want to watch Doctor Who, How I met your Mother, and more on your Android device. Check out this post to find out how you might be able to do that for free!

Click to read more ...

Saturday
Oct122013

Protect Your Consoles From Hacks and Phishing

Only a few years ago, the largest threat to a gamer involved having to blow the dust out of their cartridges. Today, Hacking NetFlix reports that three out of four current-generation console owners utilize an Internet connection for gaming and streaming, making them vulnerable to identity thieves who prey on gamers. Today’s consoles provide an all-in-one entertainment device, but this makes them vulnerable to all the safety hazards of online play and communication. How can you protect yourself when playing online?

Xbox Live

Due to the necessity of using a credit card to access Xbox Live, Microsoft’s gaming console has proven a prime target for hackers. BehindTheGames reported in May of this year that a particularly effective hacking protocol left nearly fifty million users exposed to identity theft. Turning off Xbox Live will prevent digital identity theft, but makes you unable to enjoy your games online. Instead of cutting yourself off, you can get a Hard Drive Transfer Kit (this comes standard on new 120 GB Xbox 360 units) that transfers information from one hard drive to another, so that your information remains backed up and you can swap out the sensitive data when you want to play online.

Playstation Network

Since Playstation offers its online services for free, fewer hackers try to break into the console digitally. Keep in mind, “fewer” does not mean “none”, and Sony made headlines in 2011 when their online breach put millions of customers at risk. Ars Technica reported that they were fined just under half a million dollars for the security fault. The good news is that all of your information on a Playstation can be protected by simply placing all data onto one of the removable ports, loading it onto a USB drive, and taking the drive out. While your information remains digitally stored, hackers have a very long way to go before they find out how to remotely hack an unconnected USB drive.

Wii

With only about fifty percent of Wii users logging onto the Internet to play, Nintendo has avoided the data breach scandals of its competitors. In fact, their biggest brush with hacking comes from the pirates who try to “crack” or “brick” units to play modified games. Nintendo Life reports that the company has tested its new Wii-U against external hacks and found it to be “uncompromised”. What’s more, their data protection service is easier than any other. Simply go into the Wii shop channel and choose “remove account” in settings and features. This wipes your credit card and identity information, which you can simply re-enter whenever you want to make an online purchase.

Online Accounts

Credit card fraud and identity theft becomes common when a person fails to wipe their console of information, but console hacking can be prevented rather than retroactively dealt with. You can protect yourself by using LifeLock services against all-purpose identity theft, whether it stems from bogus emails or hackers. Lifelock advice applies to consoles, as well, according to its website. It’s recommended to use pre-paid credit cards for online purchases, so that a hacker who does get hold of a credit card number has stolen only chump change.

Julius Ballard

Julius is a blogger skilled in speaking technobabble to describe his two loves: gadgets and computers. LifeLock is a Sponsor to my webpage and anything you buy with that link will give me a commission so feel free to support my site!

Monday
Oct072013

Secure Browser Alternatives for browsing safely on the web!

Zero day vulnerabilites target Internet Explorer

Cyber Security Awareness Month

If you didn’t know October is Cyber Security Awareness Month and I wanted to give out some ways to keep you safe on the internet.   I know I am not the only to suggest some of this but if you didn’t know please don’t use Internet Explorer to web browse.   If should only be used for updating Windows and that is the extent of what it should be used for it.

Is Chrome more secure than Safari?

Safari, to my knowledge as a few vulnerabilities and thus you should be keep away from using it.   I won’t say much about this because we never really know who is actually going to use these but you can bet hackers know of ways to get into your system.

Which Browser is best?

Any browser you think is safe is probably going to be wrong.   I am going to tell you which browsers are safer but none of them are a 100 percent safe.   Each one of them has good and bad but I am going to at least guide you in the right direction.  

Chrome Browser

Chrome is one of the ones, I do recommend but it shouldn’t just be used by itself.   You should add a few extensions to better protect yourself:

  • Adblock Plus — Good to protect yourself from those annoying advertising.   (Please be aware that I use advertising on my site and that is how I pay for my hosting and other things like that.   Please consider white listing my website to allow advertising.)
  • Lastpass — This is one of those that I recommend on a constant basis because it makes sure you create a strong password that you don’t have to remember.   It helps make sure no account password is ever the same!
  • ScriptSafe — Keep unwanted scripts from playing when you visit a website!  Certain web sites should be allowed and white listed, like mine. 
  • Dolphin Connect — I use the Dolphin browser on my Android Device and this is one of those ways to keep track of all your bookmarks.   Not really security related but it is very useful!

These are just a few that I recommend when you use the Chrome Browser.

FireFox Browser

FireFox is another one that I recommend when you are looking to browse the web securely.  Although it isn’t 100% secure because none are.   Some of the Add On’s you should add to your FireFox Browser are:

  • NoScript Security Suite — It is another No Script app that lets you prevent unwanted scripts from running! 
  • Lastpass — Just like Chrome, it helps keep your passwords safe and helps you keep all passwords unique!
  • Adblock Plus — Just like Chrome this can help keep those annoying advertisements from showing but please remember to white list sites that do need to advertise and do not use annoying advertisements!
  • Web Of Trust — This is a good add on for Firefox to know which web sites you can trust more with and which ones that are not trustworthy!  (if you like my site could you review it and let people know what you think about this site!)

As you can see these are the two that I always tell my family to install, I usually don’t tell them to install both but one of these two but it is up to you if you want to have both web browsers installed on your system.   It just varies from person to person which one is better for your use!   I am sure there are more addon’s or extensions that you should add but these are the ones I tell my friends and family to install first.  Which one of these two browsers are you favorite?  Leave a comment and tell others!

 

Thursday
Oct032013

The SQRL and the One Time Login (OTL).

VPN4ALL : Use Coupon code “savenow15” and get 15% off the lifetime of your account!Secured QRL Codes!

You probably are wondering about this.   I heard it from Steve Gibson and he calls it “squirrel” Code.  It basically helps those who are worried about security and privacy.   I just didn’t want to forget to talk about this myself.  Ever since I heard the podcast entitled “SQRL Episode 424”,  my mind has been trying to get a handle of the whole thing. 

What most people don’t know and haven’t yet figure out is how useful a QR Code is.   I did not think of this solution and would of laughed if I did.  It is really simple, but yet from what I have heard and understand it could be a game changer in the next few months.  I just have a few things that I must be fixed and standardized.   I wanted to share them with you and maybe in the same instants help the community with this problem.

One Time Login “OTL”

Since we are basically logging in every time we use a different QR Code we are only allowing one instance of the login for each time we use a SQRL login.  Thus we will need to limit the time and when we can use that one QR to login.   We also must figure out how we will deal with collision logins.  This is where the site or server sends out the same securely generated long random number to two different users.   This could happen if say we were using this on like Facebook or Twitter.   It is unlikely but possible, unless we disallow it to only be used once and then we get into the ridiculousness of even longer random numbers.   The only thing I can come up with is using the date and time to create the cryptographic challenge.   This would change the it from any two different users from getting the same challenge and thus we would avoid the collision of logins.  

Pretty Good Privacy

The next problem is which encryption key would we want to associate with the smartphone.   I personally think PGP is a good one to start off with and maybe even create the public key that is needed to accomplish this.   The Smartphone in question could be linked in some way to a server with our public key PGP.   I am unsure as to how well this will work but it would allow us to share that key whenever needed.   It may not work but I am thinking we should only use Open Source encryption and thus this is one of the many options.

If the Smartphone is stolen?

This is where PGP can be very useful, we could Revoke the key and tell everyone else this is is no longer trusted and thus we prevent illegal logins to our services.   I’ve heard people do with PGP and thus it should be really easy to implement in SQRL but again, I am not a designer or even ever created things like this so I thought we should at least throw that out and see what people say about it.

Needs to be Available Everyone

It needs to be available on IOS, Android, and even Windows systems.   When this happens it will make it that much easier for this to succeed. 

As you can see I have  these small questions that need to be answer and I even saw some others which I will gladly link to to better help those who may want to explore more into this realm that Steve has started.  

What do you have to say about this and are you curious to see this happen or do you think this will even work.  I may have missed something or do not fully understand it but at least I am wanting this to succeed.   What is your thoughts on this?

Wednesday
Oct022013

The Long Road home, and When things go wrong! (A Short story)

Road

The long Road Home!

It was a dark and stormy night and nothing in the world could stop the downpour. The rain came down as if the heavens opened up and started crying.   You couldn’t see a foot in front of you and not even the head lights could help.   You wonder if your going the right way or if took the wrong road.   This long winding road just seems to unfamiliar and and a little spookie.   You pas by farm houses and see only a flicker of light from a few of them.   You check your watch and it says it is 9:00 o’clock PM.   It seems kind of odd that all these houses would be dark.   Your gas gauge is reading empty and you will need to get more gas.  You come to a gas station and you pull in to the next available gas pump.   You hear “ching … ching… ching” as your car stops.  

As you wait, you hear foot steps coming closer and you look to see who it was.  You hear a “BOOM” from the storm, it makes you jump and ask  “Who are you?”   He replies, “The gas attendant, sir.  You can call me Bob!”.   “Sorry Bob, it seems I been feeling on edge.  Please fill my car up with regular unleaded.” I said to the attendant.   He says, “certaintly sir, and no problem, this country side can do that to some people.”

The story and you!

So as you can see this is where I left the story and I have been thinking something else should go wrong after that but my brain coulnd’t come up with it.   I am asking my readers what it should be and what you think of this short story so far.   Should I make the driving more exciting or should I make the driving more longer.   You will help me develop this story and hopefully we can have a little fun with this story.  I’d love to hear your comments and suggestions.

Saturday
Sep282013

Android Vulnerabilities and Exploits in the Wild! 

Android garden

Time to Do what?

When I was researching this on the web I didn’t expect to find so much stuff, but I do think IOS has more vulnerabilities then Android but it isn’t as bad as Apple IOS problems!

I am not going to talk about all of them but just a few that have peaked my interest!

The ‘Master Key’ Exploit

A simple but yet easy way to fool your Operating System and gain more access than it should.  The name doesn’t mean they actually have the master key to your device.   It is using what all Android devices use in the APK.  The MANIFEST.MF, which if done right, will have two more copies in the APK (Zip file).   When the Android OS installs this APK it will use the the last MANIFEST.MF and thus it can gain more access than you once thought.   Be able to communicate with a server  or copy your contacts.   I’ve pretty much come to the conclusion that 3rd party apps are dangerous now and I will not use anything but Google or Maybe even Amazon US app store!  

The ‘Webview’ JAVA Exploit

If you don’t use JAVA you will need to consider disabling it in Android.  While this one is a little more trickier and harder to avoid if you use Java, you best bet is to install Dolphine Browser, FireFox, and/or Chrome.   Then install a java an Addon or and Extension that does not allow Java to be used unless you specify.   This exploit can send SMS, or send out emails from you to spam your friends and family.   So this is one that you must start worrying about to a point.

The ‘Scarevertising’ Exploit

This last one I have seen become very prevalent and thus you should be on the lookout for this!   They claim in either a push notification or in some kind of inside application banner that basically tries to scare you into thinking you have a virus.   I’m not sure which advertising networks are being used but you can bet this will be a constant problem.   Some rules of thumb are install only from the Google App Store and never install any third party apps, which some call side along install.  

If your worried and you want to protect your Android Device, here are a few free applications that will help and hopefully keep you safe:

The last thing I can say is there are more than 100 different anti virus apps out there but it all depends on the end user (you) to know and trust vendors who are reputable and you can trust.   If you don’t know the Anti virus Company than maybe they shouldn’t be used.   I do hope I have helped you find what your looking for and we will discuss more in the future on Android Exploits!

 

Thursday
Sep262013

[Rant] Obamacare and Minimizing Hours!

My Personal Insurance Agent (#93041)

Obamacare and Me!

I never thought this would of happened but lately my employer that I have been working with for over a year has started to move everyone they can to part time.   It seems that I may be one of those alas, the money I was getting might dwindle and I will need to find another job to help make up the difference. 

 

Who thought of this loophole?

I am very unhappy with this loophole and it will more than likely make everyone have to find two different jobs that are part time just to get 40+ hours somewhere and you know that isn’t going to be overtime but all straight pay.

I usually don’t talk about stuff that isn’t technology related but I wanted to just rant about out ridiculous this Obamacare is and how it does nothing to help the low income people who are just trying to survive.   I have yet to have insurance and now I have to figure out how to get around the 2.5% of my income in three years.   This is the going to hit me really hard.   I either have to pay around 120$ a month or pay 367.12 a year.   I hardly been sick and when I am it is moderately bad and thus I usually only go once a year.   How is this going to help me from getting into debt.  

Obama figure this out!

I’m calling on Obama to withdrawal this plan and come up with a more fair plan that will allow the low income workers from having to work harder than we have in the past few years.   Make companies increase hours and make companies to pay more is one step that will help use get out of debt quicker and much more easily.   We are working hard and can’t easily claw ourselves out of this debt.  You just don’t understand what it is like for a low income worker.   It might be time to get your hands dirty and do some of the things we do and then you tell me how fair this law is!  

Get with it and stop making the low income work harder for the same benefits!   You aren’t helping me but making it harder for me to survive!  

Ok so that is the rant and I won’t get into much else but this is just ridiculous. 

 

Monday
Sep232013

4 Gadgets Every Techie Should Have 

Gadgets :) iPhones 4 n' 5 + iPad 2

If you consider yourself a techie, you need the right tools in your arsenal to keep up to date in today’s rapidly changing world. It’s easy to confuse yourself with what seems to be the next greatest product. That said, every techie should focus on getting these four essentials before they branch out to what would be considered extra.

A Smartphone

For starters, every techie needs a smartphone, which will keep you up to date on everything going on in the tech world. There is always going to be the debate about whether you should purchase an iPhone or other model. The choice is completely up to you, since every techie has their reasoning for which they chose. Be prepared to defend your decision against other techies, because there will never be consensus. Be wise in your smartphone choice because your smartphone will become your right hand man.

A Tablet

The next best thing for a techie would be a tablet. The benefits of the tablet seem to be endless. Most people see a tablet as just a larger version of a smartphone, but there is so much more to a tablet than meets the eye. A tablet is really a smaller, more portable computer. In fact, today’s tablets have become so powerful that they have the capability of running faster than a lot of computers. Tablets give you certain application functions and internet browsing speeds that you would otherwise miss out on if you were using a smartphone. Tablets are big enough to give you access to a full keyboard, just as you would on a computer. 

A Computers

As obvious as this next one might sound, in today’s world, people are tending to skip out on purchasing a computer. However, computers will always have the most capability when it comes to internet browsing. It likely won’t ever be beaten in software capability. A computer provides access to useful programs such as Photoshop and Microsoft Office that you just can’t duplicate on a Smartphone or Tablet. Computers nowadays are seen as kind of clunky, but they aren’t ‘big’ for no reason - they have much more memory and overall storage ability. For at least the next decade, there will be certain things that can only be done on a computer.

That Watch

Finally, every techie needs their very own techie watch. They’ve advanced, bu it can get a bit pricey. After all, nobody said being a true techie would be cheap. For the right price, you can purchase a watch that displays the weather, your heart rate, bits of news, and of course the time and date. Some techies prefer the even higher-tech bracelets, such as Nike fuel bands that track physical movements and distance covered, but they come at a pretty penny.

Vanessa Alvarez writes all about technology. Her recent work is on the Top Online Software Engineering Programs.

Saturday
Sep212013

Do VPN's keep my private information private or does it really work?

Catching up on e-mail...

NSA tells all sorts of tales!

With the current level of people worry about their security and privacy,  I’ve found people wanting to know just how much privacy do they really have on a VPN’s like Vpn4all, which is a sponsor to this blog.  When even more leaked documents that show that the NSA was involved in encryption formulas, people stopped buying VPNS because they were told a lie!   The truth of it is that we can Trust the Math, a great quote from Bruce Schneier.  When I first heard about this blog post, I ran to it to see what it says.   Most of it I believe and some stuff I questioned.  In the end I believe he is right about how the can not possibly break encryption in anything bigger that 256 bit encryption.  There is no super computer that I know of that can do the calculations to break the encryption.  

NSA will eventually see it!

Just know that no matter what you do online securely even if its encrypted that eventually it will be broken and they will see what you did.   I am just trying to keep my privacy until I die.   Hopefully after I die nothing will matter what NSA finds out about me.   I have nothing to Hide but I do not trust the NSA.

Truth about VPNS

The common idea that since VPNS are basic encryption tunnels made people think the NSA either has all keys or can easily get in through a back door.  I would be telling a untruth if I told you I didn’t at least suspect some providers to give all access to their servers just to keep their license’s and other legal stuff!

Vpn4All is a partner to OpenVPN and they use OpenSSL Library, so everyone can see the code and keep others safe from prying eyes.   So you see NSA would be hard pressed to break the encryption.   The other truth of the mater is that most of the time the keys get thrown away and we may never know if they are thrown away or given away!

Something to Consider!

When I first started this journey into encryption, I never knew it would be so hard to grasp it.   I will however tell you why I chose VPN4ALL for my site:

  • Their Business is outside of the US.  Doesn’t mean the NSA can get the key to your encryption just makes it harder.  If someone really ones something, they find a way to do it.
  • AES-256 RSA 2096 Bit Encryption.   We even see RSA making a change from unlinking to the NSA Algorithm.  So it should be safe for the time being.
  • Ultra Fast Connections.   Unlike other VPNS I have tried VPN4ALL made great strides in speed and privacy.
  • Got Over 1,000 IPS to chose from!  Let’s face it we have can choose any one ip we want and keep the NSA guessing!

The Truth of the matter is that VPNs are my friends and they shall always be used in any situation I deem necessary to keep my privacy safe and secure!

 

 

Saturday
Sep142013

4 Essential Elements for Your Parents' IT Care Package

Your parents know how to turn on the computer and are getting better at sending texts. But let’s face it, they are basically clueless when it comes to technology. Have you ever once seen your mom pick up that iPad you and your brother chipped in to get her for Christmas? Probably not unless she’s reading a book. She doesn’t know how to use it. Now that you’re away at college and the other kids are already out of the house, your parents are floating around in technological darkness.

Since you’re not at their beck and call for tech support anymore, give them a helping hand. They’ve sent you plenty of care packages of the comforts of home since you’ve been at school. Why not do the same for them with an IT care package? Include items allowing your parents to handle their Internet and tablet needs on their own (or by you, remotely).

Spyware Protection

Most parents don’t have a clue how to protect their computers from spyware. They may not even know how important it is to do that or how easy it is for someone to hack into their computer. Fortunately, you do know and you can help them. Teach them how to avoid spyware by sending them your favorite anti-spyware program with instructions for how to install and use it. Include the tech support number for their Internet service provider if they have any trouble removing existing spyware from their computer. They’ll love you for it once they realize how important this is to computer security.

Skype

It’s inevitable. Your parents will need personal help from you every now and then until you get them independent enough to handle computer issues on their own. Send them to Skype and instruct them to download it. If they have a real problem that only you can solve, they can have a face to face conversation with you and you can walk them through it until they get it right. Just make sure they know that Skype is like the Batphone as far as you’re concerned — they should only use it to contact you in a computer-based emergency. You’re not a one-person tech support department who is always on call and this is something your parents have to learn.

Remote Assistance

Sometimes, even an in-person conversation isn’t enough to help parents solve their tech problems. You’ve simply got to do it yourself. In the past, this might have been a problem if you were across the country at school. Now, you can take charge of your parents’ computer wherever you are with Remote Assistance for Windows. This will only work if they have a PC, but most parents aren’t Mac-savvy (as you discovered with the iPad incident).

Remote access can be installed on both your computer and theirs. You can use it to simply get into their computer and fix the problem for them. Remind them that this option is to be used even less frequently than Skype. Ask them to consider Remote Assistance the 9-1-1 call of tech support for you. There may be financial penalties for misusing it, just like in the real world, such as having to send you extra gas or grocery money this month.

Google

This is probably the simplest solution to any computer problem. It’s also the one your parents are most likely to overlook. Send them a big sticky note with the word Google.com written on it in their IT care package. Remind them that any tech question they have can often be answered by Googling it and then following the instructions found on a website Google provides. This should save a lot of unnecessary phone, Skype and Remote Assistance sessions with you, so you can finally untie those tech support apron strings and start to enjoy the college life at last, knowing your parents are on their way to becoming IT independent.

Henry Tinsley — Henry teaches business courses and ESL at his local community college.
Saturday
Sep072013

How to Remove / Replace a Acer 5739(g) Keyboard!

Carefull not to break those wires!

So I did it!

I removed the keyboard.   The Acer 5739g Series, has been really durable for the past  few years and I still recommend them.  I searched all over the internet for directions and then I just decided to do it without looking around.   It was quite easy, and I thought it would be high time to do a post on how to remove that silly keyboard.   The Acer 5739G keyboard isn’t a big problem but it did take about 10 minutes to do.  

How to:

  • Start by removing the battery!

There are a Total of 8 or 9 Screws you need to remove!

  • Once you take the screws out on the back, which are the ones that are the top only where the power cover is.   You will not need to remove any of the screws on the bottom of the laptop only the 8 or 9 screws on the top.  2 of the screws are underneath the battery.

See Picture at the top of the post!

Once you have removed the screws and turned the laptop back over.   You should grab the the cover that is closest to the screen which is the cover that is towards the back it should be really easy to remove and not to difficult to remove.   If it seems to not want to budge, check again for any screws you might have missed.

If you still have difficulty figuring out how to pull that top cover off, you can use your thumbs and and forefinger to peel it up like I did with the picture.  

  • Once you have the top of the cover off,  grab the keyboard and peel it back towards you carefully.   Making sure to disconnect the one little cord that tells the motherboard what your typing.   There should be a small latch that you just have to pull up to remove disconnect the cable.
  • When you plug in your cords you should not see this! You will should see the normal line indicating that the cords are secure!

  • Replace with a brand new Acer 5739g Keyboard, I found mine on Amazon US for about 10$ to 15$ and you should have no problem installing it.  All you will need to do  is reverse the steps I just given you to secure the new keyboard to the laptop.  You can check Ebay for a cheaper keyboard if you are wanting to try to save even more money but it depends on who has them and how well you trust that vendor!

If you pull the cords off by accidents!

You’ll have two small cords that are the power signal cord and the wifi, media player cords.   When I first did this, I actually did this and it wasn’t a big problem.  You will just need to connect them back to their spots and before you screw in the top cover you should plug in your power cord and see lights.   if you see this, then unplug the cord and reposition the cords and making sure those snaps are push down.   Don’t push to hard but do it gently!

That’s it, after you do this you have a new keyboard for your laptop that should keep that laptop running to days to come.   I will also talk about how to remove the Mouse and installing a new hard drive in the coming weeks.   What you may want to consider when you need to fix some of the most common problems of a laptop. 
Tuesday
Sep032013

I'll Explain Why Software filters will not work!  

Wise Eyes

I recently found Covenant Eyes

Use Coupon Code paulstechtalk15 and save 15% off your order!I really wasn’t sure when I heard this service, if it would be a very useful way to keep children from seeing mature material on the internet.   After all, If a child wants to do something they will find ways to do it.   I did however want to touch base on a few observations on why this will never work with some of the kids.   It might work with your kids but probably not all kids!

At first glance!

We see that in order to use this software, as with a lot of other software base monitor services, you will need to install software on the computer(s), Tablet(s), and all Cell Phone(s) you currently have possession of all.  Which is all free as long as you have an account with them.   I do find their methods a little questionable and I understand why it would be rather difficult to uninstall some of this but it just worries me that it will either slow down my Android device(s) or break something.   It is after all another program that I have to keep running on my devices to monitor what my kids are doing on the internet.  

Ownership of the Device!

This can be a bit tricky and could cause major legal issues if you do it wrong or if you do not own the device in question.   After all, the teen may get it in his head to avoid being watched by his/her parents he can just buy a Virgin Mobile, or Straight Talk Phone and not have to install that particular software!  This is one major reason why it wouldn’t work buying this subscription. It just depends on what the law says in your area if you can force your teen who buys a phone to install this software on their phone.  

Probably Easily by passable!

You can easily prevent snooping by using a VPN like Vpn4all to prevent anyone from seeing what you do online.   I am sure like any other software based companies they are utilizing a server to grab all this stuff you are searching and surfing habits.   I am pretty sure just using a VPN on your tablet or even cell phone would prevent the logging and keep people from seeing what you do.   This hasn’t been tested but it does make a lot of sense because in order for any filtering software to report back to the main user it has to be able to see what you are typing and searching for but if it is encrypted, it shouldn’t be able to.   I do not know if they install their own Certificate Authority but it maybe a way they try to get all encrypted data.   Although if it is encrypted before it gets sent out to the CA, then it will still look unreadable.

On a laptop or desktop, it could be as easy buying a USB Drive and installing Kubuntu or Ubuntu as a live CD and Thus they can do all their exploring of the internet without being watched.   The only problem about this is that you as the main Admin would need to password locked your CMOS and prevent any loading of USB or CD drive in boot up.  You’ll have to figure that one out on your own.   Each CMOS is different and there for it is a complicated process!

Reseting a Device!

This can be the easiest way to get that monitoring software off the system in the first place.   I can easily do that with any Android device and you can do a hardware reset without any administration intervention!  You can basically do this to all Android and IOS devices with no help from the admin of the device.   So it really could be a pain to use these types of services for kids who are shall I say AT RISK to do the most exploring.  I’ve pretty much told you everything that could happen if a teen wanted to not be monitored by their guardians or parents.  

As I’ve stated in this post, it is to show how someone could do these things.   I hold no liability if someone uses this information to do what was talked about in this post.   This was a way to open people’s eyes on how it may or may not help your situation.   Each child is different and thus must be judged accordingly.

 

 

Wednesday
Aug282013

Gadgets that look promising for Christmas! (2013)

Gadget craziness

Christmas is coming!

I thought it was high time to do another good post about Christmas gifts.  I how ever am going to do it a little more different this year.   I thought we should at least show you girls what men may want this year and why.  

  • Google Nexus 7 — With Google slashing the Nexus 4 Unlocked phones by 100$ which means you can now do more things with an unlocked android phone than ever before.   The only downside is it has no 4G capabilities.   I am certain they are slashing the prices to introduce a 4G phone in the near future.
  • Nexus 10 — Which looks extremely nice and sleek is one of those ones that any man would love to get during Christmas!  
  • Netflix — I am probably going to keep telling people this but at least this is one of those that you can’t go wrong with.   Great movies and great shows for the geek in all of us.  
  • A new Phone — I have been helping my sister decide for a new phone and I would recommend a Samsung Galaxy S3 or S4 device from Virgin Mobile.   It is one of those that I have been wanting because I could use this at work!

Finally the one thing that you probably want to know about is what I’ve talked about in the past two to 3 years and here they are:

As you can see I’ve done a few post on the subject, afterall I know what I’d want at least that is a start for you as well.  I am sure it isn’t going to be simple for the man of yours but at least you know where to start!

 

Thursday
Aug222013

Why I don't click on links in text messages!

Kathleen's shredded text prints

A strange text message!

VMFreeMsg: Your voicemail has been installed. For your personal security you must update your password and greeting. For details go to http://msg4u.us/vmve

You can do your own research but even I know this was going to happen sooner or later.   When i first got this message, I suspected it might of been an hack account over at Virgin Mobile.   It always seems like that is happening now a days.   I am always worried about security and they claim they are worried about security.   How is sending a link in text message good for security?  Who knows when or if a website or even a company could and will get hacked.   It is bound to happen, maybe not today but surely sometime in the near future someone will get a hold of an account at Virgin Mobile.  

Security and SMS Messages!

When I company claims they are keeping your safe and yet they do something like this.   It kind of makes me wonder who is actually worried the company or the person or sent out that text message.   I still am not sure if this is a legit SMS or not.  I have did a domain look for msg4u.us and it has very little information because it looks like it doesn’t belong to Sprint or Virgin Mobile.  The the tmce.biz is also where the redirect goes to after clicking the msg4u link!  

Where and who are these people?  Why does it not say Sprint or Virgin Mobile on the domains and what do I worry someone has played a cruel joke on me.  Oh and for those who are interested the Virgin Mobile Home page link is a vmobl.com which is a Virgin Mobile, I think!   This makes no sense to me but at least they didn’t worry to much about someone spoofing them if it was Virgin Mobile!   Keep up the hard work of security guys, at least you tried and failed!

 

Wednesday
Aug212013

How Malwarebytes Pro and SuperAntiSpyware Pro keeps me safe!

Virus - Don't let it get in the window

Malwarebytes and me!

I’ve been using Malwarebytes Pro for the past few years.   Ever since 2009, I’ve used Malwarebytes Pro has always been my go to for getting rid of those really hard to get rid of viruses and malware!  I must say I haven’t had a virus or malware on my system yet.   I often travel to libraries and other such places where you never know what may happen.  Even though I use VPN4ALL, also to help protect my privacy, it doesn’t make me invisible to viruses and malware!

Over the Past 4 years!

I’ve had to disinfect my sisters computers and some other family members who have yet to learn that you have to keep your antivirus up to date and current.   The problem is AVG and other are only valid for one year.   Unlike them, Malwarebytes Pro is a lifetime license.   No matter how long you use your laptop or desktop you keep getting updates on software and virus definitions.  

SuperAntispyware and Malwarebytes!

I use SuperAntispyware Pro and Malwarebytes Pro in tandem when I need to remove a virus or malware.   Both of these are sponsors of the blog, and I earn a little commission when you buy using these links.  With each of these you get a lifetime license and this saves me money because I don’t have to worry about buying a anti virus license every year or two.   I’ve probably saved several hundred dollars from not having to buy new licenses.  Although I am probably one of the few who know about what could happen if you click links your not sure of.   So by saying these have stopped me from getting a virus may be a overstatement on my part. 

I could go on!

If I just kept talking about these two products you would probably get tired of hearing me.   I have had much success with both of these products to keep and also help get rid of those really troublesome viruses and malware that may be hidden on your system.   This isn’t going to be over but this will be coming back.   If you know someone who might need to know about a good Antivirus Software or Antimalware software.   Send them to these two sites and I am sure there problems are going to go away quickly.

Monday
Aug192013

Is internet Privacy a Right or Privilege? Your help is needed!

Privacy Day at Carnegie Mellon University

Privacy and You!

When I was talking to someone on twitter saying they think this is a right.   I did not know if it was supposed to be a Right or if it was just to be a privilege and this is why I created a poll.   To help figure out which one is right.   I know we have the right to free speech and to have some civil liberties but my question for this is how much of this is actually a right and how much is this a privilege.   Does owning a gun say we have a right?  Some people can not legally own a gun because of what they have done.

Take this poll!

I am asking people on my blog this question because I am really curious as to what people think and what they consider about Privacy and what you think about it.   it is a simple question that can be a difficult thing to answer.   I am sure i am not the only one who asked this question but I intend to keep asking to find out the answer!

I’ll share the results of this poll later on next month but I am quite curious to see what people say!

Page 1 ... 2 3 4 5 6 ... 71 Next 20 Entries »