Archive | Computer Security Advice

RSS feed for this section

How to Protect Your Privacy When Using BitSeeds or Bitcoin

When you receive funds whether BitSeeds, Bitcoin, or a different cryptocurrency you have to give out a payment or receive address. While you can reuse the same address each time, the BitSeeds wallet and most other currency wallets allow you to make new receive addresses each time you do this.

In this tutorial I explain what the benefits are to either making a new address for each person or business you receive funds from, or to making a new address every single time you receive funds.

Personally, I take the second route because it offers you the greatest amount of privacy and that helps keep your funds safe from prying eyes.  Watch the video to learn more. [Click for full post]

BitSeeds: How to Back Up Your Bitcoin or Altcoin Wallet


As I explained in the previous lesson on encrypting your wallet, one of the responsibilities you have when you hold your own funds is to protect them. Encrypting your wallet protects them from being spent without your permission, but you also should protect your funds from being lost just like you would with cash or any valuable item.

Your real wallet is not the program itself, but a file called wallet.dat which has a copy of your private key. Think of your private key as a magic key that lets you spend or save your money and proves you own it. [Click for full post]

BitSeeds: Protecting Your Cryptocurrency By Encrypting Your Wallet


People these days are used to leaving their money in banks and having them protect it for you. There are downsides to this situation including the fact that you don’t really own your money once you deposit it at a bank and they can put conditions on how you can spend it or how you can withdraw it (especially when dealing with larger amounts).

While you have an increasing number of similar options to banks with Bitcoin or alternative currencies, one of the benefits of cryptocurrency like BitSeeds is that you truly own your own money. This means you can hold as much of it as you want and have true choice over how you choose to store and spend it. [Click for full post]

Using the BitSeeds Wallet Receive Tab

 In this tutorial we go over the “Receive” tab in detail, including the steps involved in creating an address to give someone if you want them to send you some funds.

Since most cryptocurrencies like Bitcoin and others work almost exactly the same way, learning the steps with BitSeeds will teach you how to do this with BTC or most any other coin.

Watch Out For This Check Scam That Targets Craigslist Users and Others

In this video lesson I walk you through the many warning signs you can find in a widespread type of scam that targets people posting ads on Craigslist, but also can affect you even if you don’t use that site.

The video tutorial above shows you an exchange I had with a scammer who was texting me hoping to fool me. This same type of scam is often run by email and even by phone sometimes.

Whether you use Craigslist or not, you should protect yourself by watching and learning how the scam works and what the warning signs were that tipped me off to the fact that someone was trying to trick me. [Click for full post]

Forgot Your Password & Locked Out of Your Computer – Tech Answers

In this latest tech question and answer audio lesson I take a question from a long-time student named Ian, about getting back into a laptop when you’ve forgotten the password:

Hi Worth;

Once again I need to ask your advice on a matter which is causing me some great deal of heartache. My grand-daughter is now 17 years old, and for her birthday I bought her a Hewlett Packard Laptop.

She set it up and things went well; then she found out that her younger sister and indeed her mother were also using her computer. So in a fit of pique she changed the password — in a hurry and without making a note of the new one… [Click for full post]

Yet Another Computer Trojan – How to Stay Safe

I just wanted to write to warn you about an online Trojan that is going around right now, and offer you some online safety and privacy advice that can help keep you safe. Trojans are dangerous programs that can affect both Windows PCs as well as Apple’s Macs, and knowledge is the best tool to protect yourself.

The key thing to remember about Trojans is that they cannot get into your computer without YOU. It’s just like the original Trojan Horse from the old stories – the Greek soldiers couldn’t get into Troy until the citizens of Troy brought them in, past the defenses, hidden inside the wooden horse.  

And just like the horse, modern Trojans look like a “gift”, but hide something dangerous inside. So if you know how to recognize them, then you’re safe.   Let me tell you a little more so you know how the Trojan I’m talking about tries to trick you.

These things happen all the time, but this latest one is called “Trojan.Yontoo.1” and it affects both Windows PCs as well as Apple Macs — and for those who might wonder desktop and laptop computers fundamentally work the same way, so both can be infected equally.

As is often (but not always) the case, this Trojan gets into your computer from a website that either was put up for the purpose of getting you to install the Trojan, or where the website has been “broken into” and changed to try to infect computers.

The way this Trojan uses to lure you in mainly seems to be the offer of a browser plugin that claims to let you watch movie trailers, but actually watches everything you do online and when it sees an opportunity, it changes webpages you’re visiting by replacing normal ads with ads that make the criminals money.

Browser plugins are perfectly common and usually helpful pieces of software that add new features to web pages and to improve your web browsing experience in some way. Unfortunately just like any tool can be put to good or bad use, the wrong browser plugins can be dangerous.

You should remember that movie trailers (or any video) often can play without a plugin at all, or if they do need a plugin it will be Adobe Flash Player.  

So if you see a website that tries to get you to install a special plugin or player to watch the videos on the site and it is not Adobe Flash Player, get out of there.

Of course, what if a criminal just lies and says their dangerous fake video player plugin is Flash Player?  

While this Trojan scam does not seem to do that, it is very possible others could.  One way to figure out if you’re actually installing a legitimate copy of Flash Player is by paying attention to your address bar.

The address bar (or location bar) is of course the bar at the top of every web browser window which shows the address of the site and page you are currently viewing.  For example if you are reading this on my site, you can look at the top of the window and you should see as that is the location of my blog.

Remember, you only get Adobe Flash Player from one place:

If a website tries to have you install a plugin to watch videos you should be suspicious and read carefully. If it’s telling you to install Flash Player it is probably legitimate — but only if it sends you away from that site to Adobe’s website!

If it tries to install from anywhere else, don’t install it.  

I hope that makes sense.  

Remember that every single Trojan relies on your lack of knowledge to take advantage of you!  

Literally the only way to stay safe is to better understand your computer and how to use it properly.  Most people lack basic skills and knowledge that put them at risk. [Click for full post]

Instagram Selling Your Photos & Other Risks of Posting Online

The online world is abuzz with news of the photo sharing service Instagram (recently acquired by Facebook) which has changed its terms of service to allow for the possible sale of people’s photos — without the photographer making a penny.  This is just the latest example of a problem I’ve been trying to educate people about for years now: who owns your information when you post it online?

I’ve just posted this audio lesson which you can listen to and learn more about this problem, which affects everyone who posts anything online such as photos, Facebook or Twitter posts, etc., as well as potentially people who store information online in online “cloud” storage, and the many people who use web-based email services such as Yahoo Mail, Gmail, and so on. [Click for full post]

Answering Computer Question: How Safe Is It to Use the Cloud?

In my last post I gave you a non-technical explanation of what the cloud is.  I had a student named Ronald write to ask me about whether it was a good idea to use cloud services. He said:

“I just have to question how safe cloud storage really is, what is stopping hackers from accessing our information, what happens if the service goes bankrupt, or if there is a major failure of a cloud system that holds all our information.

We loose it all, what happens if a cloud system decides they will sell our information to the highest bidder, we have no recourse only your word that this is the right thing to do…” [Click for full post]

Is Your Computer at Risk from Tojans?

I’ve mentioned the threat of computer “trojans” before (here’s a link to a video lesson I recorded last year about protecting yourself from a common type of trojan). There’s a new type of trojan circulating now that I thought I’d take the opportunity to teach you about today.

Briefly, a trojan is a maliciously written program designed to infect computers. It is sort of similar to a computer virus, but worms generally try to trick you into installing them by making you think they’re something you want or need to install. Check out the video in the link to learn more about how they work and how to stay safe from them.

This particular threat I’m writing about is a new type in the sense that it is new to the Mac world, but it’s a type of threat that has existed for many many years on the Windows side of things. [Click for full post]