Archive | Online Privacy & Security

RSS feed for this section

How to Protect Your Privacy When Using BitSeeds or Bitcoin

When you receive funds whether BitSeeds, Bitcoin, or a different cryptocurrency you have to give out a payment or receive address. While you can reuse the same address each time, the BitSeeds wallet and most other currency wallets allow you to make new receive addresses each time you do this.

In this tutorial I explain what the benefits are to either making a new address for each person or business you receive funds from, or to making a new address every single time you receive funds.

Personally, I take the second route because it offers you the greatest amount of privacy and that helps keep your funds safe from prying eyes.  Watch the video to learn more.

[Click for full post]

BitSeeds: Protecting Your Cryptocurrency By Encrypting Your Wallet

 

People these days are used to leaving their money in banks and having them protect it for you. There are downsides to this situation including the fact that you don’t really own your money once you deposit it at a bank and they can put conditions on how you can spend it or how you can withdraw it (especially when dealing with larger amounts).

While you have an increasing number of similar options to banks with Bitcoin or alternative currencies, one of the benefits of cryptocurrency like BitSeeds is that you truly own your own money. This means you can hold as much of it as you want and have true choice over how you choose to store and spend it.

[Click for full post]

Watch Out For This Check Scam That Targets Craigslist Users and Others

In this video lesson I walk you through the many warning signs you can find in a widespread type of scam that targets people posting ads on Craigslist, but also can affect you even if you don’t use that site.

The video tutorial above shows you an exchange I had with a scammer who was texting me hoping to fool me. This same type of scam is often run by email and even by phone sometimes.

Whether you use Craigslist or not, you should protect yourself by watching and learning how the scam works and what the warning signs were that tipped me off to the fact that someone was trying to trick me.

[Click for full post]

Computer Question About Why You Suddenly Cannot Update Your Antivirus

A student of mine named Cheryl Goodnow has written in with a question about her computer which started acting up and now her antivirus program won’t update.

Here’s what she wrote:

“Worth,

Yesterday my computer was locked up I couldn’t turn it off or anything. I unplugged the router and that did not help. Hours later a message came up “This copy of windows is not genuine”.

Later everything works but I got a message “behavior similar to pom keg logger detected”, now Kaspersky tells me my blacklist is corrupted and I can’t update.

[Click for full post]

Computer Question About Email Not Being Delivered

I received a computer question from long-time client and student Linda who wrote asking:

“Hi Worth, I hope this finds you well and in good health.

I have a very curious problem that perhaps you can help me with. I have been emailing several friends back where I used to live and there has been no problem.

My one dear friend and I have emailed several times successfully and then she got a laptop. She emails me and I email her back but she does not get my replies. I also initiate emails and she does not get them.

[Click for full post]

Yet Another Computer Trojan – How to Stay Safe

I just wanted to write to warn you about an online Trojan that is going around right now, and offer you some online safety and privacy advice that can help keep you safe. Trojans are dangerous programs that can affect both Windows PCs as well as Apple’s Macs, and knowledge is the best tool to protect yourself.

The key thing to remember about Trojans is that they cannot get into your computer without YOU. It’s just like the original Trojan Horse from the old stories – the Greek soldiers couldn’t get into Troy until the citizens of Troy brought them in, past the defenses, hidden inside the wooden horse.  

And just like the horse, modern Trojans look like a “gift”, but hide something dangerous inside. So if you know how to recognize them, then you’re safe.   Let me tell you a little more so you know how the Trojan I’m talking about tries to trick you.

These things happen all the time, but this latest one is called “Trojan.Yontoo.1” and it affects both Windows PCs as well as Apple Macs — and for those who might wonder desktop and laptop computers fundamentally work the same way, so both can be infected equally.

As is often (but not always) the case, this Trojan gets into your computer from a website that either was put up for the purpose of getting you to install the Trojan, or where the website has been “broken into” and changed to try to infect computers.

The way this Trojan uses to lure you in mainly seems to be the offer of a browser plugin that claims to let you watch movie trailers, but actually watches everything you do online and when it sees an opportunity, it changes webpages you’re visiting by replacing normal ads with ads that make the criminals money.

Browser plugins are perfectly common and usually helpful pieces of software that add new features to web pages and to improve your web browsing experience in some way. Unfortunately just like any tool can be put to good or bad use, the wrong browser plugins can be dangerous.

You should remember that movie trailers (or any video) often can play without a plugin at all, or if they do need a plugin it will be Adobe Flash Player.  

So if you see a website that tries to get you to install a special plugin or player to watch the videos on the site and it is not Adobe Flash Player, get out of there.

Of course, what if a criminal just lies and says their dangerous fake video player plugin is Flash Player?  

While this Trojan scam does not seem to do that, it is very possible others could.  One way to figure out if you’re actually installing a legitimate copy of Flash Player is by paying attention to your address bar.

The address bar (or location bar) is of course the bar at the top of every web browser window which shows the address of the site and page you are currently viewing.  For example if you are reading this on my site, you can look at the top of the window and you should see worthgodwin.com/basic-computer-training/ as that is the location of my blog.

Remember, you only get Adobe Flash Player from one place:

get.adobe.com/flashplayer/

If a website tries to have you install a plugin to watch videos you should be suspicious and read carefully. If it’s telling you to install Flash Player it is probably legitimate — but only if it sends you away from that site to Adobe’s website!

If it tries to install from anywhere else, don’t install it.  

I hope that makes sense.  

Remember that every single Trojan relies on your lack of knowledge to take advantage of you!  

Literally the only way to stay safe is to better understand your computer and how to use it properly.  Most people lack basic skills and knowledge that put them at risk.

[Click for full post]

Instagram Selling Your Photos & Other Risks of Posting Online

The online world is abuzz with news of the photo sharing service Instagram (recently acquired by Facebook) which has changed its terms of service to allow for the possible sale of people’s photos — without the photographer making a penny.  This is just the latest example of a problem I’ve been trying to educate people about for years now: who owns your information when you post it online?

I’ve just posted this audio lesson which you can listen to and learn more about this problem, which affects everyone who posts anything online such as photos, Facebook or Twitter posts, etc., as well as potentially people who store information online in online “cloud” storage, and the many people who use web-based email services such as Yahoo Mail, Gmail, and so on.

[Click for full post]

Answering Computer Question: How Safe Is It to Use the Cloud?

In my last post I gave you a non-technical explanation of what the cloud is.  I had a student named Ronald write to ask me about whether it was a good idea to use cloud services. He said:

“I just have to question how safe cloud storage really is, what is stopping hackers from accessing our information, what happens if the service goes bankrupt, or if there is a major failure of a cloud system that holds all our information.

We loose it all, what happens if a cloud system decides they will sell our information to the highest bidder, we have no recourse only your word that this is the right thing to do…”

[Click for full post]

Four Basic Computer Training Kindle Books Available on Amazon

I’m happy to announce that the first four of a series of books covering computer basics and online privacy & security advice are now available to order from Amazon.com (and on the overseas “local branches” of Amazon) for Kindle. You can see cover images and titles for the books – clicking them will take you to Amazon where you can order them and have them instantly delivered to you. [one_half]

How to Prevent Computer Problems by Avoiding 6 Hidden Dangers to Your Computer & Other ElectronicsHow to Prevent Computer Problems

How to Back Up Your Computer ebookHow to Back Up Your Computer

[/one_half] [one_half_last]

What Is a Safe Password and More Internet Privacy & Security Tips - Explained in Plain EnglishWhat is A Safe Password

What is the Internet Basic Computer Terms & ConceptsWhat is the Internet (Internet Basics)

[/one_half_last]

Password Safety Tips – Audio Lesson & Transcript

The following audio & transcript are from a live computer Q&A event I recorded back in 2008, discussing a topic which is just as important today as it was then.

This segment is a lesson giving a few tips on choosing a safe password, and also explaining a why it’s important to use strong passwords (and why assuming no one would target you is missing the point).

Due to the nature of the live recording the audio will sound a little “thinner” than usual, and I may talk a little bit faster than I normally do on my “studio recordings”.

[Click for full post]