• Join
  • Meeting Times and Locations
    • Caloundra Technology Education Centre
    • Buderim Technology Education Centre
  • Contact Us
  • Q and A
  • Free Resourses
    • Security Basics
    • WiFi Safety Guide
    • Open Office Tutorials
    • Apple Tutorials
    • Stress Management
    • The Gimp Tutorial Videos
    • Members Website Design Group
  • Interests Supported
    • Linux Operating Systems
    • Apple Mac Operating Systems
    • DIY Website Design and Marketing
    • Graphics & Digital Image Manipulation (Including Slide Shows)
  • Articles
    • Newest Articles
    • Article Index
    • Magazine Bits’N’Bytes Library
    • Health and Environmental Effects of Technology
    • Computer Security
    • Open Office
    • Audio and Sound
    • Linux
    • Buying and Selling on Ebay
    • Web Artist, Basic Web Page Creation
    • The Food Lab
    • Daily Local Background Radiation Levels and Advisories
  • Members Websites

Archive for Computer Security

PhoneGate Alert Update 2020!

By Peter Daley · Comments (0)
Wednesday, July 15th, 2020

15th July 2020


Large numbers of mobile phones in use are emitting microwave frequency radiation way above the regulatory limit, when placed against the body. For safety reason it would be wise to check if you are, or a family member is using one of these mobile phone models.

After months of legal action by French physician Dr. Marc Arazi, in June 2017 the National Frequency Agency of France (ANFR) revealed the 2015 test results of hundreds of cell phones. This ANFR study shows that if you use these phones like the majority of people do, touching the body, the phones greatly exceeded the French government radiation exposure safety limits.



If you do place one of these mobile phones directly in contact with your body, your exposure level to microwave radiation can be three or more times greater than the maximum Specific Absorption Rate (SAR) government safety level! Independent scientific experts around the world have been saying for decades that the microwave radiation SARs regulatory limits are already set far to high to protect public health, and particularly for children! 



Phonegate organization has had some success in having a number of the offending mobile phones sanctioned, or withdrawn from the market, but there is a lot more to this story!


25th May 2020 - Withdrawal of the Razer Phone 2: not seeing the forest for the trees!Extracts:

Since then, in two years, thanks to our action, 23 different smartphone models controlled by ANFR have been found to have SAR levels for the head and body above the regulatory limit of 2 W/kg during ANFR inspections. Four have been withdrawn from the French market. The others have only had their SAR level “updated” (reduced by updating).

However, tests conducted by both ANFR and the journalist Sam Roe for the Chicago Tribune have shown that the local body SAR level is multiplied by a factor of 3 to 4 when measured either at direct skin contact or at 2mm. That of the Razer Phone 2 could reach over 10 W/kg at direct contact with the skin.

“that the representative of the European Commission is hiding behind a staggering technocratic cynicism. His non-reaction shows the extent to which the mobile telephony industry lobbies have knowingly silenced the European authorities. We demand that this new health scandal, Phonegate, be treated with seriousness and a sense of responsibility. The health of hundreds of millions of Europeans citizen is at stake”.


https://www.phonegatealert.org/en/press-release-withdrawal-of-the-razer-phone-2-not-seeing-the-forest-for-the-trees


UPDATE to PhoneGate Alert!


Two new smartphones have just been sanctioned for exceeding the SAR level: the Xiaomi Redmi 7 and the Gigaset plus. This is a new advance in our alert action!


However, we have been waiting since last October for the Government to deliver on its promise to update the excessive SAR levels of several hundred mobile phone models. We demand that the commitments made following the recommendations of the French National Health Agency (ANSES) be fulfilled.


The Covid19 crisis does not justify such a delay. The Phonegate scandal is also a real health emergency!


See here the list of the 23 smartphones sanctioned to date:


https://www.phonegatealert.org/en/list-of-mobile-phones-with-non-compliant-sars-removed-or-updated-in-france


See also the list of hundreds of models awaiting government intervention :


https://www.phonegatealert.org/wp-content/uploads/2018/06/Dossier-de-presse-liste-des-mod%C3%A9les-%C3%A0-risques-28-juin-2018.pdf


Please share widely around you until we get the same thing all over Europe and internationally. Together we can do it! The Phonegate Alert team.


Download this free WiFi Safety Guide below, on page 2 it has practical suggestions on how to limit your family's WiFi radiation exposure. https://sccc.org.au/wifi/microwave-safety-chart.pdf

Free WiFi Safety Guide Screen Shot


microwave-safety-guides

 


Read my previous article on "Mobile Phone Safety" https://sccc.org.au/mobile-phone-safety


Disclaimer: This is an amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site or at SCCC activities, without further research. Views expressed in the pages, images, or tutorials on the SCCC Inc., web site or presented at venues, maybe the personal opinions of the relevant writers or presenters, and are not necessarily representative of those of SCCC Inc.

Comments (0)
Categories : Computer Security, Health and Environmental Effects of Technology, Life Saving, Uncategorized

Modern Technology Eroding Freedom, Privacy and Health!

By Peter Daley · Comments (0)
Sunday, December 8th, 2019

8th December 2019   


Technology is now a Big Brother's surveillance tool. Everything we now do in modern society is being recorded and watched, whether you like it or not. Let's look at the personal computer of the twenty first century, the smart phone. 


What can it do.


1. It can ping the local mobile towers regularly, even if it is turned off, and from this information it can triangulate your location.


2. Smart phones have a gyroscope built in so you can get those fancy games working well. The gyroscope can be used to work out what you are physically doing at any point in time, walking, running, driving, or cleaning the windows etc.


3. Even if the mobile is turned off, it can be used to take a picture, or record your conversations.


4. Not only can it triangulate where you are at any given time, but also record this information for later analysis. These personal location tracking and recording tools add a whole new dimension to the smart phone tracking armory.


5. Even if you don't own a smart phone, they can use voice or facial recognition, to determine if you are in a room with someone who is using one.


6. It can record all your keystrokes SMS messages and emails, and send this info off somewhere unknown.


Corporations and phone application builders are using your smart phone to gather all the info they can about you. Data mining / surveillance for profit is the new oil of the 21st century. By selling this data to third parties, they can potentially make more money from the surveillance for profit, than they made from the device or app they sold you!


You buy a mobile phone to have convenient mobile communication, not to be a Big Brother tool for recording and watching everything you do. Not only can this technology be used by governments, and corporations, but anyone who wants to do some basic research, can get the tools to hack your smart phone!


Saying you don't care, as your are doing nothing wrong, means absolutely nothing. Governments can change laws at any time, and what is legal now can be illegal in the future. With these technologies governments can impose total control over their citizens. You won't be able to have sex, sneeze, or fart in the toilet without the government knowing about it. 


When you purchase a Mobile Phone it should come with clear warnings!


  • You may be tracked when using this device, by government, or corporations.
  • Your conversations may be recorded without your knowledge.
  • The device may take photographs without your knowledge.
  • Your physical activities may be monitored at any time without your knowledge.
  • All your Keystrokes, SMS and emails messages are recorded, and sent off to somewhere unknown.
  • It can be hacked easily, so the manufacturer accepts no responsibility for the loss of private information or financial losses.
  • Health Hazard - use at your own risk as the radiation from mobile phones will affect your health.
  • Your children and grand children may suffer from sterility and DNA damage.


Industry sponsored research says it has no effect except for a slight warming of the body tissue. Tens of thousands of independent research papers indicate these devices are causing serious health issues. Below is just one of many recent independent articles on this subject.

18th November 2019 - Brain cancers : 4 times more new cases of glioblastoma in 2018 according to Public Health France


Extract:


Absolute duty to protect children and young people

For Dr Annie Sasco, cancer epidemiologist, former Director of Research Unit at IARC-WHO:

    “The evolution of incidence and mortality rates of central nervous system tumors as a whole and especially glioblastoma over the past 30 years is of particular concern. Of course, diagnostic behaviours have evolved and play a role, especially for older people. Nevertheless, there is a real increase, even among the youngest, for whom it is likely that diagnostic modalities have changed less than among the elderly and which may therefore be linked to environmental factors and primarily to the use of mobile or wireless phones. Informing the public should make it possible not to continue on this upward trajectory, especially among young people, with an absolute duty to protect children by not allowing them to use a cellular phone and in general by protecting them from exposure to electromagnetic fields“.


https://www.phonegatealert.org/en/press-release-brain-cancers-4-times-more-new-cases-of-glioblastoma-in-2018-according-to-public-health-france


Disclaimer: This is an amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site, without further research. Views expressed in the pages or images on the SCCC Inc., site maybe the personal opinions of the relevant writers, and are not necessarily representative of those of SCCC Inc.

Comments (0)
Categories : Computer Security, Computers, Health and Environmental Effects of Technology, Life Saving

Slimjet Web Browser

By Tech Techaccess · Comments (0)
Wednesday, March 7th, 2018

 

 By Peter Dodwell, March 2018

 

Slimjet is a fast, smart and powerful alternative web browser built on top of the Chromium open-source project (on which Google Chrome is also based).

 

https://www.slimjet.com/

 

It adds extra options to Chromium to make it more flexible and customisable. It also integrates additional features into Chromium so that users can get more done in less time without relying on external plugins.

 

Almost all of the features in Chromium have been kept in Slimjet to ensure compatibility. Most plugins and extensions designed for Chrome should work just fine in Slimjet. You can install any extension and theme from Chrome web store directly onto Slimjet. One feature that I like is the ability for links in Slimjet to automatically open in a new tab.

 

The only caveat that I’ve found is that Slimjet doesn’t always play videos that are embedded in web sites. That’s because Slimjet doesn’t pay the exorbitant licensing fees that are demanded to use proprietary codecs. That doesn’t bother me at all, because Youtube videos
will play.

 

Site isolation

 

The most important feature adopted from Chrome is site isolation. Site isolation is an experimental security feature that offers additional protection against some types of malicious attacks from compromised web sites. It makes it harder for them to access or steal information from your accounts on other web sites.

 

Web sites typically can’t access each other’s data, thanks to code that enforces the Same Origin Policy. Occasionally, security bugs are found in this code and malicious web sites may try to bypass these rules to attack other web sites. The Chrome team aims to fix such bugs as quickly as possible.

 

Google’s site isolation feature improves security for the users of the Chrome browser, and other browsers based on it. When you enable site isolation, content for each open website in the Chrome browser is always rendered in a dedicated process, isolated from other sites. This creates an additional security boundary between websites. It appears to be one of the best defences against the Spectre vulnerability, and other hazards from infected web sites such as bitcoin miners.

 

Configuring site isolation for all websites gives you the strongest security. However, it will increase memory usage by approximately 10–20%. To enable Site Isolation in Slimjet, copy the following URL in the URL address bar: – slimjet://flas//eelble-site-per-process

 

A control window will open with the option to enable Strict site isolation. Left click on that button to enable it. Now you're done. Restart your web browser and site isolation is working.

 

Additional features

 

Built in Ad Blocker

 

To enable the ad blocker in Slimjet, select "Ad Blocker->Enable Ad Blocker" from the main menu. The same option is also available within the "ad blocker" section of the settings page at slimjet://settings .

 

Ad Blocker Options

 

To configure ad blocker options, select "Ad Blocker->Ad Blocker Options" from the main menu and you will see an options dialog. Select one more filter lists based on your needs. If you visit English sites only, select "English sites".

 

Otherwise, select "English sites" plus any other language you are reading during your surfing. If you are concerned about being tracked by the advertising companies, select the "Privacy Protection List". You can also add any third-party filter subscriptions by specifying its title and URL at the bottom of the options dialog.

 

QuickFill form filler

 

QuickFill vs. default password manager

 

The QuickFill form filler in Slimjet is designed to replace the default password manager available in Chromium. Compared with the default password manager, QuickFill is more convenient and intelligent. The default password manager saves only the login information including user name and password.

 

QuickFill saves all the data in a given web form. QuickFill also saves the web page url together with the form data so that you can complete the sequence of opening web page, filling login information and submitting the form in a single step automatically.

 

QuickFill is enabled by default in lieu of the default password manager. However, if you wish to use the default password manager instead, turn off the option "Use QuickFill form filler instead of default password manager" in the section "Password and forms" of the settings page.

 

Tracking prevention

 

Slimjet has included a list of tracking prevention options to stop the Internet companies and advertising businesses from tracking your browsing activities. However, it's mostly up to the website owner to decide whether they would respect this request.

 

Send a "Do Not Track" request with your browsing traffic Send a "Do Not Track" http header with your browsing traffic. As the largest advertiser on Internet, Google DOES NOT respect this request. Despite being a very popular option among most browsers, it's the least effective one.

 

To access the tracking prevention options, select "Settings" from the main menu to open the settings page.

 

Click the "Show advanced settings" link at the bottom to show the advanced settings. Then scroll down to the "Tracking prevention options" subsection under the "Privacy" section.

 

Youtube video downloader

 

When you visit a video page on the YouTube website, you will see a "Download Video" image button on the left bottom corner of the playing video. If you just want to download the video file, select the resolution and format from the list box on the left side and click the "Download Video" button on the right side to download the video on the current page. If you wish to download the video file and also extract the mp3 audio file from the video file, check the option "Extract mp3 audio file from video file" first and then click the "Download Video" button.

 

The extracted audio won't be directly accessible from the download shelf in this case. You can locate the audio file under the same folder as the video file using Windows Explorer.

 

Photo salon enhancement and framing

 

The Photo-Salon in Slimjet lets you frame your photos and add other enhancement effects before uploading them to the server. If automatic photo shrinking feature is enabled on this domain, they will be shrunk to the preset resolution as well.

 

How to enter photo salon?

 

To enter the photo salon, just click the option "Process Photo" in the open file dialog where you choose the files to be uploaded. After that, click OK to close the open file dialog and the Photo-Salon will pop up.

 

Automatic Photo Shrinking

 

Slimjet can automatically shrink photos to a reasonable resolution enough for  web sharing purpose to dramatically cut down the time required to upload the photos to photo sharing web sites. The default target resolution for shrinking is 1M pixels. Usually no more than 2M pixels are needed since every few monitors have resolution more than that.

 

To configure options about automatic photo shrinking, go to the section "Photo processing" in the setting pages. The option "Automatically shrink photo files to make upload faster" is enabled by default. Click the button "Photo shrinking settings" to set the target resolution on a per-domain basis.

 

Built-in weather forecast

 

Slimjet provides a built-in weather forecast feature so that you can view your local weather condition directly in the browser without opening any website.

 

Use the arrow adjacent to the tool bar buttons to access the option to customise the tool bar (labeled “More tool bar buttons” when you hover your mouse arrow on it). This will open a list of additional buttons on the left side of the dual pane. Just drag the weather button to the right side to install it. All you have to do then is to set up your location information. After that, you will see your local weather condition and current temperature directly on the button.

 

NB! I haven’t covered in this tutorial any of the regular features to be found in Chrome. If you need help with any of them, you can get more information from Chrome’s on line help service.

 

Disclaimer: This is an amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site, without further research. Views expressed in the pages or images on the SCCC Inc., site maybe the personal opinions of the relevant writers, and are not necessarily representative of those of SCCC Inc.

Comments (0)
Categories : Computer Security, Computer Tutorials, Computers, General Computer Help, Uncategorized

Smart Meters, and The Internet of Things!

By Peter Daley · Comments (0)
Sunday, July 2nd, 2017

July 2nd 2017

FOR YOUR FAMILY'S HEALTH, SAFETY AND PRIVACY, SAY

TO THE INSTALLATION OF

SMART METERS / DIGITAL METERS

Research these devices and you will be shocked!

 

Peter Dodwell suggested at the June committee meeting that the club should spend time educating members and the community about “The Internet of things” (IoT). He pointed out there where serious security and privacy risks which people where not being told about!

 

What is the Internet of things? Here is a glossy corporate presentation.

 

Do deeper research into this subject, and you will be shocked at the human suffering and financial losses people have endured from the roll out of this technology.

 

To get this all working in your home, they need to persuade you to pay for the installation and replacement of your perfectly working, efficient, long life (50 year +) analogue electric meter, for a short life (~ 15 year) smart meter.

You may get a glossy brochure in the mail or a phone call, offering a free meter and installation. The Smart meter and installation costs end up in electricity bill increases for everyone, it is not free!

 

Once installed the Smart meter, also called Digital meter, becomes the Internet gateway device for all the smart devices in your home. Just be aware they also want to eventually install this type of device on your water and gas services.

 

Why all the effort to roll out all this Internet of things infrastructure? Energy companies see this as the financial gold mine at the end of the rainbow. The benefits for the power corporations are increased profits.

 

  • They no longer need meter readers.

     

  • Micro control of the electricity supply allows them to charge more for electricity.

     

  • Smart meters enable them to record huge amounts of private customer behaviour, and sell it for profit.

     

  • Financial benefit from the sale of smart appliances.

     

 

How has this all come about? They grease the political system on both sides of politics. Overseas, Congressmen, and other in government bureaucrats have ended up with lucrative corporate jobs at the end of their tenure.

 

They tell you it will help the environment, but each smart meter uses around 1,200 watts per day, which you pay for. Every smart device will use more electricity because the data collection and wireless transmission circuitry needs to be on all the time. Everywhere this technology has been rolled out electricity charges have gone up significantly!

 

Their slick campaigns focus on convenience. How cool it will be to get up in the morning and walk into the kitchen and say, “Make Coffee,” and your coffee maker will make coffee, or say TV turn on, to turn on the TV.

 

No mention of documented multiple detrimental effects to populations where these meters have been installed!

 

  • Major health issues for large numbers of people, causing personal financial losses.

     

  • House and business fires.

     

  • After Installation, electricity bills increased significantly.

     

  • Customers ended up paying for the cost in their electricity bills for the new meters and installation.

     

  • Insecure - hackers have easily hacked these devices, and gained access to free electricity, and customer data.

     

  • Used for mass surveillance.

 

The security of all these Internet of things smart devices is also a major issue! Yes they are frequently hacked. Peter Dodwell gave an example of baby monitors!

 

I roared with laughter when I read this one. Class action against a sex vibrator company. They had been collecting extensive usage data of people who had purchased their product, without their knowledge!

 

Members are flat out keeping their present gadgets secure and up to date. What are your chances of keeping your smart fridge, smart washing machine, smart TV baby monitor etc., updated and secured with the latest patches!

 

When devices like this are hacked on mass, they can be used as a controlled army to take down Internet connected infrastructure. This has happened numerous times already, and we are only at the early stages of this roll out.

 

Here are free tips and information to help protect your family's health, safety, security, and privacy!

 

  • The best way to slash electricity bills is to religiously turn off lights and other devices at the wall, when not in use!

     

  • To opt out of having a smart meter installed on your home, unit complex or business, use the information provided in the free Smart Meter Protection Kit. https://sccc.org.au/wifi/Smart-Meter-Installation-Protection-Kit-Updated.pdf

     

  • Free Wireless Safety Kit, page 2 includes practical ways to improve you and your family's safety. https://sccc.org.au/wifi/microwave-safety-chart.pdf

     

  • More Info:   https://stopsmartmeters.com.au/

 

Large numbers of people where smart meters have been rolled out have developed microwave sickness, now called  electromagnetic hypersensitivity (EHS).

 

 

The main symptoms of EHS are headaches, chronic fatigue, recurring infections, difficulties concentrating, memory loss, inexplicable unhappiness, dermatological symptoms, irritability or sleeplessness, heart problems, poor blood circulation, disorientation, nasal congestion, reduced libido, thyroid disorders, eye discomfort, tinnitus, increased need to urinate, listlessness, capillary fragility, cold hands and feet, and stiff muscles. If you have any of these symptoms, always consult your doctor to eliminate other possible causes.

More Info: (ANRES) & Oceania Radiofrequency Scientific Advisory Association Inc.

 

 

For everyone's health, safety, and privacy, please pass this handout onto friends, relatives and neighbours, because we also need them to say NO! Do letter box drops, hand it out, email it, plus post it on web sites and social media. Flyer download link.

https://sccc.org.au/wifi/Smart-Meter-Flyer.pdf

 

More excellent short videos on the subject.

 

Further Reading

 

Extract from Queensland Government web site:

"New meters

New national metering rules are expected to come into effect on 1 December 2017, making digital meters the standard meter for all customers. This means that whenever a new meter is installed, a digital meter will be the default option. However, in limited circumstances, customers in existing premises may opt-out of having a digital meter.

 

After the commencement of the new rules, small customers will not need to do anything. Your electricity distributor (e.g. Energex, Ergon Energy) will continue to provide metering services at your premises until you decide to install a digital meter, or the meter needs replacement (e.g. due to fault or age)."

https://www.dews.qld.gov.au/electricity/saving/digital-meter

 

Australia news articles about health affects

Today Tonight - Smart Meter Problems

https://www.todaytonightadelaide.com.au/stories/smart-meter-problems

 

Northcote resident says smart meter caused her tinnitus

http://www.heraldsun.com.au/leader/north/northcote-resident-says-smart-meter-caused-her-tinnitus/news-story/20d122af4ac9411c60648016232bd959?nk=358cb66b54f8163e32405e7ff9d65922-1498177158

 

Smart meter problems force Balwyn North family out of home

http://www.heraldsun.com.au/leader/inner-east/smart-meter-problems-force-balwyn-north-family-out-of-home/news-story/1004942ef8d24509ab1e1be839943d64

 

PUNITIVE POWER and the 'smart meter' TYRANNY part 1

https://www.youtube.com/watch?v=QVtEkwkk8Ec

 

Related Articles

 

  • Mobile Phone Safety
  • Headache Cure!
  • Very, Very, Hot !
  • WiFi Is Not Safe For Children!

 

Disclaimer: This is an amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site, without further research. Views expressed in the pages or images on the SCCC Inc., site maybe the personal opinions of the relevant writers, and are not necessarily representative of those of SCCC Inc.

Comments (0)
Categories : Computer Security, Computer Tutorials, Computers, General Computer Help, Health and Environmental Effects of Technology, Life Saving, Uncategorized

WiFi Is Not Safe For Children!

By Peter Daley · Comments (1)
Sunday, February 21st, 2016

(21st February 2016)

 

If you haven't already, I suggest watching this recently aired ABC Catalyst program on the risk of WiFi technologies.

 

Extract:

“Wi-Fi blankets our homes, schools & cities. Dr Maryanne Demasi takes a closer look at the link between mobile phones & brain cancer & explores whether our wireless devices could be putting our health at risk. #ABCcatalyst.”

 

http://iview.abc.net.au/programs/catalyst/SC1502H003S00

 

All mobile wireless devices are a source of microwave radiation. Microwave radiation was classed as a 2B carcinogen by the WHO in 2011, and a lot of independent researches felt it should have been classified as a 2A risk.

 

We have a criminal situation where younger and younger children being exposed to this technology, and we have no idea what long term effects this exposure will have on them. In the medical field you don't come up with a new chemical pill and give it to children without long term research. Even after this, they can get it wrong. Thalidomide is a good example of this.

 

There is no research on the long term effects of WiFi radiation on children, this generation is the experiment. Download and printout this free WiFi Safety Guide, it has practical suggestions on how to limit your family's WiFi exposure. https://sccc.org.au/wifi/microwave-safety-chart.pdf

Free WiFi Safety Guide

microwave-safety-guides

 

Over the years I have done a number of club tutorials on the risks of WiFi technology. You can find the core of this information on the club web site.

 

In these articles you will find excellent independent research information on this subject. I would encourage all members to take the time to read these articles, and watch the short informative videos. You will also find tips on how to limit your family's exposure.

 

I have a tri-axis Microwave meter to measure the strength of microwave radiation, in the environment or emanating from equipment, mobile phone, tablets, cordless phones, laptop etc. If there are enough members interested, I would like to encourage the club to also consider purchasing one, for club members to use. I can train members up on how to use it. It is an excellent tool to help protect your family.

 

It is important to understand that the industry runs interference to confuse the public, by funding research. Below is an extract from a “National Day Of Action Against Smart Meters with Jerry Flynn”, http://www.youtube.com/watch?v=c-F3nf47kAs

 

Barrie Trower 1977 document

 

In the Catalyst program, it focus's on brain tumours. There is a lot of evidence that it not only causes this type of cancer, but also inner ear, salivary gland and carotid artery tumours, plus significant hormonal disturbances and other illness.

 

The foetus of pregnant women, children, and particularly girls, are much more sensitive to radiation than adults. In the Catalyst program they mention the research showing a mobile phone causing sperm damage to men who put it in their pants pocket. Well think about it, what damage is occurring to a young girl's eggs or a young boy's sperm when they place a tablet on their laps for hours at a time. Their bodies are a lot smaller, so their exposure is much greater than an adult! The microwave signal emanating from a tablet can also be stronger than a mobile phone!

 

States within Australia are having smart meters rolled out – covertly. The PDF document document below, has printable signs and suggestions on what actions to take, to prevent one being installed on your home.

https://sccc.org.au/wp-content/uploads/2016/03/Smart-Meter-Installation-Protection-Kit-Updated.pdf

 

For wireless convenience, we are placing at risk the health of generations of children!

https://sccc.org.au/archives/4542

 

Update: Here is my TenMars tri-axis microwave test meter in use on a road tour survey of the Sunshine Coast, with Kathy Sundstrom, from the Sunshine Coast Daily News Paper.  Here is a sort video of the road tour.

 

Wireless Security and Risk Management

https://sccc.org.au/archives/3827

 

Disclaimer: This is an amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site, without further research. Views expressed in the pages or images on the SCCC Inc., site maybe the personal opinions of the relevant writers, and are not necessarily representative of those of SCCC Inc

Comments (1)
Categories : Computer Security, Computer Tutorials, Computers, General Computer Help, Health and Environmental Effects of Technology, Home Entertainment, Life Saving, Uncategorized

Important, WiFi in Schools!

By Peter Daley · Comments (4)
Friday, April 4th, 2014

(4th April 2014)

 

For wireless convenience, we are placing at risk the health of generations of children!

Facts

 

1.    Microwave radiation was classed as a 2b carcinogen by the World Health Organisation (WHO) in 2011.

 

It took a lot of scientific conferences and lobbying, to get to the point where the WHO made this classification. A lot of independent scientists feel the WHO has not gone far enough.

 

2.    Children and foetuses are much more sensitive to microwave radiation than adults.

 

The cells of children and a foetus are dividing much more quickly, plus their immune systems are not properly developed. Limiting their exposure to microwave radiation is important!

 

Children in Australian schools are now being encouraged to use wireless connected tablets and laptops, at an ever increasing early age. In my opinion this is criminal. This will expose millions of children, to an unprecedented amount of microwave radiation.

 

This exposure could result in an epidemic of serious illness in the future, amongst this generation of children. It can take five, ten, or twenty years, before illness from exposure to this type of radiation manifests! We should be taking a precautionary approach when it comes to children's health.

 

The Australian Government is aggressively implementing this program, despite the fact that other Governments around the world are banning WiFi in schools, and using wired networks. The Australian safety standard is 100 to 10,000 times higher than other countries. It is from the 1950s, and is based on the thermal effects of a six minute exposure, to an adult human body.

 

Watch these two very informative videos created by “WiFi in Schools Australia.” This organisation is made up of parents who have researched the biological effects of EMR.

 

Wifi in Schools, The Facts

http://www.youtube.com/watch?v=kmcAXZ-o1K4

 

Safe & Smart 4 r Kids - reduce wireless radiation

http://www.youtube.com/watch?v=GJPTzaNkcUk

 

A Father Speaks About Wifi in Schools and His Children's Health

https://www.youtube.com/watch?v=Fv6kikjBzug

 

“Wifi in schools web site”.

http://www.wifi-in-schools-australia.org/p/blog-page_16.html

 

Over the years a lot industry funded studies have claimed they could not find any significant health effects. FOIA documents from as far back as the 1950s, indicate that they have known all along about the serious long term health effects of non-ionising microwave radiation. Governments and Industry have kept it secret to preserve industrial profit.

 

Extract from this youtube video “National Day Of Action Against Smart Meters with Jerry Flynn.”
http://www.youtube.com/watch?v=c-F3nf47kAs

Barrie Trower 1977 document

 

The vast majority of independent research on this subject, provides overwhelming evidence that microwave radiation causes biologic damage to the human body. The amount of damage depends on the length of exposure, and its intensity.

 

Wake up call part 1

https://www.youtube.com/watch?v=cczGVhd63pM

 

Wake up call part 2

https://www.youtube.com/watch?v=tdmQDJ9WOiQ

 

The present Governments education policy is encouraging the use of WiFi based technologies in schools, to children at an ever early age. This is going to be exposed large numbers of Australian children to unprecedented amounts of microwave radiation!

 

Who will benefit? Corporate profits will increase from the sale of all this technology to parents, and schools. Schools have a duty of care to your children. Schools should not be exposing children to unprecedented amounts of microwave radiation. I know parents who have taken their children out of school over this issue.

 

You will find more informative videos and information on this subject, at the club web site here.

https://sccc.org.au/archives/3827/#Risk-Management

 

Pass this information on to parents and grandparents, to get them up to speed on this important issue.

 

Related articles

Mobile Phones and the Blood Brain Barrier
https://sccc.org.au/archives/1574

Freedom and Privacy being eroded by Technology!
https://sccc.org.au/archives/1602

What Wireless Security
https://sccc.org.au/archives/74

 

Disclaimer: This is an amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site or at SCCC activities, without further research. Views expressed in the pages, images, or tutorials on the SCCC Inc., web site or presented at venues, maybe the personal opinions of the relevant writers or presenters, and are not necessarily representative of those of SCCC Inc.

Comments (4)
Categories : Computer Security, Computer Tutorials, Computers, General Computer Help, Health and Environmental Effects of Technology, Home Entertainment, Life Saving, Uncategorized

Wireless Security and Risk Management

By Peter Daley · Comments (0)
Thursday, August 1st, 2013

(1st August 2013)

 

If you have children it is important to read,  Wireless Risk Management

 

Wireless technologies are  everywhere, providing convenience, and portability. Being able to communicate from anywhere, plus being able to get on the Internet and find information in an instant, are some of the benefits of using wireless technologies.

 

There are down sides to this. Their portability leaves them venerable to theft and forget fullness. Being connected to other systems and networks, leaves them constantly venerable to hacking attacks, virus infections and malware installations.

 

Here are some practical things you can do to improve security for mobile devices.

 

Security tips

 

1.  Have a decent password for access, at least 8 to 12 characters long, made up of upper, and lower case letters, plus symbols. Don’t use simple dictionary words with a birth date and a few numbers. These are very easy to break.

 

2. Install mobile security software, virus scanners, malware and sypware removers, plus encryption tools. Use encryption  to prevent easy access to private files, photos and data, from hackers.

 

3. Set up a device recovery system that allows you to track where the device is located. Great if you have just misplaced it somewhere. If you forget where you left it, this type of tool will allow you to track it from your home computer, laptop or mobile phone. There are remote recovery tools available, suitable for your Apple, Windows and Android based tablets and phones.

 

4. Make sure you also set up remote wipe/erase option if you set up one of these remote tracking systems. The device may not be recoverable, or has sensitive data on it that you want keep away from prying eyes. Being able to erase all your sensitive personal information quickly, could be more important than the device. Remote wipe software erases the entire system, and restores it to the factory settings. It has to be set up on the device you want to recover or erase, plus another phone, tablet, or computer you own.

 

Unfortunately no device is perfectly secure no matter which make and model you purchase. If you make the effort to follow the above suggestions, it will make it much more secure, and provide you with some peace of mind.

 

Wireless Risk Management

For wireless convenience, we are placing at risk the health of generations of children!

 

All mobile wireless devices are a source of microwave radiation. Microwave radiation was classed as a 2B carcinogen by the WHO in 2011, so limiting your exposure is important. Large numbers of independent peer review studies are showing this could potentially be a major health issue. All ionizing or non ionizing radiation is cumulative. Pregnant women, children, and and particularly girls, are much more sensitive to radiation than adults.

 

There is no safe level of microwave radiation exposure for children.

In this video British microwave military expert Barrie Trower, explains why tablets, wireless computers,

baby monitors, cell and cordless phones, plus other microwave radiation devices are NOT safe for children.

 http://www.youtube.com/watch?v=SS_ivzKaEME

no safe level of microwave radiation for children

 

National Day Of Action Against Smart Meters with Jerry Flynn

http://www.youtube.com/watch?v=c-F3nf47kAs

Extract

Barrie Trower 1977 document

 

Wifi in Schools, The Facts

http://www.youtube.com/watch?v=kmcAXZ-o1K4

Australian emr standards10 to 10000 times greater than other countries

 

Download and printout this free WiFi Safety Guide, it has practical suggestions on how to limit your family's WiFi exposure. https://sccc.org.au/wifi/microwave-safety-chart.pdf

Free WiFi Safety Guide

microwave-safety-guides

 

Children’s Health Expert Panel: Cell Phones & Wi-Fi Are Children, Fetuses and Fertility at Risk?

http://articles.mercola.com/sites/articles/archive/2013/09/21/cell-phone-wifi-radiation.aspx

 

Safe & Smart 4 r Kids - reduce wireless radiation
http://www.youtube.com/watch?v=GJPTzaNkcUk

 

Wifi in schools web site.
http://www.wifi-in-schools-australia.org/p/blog-page_16.html

 

Why WiFi is bad for children.

http://www.radiationeducation.com/Why_Is_WiFi_Bad.html

 

This short video clearly explains the risks of WiFi to children, take the time to watch it.

http://www.youtube.com/watch?v=FO0AnNHz8vI

 

Professor Magda Havas of Trent University.

In this video there are demonstrations of how wireless household appliances such as portable phones, WiFi base stations and DECT baby monitors, broadcast constant microwave radiation, that is similar in intensity to being a few hundred meters away from a large cell phone tower. In this video you will be introduced to several cell antenna studies that show the microwave radiation that is emitted by these towers are harmful to human health.

http://www.youtube.com/watch?feature=player_embedded&v=AEOcB7Svhvw

 

Cancer Officially Number One Cause of Childhood Death in U.S.

http://eatlocalgrown.com/article/12174-cancer-officially-number-one-cause-of-childhood-death-in-us.html

 

Practical things you can do to reduce your family's exposure to Microwave Radiation.

 

The more wireless devices you have turned on in your house at one time, the more intense will be the microwave radiation exposure to your family and the neighbours. Think about it. In a home of a family of four, each person could have a mobile phone, a tablet computer, their own laptop, a cordless phone system, game console, wireless access point, or mobile broadband device.

 

All of these devices radiate significant amounts of microwave radiation individually. Combined, this adds up to a very significant exposure. Train the family to turn them off, or use alternative technologies! A lot of people don’t even own a mobile phone and they survive! Some people are far more sensitive than others to this type of radiation and can suffer significant symptoms, in a very short period of time.

 

Ideally stop using wireless devices altogether and use wired connections, or at least use methods to reduce you and your family's exposure. Doing this not only limits your exposure, but also the exposure to everyone around you! When it comes to microwave radiation, distance is your friend. Each doubling of the distance from a microwave transmitting device quarters the radiation exposure.

 

1. Turn devices off when not in use! Buy wireless devices with a physical on off wireless switch. Turning the wireless device off has an added benefit, it lessens the time available for someone to hack into the device. Wireless devices such as printers, access points, cordless phones, baby monitors, WiFi routers and tablets etc, can send out very strong microwave signals constantly when left on.

 

2. A lot of wireless modems and access points will allow you to turn down the wireless transmission signal strength in their software settings. Lower the wireless signal transmission strength to the lowest possible level you can, to get everything working well with a 3 to 4 bar signal strength.

 

3. Place wireless access points and mobile broadband devices as far away from you as practical. It is suggested to put mobile broadband USB devices on a 5 meter USB extension cable. This is so you place the device away from you. You can then also use it like an aerial, to find the best signal strength location. Don’t place these devices on your lap or on your person. Use texting, speaker phone or a corded earpeiece when using a mobile phone.

 

4. Only have the device’s wireless and bluetooth functions turned on when necessary. Remember there can be more than one wireless type built into a device, WiFi as well a bluetooth etc. You can turn off these functions in the laptop, mobile phone and tablet settings. This will also improve security.

 

5. Sleeping with these devices in your bedroom, bed, or under your pillow. is a fire hazard, and also a health hazard.

 

6. Replacing a cordless phone system with an old style corded phone will greatly reduce the amount of microwave radiation emanating through your house, and your head.

 

7. Smart meters / Digital meters are being rolled out, and these devices put out a very powerful wireless signal. Act now to opt out of having them installed in your home or business power box. https://sccc.org.au/wp-content/uploads/2016/03/Smart-Meter-Installation-Protection-Kit-Updated.pdf

Act responsibly! USA statistics indicate ~25% of car accidents are now atributed to mobile phone use, and specifically texting while driving.

Download this WiFi Safetyguide from http://www.sccc.org.au/wifi/microwave-safety-chart.pdf

 

Watch these two very informative videos on the biological effects of microwave radiation, based on lots of independent research from all over the world.

 

Wake up call video part 1

http://www.youtube.com/watch?v=cczGVhd63pM

Wake up call video part 2

http://www.youtube.com/watch?v=tdmQDJ9WOiQ

 

 

Some practical devices you can purchase that will reduce your microwave radiation exposure.

http://www.lessemf.com/cellphon.html

 

Related articles

Mobile Phones and the Blood Brain Barrier
https://sccc.org.au/archives/1574

Freedom and Privacy being eroded by Technology!
https://sccc.org.au/archives/1602

What Wireless Security
https://sccc.org.au/archives/74

 

© Peter Daley 2013

Disclaimer: This is an amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site or at SCCC activities, without further research. Views expressed in the pages, images, or tutorials on the SCCC Inc., web site or presented at venues, maybe the personal opinions of the relevant writers or presenters, and are not necessarily representative of those of SCCC Inc.

Comments (0)
Categories : Computer Security, Health and Environmental Effects of Technology, Home Entertainment, Life Saving, Uncategorized

Hacking, the good, the bad and the ugly

By Peter Daley · Comments (1)
Sunday, July 31st, 2011

by Peter Daley

Hacking as an activity is now wide spread and International, as our society has become more and more dependent on everything being controlled by computers. Hacking has become a much more influential activity for the good, the bad and the ugly in our society.

 

I know the media constantly portrays hacking as an evil activity, but I quote from Wikipedia here, a hacker is by definition, "A person who enjoys exploring the details of programmable systems and stretching their capabilities, as opposed to most users, who prefer to learn only the minimum necessary."

 

Our world wide infrastructure is so tied to computers that hacking can now be used as powerful tool for intelligence, construction or destruction of our industrial or communications infrastructure. Western countries complain about the Chinese, or the Russians hacking their systems. The West have their ownspecial unites dedicated to hacking Russian, and Chinese systems. They're all just as bad as each other, they are all constantly trying to break into each others sensitive systems. World wide, given an opportunity, any country will use hackers to gain an advantage, commercially, politically, or militarially. Corporations are constantly using hacking to improve their commercial advantage. The News of the World mobile phone hacking scandal is a good example of this. (Read my blog on mobile phone hacking here, https://sccc.org.au/archives/1602)

 

Hackers have been trying to find ways to break chip based industrial control systems for years. It ended up that the West and Israel secret services handed them the information they needed to do this on a platter. Thisstory would make a best seller, or a great movie. The West and Israelis wanted to stop the Iranian nuclear program, or at least slow it down. They went to the big industrial chip makers and got what was secret or proprietary back door information to control industrial chips. In this case, the industrial centrifuges that where being used by the Iranians to concentrate uranium for their nuclear programs. They then went away and developed a very effective virus called Stuxnet. It was released into the Iranian enrichment plant control systems and it did what is was designed to do, it destroyed large numbers of theIranian centrifuges.

 

They were very pleased with themselves, and gave themselves a pat on the back. Job well done they thought. Except that now they hadopened Pandora's box and provided what hackers have wanted for years, back door industrial chip information to enable them to make viruses, and Trojans to control, disrupt, or destroy industrial control systems. By back engineering the Stuxnet virus which now is in the wild, thanks to the West and the Israelis, any government, criminal group, corporation, or hacker with some skill can create their own variation on Stuxnet.

 

This means that previous viruses will look like child's play. This technology can potentially be used to shut down power plants (nuclear, coal or hydro), electricity grids, water supply systems. Also,industrial plants or anything using industrially control chips can be a targeted. There have already been instances where Stuxnet variations may have been used to shut down, or disrupt Nuclear power plants and other industrial systems in a number of countries. No one is admitting that Stuxnet or a variation may have been the cause of these mysterious shut downs, or disruptionsto Nuclear power plantsin the USA, or Japan recently.

 

Well there you have it, and we are consider ourselves to be Intelligent. We're like children playing with fire.

 

Now we have hacker groups that are saying they are using their skills for the benefit of humanity by standing up to what they consider to be corporate imperialism. A splinter group of hacker group “Anonymous” have now focused on multinational Corporate food giant Monsanto.

 

Below is a text transcript of a video message they posted on the Internet.

 

-------------------------------------------------------------------------------

To the free-thinking citizens of the world:

Anonymous stands with the farmers and food organizations denouncing the practices of Monsanto We applaud the bravery of the organizations and citizens who are standing up to Monsanto, and we stand united with you against this oppressive corporate abuse. Monsanto is contaminating the world with chemicals and genetically modified food crops for profit while claiming to feed the hungry and protect the environment. Anonymous is everyone, anyone who can not stand injustice and decides to do something about it. We are all over the Earth and here to stay.

To Monsanto, we demand you STOP the following:

- Contaminating the global food chain with GMO's.
- Intimidating small farmers with bullying and lawsuits.
- Propagating the use of destructive pesticides and herbicides across the globe.
- Using "Terminator Technology", which renders plants sterile.
- Attempting to hijack UN climate change negotiations for your own fiscal benefit.
- Reducing farmland to desert through monoculture and the use of synthetic fertilizers.
- Inspiring suicides of hundreds of thousands of Indian farmers.
- Causing birth defects by continuing to produce the pesticide "Round-up"
- Attempting to bribe foreign officials
- Infiltrating anti-GMO groups

 

Monsanto, these crimes will not go unpunished. Anonymous will not spare you nor anyone in support of your oppressive illegal business practices.

AGRA, a great example: In 2006, AGRA, Alliance for a Green Revolution in Africa, was established with funding from Bill Gates and The Rockefeller Foundation.

Among the other founding members of, AGRA, we find: Monsanto, Novartis, Sanofi-Aventis, GlaxoSmithKline, Procter and Gamble, Merck, Mosaic, Pfizer, Sumitomo Chemical and Yara. The fact that these corporations are either chemical or pharmaceutical manufacturers is no coincidence.

The people of the world see you, Monsanto. Anonymous sees you.

Seeds of Opportunism, Climate change offers these businesses a perfect excuse to prey on the poorest countries by swooping in to "rescue" the farmers and people with their GMO crops and chemical pesticides. These corporations eradicate the traditional ways of the country's agriculture for the sake of enormous profits.

The introduction of GMOs drastically affects a local farmers income, as the price of chemicals required for GMOs and seeds from Monsanto cripples the farmer's meagre profit margins.

There are even many cases of Monsanto suing small farmers after pollen from their GMO crops accidentally cross with the farmer's crops. Because Monsanto has a patent on their brand of seed, they claim the farmer is in violation of patent laws.

These disgusting and inhumane practices will not be tolerated. Anonymous urges all concerned citizens to stand up for these farmers, stand up for the future of your own food. Protest, organize, spread info to your friends!

Say no to poisons chemicals in your food.
So no to GMO!

Say no to Monsanto!
We are Anonymous
We are legion
We do not forgive
We do not forget

Expect us

To back up their claims they provided these links.

Birth defects caused by Monsanto chemicals – Here

http://www.huffingtonpost.com/2011/06/07/roundup-birth-defects-herbicide-regulators_n_872862.html

Monsanto hired mercenary Blackwater to infiltrate anti-GMO groups – Here

http://www.digitaljournal.com/article/297701#ixzz1HDZcVpoj

Monsanto fined $1.5m for bribery In Indonesia – Here

http://news.bbc.co.uk/2/hi/business/4153635.stm

Monsanto Accused of Attempt to Bribe Health Canada for rBGH (Posilac) Approval – Here

http://www.ethicalinvesting.com/monsanto/news/10009.htm

Destruction of soil, air quality, groundwater contamination, deforestation – Here

http://www.washingtonpost.com/ac2/wp-dyn?pagename=article&contentId=A46648-2001Dec3

Corporate food giant Monsanto uses patents to bully small farmers and strangle competition – Here

http://www.examiner.com/sunset-district-libertarian-in-san-francisco/corporate-food-giant-monsanto-uses-patents-to-bully-small-farmers-and-strangle-competition#ixzz1R1zkI2qK

Farmer suicides in India – Here

http://www.independent.co.uk/environment/climate-change/indias-hidden-climate-change-catastrophe-2173995.html

----------------------------------------------------------------------------

You can watch the video of the above transcript at Youtube here. http://www.youtube.com/watch?v=Q1A-DYK4M4Q&feature=player_embedded

 

Hacking as an activity has grown to be the good, the bad and the ugly computer power of the twenty first century, love it or hate it, it will be shaping our future.

© Peter Daley 2011

Disclaimer: This is a amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site, without further research. Views expressed in the pages or images on the SCCC Inc., site maybe the personal opinions of the relevant writers, and are not necessarily representative of those of SCCC Inc.

Comments (1)
Categories : Computer Security, Computers, Uncategorized

Freedom and Privacy being eroded by Technology!

By Peter Daley · Comments (0)
Monday, May 30th, 2011

( 30th May 2011 )

 

Technology is becoming Big Brother's surveillance tool. Everything we now do in modern society is being recorded and watched, whether you like it or not. Let's look at the personal computer of the twenty first century, the mobile phone.

 

What can it do.

 

1. It pulses every 8 seconds even if it is turned off, and from this pulse your location can be triangulated. The only why to stop this is to take out the battery and sim card.

 

2. New phones will have a gyroscope built in so you can get those fancy games working well. This can be used to work out what you are physically doing at any point in time, walking running, driving, or cleaning the windows etc.

 

3. Even if the mobile is turned off, it can be used to take a picture, or record your conversations. Look up mobile phone hacking on youtube if you want proof.

 

4. The latest edition in its armoury of detective tools is to not only triangulate where you are at any given time, but also to record that information for later analysis. These personal location tracking and recording tools add a whole new dimension to the mobile phone tracking armoury. http://www.guardian.co.uk/technology/blog/2011/apr/25/steve-jobs-responds-iphone-tracking

 

5. Record all your keystrokes and SMS messages, plus send this info off somewhere unknown,  http://news.cnet.com/8301-13506_3-57333652-17/android-handsets-secretly-logging-keystrokes-sms-messages/?part=rss&subj=news&tag=2547-1_3-0-20&tag=nl.e703

 

This information was not volunteered to the public by Google, or Apple, but discovered by independent researchers. The big question is, why two so called independent rival corporations have quietly installed personal location tracking, and recording tools on their phones? It is only by a chance discovery that it was revealed.

 

You buy a mobile phone to have convenient mobile communication, not to be a Big Brother tool for recording and watching every thing you do. Not only can this technology be used by governments, and corporations, but anyone who wants to do some basic research can get the tools to hack it, and gather your private information and movements.

 

 

When you purchase a Mobile Phone it should come with a clear warning!

 

  • You may be tracked when using this device for government, or corporate use.

  • Your conversations may be recorded without your knowledge.

  • The device may take photographs without your knowledge.

  • Your physical activities may be monitored at any time without your knowledge.

  • All your Keystrokes and SMS messages are recorded, and sent off to somewhere unknown.

  • It can be hacked easily so the manufacture accepts no responsibility for the loss of private information.

  • Use at your own risk as the radiation from mobile phones may affect your health.

 

Mobile Phone health risk Industry sponsored research says it has no effect except for a slight warming on the body tissue. Independent researcher indicates long term frequent use can potentially cause serious health problems. Read my previous article here on this subject https://sccc.org.au/archives/1574

 

The mobile is now being touted as a wallet to be used instead of cash, or credit cards.

 

http://www.ibtimes.com/articles/153830/20110528/google-wallet.htm

 

Governments and history change, with these technologies governments can impose total control over their citizens. There have already been numerous instances of a number of governments using this technology to track and collect citizen's information, and at times pass, on this intelligence to corporations which the citizens were protesting against.

 

You won't be able to sneeze, or go to the toilet without the government knowing about it. In the machine verses human, I think the machine is winning!

 

© Peter Daley 2011

 

Disclaimer: This is an amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site or at SCCC activities, without further research. Views expressed in the pages, images, or tutorials on the SCCC Inc., web site or presented at venues, maybe the personal opinions of the relevant writers or presenters, and are not necessarily representative of those of SCCC Inc.

 

Comments (0)
Categories : Computer Security, Computers, Health and Environmental Effects of Technology

NoScript Essential to Web Surfing

By Peter Daley · Comments (0)
Sunday, January 24th, 2010

 

At present, the hacker black market is paying $100 per thousand hacked Australian computers. That's correct, there is a black market for hacked computers, and Australian computers are fetching top dollar, compared to other countries. Why do you think that Australian computers are getting top dollar? It's because we are easy targets as most of you don't take computer security seriously enough, plus being an affluent country, the hackers can make better money from a hacked Aussie.

 

You could argue the affluent part, depends on whether the banks get to your money before the hackers do 😉 You can secure your computer with all the modern, up-to-date security tools, but if you don't follow safe practices, you're very likely to get hacked or ripped off. It's just like driving a new car, with all the latest safety features, air bags and intelligent breaking systems, if you drive dangerously, you're more likely to crash and get injured. You need to use some common sense on the Internet, and stay away from sites that are notorious for hacking visitors computers, pornography, software cracks, copy violated music sharing and movie sites etc.

 

One other major new treats used by hackers is to break in though security holes in web browsers. This poses a serious threat to all operating systems Windows, Apple and Linux. This article reinforces what I have been trying to get across to everyone.

http://www.cnet.com/news/microsoft-denies-fault-in-hacks/

 

They can use malicious scripts hidden in web pages to exploit vulnerabilities in any web browser, being used on any OS. The way to defend yourself against this sort of threat is to turn off all scripts. Unfortunately scripts are so wide spread that if you do this you can lose a lot web page functionality. Alternatively you can use the the Mozilla Firefox web browser downloadable from here, http://www.mozilla.com and install a Firefox Add-on called “NoScript”, this will effectively block all scripts in pages you visit. You then use NoScript to choose when to allow scripts.

 

Once Mozilla Firefox is downloaded and installed on your computer, and you are connected to the Internet, click on the menu item “Tools”, and in the pop down box, click “Add Ons”. When an “Add-ons” box appears, click on the “Get Add-ons” tab. (Right click next to the last open tab open in Firefox if you can't see the "Menu bar", and tick "Menu Bar" in the pop up box that will appear, to turn it on.)

 

In the search box at the top left of this box, type in “NoScript” and click the “Search” button, then when the NoScript add-on description appears click its “Install” button.  The NoScript extension will be installed. Once it is installed, you will need to shut down, and re-open the Firefox browser before NoScript will become active.

 

(When you re-open Firefox I suggest you read the information about NoScript that will appear in a tab window in Firefox.)

After installing NoScript, go to "Tools" "Add-ons" menu item in Mozilla Firefox. The menu bar is at the top of the Firefox open window. Find NoScript in the "Extensions" list under Add-ons, and click on NoScript's "Preferences" button. Now click on the "Appearance" tab and click on the "Status Bar" box. Now when you visit web pages a status bar will appear at the bottom of the Firefox browser window. In the status is bar a NoScript "Options" button will be located in the bottom right hand corner. The Status bar will also show how many scripts are in the page that are being blocked

 

Blocking all the scripts will speed up your web surfing because you will not need to wait until the all the fancy stuff loads. It will also mean you will need to make wise decisions on when to allow scripts in web pages. I suggest not allowing any scripts in pages unless you really need the service. For instance, if you go to your web bank service with NoScript you will not be able to log in until you tell NoScript to “Allow the bank site”, by clicking on the NoScript Options button. So login boxes for services, plus Flash, Silverlight, and Java scripts will be blocked until you click the NoScript allow site, or temporary allow option, when visiting any site. If you use it with another Firefox Add-on WOT, (Web Of Trust) a web site rating service it can make those decisions easier to make.

 

Statistically 1 in 9 web sites are dangerous at present!  Statistically 1 in 9 web sites are dangerous at present!  So using NoScript wisely can provide more protection, no mater what  operating system you use!

 

© 2010 Peter Daley,

 

Disclaimer: This is an amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site or at SCCC activities, without further research. Views expressed in the pages, images, or tutorials on the SCCC Inc., web site or presented at venues, maybe the personal opinions of the relevant writers or presenters, and are not necessarily representative of those of SCCC Inc.

Comments (0)
Categories : Computer Security

What Wireless Security?

By Peter Daley · Comments (0)
Monday, January 4th, 2010

The statistics are pretty frightening, 70% of home, and small business wireless routers providing broadband connections, have no security on them. In reply to a previous blog I had written in a local newspaper, I was urged by a post to write an article on wireless security, after the person had this experience.

 

“I've recently started taking my laptop on the train in order to do some work. I decided to fire up a great bit of software called Network Stumbler. This software uses the wireless network card in my laptop to record the details of every wireless network it finds. In 10 minutes I passed by around 50 networks, 7 of which were completely unsecured.”

 

Look, you have been sold a pup. Computers where never intended to be used for financial transactions. I know, they are widely promoted to do this. Great for the banks and the IT industry, promoting it as a convenient way to improve your life style. They make money, but this technology is not certified, or made secure enough to do this safely.

 

Would you use an ATM provided by your local bank, if you knew it was not certified by the regulatory authorities, did not have proper security on it, or if it was purchased on the cheap from a foreign country in a manufacturing plant with no security clearance? Well what do you think your computer is!

 

Wireless systems are another good example of this. You're encouraged to ditch all those old fashioned wired connected devices, and go wireless. It just makes everything neater and accessible from anywhere. The truth is, that if you are using your computer for financial transactions of any kind, you should not use an in house wireless system. Use a cable to connect your computer to your broadband modem. If you're using wireless at present, turn off the wireless feature, and use a network cable connection. It's just a whole lot safer, as long as you follow my instruction in this blog on securing your broardband modem.

 

If you have some technical skill, or employ a professional to set up that wireless broadband router security correctly, it will be a lot safer. Even then, people with a good skill level can download the tools necessary to break in to most in house wireless systems fairly easily. Not that they would need to bother with downloading the tools, as most systems don't have any security!

 

Wireless War driving is a pastime in a lot of locations now. This is where someone sticks an aerial on their car, and drives around to see what wireless systems they can break into. They then infect the system to take control of it, gather personal information, banking info, or just use the victims computer to download or send files. Wireless hacks are local, not from the Internet.

 

If you're running a business with wireless systems in house, you need to take more care, because your financial info, client data, and commercial secrets are at risk. A wireless system is basically a radio station, transmitting and receiving information. To anyone who can detect, and connect to it, it's like opening all your doors and windows, and inviting them in. I have heard numerous stories where locals have bragged that they don't need to pay for a broadband connection, they just use their neighbours!

 

Often I am asked the question, why a person's Internet access charges have sky rocketed. Most likely because someone is using their in house wireless broadband connection, or they have a virus. Everyone needs to get up to speed on all these security issues, so you can protect yourself. As a community service in my previous blogs, I have put in a lot of effort to educating readers, and providing solutions to the increasing security threats.

 

If you insist on using wireless, read this blog on securing it. There are also heath concerns about using computer wireless technology, as it is working in a similar frequency band to mobile phones. Read this article.

 

The fact is, consumers should be demanding security, over features and convenience!

 

© 2010 Peter Daley,

Disclaimer: This is an amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site or at SCCC activities, without further research. Views expressed in the pages, images, or tutorials on the SCCC Inc., web site or presented at venues, maybe the personal opinions of the relevant writers or presenters, and are not necessarily representative of those of SCCC Inc.

 

Comments (0)
Categories : Computer Security, Health and Environmental Effects of Technology

Using Key Generators, and Cracks is just plain stupid!

By Peter Daley · Comments (0)
Sunday, October 25th, 2009


I have done numerous tutorials over the year in the club pointing out that using a key generator, or a software crack to make illegal use of software is just plain stupid. Firstly a person using these illegal tools are leaving themselves open to legal action. There is no doubt they are breaking the law. Secondly, key generators and software cracks are very likely to be infected with a virus, or rootkit. Rootkits are far more stealthy than your average virus.


This sort of malicious software can place keyboard loggers onto a computer, and record all the person's user names and passwords for banking, email, social networking sites and ISP accounts. These malicious tools can also be used to steal confidential information that is stored on the computer.


If anyone has encouraged a person to use one of these tools they have done them a great disfavour. If a person is using a computer for financial transactions of any kind, and have used one of these tools, they are taking a big risk. I would suggest they back up all their important files and re-install their operating system. After they have done this , secure the new installation with a good firewall, anti-virus and anti-spyware program.


I would suggest they change all their banking account and log in account passwords etc. If you are going to the trouble to create a new password, make sure it is actually going to protect you. Read my article, on how to create good secure password.


The Windows Operating system can only be used on the computer it was purchased with, and can't be installed on any other computer. If you have a legal version of Windows installed on your computer, you can constantly update it with the latest security patches. This means that legal patched versions of Windows are far more secure than a cracked illegal version. A pirated version of Windows is far more likely to have a virus, spyware or rootkit on it immediately upon installation, plus it can't be updated.


This is one of the reasons so many machines were compromised by the Downup virus. These Windows machines did not have the latest Windows patches on them. One, because people did not install Windows updates regularly, or they were using an illegal version. They probably have seen themselves as being smart using the illegal version to save themselves a couple of hundred dollars, but if they are doing any logging into financial sites, or have important information on the computer, the bad guys probably have recorded it.


If the commercial software does the job better than anything else, buy it, or alternatively look for a free legal software program that can do the job. There is just so much free legal software available that can do just about any job you could possibly need.


© Peter Daley 2020


Disclaimer: This is an amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site or at SCCC activities, without further research. Views expressed in the pages, images, or tutorials on the SCCC Inc., web site or presented at venues, maybe the personal opinions of the relevant writers or presenters, and are not necessarily representative of those of SCCC Inc.

Comments (0)
Categories : Computer Security

Wireless Security, You Need To Be A Secret Agent!

By Peter Daley · Comments (0)
Friday, October 16th, 2009


Securing your wireless router is an adventure. You will need to be a bit of a secret agent, plus be willing to play the odds. Your tools will be some dice.


First of all secure your wireless router with a better password than the one supplied by the manufacturer which is usually admin / admin or admin / password. Read these two previous blogs. Even though these blogs are about broadband modems and general password creation the info equally applies to wireless routers. If you don't secure the device first, the rest of the security set up is a waste of time. You should just resign as a 007 agent now.


This is were your 007 skills come in. Go to the Diceware site,


http://world.std.com/~reinhold/diceware.html


This is where you hone your secret agent skills on using the dice to create a really good quality secret agent passphrase.


Now play the odds, download the dicewarewordlist.pdf. This is your tool to create a really good WPA2 passphrase. The passphrase must be longer than 20 characters, using a splattering of unusual characters. Most of you who actually attempted to put some form of security on your wireless router would be using 20 characters, or less, dictionary word based passphrase, and hackers are laughing. It has been known for many years that a WPA 20 characters, or less dictionary word based passphrase is easily broken.


Now you take the dice, and dice word list into a room and close the curtains. Why the drawn curtains? Every secret agent worth his salt knows they they can now read what you're typing from the reflections in the window. Also, don't leave your keys to your computer room lying around because they can now make key duplicates from a photograph. Boy, don't you know anything?


After you have created and memorized the secure passphrase key, you can burn it, pulverize it in a mortar and pestle, and flush it down the toilet. Make sure you flush twice. Ok, a bit over kill for most of you. One flush is probably enough. Write it into your secret code book because it's going to be so complicated, most of you won't remember it anyway. Don't store it in your computer.


Are you still with me secret agents? Now we have to enter the key into the WPA2 / AES wireless setting in your wireless device. Man this is all ridiculous, you're telling me. I haven't finished yet!


Turn Off,


1. Turn off SSID broadcasting in your broadband modem or wireless router. The SSID is the WiFi station name. Don't use the factory default SSID, change the SSID wireless ID to a very unusual set of characters.


2. Turn off DHCP auto IP address assignment and assign all your network IP addresses manually.


3. Turn off WAN if you don't need it.


4. Turn off high power wireless transmission, if you don't need it. If your leave these two things on you will have created a very powerful radio station transmitting your presence into the suburb. Not good for secrecy!


5. Turn off your computer, wireless router, and broadband modem, when not in use. This significantly lessens the opportunity for the bad guys to break in. It will also help the planet and your hip pocket, by using less electricity, thus lessening the production of green house gases. Read my previous blog on this subject.


6. Turn off the UPNP (Universal Plug and Play) feature. IMPORTANT, also turn off UPNP in your Broadband modem if it is a separate device. NOTE: Xbox, video streaming, and VIOP devices may stop working when you do this. UPNP is really a big break in vector for most wireless routers and broadband modems! Incidentally, UPNP will be a big feature of the newest high speed wireless routers that will arrive soon!


Turn On


7. Make access to your wireless router more difficult by turning on access controls. This means that only a machine with a particular device MAC address, or IP address on your network has the ability to connect to your wireless router, to change the wireless router settings.


8. Make sure the firewall is turned on and set to high, if possible. If things stop working, drop it a notch.


9. Change the gateway address of your broadband modem from the standard factory addresses of, 192.168.1.254, 192.168.1.1, 192.168.0.1, 10.1.1.1, or 10.0.0.138, Use anything other than these numbers. These numbers make it so much easier for hackers to guess your network set up. Once you have done this, enter the new gateway address into the wireless router.


10. Update the firmware of your broadband modem model. This is important as it fixes security holes that were found after manufacture.


If you have read this far, you have earned your secret agent certificate.


This is the simplified version!


Yes, there is also more you could do.


Now you may see why I suggest turning off your WiFi, and plugging your computer directly into your broadband modem with a network cable. It is simpler, faster, safer, and more reliable.


A university created a concept virus for wireless systems. They let the virus go in wild in their local town and found the only thing that stopped it spreading further was the local river. Just like one person catching a cold, and then giving it to anyone who comes in close contact.


© 2008 Peter Daley, updated 2019.


Disclaimer: This is an amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site or at SCCC activities, without further research. Views expressed in the pages, images, or tutorials on the SCCC Inc., web site or presented at venues, maybe the personal opinions of the relevant writers or presenters, and are not necessarily representative of those of SCCC Inc.

Comments (0)
Categories : Computer Security

Who is Spying on You!

By Peter Daley · Comments (0)
Friday, October 16th, 2009

By Peter Daley

Who could be spying on you over the Internet? Well lets see, governments, corporations, a competing business, data mining businesses, marketing organisations, and criminal gangs etc,. Spyware is all about commercial and personal information gathering. It can make big money, and is also useful for intelligence.

Spyware has become as an important an issue as virus infections, for Windows Computers. Spyware can collect personal information about your movements on the Internet, in it's most passive form, but can also collect much more sensitive personal or commercial information from your computer, such as credit card and bank account information, or commercial secrets. It can also be used to open doorways to allow much more malicious programs, viruses or Rootkits, into your commercial or private Internet connected computer.

So it is important to install a couple of good spyware scanners on you Windows computer, and run them through your computer once a week. Most people are not aware of how serious a problem this is for Windows computers, and some of the better spyware scanners can check for approx. 450,000 spyware items, and increasing. With these numbers, it is very common for one spyware tool to find spyware the other one missed.

Here are some suggested spyware scanners you can use. They are free, or can be upgraded to commercial versions if you want that extra protection.

NOTE: There are increasing numbers of malicious Spyware and Anti-virus programs out there. They're designed to trick you into installing them. They will pop up on you screen with a warning that they have found viruses, and spyware on your computer, and that you should download and install them to remove the spyware or viruses. After they're installed, they will ask you to get out your credit card and purchase the program before you can remove the detected viruses or spyware. If you do this, they will then have your credit card info, your money, plus control of your computer! Isn't the Internet a wonderful place? It is full of such ingeniousness and creativity!

At present, Spyware Doctor and Spyware Terminator are considered to be a couple of the best spyware detectors. (These have won Internet Oscars under the "Spyware Detection" category, just joking! Everyone has their favourites, and may suggest others.)

You can download a free working version of Spyware Doctor from Google.

Go to http://www.google.com or http://www.google.com.au and click on the "More" link at the top left of the Google page. A pop down box will appear, go down to the "Even More" item and click it. A "More Google Products" window will open. Now navigated down to the bottom right hand corner of this page, and click on the "Pack" item under the "Make your computer work better", heading. Now select the programs you want from the google pack. I suggest you select Spyware Doctor and one other for this exercise. The "Google Downloader” program will now be downloaded to your computer. Once it is downloaded, you will need to double click on the Google Updater program to download and install the selected programs.

Once Spyware Doctor is installed, open it and go to the "Smart Updater" button at the top Right-hand corner of the Spyware Doctor open window. When the updates are finished click the scan button and select “Full Scan”. A limited trial version and commercial version of Spyware Doctor can also be downloaded from,

http://www.spywaredoctor.com

Spyware Terminator can be downloaded from here, http://www.spywareterminator.com

Once you go through the process or downloading Spyware Terminator, update it, and run a full scan of your Windows computer.

Now you can't have both of these programs running at the same time, so you will have to decide which one is to be your primary protector, and disable the other. You then update it, and run it manually each week to check the other one hasn't missed anything.

The way to turn it off is to look for it's icon in the system tray. The system tray is the line of icons that appear at the bottom right corner of the task bar on your opening Windows screen. Right click it's icon, and select "Shut Down" for Spyware Doctor, or "Exit" for Spyware Terminator in the pop up list that appears. You can restart them by navigating to their icon on the desktop, or in the program menu list.

With all these programs you should read their help files, plus navigate through their settings or preferences, to make sure they're running at their full protection potential. (NOTE: In Vista you will need to right click on the program icon, and select “Run as Administrator”, in the popup list, to get them working fully.)

The next blog will be on two easy to use Rootkit scanners you can use in Windows. Read my previous blog on rootkits "What on earth is a rootkit", to get some background on rootkits.

I hope you installed and scanned your computer with the free extra anti-virus checker I suggested in the bottom of my previous blog "False Sense of Security".

My friends and I spend our time doing other things, we use Linux or Apple computers 🙂

© 2009 Peter Daley

Disclaimer: This is an amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site or at SCCC activities, without further research. Views expressed in the pages, images, or tutorials on the SCCC Inc., web site or presented at venues, maybe the personal opinions of the relevant writers or presenters, and are not necessarily representative of those of SCCC Inc.

 

Comments (0)
Categories : Computer Security

ROOTKITS, nothing to do with a kit to improve your sex life!

By Peter Daley · Comments (0)
Monday, September 21st, 2009

 

For those of you with a sense of humour, this has nothing to do with a kit to improve your sex life, in fact it would probably have the opposite effect! So what are rootkits? They are super stealth hacks that are hidden from most virus checkers and spyware detectors. Trouble is, large numbers of computers using the Windows operating systems are being infected with rootkits. I do a lot of computer troubleshooting and repairs, and in the last few weeks, I have been finding an increasing number of computers infected with rootkits.

 

So you've been diligent, and kept your virus, spyware, and firewall up to date, but one of the family has decided to use one of the music sharing systems, or visited a site, and your computer has been hacked through your web browser. Hidden inside your confidently safe computer is a super stealth rootkit.

 

You can run your virus checker or spyware removal tools till the cows come home, you won't find anything. You need to run this special tool called rootkitrevealer. Most of you are going to find the information on the rootkitrevealer page, gobbledy gook. Read it if your feel you will understand some, or just cut to the chase, and go to the bottom of the page and download the Rootkitrevealer.zip file. It is a compress zip file, so save it onto your computer, and unpack it. Then run the Rootkitrevealer.exe file on you computer.

 

If you have no understanding off the last two lines in the above paragraph, you're in over your head, and should immediately stop all Internet banking on your home or work computers. Change your banking password immediately and stick to phone banking or psychically go to the bank. This type of basic security knowledge is essential to your banking and business security on the Internet. Most people's faith in computer security is unfounded, and based on poor information.

 

So you run Rootkitrevealer on you computer, (By the way, there are more steps involved to run rootkitrevealer on Vista, at present), and you get discrepancy results. What do they mean? The best I can tell you in brief, is to look to the end of discrepancy lines, and you may need to widen the column to see them, items like SAC, SAI are normal, as are entries that may refer to your virus checker name. eg Symantecs (Norton's anitvir), or Nero, a CD burning programme. Most clean computers will only have a few normal discrepancies as described above. The more discrepancies, the more likely the breach to your computer security. Most people will not have a clue what are normal discrepancies and what are abnormal. Anything over about 4 or 5 is suspicious.

 

All I can say is take a deep breath, and read this free book on stress management.

 

If you find any rootkits, getting rid of them is another story. Have you got all afternoon! I really feel that most of you out there should stop Internet banking and use phone banking or go physically to the bank. I have been demonstrating the use of Rootkitrevealer to Sunshine Coast Computer Club members.

 

© 2007 Peter Daley

 

Disclaimer: This is an amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site or at SCCC activities, without further research. Views expressed in the pages, images, or tutorials on the SCCC Inc., web site or presented at venues, maybe the personal opinions of the relevant writers or presenters, and are not necessarily representative of those of SCCC Inc.

 

Comments (0)
Categories : Computer Security

First Line of Defence, or is it?

By Peter Daley · Comments (0)
Monday, September 21st, 2009

Your ADSL Broadband modem is your high speed gateway to the Internet. It is also your first line of defence against attack, so it should be secured. Isn't it already? NO. The vast majority of home and small business modems are being operated by their owners, thinking that it is secure and it ain't!
 

Imagine that every new model of a Toyota, Holden, or Ford Car built, was sold with the same set of keys. You would all be jumping up and down complaining. Anyone could have instant access to your new car. Hey, that's just crazy! Yes it is.

 

And yet every model of broadband ADSL modem is sent from the factory with the same user name and password, plus the supplied username and password is generally admin and admin, or admin and password. Now that's just crazy. Why? Because all a hacker has to do is detect what model modem you have, and they're into your network or computer. In actual fact, they don't even need to know what model, because different manufacturers use the same generic password. Plus most service providers may only supply a couple of different models of a particular brand, so If they find out which ISP you're using, they pretty well know what the password for your broadband modem will be.

 

This modem security issue could easily have been avoided by modem manufacturers generating a unique User Name & Password for every modem and sticking it under the modem, or in the supplied booklet! You would still be able to change it later.

 

Well, what can you do? Change the factory supplied username and password! The modem will be supplied with a small paper manual, or there will be a manual on the installation CD. Look for the item that refers to manual access, or manual set up, and follow the instructions for changing your username & password. If you're going to change this password, create one of those real random ones that everybody hates to try and remember. Don't use birthdays, pet names, 1234, or something simple. You have to make it complicated. Hackers have sophisticated tools that can crack simple passwords in seconds. So make is random, use some upper-case letters, numbers and symbols. Also, make it at least 12 characters or longer if possible. You don't need to remember it, stick it under the modem, or in a special password book. Some models will only allow you to change the password, but not the user name.

 

(This is important, the password and user name we want you to change is not the user name, (generally your email address) and password you have been supplied with by your ISP for accessing the Internet. This password and user name are also in the broadband modem. If you're seeing these entries, you're in the wrong place. Leave these entries alone, or you will lose access to the Internet!)

 

Another item to check while you're in there, is that your modem firewall it turned on. A firewall is a defense system built into modem, that monitors what systems are allowed to have access to and from the Internet. Think of it like a security guard on a building, watching who or what is allowed to enter or leave the building. It is a very big part of your Internet security and must be on a standard or high setting. If you set a firewall setting too high, you may lose Internet access. Consult your modem manual. If it is not on, you have probably already been hacked! I have come across seven ADSL modems in the last fortnight that had been hacked, and their firewalls had been turned off.

 

This means the hacker can not only have complete access to all your connected computers, but also potential to redirect you, or your staff, to malicious or counterfeit sites which look like your bank, but are not! They can also redirect traffic through your Internet account. This traffic can be lots of spam, virus attacks, terrorist or hacker communications. The hackers just love this because they can send all this malicious stuff anonymously. It's going through your Internet account so it is difficult to track.

 

Why would anyone want to do this to my computer? These days the hackers can make big money out of it. Crime gangs pay them good money to pilfer credit card information, bank user names and passwords, or send spam etc. It used to be just sport. "I can do this to poor unsuspecting saps". But now they can make good money doing what they enjoy. Isn't that everyone's dream! The IT industry just makes it easy for them.

 

© 2007 Peter Daley

 
Disclaimer: This is an amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site or at SCCC activities, without further research. Views expressed in the pages, images, or tutorials on the SCCC Inc., web site or presented at venues, maybe the personal opinions of the relevant writers or presenters, and are not necessarily representative of those of SCCC Inc.

 

Comments (0)
Categories : Computer Security

False Sense of Security

By Peter Daley · Comments (0)
Monday, September 21st, 2009

By Peter Daley

In my opinion, the Windows operating system is now owned by the bad guys. They're sitting back laughing at the pathetic attempts of the average computer user to secure their Windows computers.

Recently a hacker group was reportedly caught in control of an estimated 1.2 million computers, mostly home or small business computers. This is just one gang. For this to happen, there must be something drastically wrong with Windows security. Is it that Windows security is simply overwhelmed, or does it need a drastic rethink and redesign? OK, you could point the blame at the large number of inexperienced computer users, but if they can't even visit web sites in safety, what chance do they have.

 

I am in this business, and I mainly work on Windows machines and I have seen it's security situation deteriorate. Recently, I found three computers, newly purchased, with a virus infection already on them. I re-installed another computer's operating system, using it's recovery disk, only to find the computer had a virus installed by the recovery disk. So what chance does the average joe have if they can't even be guaranteed a clean computer at purchase? These infections were caused by third party programs that had been bundled with the Windows operating system to value add the computer. I am constantly working on Windows computers and it is very rare these days to find one totally clean.

 

I have been recommending to clients and Sunshine Coast Computer Club Inc. members, who are Windows users, to install at least two virus checkers, two spy ware removal tools, two RootKit Checkers and a good firewall program, plus make sure they get regular updates. This may give them a fighting chance at keeping their system secure! Why? because no single virus checker, spy ware tool, or rootkit checker is not sufficient any more, to detect the avalanche of malicious content presently attacking the Windows operating system.

 

This is simply put, a ridiculous situation!

 

(I personally us the Linux Operating System, which is at present, virtually virus free in comparison to Windows. Apple/Macs computers are also far more secure.)

 

As I see it, Windows users have four options.

1. Only use a Linux, Apple/mac based computer for the Internet. Use your Windows computer for other tasks. Don't connect it to the net.

2. Stop using Windows and use a Linux or an Apple/Mac computer.

3. If you insist on using Windows on the Internet, install the recommended free software, or something similar, which I will suggest in future blogs, and keep it all up to date, and scan the computer regularly. (Read further for the first suggested program.)

4. Do not keep passwords, confidential, commercial, or private information stored in an Internet connected Windows computer!

 

This security situation is a major issue.

It is a big waste of your personal and business time and money.

It places at risk your confidential, personal and business information.

It places at risk your financial transactions.

It also presents serious issues about national security. Imagine the national chaos caused by 1.2 million computers being shut down at once!

We should all collectively start demanding greatly improved security rather than accepting the present situation as part of owning a computer.

 

As an exercise, download and install Clamwin, a free opensource antivirus program on to your Windows Computer to use as your second antivirus program. It will be used to cover the back of the other antivirus program, by checking that it hasn't missed anything.

 

http://www.clamwin.com

 

Once you have downloaded and installed Clamwin, it will create a rifle sight Icon in the system tray. (The system tray is the line of icons that appear at the bottom right corner of the task bar on your opening Windows screen.) Double click it to open it, if Clamwin asks to update the first time it opens, let it.

 

A. In the open Clamwin program window, left click the "Preference" button. This is the first button top left of the Clamwin window. Make sure the 'report only' item is selected.

(NOTE: This is important when running a second virus checker on a system. Why? So is to prevent the possibility, (in this case Calmwin), from deleting or removing the other virus checkers virus database. If it were to delete this file, the main virus program will not be able to detect viruses.)

B. Now go to the "Advance" tab, and make sure all the four boxes here are ticked.

C. If your present virus checker scans incoming emails, you will also need to go the "Email Scanning" tab, in Clamwin and untick the email scanning items. This is so it doesn't clash with your other virus checker trying to scan incoming emails.

D. When connected to the Internet, click the update button. After the update is finished, highlight your local disk C drive from the drive list in the main window, and click the "Scan Selected Files for Viruses", button. The furthest button to the right in the button bar.

 

On some computers this scan could take 8 hours or more, so do this when you can leave Clamwin to do it's job. Now you can get on an with those jobs around the house you been putting off :-). You spouse will be happy.

 

It is very likely that a large number of you will find viruses that your other virus checker missed. Be careful because if it says it found a virus at the other virus checkers address in the file system it is most likely a false positive. It has just detected the other virus checkers virus data base as a virus.

 

© 2008 Peter Daley

Disclaimer: This is an amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site or at SCCC activities, without further research. Views expressed in the pages, images, or tutorials on the SCCC Inc., web site or presented at venues, maybe the personal opinions of the relevant writers or presenters, and are not necessarily representative of those of SCCC Inc.

 

Comments (0)
Categories : Computer Security

Computer passwords are simple to break

By Peter Daley · Comments (1)
Monday, September 21st, 2009

 

Hackers have sophisticated tools that are freely available on the Internet that can break simple passwords, like your cats name, 1234, or anything simple, in approximately 10 minutes. So all of you need to re-think how you create passwords. All your systems that use password access need to have a good complicated password.

 

I can hear all of you greenhorns out there moaning and saying “my simple password is so easy to remember, and I use it for everything. This makes my life so much simpler.” Well the hackers are laughing at you, because it makes their life so much simpler too!

 

Yes, I know there are computer programs that claim to safely sort all your passwords on your computer for easy access, but truthfully, you can't rely on them not to be hacked. The hackers see them as a little honey pot of all your passwords, with every thing in one place. It just saves them a lot of work. Never store password information on your computer, and change passwords regularly.

 

It is very important that you create complex passwords for everything, banking, Internet accounts, Broadband/wireless Modem, and Internet Game site access, etc., that contain some upper case letters, numbers, and where possible, characters like #, &, or similar. Unfortunately, some password creation systems will not allow you to use characters like #, &, or similar, in the password. If they don't, then use a complicated mixture of upper case, and lower case letters and numbers.

 

It should be at least 12 characters long. Why? Because hacker's have sophisticated password cracking tools, that can break the average dictionary word based password, with a few numbers thrown in, in a few minutes! The longer the complicated password, the harder it is to crack.

 

I know some people who have changed banks simply because the bank web site wouldn't allow them to create a complex password using characters like #,>, &, etc. For those of you scratching your head right now thinking how am I going to create all these super passwords, here is a free tool you can use. It is an Ultra High Security Passwords Generator, kindly provided by Steve Gibson of Gibson Research Corporation.

 

https://www.grc.com/passwords.htm

 

Use the second row, the 63 random printable ASCII characters row for general password creation. For those of your ready to panic, you don't need to use all 63 characters for each password just 12 or more characters, randomly selected from those shown. (For those of you using Linux, use this tool to create a really good admin root password.)

 

If this bit stressed you, read this Free Book on Stress Management.

 

The facts are that most computer users are way out classed. The crime gangs are employing some of the best computer minds in the world, and paying them good money to create more ingenious and sophisticated hacks. So everyone using a computer needs to get their act together, and stop thinking that your computer is a communication and entertainment tool, and realize that it is continually under sophisticated attack, and you need to raise your understanding of computer security, and defend yourself.

 

I am constantly hearing of personal bank accounts being pilfered. In some cases the banks have refused to reimburse the amount lost. The American stats for 2007 were 3.83 million Americans lost an average US$1500 each from their bank accounts through bank pilfering. Now that all adds up to a lot of money!

 

A month ago the criminal Internet economy was estimated to be making $150 billion dollars annually worldwide. It is now making more money than the north American drug trade. So they have a lot of money to re-invest in research and development.

 

It is not much use going to all the trouble of creating wonderful complicated passwords if your computer is already hacked. Because hackers will have it as soon as you type it. (The statistic show 25% or more of you reading this articles are hacked already.) So get yourself up to speed, and read my previous blogs that outline how to secure your system, and keep it safe, plus use the suggested tools to check to make sure your system is clean.

 

© 2008 Peter Daley

 

Disclaimer: This is an amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site or at SCCC activities, without further research. Views expressed in the pages, images, or tutorials on the SCCC Inc., web site or presented at venues, maybe the personal opinions of the relevant writers or presenters, and are not necessarily representative of those of SCCC Inc.

 

Comments (1)
Categories : Computer Security

Viruses! Most computer users don’t stand a chance!

By Peter Daley · Comments (1)
Monday, September 21st, 2009

The Windows virus situation has gone from bad to the ridiculously bad. I am telling you how it is, and not what the industry would like you believe it is. They're not in control, the bad guys are!

 

Just look at this virus total site and you will get a good clear picture of what most Windows users, and our Windows IT infrastructure is up against. Just look at the detection rate in the submission chart, under the statistics tab at the site.

 

Pretty shocking situation! Statistically, at best Windows virus checkers are only finding 38% of the viruses. So if you are confidently using the virus checker you paid $50 to $100 or more for, it ain't going to find all the viruses! OK, the salesman told you that it's all you needed to protect your Windows Computer. Well it is not, and far from it. It doesn't matter whether it is a free, or commercial virus checker, they're all in the same boat, which as far as I can see is sinking in a tidal wave of viruses and  malware.

 

How clear can I make it, no single virus checker is finding all the Windows viruses.

 

So as I pointed out in this blog I wrote 15 months ago, you need more that one virus checker in Windows to have any chance of finding all the viruses. Back then, I was suggesting Windows users use at lease two checkers. This year I am suggesting using three.

 

Here are my free virus checker suggestions for non commercial use. You need to use multiple virus checkers with caution, because one virus checker can find the others virus detection data base, and think that it has found a virus and remove it. This would then disable the virus checker.

 

Generally, in most circumstances, these virus checkers will work together. If you already have a virus checker installed, and are happy with it, try installing one of these and see if they will work together without clashing.

 

(NOTE: It is important to only have one virus checker active at any one time. Turn off “Real Time  Scanning” and "Load at start up," in the settings or options of all the other checkers you have installed, except the one you want to keep active all the time. This is so they don't clash.)  If you uncertain how to do this ask some one at a club meeting to show you.

 

AVG Free (Use this as your main auto scanning / email scanning virus checker)

 

Avira Free can be used instead of AVG for those who find AVG clashes with something on their computer.

 

Both AVG and Avira offer paid versions which provide more protection features.

 

Clamwin, make sure you read the bottom part of my previous blog here, on how to set up and use Clamwin as a secondary virus checker. Us this as a guide on getting multiple anti-virus programs working together.

 

Comodo Internet Security suite.

 

(NOTE: Comodo Internet Security is also a firewall, so if you don't want to use the firewall feature, just download the Comodo Anti-virus program separately.)

 

If you have multiple anti-virus programs all with their real time scanning features turned on at the same time, it will slow down your computer. So only have one program with their real time /  background scanning feature turned on at any one time!

 

Read my blog here on Firewalls.

 

This will provide you with three virus checkers which will work together. Collectively, their combination will be far more effective than any single Windows virus checker. They should be virus signature updated, and run through your Windows computer regularly.

 

You are also faced with the fact that a lot of modern virus checkers are now flagging more files as viruses incorrectly. Flagging a file as a virus incorrectly is called a false positive. In my opinion, anti-virus vendors are panicking. Most of them now know that they have no chance with their present Windows technologies, of detecting anywhere near all the viruses and malware! Ironically, the hackers are submitting their creations to the Virus Total testing site, to see if their code will be detected as a virus. Now that is innovation for you!

 

What a ridiculous situation,. You will be spending a part of a day or so, every week, just updating and scanning with your virus checkers, to make sure your Windows OS is clean! Well all I can say is good luck, you're going to need it 🙂 Watch out for those false positives. A lot of our club members now use Linux for the Internet, and use Windows for other things. If you use Linux for the Internet make sure you have created a good root password, and have the firewall turned on and set up securely, plus constantly install all the latest distros updates, and patches. There are people in the club who will show you how to install Linux on your computer. You can have Linux and Windows loaded on a computer at the same time. This is called a dual boot system, you just make a decision which operating system you want to use at start up.

 

Criminal gangs are just laughing at our inability to protect our private and commercial IT infrastructure. The Chinese are smart, they have created their own secure operating system “Kylin” for their critical infrastructure computers. It is based on Linux / BSD.

 

© Peter Daley, 2009

 

Disclaimer: This is an amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site or at SCCC activities, without further research. Views expressed in the pages, images, or tutorials on the SCCC Inc., web site or presented at venues, maybe the personal opinions of the relevant writers or presenters, and are not necessarily representative of those of SCCC Inc.

 

Comments (1)
Categories : Computer Security

Get a good secure firewall!

By Peter Daley · Comments (0)
Friday, September 18th, 2009

Get a good secure firewall!

Get a good secure firewall on your Windows computer for free. For those who have no idea what a firewall is, it is like having a security guard at the entrance to a building, monitoring who is coming and going. The guard stops those entering the building who he sees as suspicious or dangerous, and prevents those leaving the building who may have broken in and be trying to steal something. A computer firewall basically a security guard for your computer.

Everyone, no matter what OS (Operating System) they are using, Windows, Linux or Apple, should be using a good secure firewall. Windows, from XP onwards, has a Windows firewall built into the OS. The stats suggest that the average Windows machine on the Internet without a firewall is hacked within minutes.

You can greatly improve your Windows security by using an alternative free or commercial firewall instead. There are lots out there. The question is which one to use? A lot of firewalls that are free or commercial are useless, and are not giving you any protection. On the Matousec firewall program rating page click on the "Products Rating" item, then scroll down to product rating list for a comparison of firewall products. This is to make sure your firewall is actually effective against the latest threats. Take note of the version that is being rated.  It is the version that has been tested is important, make sure you get the best rated version.

Purchased versions of the firewalls will often give you extra features over the free version, and with some deals support you if you are having difficulties, or issues using the product. At present the Comodo firewall it is rated as one of the best.

Important, if you want the free firewall versions of a recommended firewall program, go directly to the firewall creators web site, as the links at Matousec will direct you to the paid versions.

For example, to get the free Comodo firewall go directly to, https://www.comodo.com/

Because of the changing security environment, just like anti-virus software, the firewall has to be constantly updated and improved to protect you from the latest security issues.  The effectiveness of any firewall can change with time, so I suggest you check the Matousec site to see where your firewall stands in the independent firewall testing ratings from time to time. 

You can't have multiple firewalls running on your computer at the same time. Not only may they clash, they will drive you crazy with all the questions they will ask! If you find the popular security suite you are using has a firewall component rated as useless, then do this.
After you download and install one of the recommended firewall programs, turn off the security suite firewall feature, in its options or settings, then shut down, and restart the computer.
Yes, modern Windows firewalls are constantly asking you questions, and more questions, on whether something should be, or not be allowed to change something on your Windows computer. There is a firewall learning period. After it has been trained on what is safe or not, it will not ask as many questions. There are no easy answers to some of these questions.

These are the best general suggestions I can give you to deal with all those firewall questions.

If you are installing, un-installing or updating a software that has been virus checked, or you know is safe, Allow / Remember it in the firewall pop up when asked. In Comodo, it will give you the option to select “Treat this as an Installer / Updater.” Select this option if the program fits the above program profile. If in doubt, temporarily block the program in the firewall pop up options box and do a search engine search, Google / Yahoo etc., to see if it is malicious. (To temporarily block the program in the firewall, select Block in the firewall pop up options box plus un-tick the Remember / Permanent option until you find out if it is malicious or not.)

Good luck in the present security environment, you need it in my opinion, using a Linux or Apple computer on the Internet, is a much more peaceful experience at present.

 

© peter Daley 2009 (updated April 2015)

Disclaimer: This is an amateur volunteer run service. Human error can provide incorrect information, and equipment malfunction can produce false readings. Do not rely on, or take action upon information presented on this web site or at SCCC activities, without further research. Views expressed in the pages, images, or tutorials on the SCCC Inc., web site or presented at venues, maybe the personal opinions of the relevant writers or presenters, and are not necessarily representative of those of SCCC Inc.

Comments (0)
Categories : Computer Security, Computers
Next Page »

Recent Posts

  • PhoneGate Alert Update 2020!
  • Social Distancing Is Very Important!
  • Coronavirus COVID-19 & Flu Season, first line of defense!
  • Potential 110 Times Regulatory Exposure Limit For Children!
  • Modern Technology Eroding Freedom, Privacy and Health!
  • Legal Opinion & Duty of Care

The Food Lab

Subscribe for Periodic Alerts & Updates from The Food Lab on Radiation Contamination Testing in Food and the Environment
Please Ceck Your Email after Subscribing to Validate your Email Subscription.

Categories

 

Sunshine Coast Computer Club
Copyright © 2021 All Rights Reserved
Website Design by Website Design Centre
Powered by WordPress