Tor Story 2

This is the second of a three-part series of articles about TOR.  On Monday we took a look at the surprising origins of the TOR network.  Today we will be taking a look at how TOR works.

HOW TOR WORKS

To use TOR, a person just needs to go to The TOR Project , and download an install the TOR web browser. Then it makes sense to read the TOR warning document. The rules include:

  • Use the TOR browser
  • Don’t torrent ...
Continue Reading →
0

Tor Story 1

TORlogoTOR or The Onion Router is one of the greatest anonymizer services available on the Internet, and allows anyone to use the Internet without revealing their source IP address, and through that, their location. Yet as recently as last November, when the FBI took down the Silk Road server and arrested its operator , and Interpol followed up with the seizure of 400 Dark Web marketplace sites and the arrest of ...

Continue Reading →
0

Data and Goliath by Bruce Schneier – A Review

I finished Bruce Schneier’s latest contribution to the realm of corporate and governmental surveillance. This book is a great read if you want to understand just who IS spying on you. Turns out it is not just the NSA, but big corporations are collecting all data they can on customers and potential customers, and this information is sold and exchanged. Then there is the unholy alliance between corporate American and Big Government surveillance.

At the end, he recommended solutions in the ...

Continue Reading →
0

Google My Account Helps Control Your Privacy

As ironic as it may seem, since Google knows more about us than even the NSA, Google has stepped up with a new tool called My Account to help people control their online privacy.  If you have been lamenting the loss of personal privacy in the Internet age, here at last is something you can do about it.  It may not address all your concerns, but here is a start.

You will be able to control Sign-in and Security, Personal ...

Continue Reading →
0

Have a WordPress Site? Better Secure It!

WordPresslogoWordPress has become an incredibly popular web design platform, and currently has about a 25% share of all web sites on the Internet.  As an open-source software product that is free to download and use, with a great support and documentation through WordPress.org, and a huge, international development community providing an endless array of themes, plug-ins and widgets, it is easy ...

Continue Reading →
0

Cost of Breach Per Record At $217

The new Ponemon Institute 2015 Cost of Data Breach report was released recently.  This report looks at the costs of 2015 large enterprise class data breaches, but there are some salient pieces of information for small business owners to consider when formulating their cyber security risk management plans.

The average cost per record lost in a data breach increased from $201 in 2014 to $217 in 2015.  Different sorts of records had different costs associated to them.  For instance, more detailed ...

Continue Reading →
0

Your Brain Waves Could Be Your Password

brainwavesWe have been relying on the trusty password for years, but as password cracking technologies improve, even longer and more complex passwords are being solved and sold on rainbow tables.  So passwords are for the most part over.  Two factor authentication is possibly a solution, but biometrics are becoming a big part of what is next in the field of user authentication.  We have already seen fingerprint scanners on some laptops, ...

Continue Reading →
0

Privatoria – TOR Plus

TOR, or The Onion Router is a method of surfing the Internet anonymously.  TOR uses a chain of proxy servers and redirection to keep the original IP address (your IP) and hence your identity a secret.  One of the problems with using TOR is that there is a bit of a learning curve, and your Internet browsing speed will likely be reduced to the speed of the slowest Internet connection to one of the proxies in your chain.

There is a ...

Continue Reading →
0
Page 40 of 44 «...1020303839404142...»