Rabu, 26 Agustus 2015

How to Prevent Your Local Searches From Being Sent Over the Internet

How-To Geek Newsletter
Did You Know?

They might look fluffy and ethereal but clouds are quite heavy; the average cumulus cloud (the big white cotton-candy-like ones you see on nice days) weigh 1.1 million pounds.

Geek Trivia

The Canary Islands Are Named After?
Frogs →
Dogs →
Snakes →
Birds →


Advertisement
Download 2015 Cloud Technology Kit (a $19.99 value) FREE for a limited time!
Kit includes "Hybrid Cloud for Dummies" plus 3 other resources to help you find the right combination of public, private, and data center resources to empower your business. Click here to download
Thoughts from the Geek

Samsung smart fridge leaves Gmail logins open to attack

The internet-connected device is designed to download Gmail Calendar information to an on-screen display. Security shortcomings mean that hackers who manage to jump on to the same network can potentially steal Google login credentials from their neighbours.

I would say that you shouldn’t trust a kitchen appliance maker with computer security, but this is Samsung. They should have tons of experience with this type of thing. So they don’t get a pass, this is bad. But at least security researchers are testing all of these internet-connected devices these days. It’s worth noting that this is the same company that makes a Smart TV that listens to your conversations and has the ability to send whatever you say back to their servers.

The main takeaway from this is that if you’re getting ready to head into college, cybersecurity is probably a good degree to go for, because there will be never-ending jobs in the computer security field.

How security flaws work: the buffer overflow

The buffer overflow has long been a feature of the computer security landscape. In fact the first self-propagating Internet worm—1988’s Morris Worm—used a buffer overflow in the Unix finger daemon to spread from machine to machine. Twenty-seven years later, buffer overflows remain a source of problems. Windows infamously revamped its security focus after two buffer overflow-driven exploits in the early 2000s. And just this May, a buffer overflow found in a Linux driver left (potentially) millions of home and small office routers vulnerable to attack.

I feel like almost every day I’m pushing a link to ArsTechnica in this column, and that’s because they often write articles that I wish we had done. This one is no exception — it’s an extremely detailed and technical look at what buffer overflows are and how they work at a very low level.

AT&T Hotspots: Now with Advertising Injection

While traveling through Dulles Airport last week, I noticed an Internet oddity. The nearby AT&T hotspot was fairly fast—that was a pleasant surprise. But the web had sprouted ads. Lots of them, in places they didn't belong. Curious, and waiting on a delayed flight, I started poking through web source. It took little time to spot the culprit: AT&T's wifi hotspot was tampering with HTTP traffic.

This is one of many reasons why you should always use a VPN whenever you connect to a public Wi-Fi hotspot. Using a VPN will protect you from ad-injection, people sniffing your packets, and generally make the web more secure. It’s well worth the couple of dollars per month.

When I have a decent 4G LTE connection on my iPhone, I usually share my internet connection with my other devices, but when I can’t do that, I use Private Internet Access if I need to connect to a public Wi-Fi hotspot. After testing a lot of different VPN providers, they had the fastest service for the best price, and a huge selection of servers to choose from, so I’m comfortable recommending them.


Geek Comic
2015-08-26-(begging-for-trouble)
Today's Tech Term

Lamer

Lamer is a slang term used to refer to individuals in online communities who are irritating, immature, behave stupidly, and/or uneducated in a particular topic area, etc.

What We're Reading from Around the Web

How to Print Hidden Text in Word

Word makes it easy to format text as hidden so it can't be viewed or printed. What if you want some text hidden on the screen, but you want to be able to print the hidden text? No worries, easily done.

Read This Article →


How to Manually Backup Your iPhone (in Preparation for iOS 9)

With iOS 9 and the launch of the new iPhone 6 model just weeks away, now has never been a better time to make sure that all the data stored on your iPhone is backed up and secure. In preparation for the big launch, we’ve written a guide on how you can get any important contacts, notes, texts, or music copied from your mobile device to a local hard drive or linked iCloud account.

Read This Article →


How to Prevent Your Local Searches From Being Sent Over the Internet

All modern operating systems — from smartphones and tablets to desktops and laptops — automatically send your local searches over the Internet and provide web results. But you can disable this, which is especially useful for protecting private searches.

Read This Article →


Why can Data be Recovered After Formatting?

If you are worried about data being recovered after formatting a hard-drive, do you need to go with an option as powerful as DBAN or will something less potent do just as well? Today’s SuperUser Q&A post has the answer to a curious reader’s question.

Read This Article →


How to Improve Fingerprint Recognition with Touch ID

Apple’s Touch ID is good. The ability to unlock your iPhone or iPad with your fingerprint is a a killer feature that doesn’t work as well on other devices. That said, it can always be better and improved very easily.

Read This Article →


How to Enable and Disable Email Notifications in Windows 10

Windows 10 includes enhanced app notifications that can display on the start menu, in the Action Center, and even on a flyout above the Notification bar. The Mail app uses the Windows notification system to notify you of new emails.

Read This Article →


How and Why to Encrypt Your Text Messages

With the NSA peering into everyone’s pockets without permission, nosy siblings snooping through your message history while you’re away, and there has never been a better time to start encrypting your text messages than there is today.

Read This Article →


How to Disable the "Get Office" Notifications on Windows 10

Windows 10 doesn’t include Microsoft Office, but it does include regular advertisements encouraging you to download it. If you don’t want to get Office on your Windows 10 PC, you can prevent those notifications from bothering you.

Read This Article →


Advertisement
Download The Analytics Revolution: How to Improve Your Business By Making Analytics Operational In The Big Data Era (A $32.99 Value — FREE!)
The Analytics Revolution gives you everything you need to implement operational analytic processes with big data. Click here to download

Tidak ada komentar:

Posting Komentar