The EFF has made a you might be interested in. Entitled, “Letter to FBI Requesting More Time to Respond to Proposed Privacy Act Exemptions for Next Generation Identification“, its quite a mouthful, but its also quite important. Give it a read, and decide for yourself if you need to make your voice heard! https://www.eff.org/files/2016/05/30/request_for_30_day_extension_to_cpclo_orders_no._003-2016_and_002-2016_-_final.pdf
Hostageware – Part 1 What we’ve been predicting for a year now has finally come to pass. The most pernicious malware today immobilises an infected computer, encrypts its files and then demands a ransom to release them. If not paid within 12 hours or so, the computer’s content gets obliterated. To make sure the hapless victim gets the message, a bright red clock begins the count down. Being right is over-rated 🙁 So, what can you do? How can you protect yourself now and in the future? Listen in! And when you’re ready, click here for Part 2!
Hostageware – Part 2 What we’ve been predicting for a year now has finally come to pass. The most pernicious malware today immobilizes an infected computer, encrypts its files and then demands a ransom to release them. If not paid within 12 hours or so, the computer’s content gets obliterated. To make sure the hapless victim gets the message, a bright red clock begins the count down. Being right is over-rated 🙁 So, what can you do? How can you protect yourself now and in the future? Listen in! In case you missed it, you can click here for Part 1!
Computers 101: E-cycling – Part 1 Marty McMahon from Maui County’s Electronic Recycling Program joined Jonathan, LD, and Sam to go over the history of our island’s excellent eCycling program, plus its future! Got questions? He went over quite a bit about recycling your old electronics! Ready to listen to Part 2? Click here!
E-Cycling – Part 2 We continue where we left off! Looking for ideas on how to recycle your computer? Sure, you can eCycle it, but you can also give it a new job! We look at not only prepping your computer for eCycling but ways to use old computers! Missed Part 1? Click here!
Apple vs .Gov, the roundup Hour two continues the ongoing story of Apple vs the Government. Ben brings his perspective on this tricky, multifaceted issue along with Jonathan and LD! If you missed hour 1, click here to listen to Computers 101: So You’d Like To Learn More?
Flash Security (again!) For hour one we talked about Flash! The once invaluable browser plugin had another bad news day this week, and we covered what you can do about it!
This show was a grab bag! Hour one? What’s Coming for Apple? Are you looking forward to a new iPad or Mac? Or curious about Apple vs the FBI? We talk about that as well as go over the week’s news in tech!
Hostageware and Cryptowall What a revolting development! The bad guys are still working 24/7 to make everyone’s lives worse, and to that end there’s a NEW version of Cryptowall. What does it do? What makes it worse? We spend our first hour talking about this horrible piece of Hostageware so you can better prepare yourself in case the worst happens!
First off, if you need help with making a password? Jonathan’s Patent Pending Password Algorithm™ is here to help! Take a phrase that you say a lot like “May The Force Be With You” or “The Quick Brown Fox Jumped Over The Lazy Dog.” Take the first letter off of each word, and only capitalize the first letter. So, Mtfbwy or Tqbfjotld. Add your favorite number at the end, then an exclamation point or something else. Mtfbwy1! or Tqbfjotld9!. Split it in half, and put in the initials for whatever you’re contacting in between. So, for Bank of Hawaii? You could use MtfBOHbwy1 or TqbfBOHjotld9. Using this formula, you’ll have the same password for every site you go to, but have a unique password for every site! Next, if you shop on Amazon, they have enabled a new security feature! Two-Factor Authentication means the bad guys need more than just your password to do bad stuff with your account! In addition to your password, Amazon will make use of your cell phone by either texting you a security code or letting you use an authenticator app. Want to set it up? PC World has an easy article on how to do it. http://www.pcworld.com/article/3006262/security/how-to-protect-your-amazon-account-with-two-factor-authentication.html