Latest Articles

hacked

Q: How do I find the owners of IP addresses trying to login to my home security system?

A: You, personally, do not have either the tools or the legal footing to do so. That said, law enforcement does have the tools (at least the tools to get your ISP to assist with linking IP address with individual computers). It is still required to get the legal...

Q: Why should we trust a VPN with internet privacy?

A: There is very little reason you should trust a VPN provider with your internet privacy. The vast majority of VPN providers are operating on the other side of ethics, or are outright criminal organizations. On the other hand, why should you trust anyone (priests...
National Security

Q: How can we balance law enforcement’s needs to investigate crimes with the need for stronger cyber security?

A: That balance already exists. Any weakening of cybersecurity for anyone, weakens cybersecurity for everyone. You cannot put the genie back in the bottle and eliminate AES 256 and all other end-to-end encryption. So, it remains the eternal cat and mouse game....
Online Security Technology

Q: Is it important to change security passwords occasionally?

A:  There are conflicting opinions regarding this within the IT security field. Here is my recommendation: Use strong passwords. Defined as 15 or more characters. Use a different password for each site or service. For your computer, enable full disc encryption...
Email Security

Q: How could someone hack my Gmail despite Google strict privacy settings?

A: First, what is the evidence that your account was compromised? More often than not, when a client comes to me saying they have been compromised, it is either a bug or misunderstanding of how something works. If in fact the account was compromised, how strict is...

New VORACLE Attack Vector Can Recover HTTP Data From VPN Connections

A new attack vector named VORACLE can recover HTTP traffic that is sent via encrypted VPN connections under certain conditions. The conditions appear to be: Use the OpenVPN protocol Visit an HTTP that is under control or compromised by the attacker Using OpenVPN...
National Security

John O. Brennan on Deadline White House, MSNBC

Trump has one-by-one been dismantling the leadership of the FBI. Now he is doing the same with the CIA. This outrageous action is taking place without a single Republican leader speaking out against it. Note that John Brennan doesn't just call up the CIA and say, "Hey...

Trump Removes Rules For U.S. Cyberattacks

On this, you must think, young Jedi. After a massive, effective, penetration of our 2016 national elections (probably by the Russian government), Trump is removing many of the cybersecurity protocols put into place by the previous administration. Now, why would this...

Google Tracks Your Location, Like It Or Not

As reported in an AP Exclusive, Google wants to monetize your data so badly, that for Android devices and iPhone users of Google Maps, Google Chrome, Google Search, and possibly other apps, even when Location Tracking is turned off, Google is still capturing your...
Android malware

Millions Of Android Devices Vulnerable Out Of The Box

A recently released DHS-sponsored study by Kryptowire has found that millions of Android devices are vulnerable to remote data harvesting, factory reset, and monitoring, all right out of the box–no need to accidentally download a malicious app or visit a compromised...

Because someone had to say it, and I was just standing around

I tip my Stetson to Dan Piraro of Bizarro Comics. Genius moment of the...

Vote as if your life depended on it

Every single day my staff and I battle criminals, enemy agents, malware, and wackadoodle ex's from compromising your security and privacy. I think we do an excellent job of it. There is, however, a limit as to how much we can do. One of those limits just hit you and...

Secure Your DNS

Domain Name System (DNS) Most activities on the Internet require pointing to a specific device by use of an address. For example, to use my email, the email software must be able to locate my email server. It does this by looking for mail.mintzit.com. While such...

FOR SALE: Ubiquiti UniFi Ethernet Switch 24 Port 250w PoE

Ubiquiti UniFi Switch 24 Port 250w Power over Ethernet New. In box. Currently selling on Amazon for $397. Specs MintzIT Price: $300 plus $25 shipping. Contact: Marc Mintz...

FOR SALE: Ubiquiti UniFi Security Gateway

Best-in-class network hardware Ubiquiti UniFi Security Gateway A great solution for business New, In box. Currently selling on Amazon for $108. Specs MintzIT Price: $65 plus $15 shipping. Contact: Marc Mintz...

FOR SALE: Ubiquiti UniFi AP AC Pro Access Point

Best-in-class network hardware. Ubiquiti UniFi AP AC Pro Access Point New. In box. 2 available. Currently selling on Amazon for $176. Specs MintzIT Price: $125 plus $20 shipping. Contact: Marc Mintz...
ASUS RP-AC68U AC1900 Access Point 1200x628

FOR SALE: Asus RP-AC68U AC1900 Wireless Access Point

MintzIT is clearing out our stock of new, best-in-class network equipment at great discounts. Asus RP-AC68U AC1900 Wireless Access Point New, never opened. 2 available. Currently selling on Amazon for $223 plus $21 shipping. Specs MintzIT Price: $175 plus $20...

… Because there are some fighting against us

We the people are the rightful masters of both Congress and the courts, not to overthrow the Constitution but to overthrow the men who pervert the Constitution. - Abraham Lincoln If you think your security and privacy are dependent upon only bits and bytes, think...
justice for all

Security & Privacy For All

True, full security and privacy for any of us will not be achieved until there is justice for all of...
windows 10 update

Windows 10 Security Essentials Update

Version 3.1.1 of Practical Paranoia Windows 10 Security Essentials was released today. The Live! version is available immediately. Kindle updates will appear tomorrow, with print versions appears on store shelves in the next 2 weeks.

Latest Books

Latest Reviews

A Great Step-By-Step Guide You'd be Foolish Not to Follow

5 star reviews

reviewsThis reviewer is a 60+, female, self-trained MAC user currently in OS10.8.1 and getting ready to buy a new MAC with Mavericks OS. I purchased and read Marc’s book cover to cover in preparation for understanding the scope of my commitment to get my new Maverick OS computer set-up in the most optimal way, for my home-use network. I want to get it hardened from the get-go. This was the best forty odd-dollar investment I could have made.Security book reviews

Practical Paranoia for the non-paranoid...

5 star reviews
reviews

I became a client of Marc’s five or six years ago when I said goodbye to Windows, became a Mac shop and put in an OS X server. So when Marc announced his new book, Practical Paranoia, I didn’t waste any time buying a copy.

The reason is simple, when Marc tells you something, you can take it to the bank.

The book is clean, well organized, designed to be completely accessible for the non-geek, and provides step-by-step screen shots and instructions on how to save yourself from the nightmare of data loss or breach.Security book reviews

 

Best Book on the Subject

5 star reviews
reviews

Easy to use – I did about half of the recommendations in under an hour. I’m a writer and I run a business from home. I’m not so technically adept. When I travel, I hate packing up all my equipment and putting things in storage to make sure that, in the unlikely event the house is robbed, all my data is safe and I could easily restart my business from a backup in the cloud. This book is a “paint-by-numbers” approach to security for every aspect of a computer system, from backups to email to encrypting the physical drives.

There’s really nothing else on the subject, unless you want to read technical blogs for days. This book has it all in one place and makes it easy for even a normal person (like me).Security book reviews