Secure Your Communications NOW!
I receive at least one question every day regarding how to secure email communications. People are legitimately concerned that their email may be seen by crazy ex-boyfriend/girlfriend/gender-neutral lover, boss, rivals, or government. Let me put your minds at rest....
iOS 12 Security Essentials
Live Versions are updated in real time.
The best-selling, easiest, step-by-step, most comprehensive guide to securing your home or business iPhones and iPads. Completely revised and updated for iOS 12.
Q: Why can’t you trust people with your phone?
A: Your phone contains your private data, possibly sensitive business information, passwords, credit card information, banking information, a record of all calls, website visits, very possibly a map of your movement/travels over the past x months.
Q: Home wireless network that only I can detect?
A: Although you can disable SSID (the name of your network) visibility, any 8-year-old with 5 minutes of free time will figure out how to view invisible networks.
Q: Firewall Question Answered
A: A firewall can be located on your computer (part of the OS), or between your local area network and the internet. It is typically built into the modem/router provided by your broadband provider.
Q: How is ProtonMail encrypted?
A: ProtonMail uses PGP encryption. This end-to-end encryption protocol is highly secure, and prevents even ProtonMail from reading your mail.
Q: Is my ISP spying on me?
A: It is almost certain that they are.
Not like they have a person on the payroll to spy on your activities specifically, but virtually all ISP’s (ALL in the USA) log your activity, and most (if not all) sell this to marketing firms.
macOS 10.14 Mojave Security Essentials
Official workbook for the Practical Paranoia: Security Essentials Workshop. Designed for classroom, workshop, and self-study. The entire workshop is contained within the book. Includes all instructor presentations, hands-on assignments, links to all software, and security checklist.
Q: Can an email sender delete the email after being sent?
A: There are services available that can do this. Virtru is one we use.
However, standard email and email software don’t permit this.
Q: How effective is a ClamAV…
So, without testing and validation, it’s not possible to know how well it works, and what performance degradation it introduces. why would one use something so important to security and privacy?
Q: If the primary person on my iPhone account is…
A: Can they “hack” your phone? Not unless they have a spare $15,000-$1M US hanging around, or they know your PIN. However, if you have jailbroken the iPhone, you have removed all security from your device.
Q: How can I tell if my Mac has been compromised…
In the case of macOS, the firewall isn’t terribly vital. With the firewall off, you would still require an active process (application) waiting for and responding to commands coming in from outside the computer.
Q: Is it possible to hack a large number of adult sites…
A: In order for this to be possible, all of the sites would need to be running on the same operating system, using the same web server software, so that they would all be subject to the same vulnerability.
Q: What Antivirus Does Google Recommend?
A: Google has no recommendations for antivirus. However, one of the reasons I love Google for email is they use VirusTotal to scan all email.
Q: What Are The Symptoms Of A Malware Attack?
This almost entirely depends on the skill level of the malware developer. Malware crafted by a skilled developer will be invisible to the end user, and invisible to the network administrator for quite some time.