.comment-link {margin-left:.6em;}

Old Army's Blog

My Life and Opinions about life in Nevada & now Texas!!!

Name:
Location: Texas, United States

I am a Retired Army guy, who is old fashioned and progressive. You know a living oxymoron! My Favorite blogs: http://jetiranger.tripod.com/BLOG/ & http://www.usinkorea.org/

Thursday, April 27, 2006

Kids outsmart Web filters

As yet another reason to monitor your children's internet usage. The children of today's generation are so much more technologically savvy than say those of us in my age bracket.

I spend a lot of time trying to stay up on current problems as it is kind of my job now but there are some teckie things that I don't understand right away so I have to find a kid ( someone under 30) to explain it to me.

Examples: Ipod, setting the clock on the aftermarket CD player. It is second nature to them and they do in 30 sec what takes me the better part of an hour. I do learn and try to stay ahead of my kids but also do not let them know how I do some of my stuff like hiding web logs, not giving them admin privileges on my PC's. When they have a computer question they come to me most of the time.

It is an interesting article and hopefully will demonstrate the need for parental/adult control. Do read some of the comments. One in Particular talks about they only cared about getting through to their application be it My Space or Music. The reason is that kids do not understand that there are people who do nothing but collect info which is one of the problems with My Space, posters have never heard of TMI (To Much Information).

It is amazing what you can get from a few words that will let lead you to more information from a different location. Some adults are just as guilty as the kids and especially women who post too much info that not everyone in the world needs to know.

Wednesday, April 19, 2006

Observations of Texas

I have been back in Texas for over 6 months and thought it was time for some of my observations of the Fort Worth Area. The housing boom is alive and well here although I think that may slow down a bit with the interest rates climbing and many 1-3 year old houses on the market. I am happy I bought at the right time. The property taxes here are way too high what I paid a year in Oklahoma I pay a month here. Even Nevada the property taxes are half of what they are here. The State legislature has been trying to fix it since 2002. They are still trying but will probably resolve it as this is an election year and lowering property taxes is good for those trying to be reelected.

Now on to Texas Drivers. If you ask any one who lives in DFW what is the purpose of the speed limit sign you will get a response of either "That is a suggested speed" or "That is the minimum speed" They obviously believe that as if you go 60 or even 65 in a 65 zone you get people glaring at you, giving you the 1 finger salute. Also if you want to move over a lane do not put on your turn signal as that is the freeway signal to close in that lane so you cannot get in. This is not as bad in Fort Worth as it is in Dallas. Everyone wants to go as fast as possible many not caring about who they cut off until they cause an accident. I will write more later on politics here.

Wednesday, April 12, 2006

Phishing (fishing)

You also might like to read this story from Fox News. It talks about how the Mafia (Russian and European) are getting involved to steal information!


Phishing unlike fishing is not fun for all as we are the fish in this case! What is phishing? Well the short version is it is unscrupulious people trying, by tricking you to go to a web site that will steal your data or getting you to load, unknowingly, software that will compromise your information. Below are suggested prevention tips I have pulled from several sites on the web. Feel free to post a comment if you have a question or if you find the links do not work.

* If you get an email or pop-up message that asks for personal or financial information, do not reply. And don't click on the link in the message, either. Legitimate companies don't ask for this information via email. If you are concerned about your account, contact the organization mentioned in the email using a telephone number you know to be genuine, or open a new Internet browser session and type in the company's correct Web address yourself. In any case, don't cut and paste the link from the message into your Internet browser — phishers can make links look like they go to one place, but that actually send you to a different site.

*Use anti-virus software and a firewall, and keep them up to date. Some phishing emails contain software that can harm your computer or track your activities on the Internet without your knowledge. Anti-virus software and a firewall can protect you from inadvertently accepting such unwanted files.
Anti-virus software scans incoming communications for troublesome files. Look for anti-virus software that recognizes current viruses as well as older ones; that can effectively reverse the damage; and that updates automatically.
A firewall helps make you invisible on the Internet and blocks all communications from unauthorized sources. It's especially important to run a firewall if you have a broadband connection. Operating systems (like Windows or Linux) or browsers (like Internet Explorer or Netscape) also may offer free software "patches" to close holes in the system that hackers or phishers could exploit.

*Don't email personal or financial information. Email is not a secure method of transmitting personal information. If you initiate a transaction and want to provide your personal or financial information through an organization's website, look for indicators that the site is secure, like a lock icon on the browser's status bar or a URL for a website that begins "https:" (the "s" stands for "secure"). Unfortunately, no indicator is foolproof; some phishers have forged security icons.

*Review credit card and bank account statements as soon as you receive them to check for unauthorized charges. If your statement is late by more than a couple of days, call your credit card company or bank to confirm your billing address and account balances.

*Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer's security.

*Forward spam that is phishing for information to spam@uce.gov and to the company, bank, or organization impersonated in the phishing email. Most organizations have information on their websites about where to report problems. You also may report phishing email to reportphishing@antiphishing.org. The Anti-Phishing Working Group, a consortium of ISPs, security vendors, financial institutions and law enforcement agencies, uses these reports to fight phishing. note: if you get spam on your web or local ISP they have a way to report to them. This assists them in updating spam lists and keeps others from getting this kind of mail.

Action you can take: If you believe you've been scammed, file your complaint at ftc.gov, and then visit the FTC's Identity Theft website at http://www.consumer.gov/idtheft/. Victims of phishing can become victims of identity theft. While you can't entirely control whether you will become a victim of identity theft, you can take some steps to minimize your risk. If an identity thief is opening credit accounts in your name, these new accounts are likely to show up on your credit report. You may catch an incident early if you order a free copy of your credit report periodically from any of the three major credit bureaus. See http://www.annualcreditreport.com/ for details on ordering a free annual credit report.

Tuesday, April 11, 2006

Protect your privacy: 10 simple steps

Here is an article orginally written by Jeff Wuorio. I have modified it a little and made a few corrections but it is 99% his work.

For excellent info on how to protect you home PC try this link! While you are there go to the CERT home page where they have a lot of good information to keep you informed of latest news to keep you safe on the internet.

Here is an article from Fox News "It's All Geek to Me!"
posted 14 April 2006 OA

Protect your privacy: 10 simple steps

By Jeff Wuorio

“Personal privacy” may be the biggest oxymoron of the 21st century. From annoying streams of e-mail spam to the more insidious and costly crime of identity theft, Americans are facing an attack on their personal privacy unlike that seen by any prior generation. Shielding your privacy with no risk of a breakdown may be impossible these days. It is critical to understand how your privacy can be compromised and the consequences of such a breach -- and take a few simple steps to, if nothing else, better the odds in your favor.

Identity theft booming this rather broad topic takes in any number of privacy crimes, including theft of a Social Security number, a credit or debit card, or even the pilfering of phone calling cards. The numbers associated with identity theft are beginning to add up fast. A recent General Accounting Office report estimates that as many as 750,000 Americans are victims of identity theft every year. And that number may be low, as many people choose not to report the crime or, for that matter, even know they’ve been victimized.

Below info is a little dated as you can almost double the numbers for 2006!
In November 1999, the Federal Trade Commission’s Identity Theft Data Clearinghouse was fielding about 455 calls a week. Two years later, that number had jumped to more than 3,000. · MasterCard and Visa estimate that more than $114 million in credit-card related identity theft occurred in 2000 (not as stinging as it might seem, as those numbers represent less than one-tenth of 1% of annual sales volume). The government, which has a broader definition of identity theft, puts the number closer to $1 billion now. In one study by two California identity theft groups, victims spent an average of 175 hours per incident trying to unravel the problems caused by identity theft.

How it can this happen? Officials say much of identity theft still comes down to hands-on mischief -- things like ‘Dumpster diving’, in which criminals sift through trash to find a credit-card statement or solicitation that someone didn’t tear up, and 'shoulder surfing', where criminals try to spot calling card and personal identification numbers. Knowing which tricks thieves prefer remains a quantifiable mystery. “80% of the victims who call us say they have no idea how it happened,” says Joanna Crane, program manager of the Federal Trade Commission’s Identity Theft Program Officials also acknowledge that the Internet has opened new avenues for theft. If nothing else, the Web allows thieves to send stolen data to most any worldwide location.

One popular scam involves fake mortgage brokers who dangle super low rates if the applicant is quick to provide personal data. Still another uses e-mails in which the sender poses as an Internet service provider asking for information: “Even though people are told that ISPs will never ask for your Social Security number, one scam was just shut down after 70,000 people responded to their e-mails,” notes Crane.

As if the cost of some restaurant meals isn’t unsettling enough, there’s the infamous “skimmer”. “A skimmer is about the size of a credit card,” says Ellen Moriwaki, a senior product manager at CyberSource, a payment processing and risk management concern. “And a criminal buys off a waiter in a restaurant. When you give him your credit card, he rings it up but also runs it through the skimmer, which collects your credit card information. In exchange for $50 a card, a waiter can gather as many as 100 credit cards a night.” A Social Security card can also reap long-term fraudulent benefits. Virgil Gardaya, a corporate vice president with the credit bureau Equifax, notes that a stolen wallet containing a Social Security card lets a criminal quickly set up dummy bank and savings accounts. The very presence of the account may prompt the bank to give the criminal a credit card. From there, the con artist may waste little time maxing out the card, or take a bit more time and build up the card's buying power. That can mean fraudulent purchases as pricey as cars and boats. “When I moved five years ago, I was alerted that two new accounts had been opened up under my name,” adds Gardaya. “They actually had statements being delivered to two different addresses.” Simple ways to protect yourself There’s no ironclad protection that guarantees that you’ll never fall victim to some form of identity theft. But there are steps you can take to shield your privacy, many of which are rather simple:

* Destroy private records and statements. Tear or, if you prefer, shred credit card statements, solicitations and other documents that contain private financial information.

*Empty your mailbox quickly so criminals don’t have a chance to snatch credit card pitches. Consider locking your mailbox. Note: Consider paying your bills online with your bank it is much safer than letting that check sit in your mail awaiting the mail man with the flag up.

*Don’t carry your Social Security card with you, or any other card that may have your number.

*Don’t put your number on your checks. Leave your driver’s license number off your checks as well.

*Never leave ATM or gas station receipts behind.

*Worried about credit card skimming? Pay with cash as often as possible.

*When making an online purchase, look in the lower right hand corner of your browser window. If you see the icon of a lock, that means you’re dealing with a secure site. If you don’t see one, you’ll be safer finding another merchant. Also, check out Web site privacy policies. Shy away from sites that don’t specifically say that they won’t pass your name and information around to others. Note: Even that lock down the bottom can be faked make sure you deal with sites that you know.

*Stick to well-known retailers or sites that others have used to their satisfaction. Use only one credit card for online purchases. That way, if something amiss happens, it’ll be easier to spot on your bill.

*Be more defensive with personal information. Ask salespeople and others if information such as a Social Security number or driver’s license is absolutely necessary. Ask anyone who does require your Social Security number, for instance, your insurance company, what their privacy policy is and whether you can arrange for the organization not to share that information with anyone else.

*Check your credit report at least once a year to look for suspicious activity. If you spot something, alert your card company or the creditor immediately.

*Investigate credit bureau protection services. For instance, Equifax offers Credit Watch, which alerts you any time a change take place with your credit report.If something goes wrong Again, protecting yourself from security fraud is no sure thing.

There is plenty you can do if you uncover some wrongdoing:
*First, contact the fraud departments of each of the three major credit bureaus. Tell them that you're an identity theft victim. Request that a "fraud alert" be placed in your file, along with a victim's statement asking that creditors call you before opening any new accounts or changing your existing accounts. EquifaxTo order a report: 1-800-685-1111 or write: P.O. Box 740241, Atlanta, GA 30374-0241 To report fraud: 1-800-525-6285 and write: P.O. Box 740241, Atlanta, GA 30374-0241 ExperianTo order a report: 1-888-EXPERIAN (397-3742) or write: P.O. Box 2104, Allen, TX 75013 To report fraud: 1-888-EXPERIAN (397-3742) and write: P.O. Box 9532, Allen, TX 75013 TransUnionTo order a report: 800-916-8800 or write: P.O. Box 1000, Chester, PA 19022To report fraud: 1-800-680-7289 and write: Fraud Victim Assistance Division, P.O. Box 6790, Fullerton, CA 92634.

*Contact the creditors for any accounts that have been tampered with or opened fraudulently. Speak with someone in the security or fraud department of each creditor, and follow up with a letter.
*File a report with your local police or the police in the community where the identity theft took place. Get a copy of the police report in case the bank, credit-card company or others need proof of the crime.

*Keep records of everything involved in your efforts to clear up fraud, including copies of written correspondence and records of telephone calls. De-spamming yourself, whether a mere annoyance or a lucrative venue for thieves, solicitations via phone, mail or the Internet may seem an inescapable element of modern life, but like other privacy issues, there are steps you can take to mitigate the problem.

First, the Direct Marketing Association maintains a service through which consumers can remove themselves from mail, phone and e-mail solicitation lists used by association members. Here’s the drill:
· To get off the mail list, write to Mail Preference Service, Direct Marketing Association, P.O. Box 9008, Farmingdale, NY 11735. When giving your name, use full names, nicknames and any other combination that a solicitor may use.

· To get off the phone list, send your name, address and phone number to Telephone Preference Service, DMA, Box 9014, Farmingdale, NY 11735. Make sure you provide all phone numbers you may use.

· To zap unwanted e-mail, fill out the DMA registration form. To access that form, clink on the link at left.

You also might want to try these tips:

· If you get an unwanted e-mail, don’t click the “remove me” option that many such mails offer. In many cases, all that means is that the mail has hit an active address, which only means more solicitations.
· Set up an e-mail garbage address. Use one e-mail address for transactions and other activities that may lead to spam. Use another for all private communication.
· Besieged by telephone solicitations? Just tell them not to call again. The Telephone Consumer Protection Act of 1991 stipulates that they have to do so if you ask. If they happen to call again, you may be able to sue them for $500 in a “private right of action” in local court.
· Contact your credit card company and find out how to take part in their “opt out” program. This prevents your name from being passed around to solicitors and other companies with whom your cardholder deals.

Monday, April 10, 2006

My Space

PC Mag Story Business Week Story NY Times These stories show the press My Space is getting. Most of it is not good but any press is better than no press!

MSNBC had an interesting write up on My Space, click on the Title link to go to the article. Much of it is trying to show how kids feel so safe but that they are giving too much info out. This is a problem not only with My Space profile but with all the others out there. It is incumbent upon the user to be judicious in what they do and do not give out.

I think more pressure should be placed on parents to look at what their kids are putting on the net. The big problem is many of the kids are very internet savvy and the parents have little time or inclination to see what their kids are doing. My thoughts are if I am paying for the connection then what you do on my connection is my business. So the kids screaming "my privacy!" have no leg to stand on.

If you have a chance go to My Space and take a look at the profiles in your area. I did a search to see people my age as I just moved here and found 14 & 15 year olds (listing themselves as 41&51) you can tell just by the way they write and the VeRNacUlAr they use. It can be a danger to young people and even young women to give out that much info as there are many sick people on the web. Now that Rupert Murdoc owns My Space they will care even less about it unless it is a threat to their bottom line.