Lockdown.co.uk - The Home Computer Security Centre

LockDown is the source for security information and resources for the home computer user.

Features

Categories

About


Google
Web www.lockdown.co.uk   

Trusting Microsoft

Filed under: July 15, 2013

John C. Dvorak wonders why anyone would want to use Microsoft

Microsoft, despite denials, appears to be in bed with the NSA. Apparently all encryption and other methods to keep documents and discussions private are bypassed and accessible by the NSA and whomever it is working with.

[...]

With that said, do you really want to buy a Microsoft product? Do you want to buy anything that gives easy access to snoops poking around at their leisure?

[Read the full article] at [PCMag.com]


Justifying Mass Surveillance: A Fallacious Myth

Filed under: March 04, 2009

“Regardless of whatever safeguards may have been implemented to safeguard your personal information, it’s a question of when — not if — said data will end up being corrupted or lost.”

From infopackets


Watchdog Group Slams Google on Privacy

Filed under: June 11, 2007

From washingtonpost.com (via slashdot)

In a report released Saturday, London-based Privacy International assigned Google its lowest possible grade. The category is reserved for companies with “comprehensive consumer surveillance and entrenched hostility to privacy.”


Read the full article at washingtonpost.com

Read the report by Privacy International


Four ways to hide information inside image and sound objects

Filed under: May 22, 2007

From Linux.com:

Ever find yourself with too many passwords to remember and no idea where to keep them so that only you can find the password list? Creating a password.txt file in your root directory is out of the question, as is a password-protected OpenOffice.org file. A piece of paper hidden somewhere is not a good idea, because after you forget where did you put it, someone else will find it and abuse it. Instead of these approaches, consider using steganography, a method for hiding sensitive information inside some other object, typically a JPEG picture or a sound file.


Read the full article at Linux.com


Escaping the data panopticon: Prof says computers must learn to “forget”

Filed under: May 10, 2007

From ars technica (via slashdot):

“If whatever we do can be held against us years later, if all our impulsive comments are preserved, they can easily be combined into a composite picture of ourselves,” he writes in the paper. “Afraid how our words and actions may be perceived years later and taken out of context, the lack of forgetting may prompt us to speak less freely and openly.”

Read the full article at ars technica


Real-World Passwords

Filed under: December 14, 2006

Bruce Schneier has written an interesting peice about the passwords people use.

How good are the passwords people are choosing to protect their computers and online accounts?

Read the full article at Schneier.com


The Death of Privacy

Filed under: September 07, 2006

Jeffrey Rothfeder at Ziff Davis CIO Insight has written an article about how companies treat their customers privacy.

“The general disinterest in doing little more than the bare minimum to shield consumer privacy extends well beyond companies that are closing up shop.”

Read the full article at CIO Insight


Look At All Of These Passwords!

Filed under: August 22, 2006

From A Day in the Life of an Information Security Investigator:

If you use any number of popular web forums or even some commercial services like classmates.com, amazon.com, netzero.com or your provider’s webmail service, you may not be aware that you’re sending your credentials over the internet in the clear.


Read the full blog post at Day in the Life of an Information Security Investigator


Protecting your Identity from theft

Filed under: August 15, 2006

Canada.com has an article entitled ‘Keeping Your Identity on a Short Leash’ in which Terry Cutter a Certified Ethical Hacker

“The dangers of information and identity theft are many, but by following a few very simple rules, people can drastically lower their odds of being victimized.”

Read the full article at Canada.com


FAQ: Protecting yourself from search engines

Filed under: August 09, 2006

CNet News.com have published a FAQ written by Declan McCullagh that has helpful search engine privacy advice.

“Search engines place a multibillion-dollar infrastructure at the hands of any random user who stops by their Web site. The price you pay, however, is that the company may hold on to your search queries–which can provide a glimpse into your life–forever.”

Read the FAQ at C-Net News