Some useful free tools to keep you and your mobile device safer and more private.

Read the rest of this entry »

(The knee-jerk 2-step)

Examples of proud English “Nationalism” now legitimised and on display (knee-jerks turns rapidly into goose-steps).
http://www.bbc.co.uk/news/uk-36634786 – Nationalist (Neo Nazi) posters becoming common in cities.
http://www.bbc.co.uk/news/world-europe-36656348
 https://m.facebook.com/sarah.leblanc.718/albums/10101369198638985/?refid=52&__tn__=C
https://www.facebook.com/sarah.leblanc.718/media_set?set=a.10101369198638985&type=3

Read the rest of this entry »

Class-1 – SSL/TLS – S/MIME (Secure/Multipurpose Internet Mail Extensions)
Standard Email encryption for dummies.

Read the rest of this entry »

Due to the amount of controversy around the Enigma Software SpyHunter product, I decided it was time to review my Web Of Trust rating. by retesting the software.
https://www.mywot.com/en/forum/64166-defending-freedom-of-speech
https://blog.malwarebytes.org/security-world/2016/02/bleepingcomputer-defends-freedom-of-speech/
Read the rest of this entry »

p2p fileshare needs re-marketing as a powerful tool with many clear benefits for server and client use.

Problem is that almost all p2p programs pretend that what you access is “their exclusive network”, not just a protocol anyone can use.
Ever since Kaza most users are just simpletons that want to steal some music, and would never think that the first download they should look for in Limewire or Bareshare, is the pro version 😆
The fake Shareaza site is a good example. It continues that concept and makes it seem like you are getting access to their exclusive network, so you will pay for some free software.
Read the rest of this entry »

Here you will find Christmas music, that won't make you feel sick.
…Enjoy X …

Read the rest of this entry »

Streaming video

Posted: Oct 17, 2013 in Uncategorized
Tags:

Read the rest of this entry »

Web-Mail security

Posted: Sep 27, 2013 in Security
Tags:

Web-mail is a convenient way to access email if you are not using your own computer.
If you use your own device or computer, accessing your email with real email software is faster, more convenient to manage, and easier to keep secure.

Increasingly email providers use the web experience to scan your emails and show adverts based on the content.
If they do not have a warrant to scan your emails, they should not be looking at them.
Use web-mail only as a backup, not your first choice.

Read the rest of this entry »

Security

Posted: Sep 8, 2013 in Security
Tags:

Security related sites, and tools.

*This page is in Beta. …

Read the rest of this entry »

Online Anti-Malware

Posted: Jul 19, 2013 in Security
Tags: , , , ,

Read the rest of this entry »