Show #61# 9-6-2018

Moderator: Bobby_Vicarious

Post Reply
User avatar
Posts: 36
Joined: 10 Nov 2017, 22:14

Show #61# 9-6-2018

Post: # 1393Post Bobby_Vicarious
06 Sep 2018, 10:23


Urban Psychosis hosted by Bobby Vicarious
Show #61# 9-6-2018
Call in 1-804-591-0046 | 00GO
World landlines - Mobiles US, Canada, Mexico

Please send feedback, ideas, topics
NEW CHAT "Urban Psychosis"

Purchase the archives - only $5.95 a Month

********* TOPICS *********

Urban Psychosis

*** Re: Show #40# 4-12-2018
Post: # 1317Post timreek
Fri Aug 03, 2018 2:44 am

You guys should also hold a show educating newbies how to choose the best vpn and what are the main factors to consider while choosing a VPN.

*** A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together and provides a secure connection. - Examples - Think of it as a secure tunnel through which all communication flows. The data packets along with their routing information are encrypted and passed through the tunnel. All one sees from the outside is encrypted data moving between your PC, (or other device), and another address. They don't see the adress of where individual packets are going. Many people think encryption does this, but only data packets may be encrpted. The router information for every packet remains in clear text, because routers have to be able to read it to direct it to its destination. So others viewing this can't read your data because it is encrypted, but they can see every address you are connecting to. So if you are concerned that your internet provider is recording your connection data, use a VPN. But how do know your VPN provider isn't selling your connection data? Do your research and read the fine print in their privacy statement. BTW congress just passed a law allowing your internet provider to sell your connection data.

You can use a VPN to:
Bypass geographic restrictions on websites or streaming audio and video.
Watch streaming media like Netflix and Hulu.
Protect yourself from snooping on untrustworthy Wi-Fi hotspots.
Gain at least some anonymity online by hiding your true location.
Protect yourself from being logged while torrenting.


*** Public WiFi
I don't believe anyone should use public Wifi without a VPN. Did you know there is no encryption of your data between your device and the WiFi. This is a hackers paradise.

*** VPN criteria
Price - you get what you pay for
Performance vs your native connection
Number of devices supported concurrently
Torrenting policy Torrenting is Peer to Peer filesharing, the new tech lime wire
Number of servers & locations
Support for Netflix
Logging policy - look for "no loging" & read fine text in privacy agreement

One of the main reasons to use a VPN is to keep your information private, particularly while you’re browsing the Web. But before you get too comfortable, thinking this will keep prying eyes out of your personal business, know that some of the most popular VPNs are actually keeping logs on you, even after promising that they won’t.

As crazy as it sounds, that’s true. A new report claims that 26 of 115 of the most popular VPNs are keeping logs on you and your use of their service.

The Best VPN investigated 115 of the more popular VPN services and found 26 of them collected three or more log files that include personal and identifying information. This includes IP addresses, locations, bandwidth data, and connection timestamps.

This comes at an interesting time, when Facebook is being called out for sharing users’ data, making many want to drop the service. Yet another service they were counting on to protect their privacy has been holding onto their information. In fact the VPN industry is increasing in popularity. In 2014 it was a $45 billion business, and it’s expected to increase to $70 billion by 2019.

PureVPN’s logs actually led to a man’s arrest, logs that they say in their privacy policy they’re not keeping. They say they “have no record of your activities such as which software you used, which websites you visited, what content you downloaded, which apps you used, etc., after you connected to any of our servers.”

However, Ryan Lin’s information was being kept. The logs of his data were turned over to the FBI. He was using PureVPN, a service he believed was keeping his information private, yet they were keeping logs regarding him and gave up the info to the FBI.

Despite it being made public that they’re keeping logs, PureVPN still does, yet their privacy policy still claims that they don’t. The study determined they are keeping names, email addresses, phone numbers, IP addresses, bandwidth data, and connection timestamps.

But again, PureVPN isn’t the only one, just one of 26 of the tops VPNs – not all of them, just the most popular ones. If you’re concerned your VPN might be collecting information on you, visit the list to see if yours is mentioned.

NordVPN, on the other hand, is the most secure option we’ve found in our VPN testing. It keeps a strict no-logs policy meaning that, even if a government agency asked, NordVPN would have no logs to hand over.

It also uses best-in-class security with AES-256 encryption on all connections and support for OpenVPN, PPTP, L2TP/IPsec and IKEv2/IPsec. NordVPN uses a few double-hop servers for an extra layer of protection. These servers are a big reasons why it’s a pick on our best VPN for China list. You can read more about it in our NordVPN review.

When choosing a VPN provider, you should glance over the privacy policy to see how it handles logs. Read our VPN reviews to see how a provider handles your data.

Killswitches & DNS Leaks
There are two other important parts of VPN security that wouldn’t fit neatly into any other sections: leaks and kill switches.

Starting with the simpler of the two, a killswitch is a security feature that allows you to cut your connection to the internet in the event you get disconnected from the remote server. That way, you won’t get caught with your pants down.

A lot of VPN providers offer a killswitch, but some of the more mediocre options on the market do not. PIA, AirVPN, IPVanish and ExpressVPN are just a few of the many providers that offer a killswitch. Read our PIA, AirVPN and IPVanish reviews to learn more about these providers.

Leaks are a serious problem when using a VPN. The two main leaks you’ll encounter are IP leaks and DNS leaks. IP leaks are when you’re connected to the VPN, but your IP address still points back to your location.

In most cases, IP leaks are the cause of a WebRTC bug. VPNs that work in browser extensions should disable WebRTC when you enable the extension, but you can go and disable it yourself using another extension.

DNS leaks are when you connect to the VPN’s DNS servers but your web browser sends the request directly to your ISP anyway. DNS, the domain name system, is what allows IP addresses and domains to work. When you type a URL into your web browser, DNS translates your IP address and the server’s IP address so the two can connect.

DNS leak
When you connect to a VPN, your traffic should be redirected to an anonymous DNS. However, in some cases, your web browser will just send the request directly through your ISP’s DNS. This is a DNS leak.

We test IP and DNS leaks in each of our VPN reviews, so you can read through those to see which make the cut and which fall behind. There are a few ways to check yourself, though. You can see if there’s an IP leak by looking up your IP address and seeing if its changed or not, and check your DNS by using or

*** VPN URL's

--- Risks of Public WiFi ---

The risks of public Wi-Fi ... wi-fi.html

Public Wi-Fi is not as safe as you think ... think.html

HTTPS Everywhere | Electronic Frontier Foundation

Why Using a Public Wi-Fi Network Can Be Dangerous, Even When Accessing Encrypted Websites ... -websites/

Firesheep - codebutler

Keep Your Windows Computer Secure on Public Wireless Hotspots ... -hotspots/

How to Protect Yourself on Public Wi-Fi | We Ask an Expert | Digital Trends ... lic-wi-fi/

Most people unaware of the risks of using public Wi-Fi ... wi-fi.html

Dangers of Open WiFi - RouterCheck

Free Wi-Fi? Beware of security risks ... s/2480167/

Staying safe on public Wi-Fi - CNET ... lic-wi-fi/

--- VPN Info ---

What Is a VPN, and Why Would I Need One? ... -is-a-vpn/

What is a VPN? And why you should use a VPN on public Wi-Fi ... a-vpn.html

What is a no-log VPN? ... g-vpn.html

How a VPN can help hide your search history ... story.html

How VPNs Work | HowStuffWorks

VPNs Are Supposed to Keep Your Privacy, But Some Keep Logs on You as Well - Make Tech Easier ... gn=2018w14

100+ VPNs & Their Logging Policy (What Logs Are Kept by Who?)

VPN Security: What You Need to Know to Stay Safe on the Web in 2018 ... know/#four

What Are DNS Leaks and How to Avoid Them

Not All VPNs Are Safe – How to Tell If a VPN Is Secure - Make Tech Easier ... n=07032018

How to Identify a Bad VPN - Make Tech Easier

--- VPN Service ---

Best VPN Services 2018 - Best Picks,2817,2 ... dium=title

Protect Your Online Privacy With the 5 Best VPNs - ExtremeTech ... dium=title

Norton WiFi Privacy | Secure VPN Service For PC, Mac, Android & iOS

Best VPN for Torrenting 2018: Sailing Piratical Waters

ExpressVPN Review - Updated 2018

--- Other Info ---

What are computer cookies? ... okies.html

What is Torrenting? 4 Things You Need to Know

--- Torrent Clients, Sites & Info ---

What Are Magnet Links, and How Do I Use Them to Download Torrents? ... d-torrents

Best Alternative Torrent Sites

µTorrent® (uTorrent) - a (very) tiny BitTorrent client



--- Extra Geek Stuff ---

How to Use Wireshark to Capture, Filter and Inspect Packets ... t-packets/

What is OpenVPN? ... envpn.html

Connect to Your Home Network From Anywhere with OpenVPN and Tomato ... nd-tomato/

Boost Networking Performance by Installing Tomato on Your Router ... ur-router/

Welcome to the Tomato USB web site - TomatoUSB

Building A Raspberry Pi VPN Part One: How And Why To Build A Server - ReadWrite ... -browsing/

Building A Raspberry Pi VPN Part Two: Creating An Encrypted Client Side - ReadWrite ... WBfWrt21bV


Sheila's 1%


********* Books *********

*** "What Not To Say"

*** "Silicon Sunrise"

********* PC Tech *********

*** Talk about windows 10 & peoples fears + new features

*** Use a password manager like LastPass or other free ones ... -lastpass/

Ctl+Alt+Del Task Manager
Processes sort on Name, CPU, Mem, Disk, Network & add columns
Learn by watching
Windows Problem Reporting 15% CPU for a long time
Telemetry Windows Insider
Activate Administrator user
Create an extra user ID besides yourself with admin privs
This is useful if something bad happens to your usual ID.
Change File-Options-View
Show Hiden Files
uncheck Hide hidden OS files
Change for all folders
Otherwise you won't see BCD
You can change it back when you are done if you wish.
Make several copies of C:\Boot\BCD - ie (BCD.bkup1, BCD.bkup2, BCD.bkup3)
When windows won't boot, boot off another disk partition or CD
delete or rename BCD to BCD.bad, rename BCD.bkup3 to BCD

********* FREE SOFTWARE *********
Belarc Advisor Displays PC info & product key
Rufus is an easy to use portable software program for Windows devices to create
bootable USB flash drives using ISO images.
Aktiv MP3 Recorder ... u-130.html
LastPass (password manager) ... -lastpass/
EasyBCD (Edit Boot Configuration Data, BCD)
Notes Holder
Space Sniffer ... index.html
xxCopy -
Open Hardware Monitor - little window, I monitor temps, total cpu & fan speeds
Crystal Disk info - watch for HDD's or SSD's going bad, (Green, Yellow, Red)
Crystal Disk Mark - benchmark HDD & SSD
WSCC - Windows System Control Center, many useful utilities
EaseUS Data Recovery Wizard - recover deleted data
EaseUS todo backup - backup ur pc
EaseUS partition master
Microsoft File Checksum Integrity Verifier
The Microsoft File Checksum Integrity Verifier tool is an unsupported command line utility that computes MD5 or SHA1 cryptographic hashes for files. ... x?id=11533

Post Reply

Return to “Urban Psychosis”