Urban Psychosis hosted by Bobby Vicarious
Show #61# 9-6-2018
Call in 1-804-591-0046 | 00GO
World landlines - Mobiles US, Canada, Mexico
Please send feedback, ideas, topics
NEW CHAT "Urban Psychosis"
Purchase the archives - only $5.95 a Month
********* TOPICS *********
*** Re: Show #40# 4-12-2018
Post: # 1317Post timreek
Fri Aug 03, 2018 2:44 am
You guys should also hold a show educating newbies how to choose the best vpn and what are the main factors to consider while choosing a VPN.
*** A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together and provides a secure connection. - Examples - Think of it as a secure tunnel through which all communication flows. The data packets along with their routing information are encrypted and passed through the tunnel. All one sees from the outside is encrypted data moving between your PC, (or other device), and another address. They don't see the adress of where individual packets are going. Many people think encryption does this, but only data packets may be encrpted. The router information for every packet remains in clear text, because routers have to be able to read it to direct it to its destination. So others viewing this can't read your data because it is encrypted, but they can see every address you are connecting to. So if you are concerned that your internet provider is recording your connection data, use a VPN. But how do know your VPN provider isn't selling your connection data? Do your research and read the fine print in their privacy statement. BTW congress just passed a law allowing your internet provider to sell your connection data.
You can use a VPN to:
Bypass geographic restrictions on websites or streaming audio and video.
Watch streaming media like Netflix and Hulu.
Protect yourself from snooping on untrustworthy Wi-Fi hotspots.
Gain at least some anonymity online by hiding your true location.
Protect yourself from being logged while torrenting.
*** Public WiFi
I don't believe anyone should use public Wifi without a VPN. Did you know there is no encryption of your data between your device and the WiFi. This is a hackers paradise.
*** VPN criteria
Price - you get what you pay for
Performance vs your native connection
Number of devices supported concurrently
Torrenting policy Torrenting is Peer to Peer filesharing, the new tech lime wire
Number of servers & locations
Support for Netflix
Logging policy - look for "no loging" & read fine text in privacy agreement
One of the main reasons to use a VPN is to keep your information private, particularly while you’re browsing the Web. But before you get too comfortable, thinking this will keep prying eyes out of your personal business, know that some of the most popular VPNs are actually keeping logs on you, even after promising that they won’t.
As crazy as it sounds, that’s true. A new report claims that 26 of 115 of the most popular VPNs are keeping logs on you and your use of their service.
The Best VPN investigated 115 of the more popular VPN services and found 26 of them collected three or more log files that include personal and identifying information. This includes IP addresses, locations, bandwidth data, and connection timestamps.
This comes at an interesting time, when Facebook is being called out for sharing users’ data, making many want to drop the service. Yet another service they were counting on to protect their privacy has been holding onto their information. In fact the VPN industry is increasing in popularity. In 2014 it was a $45 billion business, and it’s expected to increase to $70 billion by 2019.
However, Ryan Lin’s information was being kept. The logs of his data were turned over to the FBI. He was using PureVPN, a service he believed was keeping his information private, yet they were keeping logs regarding him and gave up the info to the FBI.
But again, PureVPN isn’t the only one, just one of 26 of the tops VPNs – not all of them, just the most popular ones. If you’re concerned your VPN might be collecting information on you, visit the list to see if yours is mentioned.
NordVPN, on the other hand, is the most secure option we’ve found in our VPN testing. It keeps a strict no-logs policy meaning that, even if a government agency asked, NordVPN would have no logs to hand over.
It also uses best-in-class security with AES-256 encryption on all connections and support for OpenVPN, PPTP, L2TP/IPsec and IKEv2/IPsec. NordVPN uses a few double-hop servers for an extra layer of protection. These servers are a big reasons why it’s a pick on our best VPN for China list. You can read more about it in our NordVPN review.
Killswitches & DNS Leaks
There are two other important parts of VPN security that wouldn’t fit neatly into any other sections: leaks and kill switches.
Starting with the simpler of the two, a killswitch is a security feature that allows you to cut your connection to the internet in the event you get disconnected from the remote server. That way, you won’t get caught with your pants down.
A lot of VPN providers offer a killswitch, but some of the more mediocre options on the market do not. PIA, AirVPN, IPVanish and ExpressVPN are just a few of the many providers that offer a killswitch. Read our PIA, AirVPN and IPVanish reviews to learn more about these providers.
Leaks are a serious problem when using a VPN. The two main leaks you’ll encounter are IP leaks and DNS leaks. IP leaks are when you’re connected to the VPN, but your IP address still points back to your location.
In most cases, IP leaks are the cause of a WebRTC bug. VPNs that work in browser extensions should disable WebRTC when you enable the extension, but you can go and disable it yourself using another extension.
DNS leaks are when you connect to the VPN’s DNS servers but your web browser sends the request directly to your ISP anyway. DNS, the domain name system, is what allows IP addresses and domains to work. When you type a URL into your web browser, DNS translates your IP address and the server’s IP address so the two can connect.
When you connect to a VPN, your traffic should be redirected to an anonymous DNS. However, in some cases, your web browser will just send the request directly through your ISP’s DNS. This is a DNS leak.
We test IP and DNS leaks in each of our VPN reviews, so you can read through those to see which make the cut and which fall behind. There are a few ways to check yourself, though. You can see if there’s an IP leak by looking up your IP address and seeing if its changed or not, and check your DNS by using dnsleaktest.com or ipleak.org.
*** VPN URL's
--- Risks of Public WiFi ---
The risks of public Wi-Fi
https://us.norton.com/internetsecurity- ... wi-fi.html
Public Wi-Fi is not as safe as you think
https://us.norton.com/internetsecurity- ... think.html
HTTPS Everywhere | Electronic Frontier Foundation
Why Using a Public Wi-Fi Network Can Be Dangerous, Even When Accessing Encrypted Websites
https://www.howtogeek.com/178696/why-us ... -websites/
Firesheep - codebutler
Keep Your Windows Computer Secure on Public Wireless Hotspots
https://www.howtogeek.com/howto/26674/k ... -hotspots/
How to Protect Yourself on Public Wi-Fi | We Ask an Expert | Digital Trends
https://www.digitaltrends.com/mobile/ho ... lic-wi-fi/
Most people unaware of the risks of using public Wi-Fi
https://www.cnbc.com/2016/06/28/most-pe ... wi-fi.html
Dangers of Open WiFi - RouterCheck
Free Wi-Fi? Beware of security risks
https://www.usatoday.com/story/tech/201 ... s/2480167/
Staying safe on public Wi-Fi - CNET
https://www.cnet.com/how-to/tips-to-sta ... lic-wi-fi/
--- VPN Info ---
What Is a VPN, and Why Would I Need One?
https://www.howtogeek.com/133680/htg-ex ... -is-a-vpn/
What is a VPN? And why you should use a VPN on public Wi-Fi
https://us.norton.com/internetsecurity- ... a-vpn.html
What is a no-log VPN?
https://us.norton.com/internetsecurity- ... g-vpn.html
How a VPN can help hide your search history
https://us.norton.com/internetsecurity- ... story.html
How VPNs Work | HowStuffWorks
VPNs Are Supposed to Keep Your Privacy, But Some Keep Logs on You as Well - Make Tech Easier
https://www.maketecheasier.com/vpns-pri ... gn=2018w14
100+ VPNs & Their Logging Policy (What Logs Are Kept by Who?)
VPN Security: What You Need to Know to Stay Safe on the Web in 2018
https://www.cloudwards.net/vpn-security ... know/#four
What Are DNS Leaks and How to Avoid Them
Not All VPNs Are Safe – How to Tell If a VPN Is Secure - Make Tech Easier
https://www.maketecheasier.com/how-to-t ... n=07032018
How to Identify a Bad VPN - Make Tech Easier
--- VPN Service ---
Best VPN Services 2018 - Best Picks
https://www.pcmag.com/article2/0,2817,2 ... dium=title
Protect Your Online Privacy With the 5 Best VPNs - ExtremeTech
https://www.extremetech.com/internet/24 ... dium=title
Norton WiFi Privacy | Secure VPN Service For PC, Mac, Android & iOS
Best VPN for Torrenting 2018: Sailing Piratical Waters
ExpressVPN Review - Updated 2018
--- Other Info ---
What are computer cookies?
https://us.norton.com/internetsecurity- ... okies.html
What is Torrenting? 4 Things You Need to Know
--- Torrent Clients, Sites & Info ---
What Are Magnet Links, and How Do I Use Them to Download Torrents?
https://lifehacker.com/5875899/what-are ... d-torrents
Best Alternative Torrent Sites
µTorrent® (uTorrent) - a (very) tiny BitTorrent client
--- Extra Geek Stuff ---
How to Use Wireshark to Capture, Filter and Inspect Packets
https://www.howtogeek.com/104278/how-to ... t-packets/
What is OpenVPN?
https://openvpn.net/index.php/open-sour ... envpn.html
Connect to Your Home Network From Anywhere with OpenVPN and Tomato
https://www.howtogeek.com/60774/connect ... nd-tomato/
Boost Networking Performance by Installing Tomato on Your Router
https://www.howtogeek.com/59152/boost-n ... ur-router/
Welcome to the Tomato USB web site - TomatoUSB
Building A Raspberry Pi VPN Part One: How And Why To Build A Server - ReadWrite
https://readwrite.com/2014/04/10/raspbe ... -browsing/
Building A Raspberry Pi VPN Part Two: Creating An Encrypted Client Side - ReadWrite
https://readwrite.com/2014/04/11/buildi ... WBfWrt21bV
********* Books *********
*** "What Not To Say"
*** "Silicon Sunrise" https://www.sfsite.com/10a/sil42.htm
********* PC Tech *********
*** Talk about windows 10 & peoples fears + new features
*** Use a password manager like LastPass or other free ones
https://www.howtogeek.com/77319/the-how ... -lastpass/
Ctl+Alt+Del Task Manager
Processes sort on Name, CPU, Mem, Disk, Network & add columns
Learn by watching
Windows Problem Reporting 15% CPU for a long time
Telemetry Windows Insider
Activate Administrator user
Create an extra user ID besides yourself with admin privs
This is useful if something bad happens to your usual ID.
Show Hiden Files
uncheck Hide hidden OS files
Change for all folders
Otherwise you won't see BCD
You can change it back when you are done if you wish.
Make several copies of C:\Boot\BCD - ie (BCD.bkup1, BCD.bkup2, BCD.bkup3)
When windows won't boot, boot off another disk partition or CD
delete or rename BCD to BCD.bad, rename BCD.bkup3 to BCD
********* FREE SOFTWARE *********
Belarc Advisor Displays PC info & product key
Rufus is an easy to use portable software program for Windows devices to create
bootable USB flash drives using ISO images.
Aktiv MP3 Recorder
http://www.goforsharing.com/home-mainme ... u-130.html
LastPass (password manager)
https://www.howtogeek.com/77319/the-how ... -lastpass/
EasyBCD (Edit Boot Configuration Data, BCD)
http://www.uderzo.it/main_products/spac ... index.html
xxCopy - http://xxcopy.com/index.htm
Open Hardware Monitor - little window, I monitor temps, total cpu & fan speeds
Crystal Disk info - watch for HDD's or SSD's going bad, (Green, Yellow, Red)
Crystal Disk Mark - benchmark HDD & SSD
WSCC - Windows System Control Center, many useful utilities
EaseUS Data Recovery Wizard - recover deleted data
EaseUS todo backup - backup ur pc
EaseUS partition master
Microsoft File Checksum Integrity Verifier
The Microsoft File Checksum Integrity Verifier tool is an unsupported command line utility that computes MD5 or SHA1 cryptographic hashes for files.
https://www.microsoft.com/en-us/downloa ... x?id=11533
Ad blocker detected: Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker on our website.
1 post • Page 1 of 1