Jump to content
Killersites Community

LSW

Moderators
  • Content count

    1,353
  • Joined

  • Last visited

  • Days Won

    7

Everything posted by LSW

  1. The Issue of Net Neutrality

    Here are a couple of videos that may explain it and how it can effect you, better than I have. Here's What You Need To Know About Net Neutrality - Screen Junkies News What is net neutrality and how could it affect you? - BBC News
  2. I am posting this as I feel it is an important issue. You may not have heard of it or simply not really know what it is about. Briefly, the Net Neutrality rules state that High-speed Internet is a utility that all Americans have equal right too. My Internet has to be the same speed as yours. If this is removed, it will mean, for example, that my ISP could charge services for speed. You may watch Netflix at high-speed because they paid for it and Hulu did not so it keeps buffering and snagging etc. Another form of this is poor people get slow speed internet (remember that from the 80's?) while rich people can afford high-speed Internet. The claim is that it will make new jobs, but how often is that the fact? The truth is the ISP and others stand to make lots of money serving the richer and the poorer will get a poorer internet experience. This is coming to a vote soon. Trump wants it gone and it is an Obama legacy. Whether it is to wipe away another Obama legacy, or to increase the wealth of his big business buddies or if Trump really believes it will make new jobs, I do not believe it to be a win for the people and most people do not seem to believe so either. The Internet is now a human right and all should have equal access to it in my opinion. I cannot support ending Net Neutrality anymore than I could support censorship like the Great Firewall of China. If you are an American, read these and do your own investigation and then if you agree, sign a petition or call/write your congressional and house representatives and let them know you do not agree. The vote is before the Holidays. The New Net Neutrality Rules (From 2016) What Net Neutrality Rules Say I'm on the FCC. Please stop us from killing net neutrality A Lump of Coal in the Internet’s Stocking: FCC Poised to Gut Net Neutrality Rules Most Americans Support the Net Neutrality Rules that Trump’s FCC Wants to Kill Investigate it yourself and make an informed decision as to if you think it will benefit the people. Just please do it soon.
  3. The Issue of Net Neutrality

    Well, as I feared, it is official. Net Neutrality has been repealed in the US. ISPs are now free to play Netflix fast and Hulu slow if one pays more. They can block new technologies from wide usage if they feel they or a partner is working on another competing technology. They can block you from accessing any sites they may not agree with so no more planned Parenthood info if the ISP is owned by Pro-life businessmen or maybe or pro-drugwar ISPs can block web access to marijuana shops in states where it is legal. Of course you can always vote with your wallet, drop your ISP and access a new one you trust or offers what you want... if you are lucky. But those of you in Rural areas may not have another choice. Our Internet access came down to two companies, so we went with the one that we did not hate, but the one we hated bought the smaller one so now they are the only choice in town and they can now control what I have access too. If you think it is not a big deal, remember there was a time when Facebook was a startup and we had no neutrality law and a certain major player ISP banned Facebook from their services as it was competing with some idea of their own. Facebook may never have come into existence without the neutrality laws. So what new technology or service will we never have now because of the whims of big business? But more than a few groups are swearing the fight is not over yet.
  4. For those of you using DirtectTV, there is a risk that could allow attackers access to your system and network. Zero-Day Remote 'Root' Exploit Disclosed In AT&T DirecTV WVB Devices https://thehackernews.com/2017/12/directv-wvb-hack.html I have not discussed this issue yet as it can be a tad complicated for those who have never dealt with your routers yourselves. It may be a good idea to talk to someone in "The Know" or discuss it with your ISP support team. The real issue here is IoT (Internet of Things), all the gadgets that are being developed to use the internet. The folks who create your OS generally think about security. The folks who develop your router think about security. But does the developer of all this IoT crap think about security? Did the software developer for you internet connected coffee machine, pace maker, iBarbecue thing think about security? Likely not... so time and time again researchers and bad actors have found ways to bypass the best security people thought they had by hacking a unprotected IoT device. This is another example how hackers can get into your network through your Smart TV. For those of you who like a challenge, find a way to limit your IoT things contact to your network. It needs access to the Internet, but no other devices, it needs no access to your computers or tablets and phones. This way if compromised, the attacker can't do much of anything. Another way is to replace your Router's firmware with an opensource software with something like DD-WRT. Routers can do much more for security if you understand them, but their firmware is "Simplistic" for the average user. By getting more control with other software you can create two networks, your main network and a locked down network for just IoT devices with no contact to your personal devices.
  5. Let me toss this out: Sha1 is outdated and easy to crack. You should use Sha-256 at a minimum for user protection.
  6. Read this and you will see why it is a bad idea. I get it, passwords are hard to remember when you have lots of them or you change them a lot. But the disturbing thing here is that of this 1.4 Billion passwords, many are still active as the authors discovered. Also, remember to check periodically if your passwords etc. have been stolen and posted online: https://haveibeenpwned.com/ Collection of 1.4 Billion Plain-Text Leaked Passwords Found Circulating Online https://thehackernews.com/2017/12/data-breach-password-list.html
  7. For HP Users:

  8. For HP Users:

    Just a heads up to HP owners. This is one of those situations where this is not really a security issue, but it is a privacy issue if you are sensitive about your privacy or control over YOUR PC. First the article: HP Silently Installs Telemetry Bloatware On Your PC - Here's How to Remove It https://thehackernews.com/2017/11/hp-computers-telemetry-data.html Now some of you may quite legitimately ask what the big deal is. There are a few points here, none of which may have any meaning if you don't worry about your privacy or have different views on what makes up your idea of your privacy. For those people who do have an issue with this, here are some reasons why: Telemetry: Telemetry can mean different things depending on who collects it, NASA space shot telemetry is a different thing in many ways. For us, this is data about your machine. This can clearly be useful for HP, telling them as an example that "XX many HP users still use Vista", "XX% of HP machines with this patch level have over a 47% more chance of crashing when this and that software are installed". This is all good info, no arguments. Privacy Part 1: One issue is "What are they collecting and how does it ID me?" Normally this is not PII data of course, SSN, DOB etc., but it is still a form of Fingerprint. A fingerprint if of no use on its own, It would mean nothing to Wyatt Earp in the 1800s, but today and together with data bases it is a crime solving tool. Your PC fingerprint can be used to identify it by the way it is set up, what is on it, and various IDs like your IP address will tell them where it is, the MAC address will tell them exactly what Manufacturer made a part. this is some of what identifies my PC right now from your device you are reading this on. Alone the MAC address can lead someone to the serial number of the PC, that is connected to a payment for that PC which leads to me and the IP gives my general area of Alaska. It is like cop shows where they place random details in the trash together to get an idea of who the suspect is and what they are likely to do by profiling them. Privacy Part 2: Another issue aside from not knowing what data they are collecting, is the fact that they are doing so without our consent. Aside from legality and public domain legal arguments, just set all that aside... answer these questions and ask yourself if you feel the same about HP collecting data without your knowledge? If you see some (clearly not homeless or starving) person going through your trash, would you be upset? If I asked your permission to go through your trash, would you likely say yes or no (aside to thinking I am weird)? MY PC!: This is my PC, I decide what software goes on it and when it runs. HP intentionally put there software on "my" machine and they decided when it would run and what it collects, all without asking me! Again, imagine looking out your window and seeing guys in Ford branded clothing, opening up your Ford vehicle with some sort of "command key" and installing something... and then getting is a car and driving away, not saying a word to you. MY PC/Changed Result: Now take the above, but your neighbor sees it. You get into your car, get on the highway, give it the gas and... your car will not go above 55. You think something is wrong and you go home and your neighbor tells you what they saw. You open the hood and find a throttle installed without your knowledge or permission? Alaska would not be so bad as we are a 55 mph state, but Michigan is 65 mph last I looked and that would suck! Now this example is not quite the same because HP is not intentionally slowing your PC as it seems to have done according to some people in the article, but the result is the same. Gamers pay big bucks for fast PCs, I pay big bucks for fast internet, and now an app I did not want or even know about is slowing my machine down. If you read may older posting s on web design and accessibility you will find a common thread, "Let the user choose what they want". The best example of this is building a website that plays music automatically. Can my connection handle the extra load? Is it costing more money in fees? Is it music I even like? Is it now playing over top of the music I was listing to already? Can I even hear it? Maybe my speakers are off? In the end this is not a security update, or a patch, or anything that even helps the owner? No, it only helps HP and they placed on PCs without the users knowledge or consent and it slowed many down. It should have been announced, and it should have been voluntary, and it should be easily and quickly deletable if it effects the machine. That is why it is a big deal for many people and yet it may not bother others. Never force things on the users, let us use free will.
  9. Music while coding

    I almost always listen to music, and music of all sorts. European Goth mostly, but bagpipes as well and sometimes Native American or Celtic. It has little to do with what I am doing either, more my mood. If I am angry then a lot of Linkin Park, if mellow then classical or Native. If my cubicle mate next door is being obnoxiously loud then we get into Bagpipes or death metal... something loud to drown him out. In the end it depends on the person, some can do anything with any type of music. Some like Stef says depends on what they are doing. Some other folks may need silence. I simply don't like all the background noise and conversations around me so music of any sorts drowns it out so I can concentrate. Silence makes it hard for me to concentrate as I get bored, that is the ADHD coming through.
  10. Microsoft Issues Emergency Windows Security Update For A Critical Vulnerability https://thehackernews.com/2017/12/windows-update-malware-protection.html
  11. If anyone at Killersites builds Android mobile apps or knows someone who does, take note of vulnerabilities is the development tools. https://thehackernews.com/2017/12/android-development-tools.html
  12. Cybersecurity News

    I have decided to make the Data Breaches section it's own post as it is getting rather long and it shows just how insecure your data is from even some of the best known companies. Do not give up info to anyone who really does not need it. Just these headlines as of 12/6/2017 show over 273 Million people's data has been compromised. Data Breaches Insider Allegedly Steals Mental Health Data of 28,000 Patients (San Antonio, Texas) [12/7/2017] Uber Paid 20-Year-Old Florida Hacker $100,000 to Keep Data Breach Secret [12/7/2017] Massive Breach Exposes Keyboard App that Collects Personal Data On Its 31 Million Users (virtual keyboard app, AI.type) [12/6/2017] Stanford University server exposes data of 10,000 staffers [12/6/2017] PayPal Subsidiary Data Breach Hits Up to 1.6 Million Customers [12/4/2017] NOTE: This was the TIO Platform and not PayPal, PayPal just owns them since July 2017. They claim it does not effect PayPal customers. Uber's British Breach Tally: 2.7 Million Victims [11/30/2017] Imgur Warns: Old Breach Compromised 1.7 Million Accounts [11/28/2017] Did Uber Break Breach Notification Minimum-Speed Limits? [11/28/2017] Uber Concealed Breach of 57 Million Accounts for a Year [11/22/2017] Forever 21 Warns Shoppers of Payment Card Breach at Some Stores [11/16/2017] Malaysia Stung by Massive Data Breach Affecting Millions [11/3/2017] How Top Companies Accidentally Leaking Terabytes of Sensitive Data Online WebSites Found Collecting Data from Online Forms Even Before You Click Submit US Defense Contractor left Sensitive Files on Amazon Server Without Password Viacom Left Sensitive Data And Secret Access Key On Unsecured Amazon Server Passwords For 540,000 Car Tracking Devices Leaked Online Amazon's Whole Foods Market Suffers Credit Card Breach In Some Stores Disqus Hacked: More than 17.5 Million Users' Details Stolen in 2012 Breach Blood Test Results Exposed in Cloud Repository This is getting too stupid, so I am giving Equifax their own list Equifax Equifax Hack Exposes Personal Info of 143 Million US Consumers Equifax Data Breach: Steps You should Take to Protect Yourself Equifax Suffered Data Breach After It Failed to Patch Old Apache Struts Flaw Whoops, Turns Out 2.5 Million More Americans Were Affected By Equifax Breach Equifax: 15.2 Million UK Records Exposed Equifax, TransUnion Websites Served Up Adware, Malware
  13. Cybersecurity News

    Please bare with me as I figure out how best to handle the articles for easy viewing. As for now, I am closing this Topic in order to create replies that deal with each possible subject and will just edit that topic with new articles as I get them. If you have an article you feel should be added, just let me know.
  14. The Issue of Net Neutrality

    Here is a Good look at why non-US killersites members should be paying attention. This reviews Net-Neutrality from a Canadian view, not the US vote of the FCC, but in general, the whole general subject faced by Canadians. Threat To Net Neutrality Hits Canada In a New Form
  15. The Issue of Net Neutrality

    What the world looks like without net neutrality... - Jan. 2014 Net Neutrality Explained - Wall Street Journal Feb. 2015 Now this may be funny, they make some good points about the rules: Net Neutrality II: Last Week Tonight with John Oliver (HBO) - May 2017
  16. The Issue of Net Neutrality

    This is a keynote speech sponsored by "New America" and makes some very good points. He goes into the history of why these rules were created. How ISPs blocked start-up companies like Facebook and google and the like because the ISP were working on their own services or were partnered with others who were creating services and so all competition was blocked. For those of you not in the US, this is still important, because you may have such issues in your countries or such laws to stop such actions. If we lose our rights, that could be used by your ISPs to argue for changes in other countries. Total Eclipse of the Net: The End of Net Neutrality? - New America
  17. Cyber Warriors Fight USAF's Most Active, and Secret, War http://www.airforcemag.com/MagazineArchive/Pages/2018/January 2018/Cyber-Warriors-Fight-USAFs-Most-Active-and-Secret-War.aspx Again, as I have stated before in different places here, Cyber Security is a case of National Security. It is estimated that the US will be missing some 3.5 million jobs in cyber security by 2021 and in the meantime Pres. Trump suggests joining the Russians for cyber security. If you, family, or friends are looking to get into a new field, cyber security is a great place to go. Have kids join the military for cyber training and experience any big company will love to hire later. For those not in the US, every nation now has cyber security embedded into their military and every nation is going to need cyber security in the coming years.
  18. Is Your DJI Drone a Chinese Spy? Leaked DHS Memo Suggests https://thehackernews.com/2017/12/dji-drone-china-spying.html This article falls into the area of IoT (Internet of Things) and how with so many things becoming connected to the internet we are losing control over what data is collected. For my point here you can drop China (although that is a concern) and concentrate on the larger picture. To you these UAVs (Un-manned Aerial Vehicles) are often little more than toys or just a hobby like RC Aircraft... but with today's technologies they can be used to pinpoint points of interest. Are any of you aware of a US Airstrike a few years ago on an ISIS headquarters? Some little putz with a smart phone took a photo of himself with his assault rifle and posted the photo online. That was picked up by intelligence and as he had not turned off tagging, the phone GPS tagged the photo and gave the US the HQ direct location and in less than 48 hours a airstrike hit it killing some high ranking commanders. In another (accidental) case years ago, a power station failed. The load must then be spread in the system causing other smaller stations to fail, their loads in turn exceeded the draw on larger nets and the cascade effect finally knocked out power grids in the upper east coast, as far west as Michigan and as far north as into Canada. Millions without power for days. Now just as an example, add these three stories together. I live near a small power center, I fly my UAV (Drones are military un-manned targets) and GPS is collected as well as the fact it is flying around a power station. A few others do the same and the adversary now knows where they are to within a few feet. They hack in, or physically break in, bring down the stations so the power defaults to other lines that then collapse and whole grids begin to fail. We can argue all day about the likelihood of this, but it is a very real threat, it is possible regardless of how unlikely you think it is. It is merely a precautionary tale. This is also not including the fact that these UAVs are collecting personal data on you. Always limit as much info going out about you as possible from any IoT, app or device.
  19. Ok you all know about " " or ' '. You may use them often. But are you using them right? First let us look at the different forms of using Quotes: Quoting a person's comments - "LSW is the greatest web designer of all time". You agenerally write this with an accreditation. Stef said "LSW is the greatest web designer of all time". Now we know how Stef feels *grin*. Sarcasm or highlighting - Now let us move the quotes, LSW is the "greatest" web designer of all time. Now one can say that you are saying I am the greatest, but highlighting the Greatest to suggest that you do not feel this way or using sarcasm. Stef said "LSW is the 'greatest' web designer of all time", now you can easily see Sref?s look of contempt as he says it. Or it can in other sentences mean that the word is special. Stef said "LSW is the greatest 'accessible' web designer of all time", in this case it is not sarcasm, here you can say Stef thinks I am not the best designer of all time, but I am the best accessibility designer of all time. Also highlighting in a form of separating text from the surroundings. But that is the easy part. now let us look at the web specifically. Miss use One of the most misused tags on the net is . Time and time again I see it used by people instead of paragraphs because they like the default style of blockquotes. But Blockquote has a meaning and you are confusing people possibly when you misuse it for formatting, that is what CSS is for. So when do you use them? - is a inline element really meant for being used inside paragraphs and sentences. - is a block level element, a stand alone block of text and must include block-level elements such as headings, lists, paragraphs or divas. - now this is tricky as few agree. Some think it should not be used. Some claim it is replacing and better than while still others say it is for use when you are for instance not quoting something spoken, but more like if you were to cite a section of a book or something of that nature. When you use these tags people expect a text from a third person or source and reference to who said/printed it. By simply using it to format text visually you can confuse non visual users when the software interacts with that text in a different way. Credit You can give credit in different forms like "Stef said...", "in a article at Killersites.com....". However HTML gives us another form. It is the cite attribute.
  20. Let us imagine I have gotten you riled up or just interested in Cyber Security, what now? Well I am preaching it and trying to convince you all that It is very important There is a major need for it There is big money in it But we at Killersites are simply here to help each other and the community. So here is how to help your community by helping teach Cyber Security: Announcing the Security Education Companion Security Education Companion by the Electronic Frontier Foundation (EFF) It is there to help you set up lessons and offers materials and tips. Air Force Association Cybercamps There are other ways as well like Air Force Association Cybercamps for kids. Even Canadians take part in CyberPatriot so I assume the camps can be in Canada too. Computer Clubs Many schools have computer clubs as well so track them down and offer to help the teacher in charge. If you think your starting to late or to old (your not), then at least try to recruit & train the next generation of cyber security specialists.
  21. CSS Specificity Wars

    Ah! My friend Malarkey! He was a big help back when I was doing web design. Always had good articles and good ways of explaining things although this one I have never seen. He is always worth reading. Really look around his stuff folks, you will likely not regret it.
  22. OK, then just try the ../, that takes you out of the folder you are in and the page should be in the next folder up. So lets say folder 1 has GoodWork.html and inside folder 1 is folder 2 with page 2 folder 1/GoodWork.html folder 1/ folder 2/page2.html <li><a href=“../GoodWork.html”>Home</a></li> The ../ Takes me away from page 2 out of folder 2 into folder 1 to enter GoodWork.html. Does that make any sense to you?
  23. I have mentioned this before and must do so again so that you understand what we are speaking about when discussing Security vs. Privacy. Also let me state that I often come across a bit judgmental, that is not my intention here. Win 10 is a very solid and well secured OS, but not good for those looking for privacy and anonymity. Privacy vs. Security At a quick glance you will think that they are more or less the same, and that would be the case if we were speaking of material privacy. If your Laptop is secure than your Private photos remain private. But in cyber security we are speaking of privacy as a concept, not a thing. In this case it breaks down like this: Security: This generally speaks to your machine, hardware and software. It deals with Trojans, worms, viruses, adware, malware, ransomware, as well as system vulnerabilities like un-patched or old software, old anti-virus signatures. Keeping permissions tight, keeping access blocked, etc. Privacy: In this case we are talking about you rather than your things. Privacy is about protecting your data, not giving out your SSN, not posting embarrassing photos, not letting other know what you are doing. It is about the information and actions and beliefs that make up you. The basis of all cyber security considerations is which of these two things is most important to you? It is not about choosing one or the other, they are very much entwined, but you will always have to choose between which one weights more in your worries. That decision will often form your choices. If you are a political dissident, if you have a secure PC, but you announce your name online you will be arrested and jailed and any adversary with your hardware will eventually crack it. If you protect your identity online, the government will not who to arrest and not get your machine. So, Privacy is more important, though you would protect your PC too. Windows 10 – Go for it or hold off? So, we come back to Windows and my question above: What do you care more about? If you go out and get a new PC, it will likely have Win 10. The question is then, do I simply accept IU am forced to have Win 10? Do I wait until the next generation of Windows? Or do I simply purchase or change my OS to another type, Like Linux? Here is a break down for you and why the question is so important. I will go Positive first as I am not trying to influence you as it is a personal choice, you just need to understand what is at stake. Security Win 10 is getting some praise by the traditionally anti-Microsoft security experts. 10 is proving to be a major change for Microsoft, it is solid and far more secure than any other Windows in history. Remember that Windows has always been “Dumbed Down” for the users. They want it ridiculously easy to use so you’re the user do not have to think, just point and click. This however has resulted in decisions that, although making your life easier, also made the system massively insecure. Granted, it was also conceived in a time period where nobody saw a real need for security. Here are just a couple reasons I can think of off the top of my head why Windows has finally become more secure. Security and ease of use rarely go hand in hand. Virtualization-based security: Greatest thing to hit Windows since they started using Windows. Most of you know what virtualization is. You install a Virtual Machine and then you can run any type of Operating System (OS) on that machine. So, you boot into Windows, open your VM and you can run a Linux computer on your Windows machine as an example. Win 10 uses a version of this to run much of it’s security virtually, so even if a hacker gets into your admin account, that does not give them the needed permissions to change many major settings. This is a major change for Microsoft and something the security field has been preaching for years. Virtualization is one of the keys to security keeping different parts of the system separate from each other. You can imagine it as a virtual sandbox. Defender Application Guard for Edge: This is another example of Virtualization. Cyber security is a technical field mostly and I try to keep from getting to deep in the technical stuff with you as most of you may want to be safer but now follow the technical stuff. Basically, Application Guard decides if the web site you visit can be trusted. If it is Edge shows it as usual, if not, you still see it as usual, but the web site is shown in a virtual browser and anything bad it includes is unable to infect your browser or the machine. Here is a Happy & Bubbly video on how it works for users. Device Guard: Virtualization again shows its power with this tool. It uses the “Zero Trust Model” where everything is considered untrustworthy. You then “Whitelist” apps you trust or know where they came from. Traditional security counts on having a signature of “Bad” software, so new threats are not recognized as threats. This way everything is considered a threat until proven otherwise, so new threats do not get through. All software must be signed, from Microsoft, the developer, or now you can vouch for software you trust. Using virtualization keeps any malware that reaches the system from running code that will write or change code to the Kernel of the OS programming. Device Guard will also work hand in hand with AppLocker which is in Windows since Vista and can be used to limit permissions to applications. How Windows Defender Device Guard features help protect against threats NOTE: Currently Device Guard only works on High-end editions like Enterprise, Business and maybe Education editions. It does require some hardware etc. that supports the technologies used. Many producers have signed on to support this technology, but they have not shipped such machines, so at this time the average Home edition user will not be able to take advantage of this tool. High-end computers may be able to if they run high-end editions. There are more things making Win 10 the most secure operating system form windows yet, these are just a few real worthwhile mentions. You can see more at: What's new in Windows 10. Privacy This is a completely different matter. As mentioned above, ease of use & security rarely works well together, nor does ease of use and privacy. Here I look at it from both a security point of view and generationally. I am an old guy, so I come from a different world and cannot understand all this linking of stuff. A Phone and a camera are two different things, so why combine them, which was my opinion with the iPhone 1 announcement. Along those lines, why would I go on Facebook and post a selfie of me and my dinner while telling everyone following me what I am eating and at what restaurant at this moment. Who cares? And why would I want to follow anyone anyways? But the millennials and later, it is simply the way things are and what you do. Win 10 is made in the image of Millennials, or at least what Microsoft thinks they want (rather than need). The result is, we get things like the required addition of a Microsoft controlled email to use the OS fully. More and more Microsoft in creeping into our private lives. Win 10 is riddled with Apps that identify you, they track you, they call home and let MS know where you are, what you like, and much more data about you which MS then uses to target you for advertising and among other uses, makes a profit off you. This is why you must decide what is more important, a secure OS or an OS that phones home without your knowledge and permission to tell businessmen everything about you just so you can use Skype with fewer clicks. That is the reason it all depends on you, if you want security and do not care about secret communications between your machine and MS, you just want easy access to all your social tools, then Win 10 will work for you. If your privacy is important and you don’t like this idea of MS possibly spying on you, then go with another OS or wait and see if we privacy advocates can force MS to back off and respect our privacy in the next OS. Here are some privacy examples for you: Synchronization is the default. Everything synchronizes with Microsoft to include, web sites you visit, passwords, personal data, browser history, hotspots, software settings etc. Do you trust MS with your user IDs and passwords? Do you visit sites that maybe you do not want others, especially strangers to know you visit? Each instance of Win 10 gets a unique Advertising ID to customize advertising you receive to your interests. They do not do this to be nice, advertisers pay them good money to target you with their advertising based on what you surf to or for. Cortana Data Collection, seriously, was your life so difficult before Cortana? To serve you it must learn about you. To work and meet your requests Cortana (and Siri etc.) collect data such as device location, information & location history, your contacts, voice input, search history, calendar details, content & communication history from messages and app, key strokes, debit & credit card details, movies you watch and music you listen too, as well as info about your device to name a few. When you agree to use Win 10 you are agreeing with sharing your data with Microsoft and how they will track you. Read their privacy statements and service agreements. You have some great services to gain, but it will cost your privacy, so be sure it is worth it for you. https://www.microsoft.com/en-gb/servicesagreement/default.aspx https://privacy.microsoft.com/en-us/privacystatement/ So, decide if you want an Easy to use/Semi-secure/Gadget driven link to your online life or if you are more worried about Security AND Privacy. Many of you do are not much worried about your privacy and that is fine if it works for you and you can feel more secure with Windows 10 than you should feel with whatever Windows you use today. If however your privacy is important to you, stay away from Win 10 as long as possible and seriously consider Linux or even Mac.
  24. Your ./ should be ../ if you are leaving the folder to that page. You should always use the full URL on every link. it is safer that way. <li><a href=“http://www.whatever.com/folder/GoodWork.html”>Home</a></li>
  25. Facebook terms and conditions: why you don't own your online life http://www.telegraph.co.uk/technology/social-media/9780565/Facebook-terms-and-conditions-why-you-dont-own-your-online-life.html NOTE: The title is a bit misleading as the article is about many social media and not just Facebook.
×