Here is a very interesting article from Fox News (yeah, right wing) that exposes a truth that I do not believe many people are going to catch on to. It wasn’t but just a couple months ago that the NSA was saying “we are not collecting information on all email” and, they were also claiming they were NOT collecting information on all cell phone use. However…
In this article, the NSA source speaking on behalf of the NSA to Fox News says “The statement said the programs as a whole have helped defend the nation, and that as of 2008, “there were over 300 terrorists captured using intelligence generated from XKEYSCORE.” ” Now, in previous interviews, the NSA has said that the new database was not yet functional. Now, they are saying that they have captured over 300 terrorists? Hmmm…
Also, read this closely… “Meanwhile, the Office of the Director of National Intelligence declassified a set of documents on Wednesday that begin to shed light on the authorization and rules behind the agency’s phone and Internet record collection.
The documents stress that these programs allow the government to collect basic information about phone calls and email communications, but not the content of those messages. They say most of the information “is never reviewed,” while describing the programs as vital to the “early warning system” for detecting terror plots.”
Think about this for a moment… They are capturing the information, but cannot use the content (they have the content as well). And, again, it was just a few months ago that the NSA was saying they were not collecting ALL information on phone calls and emails.
Draw your own conclusion.
Whenever sharing is involved, there is a always a chance that someone will break the ties that bind and violate your trust. If you’re worried about your photos getting stolen from your Facebook or Twitter accounts, here is one techniques that will stop digital photography theft.
Some other things to remember..
Be safe and be blessed!
This week we are looking at internet browser security. I said earlier that I am a fan of Google Chrome, and here is one more reason why.
Google Chrome has a feature called sandboxing. If you are not sure about a site, or you just are not familiar with a new site you can trust Google Chrome to sandbox the site. In computer security, a sandbox is a security mechanism for separating running programs. It is often used to execute untested code, or un-trusted programs from unverified third-parties, suppliers, un-trusted users and un-trusted websites. The sandbox typically provides a tightly controlled set of resources for programs to run in. Network access, the ability to inspect the host system or read from input devices are usually disallowed or heavily restricted.
Each tab in Chrome runs independent processes and one tab crashing does not crash all of the Google Chrome processes, or tabs.
So, if you are using lots of different websites and have a tendency to use sites you have never been on before, try Google Chrome. The sandbox might just save you some headaches.
Be safe and be blessed!
How can I tell if a web page is secured?
There are two general indications of a secured web page
1. Check the web page URL
Normally, when browsing the web, the URLs (web page addresses) begin with the letters “http”. However, over a secure connection the address displayed should begin with “https” – note the “s” at the end.
Try it! – Visit our home page (http://www.ssl.com ). Note the URL begins with the “http” meaning this page is not secure. Click the link in the upper-right hand corner to “Log in”. Notice the change in the URL? It now begins with “https”, meaning the user name and password typed in will be encrypted before sent to our server.
2. Check for the “Lock” icon
There is a de facto standard among web browsers to display a “lock” icon somewhere in the window of the browser (NOT in the web page display area!) For example, Microsoft Internet Explorer displays the lock icon in the lower-right of the browser window:
As another example, Mozilla’s FireFox Web Browser displays the lock icon in the lower-left corner:
Google Chrome gives you the “lock” on the URL address line:
THE LOCK ICON IS NOT JUST A PICTURE! Click (or double-click) on it to see details of the site’s security. This is important to know because some fraudulent web sites are built with a bar at the bottom of the web page to imitate the lock icon of your browser! Therefore it is necessary to test the functionality built into this lock icon. Furthermore, it is very important to KNOW YOUR BROWSER! Check your browser’s help file or contact the makers of your browser software if you are unsure how to use this functionality.
Try it! – Visit our home page (http://www.ssl.com ). Click the link to “Log in” to initiate a secure session. Note the lock icon display in YOUR browser. Click the icon, or double-click (varies by browser), and examine the security information displayed about the web site. If there is no display at the bottom of your browser try clicking “View” in the main menu and make sure “Status Bar” is checked.
Many people are not aware that of http:.. and https://
The main difference between http:// and https:// is It’s all about keeping you secure. HTTP stands for Hyper Text Transport Protocol. This is just a fancy way of saying it’s a protocol (a language, in a manner of speaking) for information to be passed back and forth between web servers and clients. The important thing is the letter S which makes the difference between HTTP and HTTPS. The S (big surprise) stands for “Secure”. If you visit a website or webpage, and look at the address in the web browser, it will likely begin with the following: http://.
This means that the website is talking to your browser using the regular ‘unsecure’ language. In other words, it is possible for someone to “eavesdrop” on your computer’s conversation with the website. If you fill out a form on the website, someone might see the information you send to that site.
This is why you never ever enter your credit card number in an http website! But if the web address begins with https://, that basically means your computer is talking to the website in a secure code that no one can eavesdrop on.
Do you understand why this is so important? If a website ever asks you to enter your credit card information, you should automatically look to see if the web address begins with https://.
If it doesn’t, DO NOT enter sensitive information like your name, address, phone number and most certainly, not a credit card number.
Be safe and be blessed!