Serving missions and missionaries around the world.
Feel free to email us: TheCMDGroup@gmail.com

CISPA2Here is a very interesting article from Fox News (yeah, right wing) that exposes a truth that I do not believe many people are going to catch on to.  It wasn’t but just a couple months ago that the NSA was saying “we are not collecting information on all email” and, they were also claiming they were NOT collecting information on all cell phone use.  However…

In this article, the NSA source speaking on behalf of the NSA to Fox News says “The statement said the programs as a whole have helped defend the nation, and that as of 2008, “there were over 300 terrorists captured using intelligence generated from XKEYSCORE.” ”  Now, in previous interviews, the NSA has said that the new database was not yet functional.  Now, they are saying that they have captured over 300 terrorists?  Hmmm…

Also, read this closely…  “Meanwhile, the Office of the Director of National Intelligence declassified a set of documents on Wednesday that begin to shed light on the authorization and rules behind the agency’s phone and Internet record collection. 

The documents stress that these programs allow the government to collect basic information about phone calls and email communications, but not the content of those messages. They say most of the information “is never reviewed,” while describing the programs as vital to the “early warning system” for detecting terror plots.”

Think about this for a moment…  They are capturing the information, but cannot use the content (they have the content as well).  And, again, it was just a few months ago that the NSA was saying they were not collecting ALL information on phone calls and emails.

Draw your own conclusion.

 

Click the graphic above, or this link here to read the whole story.

Posted by: In: Tips 02 Mar 2013 0 comments

Whenever sharing is involved, there is a always a chance that someone will break the ties that bind and violate your trust. If you’re worried about your photos getting stolen from your Facebook or Twitter accounts, here is one techniques that will stop digital photography theft.

    1. Ask yourself this… Do you really need to protect your photos from theft?  It all depends on a lot of factors. First of all, Facebook and Twitter already have some pretty strict written download guidelines. But, does that stop them?  No.  Facebook and Twitter both dramatically reduce the quality of large photos that you upload.  Your untrustworthy friends will be able to download your photos, but will not be at the original resolution.
    2. Reduce what they can take.  Upload a smaller copy of the file than your original. That way no one will have access to the full image but you. Facebook and Twitter mostly do this automatically (to save their server space). People might be able to steal your photos, but they are not going to get the whole thing. They’ll get a little souvenir keychain version, and that’s hardly worth the effort.
    3. Mark-it!  You can also do what sites like iStockPhoto and GettyImages do. They place a big white “X” over every photo so it’s visible to you, the user, but useless to anyone who wants to do anything with it.
    4. Keep them safe.  The only really sure-fire way to protect your photography from anyone, is never to upload it to the Internet. But then you don’t get to share your masterpieces, or show your work to new clients.

Some other things to remember..  

    1. Geotagging.  May seem like a good idea, but you are letting others know where you are.
    2. Make sure you have approval to post pictures of other people.
    3. Do not post anything that is inappropriate.
    4. Do not post pictures of people under aged.

Be safe and be blessed!

 

This week we are looking at internet browser security.  I said earlier that I am a fan of Google Chrome, and here is one more reason why.

Google Chrome has a feature called sandboxing.  If you are not sure about a site, or you just are not familiar with a new site you can trust Google Chrome to sandbox the site.  In computer security, a sandbox is a security mechanism for separating running programs. It is often used to execute untested code, or un-trusted programs from unverified third-parties, suppliers, un-trusted users and un-trusted websites.  The sandbox typically provides a tightly controlled set of resources for programs to run in.  Network access, the ability to inspect the host system or read from input devices are usually disallowed or heavily restricted.

Each tab in Chrome runs independent processes and one tab crashing does not crash all of the Google Chrome processes, or tabs.

Keep it in the sandbox with Chrome!

So, if you are using lots of different websites and have a tendency to use sites you have never been on before, try Google Chrome.  The sandbox might just save you some headaches.

Be safe and be blessed!

How can I tell if a web page is secured?

There are two general indications of a secured web page

1. Check the web page URL

Normally, when browsing the web, the URLs (web page addresses) begin with the letters “http”.  However, over a secure connection the address displayed should begin with “https” – note the “s” at the end.

Try it! – Visit our home page (http://www.ssl.com ).  Note the URL begins with the “http” meaning this page is not secure.  Click the link in the upper-right hand corner to “Log in”.  Notice the change in the URL?  It now begins with “https”, meaning the user name and password typed in will be encrypted before sent to our server.

2. Check for the “Lock” icon

There is a de facto standard among web browsers to display a “lock” icon somewhere in the window of the browser (NOT in the web page display area!)  For example, Microsoft Internet Explorer displays the lock icon in the lower-right of the browser window:

MS Internet Explorer Lock

As another example, Mozilla’s FireFox Web Browser displays the lock icon in the lower-left corner:

Mozilla FireFox Lock Icon

Google Chrome gives you the “lock” on the URL address line:

THE LOCK ICON IS NOT JUST A PICTURE!  Click (or double-click) on it to see details of the site’s security.  This is important to know because some fraudulent web sites are built with a bar at the bottom of the web page to imitate the lock icon of your browser!  Therefore it is necessary to test the functionality built into this lock icon.  Furthermore, it is very important to KNOW YOUR BROWSER!  Check your browser’s help file or contact the makers of your browser software if you are unsure how to use this functionality.

Try it! – Visit our home page (http://www.ssl.com ).  Click the link to “Log in” to initiate a secure session.  Note the lock icon display in YOUR browser.  Click the icon, or double-click (varies by browser), and examine the security information displayed about the web site.  If there is no display at the bottom of your browser try clicking “View” in the main menu and make sure “Status Bar” is checked.

Many people are not aware that of http:.. and https://

An example of “https://” when connecting to a bank site.

The main difference between http:// and https:// is It’s all about keeping you secure.  HTTP stands for Hyper Text Transport Protocol.  This is just a fancy way of saying it’s a protocol (a language, in a manner of speaking) for information to be passed back and forth between web servers and clients. The important thing is the letter S which makes the difference between HTTP and HTTPS.  The S (big surprise) stands for “Secure”. If you visit a website or webpage, and look at the address in the web browser, it will likely begin with the following: http://.

This means that the website is talking to your browser using the regular ‘unsecure’ language. In other words, it is possible for someone to “eavesdrop” on your computer’s conversation with the website. If you fill out a form on the website, someone might see the information you send to that site.

This is why you never ever enter your credit card number in an http website!  But if the web address begins with https://, that basically means your computer is talking to the website in a secure code that no one can eavesdrop on.

Do you understand why this is so important?  If a website ever asks you to enter your credit card information, you should automatically look to see if the web address begins with https://.

If it doesn’t, DO NOT enter sensitive information like your name, address, phone number and most certainly, not a credit card number.

Be safe and be blessed!