tag:blogger.com,1999:blog-56160999213792067902024-03-05T13:43:43.459+00:00Software Security for youHelp you secure your digital life!Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.comBlogger36125tag:blogger.com,1999:blog-5616099921379206790.post-10721504457024656632017-09-04T05:50:00.000+01:002017-09-04T05:51:11.560+01:00Transform your $15 router to $200 security router for FREE<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyFcvj1DbTM_-2Dj4MiyeuGLXHKXof6a19m4tEo5vduTVtejnZ5Fkz5-nq4YBuKtqU6GZFZynZmbdU7mwRlbRCPHeOKBETjB7QhGtpJ2tL2g3DYEVj8NvmSEUSgcBlWahaIt-nJdyXyRF7/s1600/Transform-your-15-router-to-200-Security-router-1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="315" data-original-width="560" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyFcvj1DbTM_-2Dj4MiyeuGLXHKXof6a19m4tEo5vduTVtejnZ5Fkz5-nq4YBuKtqU6GZFZynZmbdU7mwRlbRCPHeOKBETjB7QhGtpJ2tL2g3DYEVj8NvmSEUSgcBlWahaIt-nJdyXyRF7/s1600/Transform-your-15-router-to-200-Security-router-1.png" /></a></div>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
<span id="goog_1778583575"></span><span id="goog_1778583576"></span></h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
Technology is evolving faster and there are more IoT devices at home/office than a few years back. Software Security companies are moving towards securing every connected device at your home/office and not just protecting laptops/smartphones.</h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
Traditional Security companies have launched a Wi-Fi router based security product to secure every connected device. Please check <strong style="box-sizing: border-box;"><em style="box-sizing: border-box;"><span style="box-sizing: border-box; text-decoration-line: underline;"><a href="https://securehomeplatform.mcafee.com/" rel="nofollow noopener" style="box-sizing: border-box; color: #333333; text-decoration-line: none; transition-duration: 0.2s; transition-property: color, background-color, border-color; transition-timing-function: linear;" target="_blank">McAfee</a></span></em>,</strong> <em style="box-sizing: border-box;"><span style="box-sizing: border-box; text-decoration-line: underline;"><strong style="box-sizing: border-box;"><a href="https://us.norton.com/core" rel="nofollow noopener" style="box-sizing: border-box; color: #333333; text-decoration-line: none; transition-duration: 0.2s; transition-property: color, background-color, border-color; transition-timing-function: linear;" target="_blank">Norton</a></strong></span></em> & <span style="box-sizing: border-box; text-decoration-line: underline;"><em style="box-sizing: border-box;"><a href="https://www.f-secure.com/en/web/home_global/sense" rel="nofollow noopener" style="box-sizing: border-box; color: #333333; text-decoration-line: none; transition-duration: 0.2s; transition-property: color, background-color, border-color; transition-timing-function: linear;" target="_blank"><strong style="box-sizing: border-box;">F-Secure</strong></a></em></span>. There are few more new players like <em style="box-sizing: border-box;"><span style="box-sizing: border-box; text-decoration-line: underline;"><strong style="box-sizing: border-box;"><a href="http://www.netsequre.net/" rel="nofollow noopener" style="box-sizing: border-box; color: #333333; text-decoration-line: none; transition-duration: 0.2s; transition-property: color, background-color, border-color; transition-timing-function: linear;" target="_blank">NetSequre</a></strong></span></em>, <strong style="box-sizing: border-box;"><em style="box-sizing: border-box;"><span style="box-sizing: border-box; text-decoration-line: underline;"><a href="https://www.eblocker.com/en/" rel="nofollow noopener" style="box-sizing: border-box; color: #333333; text-decoration-line: none; transition-duration: 0.2s; transition-property: color, background-color, border-color; transition-timing-function: linear;" target="_blank">eBlocker</a></span></em></strong>, <strong style="box-sizing: border-box;"><span style="box-sizing: border-box; text-decoration-line: underline;"><a href="https://www.getcujo.com/" rel="nofollow noopener" style="box-sizing: border-box; color: #333333; text-decoration-line: none; transition-duration: 0.2s; transition-property: color, background-color, border-color; transition-timing-function: linear;" target="_blank"><em style="box-sizing: border-box;">Cujo</em></a></span></strong> & <strong style="box-sizing: border-box;"><em style="box-sizing: border-box;"><span style="box-sizing: border-box; text-decoration-line: underline;"><a href="https://www.gryphonconnect.com/" rel="nofollow noopener" style="box-sizing: border-box; color: #333333; text-decoration-line: none; transition-duration: 0.2s; transition-property: color, background-color, border-color; transition-timing-function: linear;" target="_blank">Gryphon</a></span></em></strong> centered around secured home protection via Wi-Fi router.</h2>
<blockquote style="background: rgb(246, 246, 246); border-bottom-color: rgb(175, 7, 9); border-left: 4px solid rgb(175, 7, 9); border-right-color: rgb(175, 7, 9); border-top-color: rgb(175, 7, 9); box-sizing: border-box; color: #747474; font-family: "PT Sans"; font-size: 13px; font-stretch: normal; font-style: italic; line-height: 1.5; margin-bottom: 2em; margin-top: 2em; padding: 15px;">
<h2 data-fontsize="18" data-lineheight="27" style="box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; letter-spacing: 0px; line-height: 1.5; margin: 0px; padding-bottom: 0px;">
Protecting every connected device makes sense and router based security technology solve it perfectly.</h2>
</blockquote>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
Most of these above Security companies are offering a Hardware/Router device costing around $200-$300 as the premium price for a security solution. Sounds perfect as it brings in huge value to customers.</h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
NetSequre has taken a different approach and we are happy about we did. We do have our own branded NetSequre router, in addition to it, we provide custom NetSequre firmware for around 200+ market available routers. We have generalized our network security stack to be able to run on various hardware/routers.</h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
<strong style="box-sizing: border-box;">Eco-friendly & Economical option</strong></h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
You don’t need to throw away your existing router and buy a costly router. Go for the eco-friendly and economical option! NetSequre. This is exactly what we are doing with one of our ISPs in India – We will be migrating a huge number of TP-Link routers with the NetSequre solution to provide Security & manageability. Big Win!</h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
One of the most popular router <a href="https://www.amazon.in/TP-Link-TL-WR841N-300Mbps-Wireless-N-Router/dp/B001FWYGJS" rel="nofollow noopener" style="box-sizing: border-box; color: #333333; text-decoration-line: none; transition-duration: 0.2s; transition-property: color, background-color, border-color; transition-timing-function: linear;" target="_blank">TP-Link TL-WR841n</a> (the one in title image) comes at a cost of around $15 in India and NetSequre support it. Users can download the firmware for free and install it just like upgrading your router firmware. That’s it!</h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
Once the NetSequre firmware is installed, router reboots with a default SSID to configure it for WAN, Wi-Fi & account settings. There you go to start using one of the most security focused router.</h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
<strong style="box-sizing: border-box;">Pre-Configured Wi-Fi Networks – </strong>NetSequre starts with three pre-configured SSIDs – Primary, Childsafe & Guest Wi-Fi. Network policies are predefined for each SSID and ready to use out-of-the-box. Zero configuration required.</h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
<strong style="box-sizing: border-box;">How does NetSequre secure your home network?</strong></h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
<strong style="box-sizing: border-box;">Provides online safety </strong>– Surf, Bank, Play, Shop and Socialize Securely on any device.One less thing to worry about online threats like short-URLs, phishing email, viruses, spyware, ransomware and more. Secure every device at home from latest online threats.</h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
<strong style="box-sizing: border-box;">Provide Safe & Secure Internet For Kids</strong> – Filters pornographic and 20+ website categories automatically. Filters Google images and YouTube videos for adult content.</h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
<strong style="box-sizing: border-box;">Cloud based Security for up-to-date protection</strong> – Routers with NetSequre firmware talks to cloud based Secure DNS solution from NetSequre that filters out bad content and allow the rest.</h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
<strong style="box-sizing: border-box;">AdBlocking & Anti-Web tracking on all devices </strong>– Block ads and web-tracking on all connected devices. It saves bandwidth and provides privacy against the web trackers.</h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
<strong style="box-sizing: border-box;">DNS Encryption for Privacy and Security</strong> – A high-end router with better capacity provides DNS Encryption to provide best security and privacy. Your browsing history is hidden from your ISP & higher authorities.</h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
<strong style="box-sizing: border-box;">Additional Key feature to protect your home network</strong> –</h2>
<ol style="background-color: white; box-sizing: border-box; color: #747474; font-family: "PT Sans"; font-size: 13px;">
<li style="box-sizing: border-box;"><h2 data-fontsize="18" data-lineheight="27" style="box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; letter-spacing: 0px; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
Secure auto-updates to router software to keep it up-to-date</h2>
</li>
<li style="box-sizing: border-box;"><h2 data-fontsize="18" data-lineheight="27" style="box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; letter-spacing: 0px; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
Security that cannot be bypassed</h2>
</li>
<li style="box-sizing: border-box;"><h2 data-fontsize="18" data-lineheight="27" style="box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; letter-spacing: 0px; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
Cloud managed router to remotely fix and configure the router</h2>
</li>
<li style="box-sizing: border-box;"><h2 data-fontsize="18" data-lineheight="27" style="box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; letter-spacing: 0px; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
Policy defined network that can be customized per SSID</h2>
</li>
<li style="box-sizing: border-box;"><h2 data-fontsize="18" data-lineheight="27" style="box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; letter-spacing: 0px; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
And several more features to protect you in various ways</h2>
</li>
</ol>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
Learn more here <a href="http://www.netsequre.net/" rel="nofollow noopener" style="box-sizing: border-box; color: #333333; text-decoration-line: none; transition-duration: 0.2s; transition-property: color, background-color, border-color; transition-timing-function: linear;" target="_blank">www.netsequre.net</a></h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
<strong style="box-sizing: border-box;">What about hardware warranty?</strong></h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
We worked very closely with TP-Link India and confirmed that hardware warranty continues without a problem.</h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
<strong style="box-sizing: border-box;">Does NetSequre charge for Security Services?</strong></h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
Yes, we do provide Security as service and its paid after 30-day trial. <a href="https://www.netsequre.net/netsequre-pricing/" rel="nofollow noopener" style="box-sizing: border-box; color: #333333; text-decoration-line: none; transition-duration: 0.2s; transition-property: color, background-color, border-color; transition-timing-function: linear;" target="_blank">Here is pricing the chart</a>. Do read next paragraph!</h2>
<h2 data-fontsize="18" data-lineheight="27" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
<strong style="box-sizing: border-box;">Good News – Want a free lifetime security subscription? </strong></h2>
<blockquote style="background: rgb(246, 246, 246); border-bottom-color: rgb(175, 7, 9); border-left: 4px solid rgb(175, 7, 9); border-right-color: rgb(175, 7, 9); border-top-color: rgb(175, 7, 9); box-sizing: border-box; color: #747474; font-family: "PT Sans"; font-size: 13px; font-stretch: normal; font-style: italic; line-height: 1.5; margin-bottom: 2em; margin-top: 2em; padding: 15px;">
<h2 data-fontsize="18" data-lineheight="27" style="box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; letter-spacing: 0px; line-height: 1.5; margin: 0px; padding-bottom: 0px;">
NetSequre is giving away free subscription for our first 1000 subscribers starting today. No strings attached – No catch.</h2>
</blockquote>
<div class="fusion-sep-clear" style="background-color: white; box-sizing: border-box; clear: both; color: #747474; font-family: "PT Sans"; font-size: 0px; height: 1px; line-height: 0; overflow: hidden; width: 767px;">
</div>
<div class="fusion-separator fusion-full-width-sep sep-none" style="background-color: white; border: 0px solid transparent; box-sizing: border-box; clear: both; color: #747474; font-family: "PT Sans"; font-size: 13px; height: 1px; margin: 10px auto; position: relative; z-index: 11;">
</div>
<div class="fusion-button-wrapper fusion-aligncenter" style="background-color: white; box-sizing: border-box; clear: both; color: #747474; font-family: "PT Sans"; font-size: 13px; margin: 0px auto; text-align: center;">
<a class="fusion-button button-flat fusion-button-round button-large button-default button-2" href="https://www.netsequre.net/supported-devices/" style="background: linear-gradient(to top, rgb(193, 22, 3), rgb(175, 9, 7)) rgb(175, 9, 7); border-radius: 2px; border: 0px solid rgb(255, 255, 255); box-shadow: none !important; box-sizing: border-box; color: white; cursor: pointer; display: inline-block; font-family: "PT Sans", Arial, Helvetica, sans-serif; font-size: 14px; font-weight: 700; letter-spacing: 0px; line-height: 17px; outline: 0px; padding: 13px 29px; position: relative; text-decoration-line: none; text-transform: uppercase; transition: all 0.2s; width: auto; zoom: 1;" target="_self"><span class="fusion-button-text" style="box-sizing: border-box; transition: all 0.2s;">UPGRADE YOUR ROUTER NOW!</span></a></div>
<div class="fusion-sep-clear" style="background-color: white; box-sizing: border-box; clear: both; color: #747474; font-family: "PT Sans"; font-size: 0px; height: 1px; line-height: 0; overflow: hidden; width: 767px;">
</div>
<div class="fusion-separator fusion-full-width-sep sep-none" style="background-color: white; border: 0px solid transparent; box-sizing: border-box; clear: both; color: #747474; font-family: "PT Sans"; font-size: 13px; height: 1px; margin: 10px auto; position: relative; z-index: 11;">
</div>
<div class="prose" style="background-color: white; box-sizing: border-box; color: #747474; font-family: "PT Sans"; font-size: 13px;">
<h2 data-fontsize="18" data-lineheight="27" style="box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; letter-spacing: 0px; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
After installation <strong style="box-sizing: border-box;">please email us</strong> from the registered email address with routers MAC address and we will activate your free lifetime subscription.</h2>
<h2 data-fontsize="18" data-lineheight="27" style="box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; letter-spacing: 0px; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
<strong style="box-sizing: border-box;">Questions</strong>? – Drop us an email at info@netsequre.net</h2>
<h2 data-fontsize="18" data-lineheight="27" style="box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; letter-spacing: 0px; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
<strong style="box-sizing: border-box;">Legal Note</strong>: McAfee, Norton, F-Secure, Cujo, eBlocker & Gryphon – All product names, logos, and brands are the property of their respective owners.</h2>
<h2 data-fontsize="18" data-lineheight="27" style="box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; letter-spacing: 0px; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
<strong style="box-sizing: border-box;">Warranty Note</strong>: Ensure you do not brick the router with incorrect firmware. Bricked routers are not covered under warranty.</h2>
<h2 data-fontsize="18" data-lineheight="27" style="box-sizing: border-box; color: #333333; font-family: "Roboto Slab", Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; letter-spacing: 0px; line-height: 1.5; margin: 0px 0px 0.7em; padding-bottom: 0px;">
<a href="http://www.netsequre.net/" rel="nofollow noopener" style="box-sizing: border-box; color: #333333; text-decoration-line: none; transition-duration: 0.2s; transition-property: color, background-color, border-color; transition-timing-function: linear;" target="_blank">NetSequre</a> is a company based in Bangalore, India. The company is geared toward Network Security and provides various security solution over wireless. Author of this article Mangesh Bhamre, Founder & CEO of NetSequre has in-depth knowledge on Networking, Security and latest online threats which is reflected in NetSequre product line.</h2>
</div>
Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com1tag:blogger.com,1999:blog-5616099921379206790.post-12197091343956735512016-10-08T08:02:00.000+01:002016-10-08T08:24:06.840+01:00How to secure your home network ? <h3 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.85098); font-family: "Source Sans Pro", Helvetica, Arial, sans-serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 28px; margin: 2.4rem 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="color: rgba(0 , 0 , 0 , 0.701961); font-family: "source serif pro" , serif; font-weight: normal;">Every home network device is connected to Internet via Wi-Fi router. Right way to protect every home device is to implement security on Wi-Fi router and filter-out all unwanted traffic at central point. <br /><br />GENIE - Total Internet Security is such a router built for security.</span></h3>
<h3 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.85098); font-family: "Source Sans Pro", Helvetica, Arial, sans-serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 28px; margin: 2.4rem 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">What is GENIE - Total Internet Security ?</b></h3>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">GENIE is next generation Wi-Fi router</b> and ecosystem of servers to offers Internet security and on-line child protection for all connected devices at home and office. www.geniewifi.com</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<img class="center" height="356" src="https://media.licdn.com/mpr/mpr/shrinknp_400_400/AAEAAQAAAAAAAAeCAAAAJDg3NTI3Mzk0LTBmYzgtNGEzZi1iZDMyLTg0NzMzZWQ0ZmViZQ.png" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 4.4rem auto; max-width: 100%; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;" width="356" /></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Why Genie - Total Internet Security ?</b></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
You might be using most secure desktop operating system along with best security products installed on to them, however if your network is insecure you can lose the game due to weakest link. GENIE secures this link.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
Not every network device can be secured by installing security product. These devices are equally vulnerable as your desktop/laptop and needs protection. With <b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">ZERO footprint on devices</b>, GENIE fills the gap.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
Wi-Fi router forms the network hub at home and office. Every network device you have connects to Wi-Fi router and thus <b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">centralized security makes most sense</b>. Applying policies centrally and securing every device is feasible by running security on Wi-Fi router.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
We wish to bring in enterprise grade security to “<b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Home and SMB</b>” at most affordable price and that can be managed by a regular Internet user. <b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">GENIE - Total Internet Security </b>is our solution for this.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
GENIE is not yet another Wi-Fi router on shelf like TP-Link, Netgear, D-Link, iBall and others. It’s our innovation for next billion homes and offices to make them safe online.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">What GENIE provides ?</b></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
It exposes three separate WiFi SSIDs from the router, primary WiFi for online security, second WiFi for online child protection and third for guest. Router is pre-configured to block adult content and make Internet safer for you and your kids.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">1. Internet Security </b>- Protects your every device from Phishing, Spyware Ransomware and Malware attacks. Uses advanced DNS protection techniques to block fraudulent websites. Backed with up-to-date security to protect you from latest online threats.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">2. Google/YouTube adult content filtering</b> - Forces google safe search for kids. Filters out adult/mature content on google search. Kids will be able to only see childsafe videos. YouTube search will automatically block any adult videos on any device on any browser. Zero installation on devices. A filtering service that cannot be turned off by kids.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">3. Blocking adult/mature websites</b> - Block all porn and other adult content that kids may stumble upon. By default it blocks 20 categories of websites out-of-box.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">4. Filters that can’t be circumvented</b> - GENIE is built with advanced firewall technique to prevent smart kid or employee that may try out to bypass or workaround content filtering. GENIE block TOR, VPN, Email, FTP, proxy, Torrent download and any unknown traffic accessed using IP address instead of DNS. A way advance mechanism to break through.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">5. Zero config</b> - We believe security should not complicate user's interaction with technology. GENIE is ready to use out-of-box without any configuration. Just connect your devices to primary, child-safe or guest Wi-Fi. No device based configuration, or installing apps on every device. Protection starts instantly.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">6. Secure by design</b> - Every router comes with complex unique passwords for admin and Wi-Fi to reduce common attack vectors. No access to routers admin panel for child safe and guest WiFi to prevent cracking tools. We ensured only required functionality is built into router to reduce attack surface. No fancy features like UPnP & WPC which are known for security weakness.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">6. Performance</b> - Hardware is upscaled to run security on it without impacting performance. Our test result showcase <b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">zero performance impact</b> due to additional security. In fact with DNS caching on router, we improved performance of DNS request-response by <b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">50X</b>. Faster the DNS response, faster the browsing experience and that’s what we exactly achieved.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">7. Auto updates - </b>GENIE has auto-updates mechanism to provide newer functionality, security fixes and performance improvements. It gets better to server and secure you at its best.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">8. Standard features </b>- We bundle in all that a standard off-the-shelf Wi-Fi router provides. 300 Mbps high end router, with sufficient Wi-Fi range covering 3 BHK home. A reasonable processor and RAM to support 20+ users/devices.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
Blocking pages that user see if they visit phishing or blocked site -</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<img class="center" height="418" src="https://media.licdn.com/mpr/mpr/shrinknp_800_800/AAEAAQAAAAAAAAj9AAAAJDMwODVjMDI2LTE1NzktNGQ3MS04N2E2LTU5ZmRhN2VjODg5MQ.png" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 4.4rem auto; max-width: 100%; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;" width="640" /><img class="center" height="418" src="https://media.licdn.com/mpr/mpr/shrinknp_800_800/AAEAAQAAAAAAAAl_AAAAJDY5ZDhiNzc1LTcwYWUtNDUwMC1hMzZiLTEwZWI1YjE2NzIwMQ.png" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 4.4rem auto; max-width: 100%; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;" width="640" /></div>
<h3 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.85098); font-family: "Source Sans Pro", Helvetica, Arial, sans-serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 28px; margin: 2.4rem 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><br />Open Netware’s Secure DNS Technology</b></h3>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
Open Netware host bunch of secure DNS servers to provide Internet security and Parental control with our secure DNS technology. Here are few functionality it provides</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">1. Secure DNS solution provides Internet Security</b>, protecting users against phishing, malware, spyware, ransomware, suspicious and virus infected websites. </div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">2. Parental control DNS</b> protection blocks adult content that kids may stumble upon. It blocks around 12 different categories of websites which kids should not be visiting. Around 2.6 million websites that we block and continue to update daily. Peace of mind for busy parents is the aim.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
3. Privacy and Security using latest using <b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">DNSCrypt. It’s like SSL for DNS queries</b>. No one can intercept DNS queries or re-route you to fraudulent websites.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
4. <strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Hybrid DNS solution</strong> (Cloud DNS and router level DNS) gives us big advantage of both worlds. Speed and up-to-date protection. A unique offering.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
5. Daily updates to our DNS to block latest threats and unwanted websites to provide up-to-date protection. <b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Rich set of third-party DNS paid integration</b> to give our users max protection from latest online threats.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
6. Cloud based security to provide you instant protection without users interception. Round the clock protection behind the scene to<b style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"> protect all your devices.</b></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<img class="center" height="360" src="https://media.licdn.com/mpr/mpr/shrinknp_800_800/AAEAAQAAAAAAAAmKAAAAJDdiZjZhNDYyLTJjZjgtNDNiNS04MWYyLWJiNTkyY2MwN2IwMA.png" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 4.4rem auto; max-width: 100%; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;" width="640" /></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 32px; margin-bottom: 3.2rem; margin-top: 3.2rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://goo.gl/BkReeU" style="margin-left: 1em; margin-right: 1em;"><img height="85" src="https://lh3.googleusercontent.com/pbjorY3SglGjJy8p4VdOaIogttp8ETyyp6yAkrXADRgWGApBDzteOiuwPBS_uYz7hZ4j8bMcsyUNMTF0LyWcEf_HqTpgXHBOTFTTGTOznEZ4D4I-SmkilnSBonkRVlYrZxcgbDxbhMU" width="200" /></a></div>
<br />
</div>
Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com0tag:blogger.com,1999:blog-5616099921379206790.post-80633795000154868602015-12-20T21:19:00.001+00:002015-12-20T21:19:42.987+00:00How to go Incognito from ISP and websites ?<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Incognito mode or private mode in browsers is extensively used for various reasons. Core value it brings is non-persistence of your browsing history. Your browser starts with clean slate and leaves no traces on laptop/device which is great for privacy.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"> Just to refresh what you get from Incoginto -</strong></div>
<ol style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 24.5455px; margin: 0px 0px 15px; outline: 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;"><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"> </strong>Browser starts with clean slate - No cookies or older traces of visiting any sites or login info </li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Leave no traces of visiting any site</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Cleanup any cookies when you close down browser </li>
</ol>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
All-in-all a great tool for privacy. </div>
<blockquote style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Georgia; font-size: 24px; font-stretch: normal; font-style: italic; line-height: 38px; margin: 50px 0px; outline: 0px; padding: 0px 80px; position: relative; quotes: none; text-align: center; vertical-align: baseline;">
Using just Incognito mode is NOT the total solution for privacy. You need to go beyond that.</blockquote>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><img class="center" data-loading-tracked="true" height="375" src="https://media.licdn.com/mpr/mpr/shrinknp_800_800/AAEAAQAAAAAAAAbKAAAAJDRmMzIzMzhiLWZkY2UtNGEwNC05NWRjLTQyZTlkY2EyZjg3Mw.png" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 30px auto; max-width: 100%; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;" width="640" /><img class="center" data-loading-tracked="true" height="225" src="https://media.licdn.com/mpr/mpr/shrinknp_800_800/AAEAAQAAAAAAAAXHAAAAJDdmZmZlYjBiLWFkNTMtNGU3NS04ZDAwLWM0OGNiMDlhYzZkNQ.png" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 30px auto; max-width: 100%; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;" width="640" /></strong></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Your browser clearly calls out two warnings </strong></div>
<ol style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 24.5455px; margin: 0px 0px 15px; outline: 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Your Internet service provider (ISP) can see what you do online</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Websites you visit knows where you come from - your physical location is known </li>
</ol>
<h2 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Helvetica, Arial, sans-serif; font-size: 24px; font-stretch: inherit; font-weight: 400; line-height: 1.16667; margin: 0px 0px 8px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br style="box-sizing: border-box;" /><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Possible solution ? Use VPN / Tor / Tor-Router<br style="box-sizing: border-box;" /></strong></h2>
<h3 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Helvetica, Arial, sans-serif; font-size: 20px; font-stretch: inherit; font-weight: 400; line-height: 1.2; margin: 10px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;">
Use VPN </h3>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Virtual Private Network(VPN) is known way to protect yourself from ISP. It creates a tunnel between your computer and a server and all data from machine gets encrypted. You ISP cannot see what you browse or download.<br style="box-sizing: border-box;" /><br style="box-sizing: border-box;" />There are lots of VPN service provider with various internal options to choose from. Most of VPN vendors come with handy app/program to install on your laptop and use login credentials to go incognito. <br style="box-sizing: border-box;" /><br style="box-sizing: border-box;" /><em style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Advantage of using VPN:</em></div>
<ol style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 24.5455px; margin: 0px 0px 15px; outline: 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Great for travel purposes. If you connect to public Wi-Fi then VPN is perfect</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Multiple servers world wide to connect and choose your exit point. Most VPN vendors have distributed network of servers around the globe for you</li>
</ol>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<em style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Disadvantage of using VPN:</em></div>
<ol style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 24.5455px; margin: 0px 0px 15px; outline: 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Its a paid service</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">You need to configure it on every device on which you need privacy</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Your data now can be snooped by VPN vendors.</li>
</ol>
<h3 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Helvetica, Arial, sans-serif; font-size: 20px; font-stretch: inherit; font-weight: 400; line-height: 1.2; margin: 0px 0px 8px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br style="box-sizing: border-box;" />Use Tor browser -</h3>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Tor browser has been getting popular for privacy and its been used by 2 million plus people around the globe. Its a package that you need to download and run from your laptop which comes with its own browser (Firefox tuned for privacy).</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Once you use Tor browser, all network-data from browser gets encrypted and traversed between random servers around the globe. Your ISP cannot see which sites you visit, neither websites know where you come from. Read more on Tor here - http://TorProject.com</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<em style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Advantages of Tor Browser:</em></div>
<ol style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 24.5455px; margin: 0px 0px 15px; outline: 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Its a free service</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Your data gets encrypted with tree layered encryption </li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Data travels between random volunteered servers and thus great level of privacy</li>
</ol>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<em style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Disadvantages of Tor Browser</em></div>
<ol style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 24.5455px; margin: 0px 0px 15px; outline: 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Tor slows down your network as it routes your network traffic from multiple servers before it hits the website.</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Tor browser is platform specific - available for Mac / Linux / Windows / Android and you need to install it on every device. </li>
</ol>
<h3 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Helvetica, Arial, sans-serif; font-size: 20px; font-stretch: inherit; font-weight: 400; line-height: 1.2; margin: 0px 0px 8px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br style="box-sizing: border-box;" />Use Tor Router - </h3>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
A new generation of routers are seen in recent years that integrates Tor in Wi-Fi router. You connect any device to this Wi-Fi router and your privacy is ON. No installation required on any device. Your network-data from any device and any app gets routed from Tor Network. ISPs can't see which websites you browse, neither websites know your location.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
There are three companies(in my knowledge) in this space - "<a href="http://privacyontop.com/" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">Privacy On Top</a>", "<a href="https://anonabox.com/" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">Anonabox</a>" and "<a href="https://invizbox.io/" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">InvizBox</a>"<br style="box-sizing: border-box;" /><br style="box-sizing: border-box;" /><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Note</strong> that you need to still use Incognito mode when you use Tor Router. You now get benefit of protecting your entire network data from ISP and also all advantage of local Incognito mode.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<em style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Advantages of Tor Router- </em></div>
<ol style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 24.5455px; margin: 0px 0px 15px; outline: 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Network Data from all devices and app gets encrypted and routed via multiple servers.</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">No installation of any app on any device</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Centralized privacy for all your home device</li>
</ol>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<em style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Disadvantages of Tor Router</em></div>
<ol style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 24.5455px; margin: 0px 0px 15px; outline: 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">You need to buy Tor Router - Its a one time purchase though</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Tor slows down your network as data is routed from multiple servers around world.</li>
</ol>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Hope you found this article useful. Please share and comment on it. Would love to hear more options in case if I missed anything.</div>
Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com0tag:blogger.com,1999:blog-5616099921379206790.post-34279524626091595342015-12-03T16:43:00.000+00:002015-12-03T16:43:07.572+00:002000+ Companies track you online with 26 types of trackers<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Yes, that’s true! you read it right. More than 2000+ companies around the world are built for tracking you in 26 different ways to sell you personalized content/ads, emails, or target you for online scams like phishing.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Almost every website you visit uses services from these 2000+ companies. Over the time huge amount of info about you is getting collected, shared and sold. You are the product and websites wants to know everything about you to sell something.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Your public IP address, operating system, browser, screen size of device and cookies are all known to websites, however companies go far beyond and trace you with next level of intelligence built into their systems.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Here are the 25 types of website trackers that tracks your every move online.</div>
<h2 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Helvetica, Arial, sans-serif; font-size: 24px; font-stretch: inherit; font-weight: 400; line-height: 1.16667; margin: 0px 0px 8px; outline: 0px; padding: 0px; vertical-align: baseline;">
Serious Privacy Trackers<br style="box-sizing: border-box;" /></h2>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">1. Device Fingerprinting</strong> - These apps can identify and Id a user across multiple devices</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">2. Visitor De-Anonymization</strong> -These apps are actively engaged in identifying a particular browser session to be actual user using that browser</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">3. Behaviour Tracking </strong>- These apps engage in tracking your behaviour or deriving your behavioural traits through traffic examination</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">4. History Sniffing - </strong>These entries are known to "Sniff" your browsing history, meaning, they check which sites you've visited in the past</div>
<blockquote style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Georgia; font-size: 24px; font-stretch: normal; font-style: italic; line-height: 38px; margin: 50px 0px; outline: 0px; padding: 0px 80px; position: relative; quotes: none; text-align: center; vertical-align: baseline;">
There are 54+ companies around world geared to monitor you very closely. They know you better than your spouse.</blockquote>
<h2 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Helvetica, Arial, sans-serif; font-size: 24px; font-stretch: inherit; font-weight: 400; line-height: 1.16667; margin: 0px 0px 8px; outline: 0px; padding: 0px; vertical-align: baseline;">
Analytics Trackers</h2>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><br style="box-sizing: border-box;" />5. Analytics</strong> - Tracks your visits, revisits, page navigation within site, duration and device details</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">6. Local Analytics </strong>- These trackers are usually operated as self-hosted solutions by the first party web sites</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">7. E-mail Analytics</strong> - Apps that collect information on how well an email campaign is working</div>
<blockquote style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Georgia; font-size: 24px; font-stretch: normal; font-style: italic; line-height: 38px; margin: 50px 0px; outline: 0px; padding: 0px 80px; position: relative; quotes: none; text-align: center; vertical-align: baseline;">
There are around 144+ companies in addition to google that provides analytic solutions that websites can integrate to watch your move across their websites.</blockquote>
<h2 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Helvetica, Arial, sans-serif; font-size: 24px; font-stretch: inherit; font-weight: 400; line-height: 1.16667; margin: 0px 0px 8px; outline: 0px; padding: 0px; vertical-align: baseline;">
Advertisement Trackers<br style="box-sizing: border-box;" /></h2>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">8. Affiliate Marketing </strong>- Advertising generated by these apps is known as affiliate marketing</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">9. Popunders & Popups </strong>- A type of self-explanatory advertising that these apps engage in<br style="box-sizing: border-box;" /><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><br style="box-sizing: border-box;" />10. In-Text Ads -</strong> A tag for advertising companies that like to provide annoying ads in-text via deceptive hyperlinks<br style="box-sizing: border-box;" /><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><br style="box-sizing: border-box;" /></strong><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">11. Interstitials </strong>- An incredibly annoying advertising technique that forces a user to see an ad that appears between certain content or before they could access some content.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">12. Lead Management -</strong> These apps are designed to generate new potential business clientele by connecting outgoing consumer advertising with the responses to that advertising<br style="box-sizing: border-box;" /><br style="box-sizing: border-box;" /><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">13. Overlays</strong> - Another annoying advertising technique that involves content overlays that have to be closed prior to seeing content. <br style="box-sizing: border-box;" /><br style="box-sizing: border-box;" /><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">14. Pornvertising</strong> - This is a collection of advertisers that most often appear on pornographic sites<br style="box-sizing: border-box;" /><br style="box-sizing: border-box;" /><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">15. Segment Data </strong>- These apps are involved in deriving segmentation data through the tracking</div>
<blockquote style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Georgia; font-size: 24px; font-stretch: normal; font-style: italic; line-height: 38px; margin: 50px 0px; outline: 0px; padding: 0px 80px; position: relative; quotes: none; text-align: center; vertical-align: baseline;">
There are around 136 companies that provides personalized ads that websites can integrate to generate revenue for them.</blockquote>
<h2 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Helvetica, Arial, sans-serif; font-size: 24px; font-stretch: inherit; font-weight: 400; line-height: 1.16667; margin: 0px 0px 8px; outline: 0px; padding: 0px; vertical-align: baseline;">
</h2>
<h2 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Helvetica, Arial, sans-serif; font-size: 24px; font-stretch: inherit; font-weight: 400; line-height: 1.16667; margin: 0px 0px 8px; outline: 0px; padding: 0px; vertical-align: baseline;">
Standard website plugins trackers<br style="box-sizing: border-box;" /></h2>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">16. Website Chat</strong> - These apps are generally used to provide ability for site operator to chat with visitors</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">17. Feedback </strong>- These companies offer widgets and other tools that help operators gather and respond to feedback</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">18. Polls </strong>- These companies offer widgets that are used in asking site visitors simple questions and aggregating results in a poll result<br style="box-sizing: border-box;" /><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><br style="box-sizing: border-box;" /></strong><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">19. Social</strong> - All kinds of social sharing widgets that are easily recognizable<br style="box-sizing: border-box;" /><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><br style="box-sizing: border-box;" /></strong><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">20. Commenting systems </strong>- These apps are commonly used to provide the web site with some kinds of commenting functionality<br style="box-sizing: border-box;" /><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><br style="box-sizing: border-box;" /></strong><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">21. Audio / Video Player </strong>- Self explanatory</div>
<h2 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Helvetica, Arial, sans-serif; font-size: 24px; font-stretch: inherit; font-weight: 400; line-height: 1.16667; margin: 0px 0px 8px; outline: 0px; padding: 0px; vertical-align: baseline;">
Search Tracker<br style="box-sizing: border-box;" /></h2>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">22. Search - </strong>These apps are involved in providing off-site search, so if search functionality is broken these are the entries to look at</div>
<h2 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Helvetica, Arial, sans-serif; font-size: 24px; font-stretch: inherit; font-weight: 400; line-height: 1.16667; margin: 0px 0px 8px; outline: 0px; padding: 0px; vertical-align: baseline;">
Website Management Trackers</h2>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><br style="box-sizing: border-box;" />23. A/B Testing </strong>- Tracking apps that provide A/B testing scaffolds for web-sites<br style="box-sizing: border-box;" /><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><br style="box-sizing: border-box;" /></strong><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">24. Font Systems</strong> - That affect how your fonts are rendered on the web sites</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">25. Tag Manager</strong> - THis is a collection of apps that provide third party tag management<br style="box-sizing: border-box;" /><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><br style="box-sizing: border-box;" />26. Site Optimization</strong> - These apps provide various means to optimize visited websites</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Data source </strong>: Ghostery extension for chrome</div>
<blockquote style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Georgia; font-size: 24px; font-stretch: normal; font-style: italic; line-height: 38px; margin: 50px 0px; outline: 0px; padding: 0px 80px; position: relative; quotes: none; text-align: center; vertical-align: baseline;">
Every top website you visit integrates with average 5 different tracking companies out of 2000, so as to target your identity and improve marketability. Source <a href="http://www.digitaltrends.com/web/top-100-websites-how-are-they-tracking-you/" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">here</a>.</blockquote>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Install Ghostery extension from <a href="https://chrome.google.com/webstore/detail/ghostery/mlomiejdfkolichcflejclcbmpeaniij" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">here</a> and visit top websites. You should be able to see a number on the Ghostery app. Screenshot showing 13 trackers on cnn.com </div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<img class="center" data-loading-tracked="true" height="482" src="https://media.licdn.com/mpr/mpr/shrinknp_800_800/AAEAAQAAAAAAAAP7AAAAJDQ4MWU0NGJkLTc4YWQtNGRhMi04N2IxLWFiOGViODkzOWZkMQ.png" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 30px auto; max-width: 100%; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;" width="640" /></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br style="box-sizing: border-box;" />Below screenshot showing 2000+ trackers and categories.</div>
<h2 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Helvetica, Arial, sans-serif; font-size: 24px; font-stretch: inherit; font-weight: 400; line-height: 1.16667; margin: 0px 0px 8px; outline: 0px; padding: 0px; vertical-align: baseline;">
<img class="center" data-loading-tracked="true" height="500" src="https://media.licdn.com/mpr/mpr/shrinknp_800_800/AAEAAQAAAAAAAAb0AAAAJGM0ODdmYjAyLWQ3ZmUtNDIyOS05OGZiLTEyMjNiNmZiNzdhMA.png" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 30px auto; max-width: 100%; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;" width="640" /></h2>
<h2 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Helvetica, Arial, sans-serif; font-size: 24px; font-stretch: inherit; font-weight: 400; line-height: 1.16667; margin: 0px 0px 8px; outline: 0px; padding: 0px; vertical-align: baseline;">
</h2>
<h2 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Helvetica, Arial, sans-serif; font-size: 24px; font-stretch: inherit; font-weight: 400; line-height: 1.16667; margin: 0px 0px 8px; outline: 0px; padding: 0px; vertical-align: baseline;">
How can you prevent tracking & improve privacy ?</h2>
<ol style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 24.5455px; margin: 0px 0px 15px; outline: 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;"><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Install Ghostery chrome extension </strong>and block all trackers from <a href="https://chrome.google.com/webstore/detail/ghostery/mlomiejdfkolichcflejclcbmpeaniij" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">here</a>. FireFox extension <a href="https://addons.mozilla.org/en-US/firefox/addon/ghostery/" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">here</a>.</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;"><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Use Incognito / Private browsing </strong>mode while you do shopping, research, or do casual browsing. Start with clean slate and prevent your browsing patterns been read by websites.</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;"><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Tor Browser - </strong>Use Tor browser is browser to hide your identity from websites. <strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><br style="box-sizing: border-box;" /></strong></li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;"><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Tor Router </strong>- User Tor Router provides online anonymity and privacy - better solution than Tor browser. It encrypts all data so that ISP can’t see. You physical address gets hidden from websites can thus blocking targeted ads. Visit -<a href="http://privacyontop.com/" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">http://PrivacyOnTop.com</a> . Privacy On Top is custom Wi-Fi router with Tor installation built for privacy and security.</li>
</ol>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Data source </strong>: </strong>Ghostery extension for chrome</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Author<br style="box-sizing: border-box;" /><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Mangesh Bhamre</strong></div>
Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com0tag:blogger.com,1999:blog-5616099921379206790.post-18208056388116186662015-11-21T14:19:00.000+00:002015-11-21T17:47:10.530+00:00Safe on Net<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaWhahNlgFESxawGSC6nM3z0RolumRHRoktsC9kuMXb3QfvS9KPYLutZota4EmrwKju5U67yFM6l5pzu7Kdl85KeEa6vbPwJdtH6pjnHQ747PuUpDZ_cajAxA0jwUBCE9Sypwhudyv_Ecw/s1600/Screenshot+from+2015-11-21+14%253A18%253A15.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="418" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaWhahNlgFESxawGSC6nM3z0RolumRHRoktsC9kuMXb3QfvS9KPYLutZota4EmrwKju5U67yFM6l5pzu7Kdl85KeEa6vbPwJdtH6pjnHQ747PuUpDZ_cajAxA0jwUBCE9Sypwhudyv_Ecw/s640/Screenshot+from+2015-11-21+14%253A18%253A15.png" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<div dir="ltr" style="line-height: 1.656; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">As a parent, you want to keep your child safe always. It’s natural to be concerned about internet usage because we’ve all come across content no youngster should see.</span></div>
<b id="docs-internal-guid-b464916a-2b27-641f-7d89-67a277f6256b" style="font-weight: normal;"><br /></b>
<div dir="ltr" style="line-height: 1.656; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">But that should not hold you back from allowing your child to access the web in a safe and secure way. Some 98% of young people use the internet, and just under half of these use it every day to make friends, play games, download music and do their homework.</span></div>
<b style="font-weight: normal;"><br /></b>
<div dir="ltr" style="line-height: 1.656; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">But, unfortunately, and often times inadvertently, kids are stumbling upon unsuitable internet content.</span></div>
<b style="font-weight: normal;"><br /></b>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Parents have many questions: How do I stop my child from accessing bad internet sites? What do I do if I find my child is looking at pornographic material? Is the internet good or bad for my child?</span></div>
<h2 dir="ltr" style="line-height: 1.38; margin-bottom: 6pt; margin-top: 18pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 21.333333333333332px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Some scary facts</span></h2>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">1. 42.1% of kids admit they have seen online porn. One in 16 have been exposed to hardcore pornography.</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br class="kix-line-break" /></span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">2. One in 12 have exchanged messages with sexual content to other people, while one in 25 have sent graphic photos of themselves.</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br class="kix-line-break" /></span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">3. 25% of children get away with pretending to be older to get an account online.</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br class="kix-line-break" /></span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">4. One in 20 children admitted arranging a secret meeting with someone they met online.</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br class="kix-line-break" /></span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">5. Almost three in 10 parents (29%) let their kids use the internet without any restrictions or supervision.</span></div>
<b style="font-weight: normal;"><br /></b>
<h2 dir="ltr" style="line-height: 1.38; margin-bottom: 6pt; margin-top: 18pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 21.333333333333332px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Parental Controls made simple</span></h2>
<div dir="ltr" style="line-height: 1.656; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Let’s face it… life gets busy. You can‘t always be there to monitor everything your children see online. But from within the walls of your own home, online pornography and illicit content threatens their innocence. It’s far more dangerous than you may believe, and it’s always just a few clicks away.</span></div>
<b style="font-weight: normal;"><br /></b>
<h2 dir="ltr" style="line-height: 1.656; margin-bottom: 6pt; margin-top: 18pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 21.333333333333332px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Safe On Net Wi-Fi router - With Parental Controls</span></h2>
<div dir="ltr" style="line-height: 1.656; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Safe On Net is a Wi-Fi router that provides parental control to connected devices</span></div>
<ol style="margin-bottom: 0pt; margin-top: 0pt;">
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.656; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">It is pre-configured to block adult content</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.656; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Forces safe search on google and image search</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.656; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Forces Safety on YouTube</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.656; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Protect every device in your home, instantly</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.656; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Blocks pornographic content, proxies and anonymizer</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.656; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Easy to setup. Just connect network devices to Kids Safe Wi-Fi and protection is ON.</span></div>
</li>
</ol>
<b style="font-weight: normal;"><br /></b>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Please join our beta program to get the software product free - Fill in the survey & join</span><a href="https://goo.gl/qWkoKK" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;"> https://goo.gl/qWkoKK</span></a></div>
<h2 dir="ltr" style="line-height: 1.38; margin-bottom: 6pt; margin-top: 18pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 21.333333333333332px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">One Less Thing To Worry About</span></h2>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Life brings plenty of worries, but protecting your children online doesn’t have to be one of them. Now you have an easy way to block pornography and illicit content throughout your entire home with one simple solution.</span></div>
<h3 dir="ltr" style="line-height: 1.656; margin-bottom: 4pt; margin-top: 16pt; text-align: center;">
<span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 18.666666666666664px; font-style: italic; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Safe On Net - A product designed by parents, for parents.</span></h3>
<br />
<div dir="ltr" style="line-height: 1.656; margin-bottom: 0pt; margin-top: 0pt; text-align: center;">
<a href="http://www.safeon-net/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">www.SafeOn-Net</span></a><span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">.com</span></div>
<div>
<span style="background-color: transparent; color: #1155cc; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;"><br /></span></div>
</div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgomddIJzS110G94PTD9Yy7oKmQfpKosJj_kJwKl8GPy43Bw6Z_00yLldM_ZQS0aud3C7fWHlCCEPGpeZREb0plCbw9-LaLjsTE2-ayNco5Q50kNVOqSwTgaYRodJ6kQ2ufy-r35W21dXFD/s1600/Screenshot+from+2015-11-21+14%253A19%253A56.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="516" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgomddIJzS110G94PTD9Yy7oKmQfpKosJj_kJwKl8GPy43Bw6Z_00yLldM_ZQS0aud3C7fWHlCCEPGpeZREb0plCbw9-LaLjsTE2-ayNco5Q50kNVOqSwTgaYRodJ6kQ2ufy-r35W21dXFD/s640/Screenshot+from+2015-11-21+14%253A19%253A56.png" width="640" /></a></div>
<h3 dir="ltr" style="line-height: 1.38; margin-bottom: 4pt; margin-top: 16pt; text-align: center;">
<br /></h3>
<div>
<br /></div>
Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com0tag:blogger.com,1999:blog-5616099921379206790.post-36276940378168729562015-10-23T10:14:00.004+01:002015-10-23T10:14:41.961+01:00Improve your online privacy using Privacy On Top<table style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-collapse: collapse; border-spacing: 0px; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 27px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><tbody style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<tr style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><blockquote style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Georgia; font-size: 24px; font-stretch: normal; font-style: italic; line-height: 38px; margin: 50px 0px; outline: 0px; padding: 0px 80px; position: relative; quotes: none; text-align: center; vertical-align: baseline;">
“I don't believe society understands what happens when everything is available, knowable and recorded by everyone all the time” - <strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Google Chairman Eric Schmidt</strong> <a href="http://online.wsj.com/article/SB10001424052748704901104575423294099527212.html" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">told</a> the Wall Street Journal 8-14-10.</blockquote>
<blockquote style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Georgia; font-size: 24px; font-stretch: normal; font-style: italic; line-height: 38px; margin: 50px 0px; outline: 0px; padding: 0px 80px; position: relative; quotes: none; text-align: center; vertical-align: baseline;">
“We know where you are. We know where you've been. We can more or less know what you're thinking about;” - <strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Google Chairman Eric Schmidt</strong> 10-1-10 per the <a href="http://www.theatlantic.com/technology/archive/2010/10/googles-ceo-the-laws-are-written-by-lobbyists/63908/" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">Atlantic</a>.</blockquote>
</td></tr>
</tbody></table>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Privacy problems with today’s internet: </strong></div>
<ol style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 27px; margin: 0px 0px 15px; outline: 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Your ISP knows everything about your online activity</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Websites knows you physical location and have data about you. Can trace how often you visit and more</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">You are constantly watched and your data is been recorded</li>
</ol>
<table style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-collapse: collapse; border-spacing: 0px; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 27px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><tbody style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<tr style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><blockquote style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Georgia; font-size: 24px; font-stretch: normal; font-style: italic; line-height: 38px; margin: 50px 0px; outline: 0px; padding: 0px 80px; position: relative; quotes: none; text-align: center; vertical-align: baseline;">
“Even if you're not doing anything wrong, you are being watched and recorded” - <strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Edward Snowden</strong></blockquote>
</td></tr>
</tbody></table>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Online Security Problem:</strong></div>
<ol style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 27px; margin: 0px 0px 15px; outline: 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">You could land up in phishing website that looks exactly like your bank website or facebook or the one you frequently visit and end-up giving your credentials</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Identity theft is a serious issue and anyone who doesn’t take precaution is putting themselves at risk of becoming the next victim.</li>
</ol>
<table style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-collapse: collapse; border-spacing: 0px; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 27px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><tbody style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<tr style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><blockquote style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Georgia; font-size: 24px; font-stretch: normal; font-style: italic; line-height: 38px; margin: 50px 0px; outline: 0px; padding: 0px 80px; position: relative; quotes: none; text-align: center; vertical-align: baseline;">
“I always tell people that if you haven’t had your identity stolen already, you will,' 'There are just so many outlets and so many ways it can happen.” - Mike Sullivan, director of education for <a href="http://www.takechargeamerica.org/" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">Take Charge America</a></blockquote>
</td></tr>
</tbody></table>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Multi Device Problems:</strong></div>
<table style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-collapse: collapse; border-spacing: 0px; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 27px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><tbody style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<tr style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><blockquote style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Georgia; font-size: 24px; font-stretch: normal; font-style: italic; line-height: 38px; margin: 50px 0px; outline: 0px; padding: 0px 80px; position: relative; quotes: none; text-align: center; vertical-align: baseline;">
“Average number of devices per person is 2.5 in developed countries” - <a href="http://www.statista.com/statistics/333861/connected-devices-per-person-in-selected-countries/" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">statista</a></blockquote>
</td></tr>
</tbody></table>
<ol style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 27px; margin: 0px 0px 15px; outline: 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">No centralized way to get online privacy or security</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Each device needs to have some kind of app/installation if we wish to stay secure</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Management cost of protecting all devices is high</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">There are devices which connect to Internet, however there is no control over installing any security software. e.g. TV, XBOX, Apple TV, Chromecast and other boxed devices.</li>
</ol>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br style="box-sizing: border-box;" /><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Solution: </strong>Privacy On Top</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><img class="center" data-loading-tracked="true" height="395" src="https://media.licdn.com/mpr/mpr/shrinknp_800_800/AAEAAQAAAAAAAAS2AAAAJGM3ZDFmNjk0LTk2NTAtNDQ4NC04MDQ3LWM3NmExZWI5NDZlNg.png" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 30px auto; max-width: 100%; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;" width="702" /></strong><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Solution: Privacy On Top</strong><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><br style="box-sizing: border-box;" /></strong></strong></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<a href="http://privacyontop.com/" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">Privacy on top</a> is the feature rich firmware/software for your Wi-Fi router which offers online privacy and security to connected devices.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
It exposes two separate Wi-Fi from the router, one Wi-Fi for online security and other for online privacy/anonymity.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Privacy On Top is built using open source OpenWRT operating system that runs on Wi-Fi router. OpenWRT turns your ordinary router to smart router by providing customizable functionality.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Privacy On Top uses TOR Network for privacy. TOR protects you by bouncing your network traffic around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Visit TorProject for more details on how Tor protects you online.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Privacy on Top also gives you advantage of <a href="http://opendns.com/" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">OpenDNS</a> and <a href="https://dnscrypt.org/" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">DNScrypt</a>. Which in simple words means online security. OpenDNS helps prevent identity theft, blocks phishing sites and bad websites. It speeds up your existing internet connection. You can visit OpenDNS for more information about how you can get online security with it.</div>
<table style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-collapse: collapse; border-spacing: 0px; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 27px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><tbody style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<tr style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><blockquote style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Georgia; font-size: 24px; font-stretch: normal; font-style: italic; line-height: 38px; margin: 50px 0px; outline: 0px; padding: 0px 80px; position: relative; quotes: none; text-align: center; vertical-align: baseline;">
“Anonymity is valuable for all the reasons. It protects privacy, it empowers individuals, and it’s fundamental to liberty” <a href="https://www.goodreads.com/author/show/175417.Bruce_Schneier" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">Bruce Schneier</a>, <a href="https://www.goodreads.com/work/quotes/41629774" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World</a></blockquote>
</td></tr>
</tbody></table>
<table style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-collapse: collapse; border-spacing: 0px; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 27px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><tbody style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<tr style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><blockquote style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Georgia; font-size: 24px; font-stretch: normal; font-style: italic; line-height: 38px; margin: 50px 0px; outline: 0px; padding: 0px 80px; position: relative; quotes: none; text-align: center; vertical-align: baseline;">
“Securing the device is not enough anymore, you need to secure network. Centralized network security solution to protect all home/office devices is future” - <strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Mangesh Bhamre</strong> CTO, Open Netware</blockquote>
</td></tr>
</tbody></table>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/KqA0Li8SAkg?wmode=transparent" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-style: initial; border-width: 0px; box-sizing: border-box; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px auto; outline: 0px; padding: 0px; vertical-align: baseline;" width="560"></iframe></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><br style="box-sizing: border-box;" /></strong><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Why Privacy on Top?</strong><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><br style="box-sizing: border-box;" /></strong></strong></div>
<h5 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue'; font-size: 16px; font-stretch: inherit; line-height: 1.5; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">
ONLINE PRIVACY</h5>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
What you do over Internet can be easily tracked by interested parties like your ISP, government, websites you visit, hackers etc. Your online privacy is at stake. Your physical location can be exposed and your browsing patterns can be learnt as you use Internet.</div>
<h5 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue'; font-size: 16px; font-stretch: inherit; line-height: 1.5; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">
ONLINE SECURITY:</h5>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
You are not safe online. Many times, you come across phishing sites or unnecessary ads bothers your security. Who knows, your ISP or hacker may be sitting in between you and your sites and reading the data you send over internet.</div>
<h5 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue'; font-size: 16px; font-stretch: inherit; line-height: 1.5; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">
CUSTOM FEATURE RICH FIRMWARE</h5>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Your existing firmware offers only limited set of features which are developed by your router's manufacturer. Also existing firmware is vulnerable to common attacks. Your router is way too smart device than you think it is. The only thing lacking in that device is smart operating system. Using new firmware you can your router with full throttle.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">How to get Privacy On Top ?</strong></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Open Netware has built an android app that can be <a href="https://play.google.com/store/apps/details?id=com.privacyontop.app" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank"><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">downloaded here</strong></a>. App guides you to detect, install and setup your Wi-Fi router with new firmware.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Privacy On Top App does following steps -</strong></div>
<ol style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 27px; margin: 0px 0px 15px; outline: 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Pre-Install check to see if you are connected to Wi-Fi and that required disk space exist to download firmware</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Detects router based on MAC address and Web Interface</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Downloads appropriate firmware and installs it using web interface on Wi-Fi router</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Reboots the router and setup up new SSIDs with new password</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Connects you to newly configured Wi-Fi</li>
</ol>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<table style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-collapse: collapse; border-spacing: 0px; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 27px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><tbody style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<tr style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><blockquote style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Georgia; font-size: 24px; font-stretch: normal; font-style: italic; line-height: 38px; margin: 50px 0px; outline: 0px; padding: 0px 80px; position: relative; quotes: none; text-align: center; vertical-align: baseline;">
“Privacy On Top is unique solution to your privacy and security at home/office/travel. All your data gets encrypted as it leaves from your Wi-Fi router ensuring no one can snoop it”</blockquote>
</td></tr>
</tbody></table>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">What is TOR and Why we use TOR Network to get privacy?</strong></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Read more <a href="https://www.torproject.org/about/overview.html.en" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">here</a>.<br style="box-sizing: border-box;" /><br style="box-sizing: border-box;" />Reference - <a href="https://www.torproject.org/" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">https://www.torproject.org</a></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
TOR is trusted name in anonymity and privacy. Your data gets encrypted between Wi-Fi router and TOR-exit nodes and thus all kind of network traffic is been protected from ISP and intermediate gateways.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Using TOR does not log any info similar to other privacy techniques e.g VPN and thus TOR is our preferred way of providing privacy.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Who use TOR?</strong></div>
<ol style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 27px; margin: 0px 0px 15px; outline: 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;"><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Family & Friends</strong> - People like you and your family use Tor to protect themselves, their children, and their dignity while using the Internet.</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;"><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Businesses </strong>- Businesses use Tor to research competition, keep business strategies confidential, and facilitate internal accountability.</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;"><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Activist </strong>- Activists use Tor to anonymously report abuses from danger zones. Whistleblowers use Tor to safely report</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;"><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Media </strong>- Journalists and the media use Tor to protect their research and sources online.</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;"><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Military and law enforcements </strong>- Militaries and law enforcement use Tor to protect their communications, investigations, and intelligence gathering online.</li>
</ol>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Reference - <a href="https://www.torproject.org/" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">https://www.torproject.org</a></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">What is OpenDNS / DNSCrypt & Why we use it ?</strong></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
OpenDNS is company that provides secure DNS (Domain name system) service. In simple terms, they categorize websites as good and bad. If you are trying to visit a website that is bad then OpenDNS blocks you from visiting that site.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="color: rgba(0, 0, 0, 0.701961); font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit;">It provides protection against phishing thereby blocking you from visiting fraudulent bank websites .</span></div>
<ol style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 27px; margin: 0px 0px 15px; outline: 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">In addition OpenDNS makes browsing faster and smarter.</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">OpenDNS and DNSCrypt is free. You can get more features of OpenDNS if you upgrade for premium account.</li>
</ol>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">What is OpenWRT & Why we use it?</strong></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Privacy On Top firmware is built using open source Linux operating system called OpenWRT. It is secured and community of people help is to make it secure everyday.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
We have further secured Wi-Fi router by taking care of all common attacks known to newly purchased router.</div>
<ol style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 27px; margin: 0px 0px 15px; outline: 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Wi-Fi passwords are long and complex.</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Password for admin is auto-generated when you setup the router and is unique and long enough for any sorts of login attacks.</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Wi-Fi security is set to highest encryption standard i.e. WPA2-AES</li>
</ol>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Software Stack on Wi-Fi Router:</strong></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><img class="center" data-loading-tracked="true" height="360" src="https://media.licdn.com/mpr/mpr/shrinknp_800_800/AAEAAQAAAAAAAATyAAAAJGYyZjUwZjcyLTNjMjctNDYwOS1hZDBkLWY3Nzc1MDU0OGU2YQ.png" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 30px auto; max-width: 100%; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;" width="640" /></strong></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Privacy On Top Website:</strong></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<a href="http://privacyontop.com/" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">http://privacyontop.com/</a></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Android App Download Link:</strong></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<a href="https://play.google.com/store/apps/details?id=com.privacyontop.app" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">https://play.google.com/store/apps/details?id=com.privacyontop.app</a></div>
<table style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-collapse: collapse; border-spacing: 0px; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 27px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><tbody style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<tr style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><blockquote style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: Georgia; font-size: 24px; font-stretch: normal; font-style: italic; line-height: 38px; margin: 50px 0px; outline: 0px; padding: 0px 80px; position: relative; quotes: none; text-align: center; vertical-align: baseline;">
“Privacy On Top is Centralized way of protecting all your network devices at home”</blockquote>
</td></tr>
</tbody></table>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div>
<br /></div>
Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com0tag:blogger.com,1999:blog-5616099921379206790.post-32682349357575473092015-10-13T14:18:00.002+01:002015-10-13T14:18:12.834+01:00Root your Wi-Fi router to get Privacy - for all connected devices!<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSXUNhnpbZvnjTJ_xrFY8g-D6W-aoC19kT0cT7G3VQb9SdQRkPD94YwZX3Awdlr7-Or-ATh8byLx55B-RQ6U8BznPuhonKttvZWFz5KwQO94PRQIM4vF267_TV7n5OrUdERHr3klMsYVhk/s1600/AAEAAQAAAAAAAAZmAAAAJDJkNmEyZjA2LWUyNzctNDEyMy05NWNkLWNjNzQ3ODg5Yzc5MQ.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSXUNhnpbZvnjTJ_xrFY8g-D6W-aoC19kT0cT7G3VQb9SdQRkPD94YwZX3Awdlr7-Or-ATh8byLx55B-RQ6U8BznPuhonKttvZWFz5KwQO94PRQIM4vF267_TV7n5OrUdERHr3klMsYVhk/s640/AAEAAQAAAAAAAAZmAAAAJDJkNmEyZjA2LWUyNzctNDEyMy05NWNkLWNjNzQ3ODg5Yzc5MQ.png" width="640" /></a></div>
<div style="color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; line-height: 32px; margin-bottom: 32px;">
Rooting Android phone using Cyanogenmod (or similar mods) gives your phone pure android experience without any blotted apps. You get features that are not available on default firmware to make it feature rich. It’s built on open source and you can rely on it.</div>
<div style="color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; line-height: 32px; margin-bottom: 32px;">
What if you could root Wi-Fi router to get new feature set ? E.g. <a data-mce-href="http://torproject.org" href="http://torproject.org/" style="color: #8c68cb; text-decoration: none;" target="_blank"><strong>TOR based privacy</strong></a><strong> via Wi-Fi </strong>or <strong>Online Security </strong>or get <strong>Secured and customizable OS on router</strong> - Sounds interesting ?</div>
<div style="color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; line-height: 32px; margin-bottom: 32px;">
Wi-Fi routers in market are re-programmable. You could install new firmware on it to make it enterprise grade router. </div>
<div style="color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; line-height: 32px; margin-bottom: 32px;">
<strong>How to root your Wi-Fi router ?</strong></div>
<ul style="color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; padding-left: 35px; padding-right: 0px;">
<li style="line-height: 32px; margin-bottom: 15px; margin-top: 0px;">If you are a super geek, you could install <a data-mce-href="http://openwrt.org" href="http://openwrt.org/" style="color: #8c68cb; text-decoration: none;" target="_blank">OpenWRT</a> and configure it as you want.</li>
<li style="line-height: 32px; margin-bottom: 15px; margin-top: 0px;">OpenWRT is Open Source Linux distribution for Wi-Fi router. Its free for anyone to download and use</li>
<li style="line-height: 32px; margin-bottom: 15px; margin-top: 0px;">OpenWRT is customizable and there are packages available that you could download and install on top of it to provide TOR Privacy, Security or more.</li>
</ul>
<div style="color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; line-height: 32px; margin-bottom: 32px;">
<strong>What’s the catch with it?</strong>Problem is that it’s NOT easy for geeks to do it right. Your router could be bricked and that you could spend endless time fiddling with it. Surely it’s doable and not impossible task. Please do it at your own risk - my DISCLAIMER.</div>
<div style="color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; line-height: 32px; margin-bottom: 32px;">
<strong>What’s the alternative ?</strong>Open Netware a startup, has came up with revolutionary android app<br />“<a data-mce-href="http://PrivacyOnTop.com" href="http://privacyontop.com/" style="color: #8c68cb; text-decoration: none;" target="_blank">Privacy On Top</a>” that can install new firmware on router over air.</div>
<div style="color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; line-height: 32px; margin-bottom: 32px;">
<strong>How does it work?</strong>Just install an Android App - “<a data-mce-href="http://PrivacyOnTop.com" href="http://privacyontop.com/" style="color: #8c68cb; text-decoration: none;" target="_blank">Privacy On Top</a>” and that will guide you through 6 simple install steps. You don’t need to touch your Wi-Fi router and everything happens over air. Interesting?</div>
<div style="color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; line-height: 32px; margin-bottom: 32px;">
<strong>Is my router supported ?</strong>Privacy On Top currently supports set of 7 widely used routers. TPLink, DLink and Western Digital. Exact list could be found <a data-mce-href="http://privacyontop.com/supportedrouterlist.html" href="http://privacyontop.com/supportedrouterlist.html" style="color: #8c68cb; text-decoration: none;" target="_blank">here</a>.</div>
<div style="color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; line-height: 32px; margin-bottom: 32px;">
<strong>What do I get with Privacy On Top firmware?</strong></div>
<ol style="color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; padding-left: 35px; padding-right: 0px;">
<li style="line-height: 32px; margin-bottom: 15px; margin-top: 0px;">A dedicated Wi-Fi for privacy using TOR Network. All your devices get connected to TOR Network. Everything coming out of router will be encrypted and cannot be snooped by ISP</li>
<li style="line-height: 32px; margin-bottom: 15px; margin-top: 0px;">A dedicated Wi-Fi for Online Security using <a data-mce-href="http://opendns.com" href="http://opendns.com/" style="color: #8c68cb; text-decoration: none;" target="_blank">OpenDNS</a> and <a data-mce-href="http://dnscrypt.org/" href="http://dnscrypt.org/" style="color: #8c68cb; text-decoration: none;" target="_blank">DNSCrypt</a>. It secures you from phishing and bad websites by blocking the traffic. Read about OpenDNS here.</li>
<li style="line-height: 32px; margin-bottom: 15px; margin-top: 0px;">Secured and customized ready to use OS that protects you against all known attacks on Wi-Fi routers.<br /></li>
</ol>
<div style="color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; line-height: 32px; margin-bottom: 32px;">
<strong>Download App or have more Questions ?</strong><a data-mce-href="http://PrivacyOnTop.com" href="http://privacyontop.com/" style="color: #8c68cb; text-decoration: none;" target="_blank">http://PrivacyOnTop.com</a></div>
Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com1tag:blogger.com,1999:blog-5616099921379206790.post-223097341518175692015-09-26T18:36:00.003+01:002015-09-26T18:36:53.964+01:00Gmail’s Unsubscribe option may lead to more emails!<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTYps9tuT7wQYSpGlBplnWC-cImmNK-xZ1BHGRQGEk0j6pdtAoki4ovxLtv78Dmn5Ivlz4hDpf6TC1Rr3qyoSXo8xxvrDqufgXdpzo7nWPLttRzPgUoh-zQ6R1LbUjRPKt0Pk4LuCoQSet/s1600/Untitled+presentation+%25281%2529.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTYps9tuT7wQYSpGlBplnWC-cImmNK-xZ1BHGRQGEk0j6pdtAoki4ovxLtv78Dmn5Ivlz4hDpf6TC1Rr3qyoSXo8xxvrDqufgXdpzo7nWPLttRzPgUoh-zQ6R1LbUjRPKt0Pk4LuCoQSet/s640/Untitled+presentation+%25281%2529.png" width="640" /></a></div>
<br />
<span style="color: #232629; font-family: Georgia, serif; font-size: 18px; line-height: 32px;">Gmail recently launched ‘Unsubscribe’ option on Android to let people opt out of eligible mailing lists directly from the Gmail app. It’s perfect for those newsletters you subscribed to a while back but don’t read any more.</span><br />
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">What if you never subscribed or don’t remember you ever did ? <br style="box-sizing: border-box;" /></strong>You might be performing email verification in this case. Performing ‘Unsubscribe’ in turn sends email to the mailing list. You may be validating your email address and let service know its active.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Result </strong>- More marketing offers and more spam. </div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">What you can do?</strong></div>
<ul style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 27px; margin: 0px 0px 15px; outline: 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Double check before you unsubscribe</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">If unsure about subscription, better option is to <strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Report spam </strong>or <strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Block</strong>.</li>
</ul>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Your email address is private - Keep it private!</div>
Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com0tag:blogger.com,1999:blog-5616099921379206790.post-10058412548599850832015-08-22T20:19:00.000+01:002015-08-23T04:49:41.993+01:00Why NOT to upgrade to Windows 10!<br />
New Windows 10 OS from Microsoft is launched and available world wide now. People get free upgrade to new shiny OS from Microsoft and everyone is happy about it. Here are the hidden facts that you should care about!<br />
<br />
#1 <b>Whatever you say is getting recorded via mic and sent to Microsoft</b><br />
Microsoft has given a nice name to it called 'Cortana', the voice assistance to help you search and type. However it records every word you say and transmits it. All your meeting minutes, private discussions are been processed and maintained by Microsoft.<br />
<br />
#2 <b>Whatever you type on your keyboard gets sent to Microsoft</b><br />
That means you give all your passwords, emails, chats, comments, account numbers to Microsoft as you type! Reasoning Microsoft gives for this is to auto-correct spellings and provide word recommendation for faster typing. They have installed key-logger officially on Windows 10.<br />
<br />
#3 <b>All documents/photos/content on your computer gets backed up on Microsoft servers</b> and can get shared with governments if asked<br />
<br />
#4 <b>Unique ID that can be used by apps for advertisement purposes</b>. Data/Activities/Ads from all apps can be co-related with your identity and available to companies.<br />
<br />
#5 <b>Location/Camera services available to all apps on request</b>. Any app can now request for location or camera and use it.<br />
<br />
#6 Your settings, web history, apps and data are synced to provide seamless experience across devices. Lots of data is captured and available to Microsoft for all good/bad reasons. <br />
<br />
Go ahead and enable privacy settings if you have upgraded to Windows 10. Be secure and keep private things private. Here is how - http://www.ghacks.net/2015/07/30/windows-10-and-privacy/<br />
<br />
Why not try Linux? That's free too and respects your privacy!<br />
<br />Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com0tag:blogger.com,1999:blog-5616099921379206790.post-33725732596378969092014-06-26T22:07:00.001+01:002014-06-26T22:07:47.921+01:00Incognito mode for Phone calls ?<b>Your phone call-log reveals lot about you:</b> Your Phone call-log is equally important as your emails, online accounts as it can reveal huge amount of information about you. What kind of person you are and what you do. What you work on and to whom you talk to frequently. Over the time it grows and maintains critical info about you, your relationships, your work, your friends, your business, your food orders and your health.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1A-MeKhe3w5ICv_nzKfU4J_9EfoqmZGDsSnhpR9ELWkc9yoCH3R2YDwabHXaVLlDG6wKwNVJBNLt4zWEjAwm_uZyu60LmwYsfgdj2gWIF-uk4PaRQhNBoYRynfp7S7Q_SmBdhG1QsJQa4/s1600/DSC_0616.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1A-MeKhe3w5ICv_nzKfU4J_9EfoqmZGDsSnhpR9ELWkc9yoCH3R2YDwabHXaVLlDG6wKwNVJBNLt4zWEjAwm_uZyu60LmwYsfgdj2gWIF-uk4PaRQhNBoYRynfp7S7Q_SmBdhG1QsJQa4/s1600/DSC_0616.JPG" height="265" width="400" /></a></div>
<br />
<br />
<b>Your phone call-log is not private any more:</b><br />
This info can be used in multiple ways to map your identity and people you communicate too. And it's too easy to capture this info and send it across to third-party. You just have to install an app(e.g. games on android) that reads your call log and send it to third-party server; which happens behind the scene while you enjoy games. Thereon your call-log can be sold/shared/investigated and can become public information. <br />
<br />
Your call-log can provide sensitive info based on where you work. Companies provide BYOD (Bring your own device) policies for employees and secure it with PIN and encrypted emails. However call log is still available games employees install and play and can be passed on to third-party. Are you working in defense, research, mission critical projects, marketing, sales ? You better maintain your call-log!<br />
<br />
<b>Call-log gets backed up:</b><br />
Many of the apps do backup your call-log so as to provide a backup service to you. Again this info is stored on servers and multiple copies are maintained. If your on-line account to that maintains backup is hacked all your info is then in hands of hackers and thus public.<br />
<br />
<b>Solution is to maintain privacy and be aware about your call-log: </b><br />
<span class="Apple-tab-span" style="white-space: pre;"> </span>1. Ensure that you are not installing apps that needs permission to you call log and other personal data<br />
<span class="Apple-tab-span" style="white-space: pre;"> </span>2. Ensure you delete/hide call log of important calls. Use '<a href="https://play.google.com/store/apps/details?id=com.petalapps.privatecall">Private Call</a>' app. This app auto-deletes call-log for incoming/outgoing/missed call and no data is available for anyone to see or any app to read.<br />
<br />
<b>Idea behind Private Call app:</b> Auto-delete call log entries of private conversations and provide incognito mode for your phone calls.<br />
<br />
<b>How Private Call app works:</b><br />
<span class="Apple-tab-span" style="white-space: pre;"> </span>- It auto-deletes call-log for specified private contacts<br />
<span class="Apple-tab-span" style="white-space: pre;"> </span>- Incoming / outgoing and missed call-log get deleted at the end of call<br />
<span class="Apple-tab-span" style="white-space: pre;"> </span>- Provides password access to private contact list and private call-log<br />
<span class="Apple-tab-span" style="white-space: pre;"> </span>- You can hide the this app(using other icon hide app) and still launch it using ##PIN in dial pad<br />
<span class="Apple-tab-span" style="white-space: pre;"> </span>- Its free! If you need to add more than 5 private contacts then it provides in-app purchase to go-premium<br />
<br />
Various purposes you can use Private Call for: You can think of any discussions e.g. private calls, business Calls, secret/research projects calls, relationship calls, marketing and sales deals that happen over series of phone calls.<br />
<br />
<b>Google Play link : </b><a href="https://play.google.com/store/apps/details?id=com.petalapps.privatecall">https://play.google.com/store/apps/details?id=com.petalapps.privatecall</a><br />
<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikeXYukEOV4DkXQ_jkHhCnP9tlNvYmdJ1yQR5PIqSbMPKOY7YvqszRWbnJr65kKFSjv4sfv2ZwkxCwOqBhnJXcQGw9zr2mtUouOy5lMCwMP8ZEBDn-Y-QZ0NIXCBXjfeNu1iMoFO2WXxBO/s1600/device-2014-06-23-195632.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikeXYukEOV4DkXQ_jkHhCnP9tlNvYmdJ1yQR5PIqSbMPKOY7YvqszRWbnJr65kKFSjv4sfv2ZwkxCwOqBhnJXcQGw9zr2mtUouOy5lMCwMP8ZEBDn-Y-QZ0NIXCBXjfeNu1iMoFO2WXxBO/s1600/device-2014-06-23-195632.png" height="320" width="180" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOPfHyETDwZ7L71jeO7QMkwfJX1XBzow8AAtT8p8Q_qGzM1ys0AaGamklrX90P5Hgoft8bMbz94vCOXP1HR0vYsKVkPlJ9gQ78xl208EGKykwYb9Ax3Qjxgvp03egScuyQoN43RlEimt9X/s1600/device-2014-06-23-194538.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOPfHyETDwZ7L71jeO7QMkwfJX1XBzow8AAtT8p8Q_qGzM1ys0AaGamklrX90P5Hgoft8bMbz94vCOXP1HR0vYsKVkPlJ9gQ78xl208EGKykwYb9Ax3Qjxgvp03egScuyQoN43RlEimt9X/s1600/device-2014-06-23-194538.png" height="320" width="180" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibqYaZrCYL8WDkZoVf7PcHFnACED6tWzVkUOFQSRGYtvplIAwNOiBcSWdJybMleKbpMAXNJrGaH5jdIc_RHrX13ht3T9Sg4_wpBB-YTlqGCzvUqtB8Wrgi5dH3n8qj0bX2uWmxWNuclrwd/s1600/device-2014-06-23-194445.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibqYaZrCYL8WDkZoVf7PcHFnACED6tWzVkUOFQSRGYtvplIAwNOiBcSWdJybMleKbpMAXNJrGaH5jdIc_RHrX13ht3T9Sg4_wpBB-YTlqGCzvUqtB8Wrgi5dH3n8qj0bX2uWmxWNuclrwd/s1600/device-2014-06-23-194445.png" height="320" width="180" /></a></div>
<div>
<br /></div>
Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com0tag:blogger.com,1999:blog-5616099921379206790.post-60987893154211119862014-06-16T21:15:00.001+01:002014-06-16T21:15:45.520+01:003 Key privacy settings in Facebook you should care about<div class="separator" style="clear: both; text-align: center;">
</div>
Facebook is now the social networking norm and everyone connecting to internet is on Facebook or soon will get on it. No big deal with having a Facebook account and actively using it daily. Kids start Facebook at 13 (officially) and will go till you are alive. It's going to capture all your life events and map it in its timeline.<br />
<br />
You are one of those Facebook users who share things, who over-share or under-share. But you do share! If you don’t then your friends share info about you by means of tagging. Ultimately there is info about you shared directly or indirectly.<br />
<br />
There is ton of info that can be shared and people do share it without a second thought. And this gets into Facebook permanently(even if you delete your account). This info can then be used by public/friends and is no more private.<br />
<br />
Knowing that you will hold Facebook account for lifetime, it's important to review privacy settings and manage who can see your shared info. Here are the key privacy settings that you should set<br />
<br />
<h3>
<b>1. Who can see my stuff? </b></h3>
Manage who can see all that you post on Facebook with this settings. Mark it to 'Friends' only when you share instead of public. Facebook also allows you to control this settings per post that you share so keep a close eye on what you are sharing and whom do you wish that to be seen. Do review your existing post for friends/public sharing.<br />
<br />
Facebook > Settings > Privacy<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrt_y9vCojocRmeE5AODie4Yg-saLQDDajoEnNgBeOHx1Jp0BfV1HWMIGR85rTLJ55gqWhrF9ljwuX28z6onXMyobzewlVbzipPqR36lvdt8muYyCT2_tBNItKsA-U7gg0y7Xor6TeyXDU/s1600/facebook-privacy.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrt_y9vCojocRmeE5AODie4Yg-saLQDDajoEnNgBeOHx1Jp0BfV1HWMIGR85rTLJ55gqWhrF9ljwuX28z6onXMyobzewlVbzipPqR36lvdt8muYyCT2_tBNItKsA-U7gg0y7Xor6TeyXDU/s1600/facebook-privacy.png" height="332" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: left;">
Review sharing option when you are about to post your new photo or status</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjSpYs457ZeGVp2Rr2rr-g4zA64jDHTCPui7CA93VhJSI75SdQVaangdmpRs9WcsWwnmMDtG5JwoXVpEbMg8FpOzD_PquUpSlj6tq8PVapLmH8JqR20-MYWT3rr1In9krPxRq8qFC7KSxL/s1600/facebook-privacy1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjSpYs457ZeGVp2Rr2rr-g4zA64jDHTCPui7CA93VhJSI75SdQVaangdmpRs9WcsWwnmMDtG5JwoXVpEbMg8FpOzD_PquUpSlj6tq8PVapLmH8JqR20-MYWT3rr1In9krPxRq8qFC7KSxL/s1600/facebook-privacy1.png" height="186" width="640" /></a></div>
<br />
<span class="Apple-tab-span" style="white-space: pre;"> </span><br />
<h3>
2. Manage photos that your friends tag you in:</h3>
Photo tagging feature is great. It lets your friends tag you in photos they share. Good thing Facebook does is that it lets you control your photos before it gets to anyone. You can get selectively in adding photos to your timeline even though your friends shared those publicly. Each photo a friend shares of you can be allowed/hidden by you before it gets seen by anyone. Unless you allow, no one will see those or appear in any search results by your friends.<br />
<span class="Apple-tab-span" style="white-space: pre;"> </span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVxOKlsSWXBfTXdqb2HYAKwst9_Xq9lOHkuDqj8zr7NzCS-akQhTrQawO84hkL6Ty6c3k5RaWAomKXCPU0HgytfmxQzH8wwNTxY7_zOKFzl6vyQrp2hokoTew_7yK4c8OF2FUkJxzLOiqz/s1600/facebook-privacy2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVxOKlsSWXBfTXdqb2HYAKwst9_Xq9lOHkuDqj8zr7NzCS-akQhTrQawO84hkL6Ty6c3k5RaWAomKXCPU0HgytfmxQzH8wwNTxY7_zOKFzl6vyQrp2hokoTew_7yK4c8OF2FUkJxzLOiqz/s1600/facebook-privacy2.png" height="332" width="640" /></a></div>
<br />
<br />
<h3>
3. Review how others see your timeline:</h3>
Facebook provides mechanism for you to see how others (public/friends) see your profile. It is very useful to know how your profile/timeline looks when third-party or your friends see it. It will help you hide few things or promote few things in case you missed category.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTKRnSTFRhef8r-UPAHOSCbNVkjmc9Dh2tioYX6XLcrP11r4i7ZfSGGcqct5c-LN00PsVXn6bLIDmZDVY_LNwgfGRjc3vllLy_A73mvDaXHGXwBoopMDjeMvCUUiHgQoy3Q8gzP2wMtyr9/s1600/facebook-privacy3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTKRnSTFRhef8r-UPAHOSCbNVkjmc9Dh2tioYX6XLcrP11r4i7ZfSGGcqct5c-LN00PsVXn6bLIDmZDVY_LNwgfGRjc3vllLy_A73mvDaXHGXwBoopMDjeMvCUUiHgQoy3Q8gzP2wMtyr9/s1600/facebook-privacy3.png" height="198" width="640" /></a></div>
<div>
<br /></div>
<div>
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqWVYn8H9lz73u8i7WB5uWBf_JU7esnHozm27pji9ul-XwMbqVSRu4no2FytiJ-SuxEEb90zepE6R8YCNk1WfW-awDLp1ykeJUIuqzasPjpEhZGhaN3tvEDg1ddToFjx6iCOcAEu4FLc_-/s1600/facebook-privacy4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqWVYn8H9lz73u8i7WB5uWBf_JU7esnHozm27pji9ul-XwMbqVSRu4no2FytiJ-SuxEEb90zepE6R8YCNk1WfW-awDLp1ykeJUIuqzasPjpEhZGhaN3tvEDg1ddToFjx6iCOcAEu4FLc_-/s1600/facebook-privacy4.png" height="210" width="640" /></a></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
Hope this helps to keep your private info with your friends rather than making it public. Do post in for your comments below.</div>
Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com0tag:blogger.com,1999:blog-5616099921379206790.post-87243181756747977652014-06-10T07:05:00.000+01:002014-06-10T07:05:37.619+01:00iOS8 Randomize MAC address for privacy - Great Win!Apple announced bunch of privacy & security features in their <a href="http://www.apple.com/apple-events/june-2014/">2014 WWDC keynote</a> and one of them is randomizing MAC address. This alone is a great feature and would like to see this become industry standard.<br />
<br />
With iOS8 all Apple handheld devices will generate random MAC address while it scans for Wi-Fi network. Doing this protects your privacy by on the go as no one can track you uniquely at a given location. Read my <a href="http://softwaresecurityforyou.blogspot.com/2014/05/malls-track-your-visits-by-wi-fi.html">other blog on Wi-Fi tracking</a> to know more on how MAC address can be used to map your location.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLSeSaWe6QyFF81vn_HvO9InmexHsvWB4xFeaM6LC_S0x_wsc6zvOK9X_7O2IQ2Vj8po8Yw5HQ0WnhvjPLe8eI1POXUmW5j8JYAf6CKyZTCeOhgH1G4wmcWGk2uJx8yskoh4nSJ-DuUeL4/s1600/ios_8_logo_520x300x24_fill_hd5282553.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLSeSaWe6QyFF81vn_HvO9InmexHsvWB4xFeaM6LC_S0x_wsc6zvOK9X_7O2IQ2Vj8po8Yw5HQ0WnhvjPLe8eI1POXUmW5j8JYAf6CKyZTCeOhgH1G4wmcWGk2uJx8yskoh4nSJ-DuUeL4/s1600/ios_8_logo_520x300x24_fill_hd5282553.jpg" height="368" width="640" /></a></div>
<b>So what is MAC Address anyway? </b><br />
MAC address is unique hardware address of your network device. These are unique within network to identify a device and route network traffic to correct device. It is a 6 byte long ID that maps your network device (iPhone, iPad, Android, Laptop, desktop, TV, and all devices that connects to network) on network. This does not change and is set by device manufacturer.<br />
<br />
<b>How is MAC address used ? </b><br />
When your device does connect to any network, it uses MAC address to uniquely identify itself and uses it to communicate over network. With Wi-Fi enabled, your device scans for known Wi-Fi networks that you often connect. When a Wi-Fi scan is done, it sends out your devices MAC address to check if Wi-Fi network is available and if so Wi-Fi router will send you message back to your MAC address. <br />
<br />
With continuous Wi-Fi scan, your MAC (unique address is broadcasted) and that can be tracked by anyone around you to know your presence. <br />
<br />
<b>Privacy Issue with MAC Address:</b><br />
As MAC address is unique and does not change, this is actively used to know more about people and track them as they carry smartphone or ipod/ipad. Your device always sends out network packet in air to scan for Wi-Fi network and leaves behind the traces of your device and indirectly you. Any mall or airport or hotel you visit knows you have been there and how long by mere presence of your smartphone.<br />
<br />
This data about your smartphone can then be shared among multiple malls/hotels to trace you as an individual and track your footprints. A major privacy issue!<br />
<br />
<b>What's the advantage of MAC address randomizing? </b><br />
<br />
<ul>
<li>Apple device now will generate unique MAC address and thus no one can track your presence and map it to you. You gain high level of privacy by not allowing anyone to know you were present at any location.<br /></li>
<li>Malls use Wi-Fi tracking to know more about customers visiting and how long they are in store and how often they visit. This data can then be shared. With MAC randomizing, your individual mapping is broken and there by giving you privacy on the move. </li>
</ul>
<br />
<br />
<a href="http://softwaresecurityforyou.blogspot.com/2014/05/malls-track-your-visits-by-wi-fi.html">My earlier blog details about Wi-Fi tracking</a> and this solution from Apple works great. Solution detailed by Apple is going to add privacy support for individuals. I am sure this will be adopted by Android and Microsoft too. Great work Apple!<br />
<div>
<br /></div>
Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com0tag:blogger.com,1999:blog-5616099921379206790.post-81906571137012319322014-06-09T06:33:00.000+01:002014-06-09T06:33:15.525+01:00Secure your confidential emails using PGP encryptionEmail is the here to stay for long time, though we have moved to chat, voice call, video /skype calls, twitter and Facebook messages. Good amount of information is communicated over emails and that is part of our daily routine.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTHt9HPoNEh9QEgf4t1VU9-FxxHPJw2yE3Tq98ty4K6Txejgj834BWQ9uIvm-PkMSh9eDVMS3S1icGCurmZdPBdJpwKTcG6PQG6257dcimP9M7FFfz22dM5cm5DcpJYB__KyixSW595peT/s1600/secure_email.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTHt9HPoNEh9QEgf4t1VU9-FxxHPJw2yE3Tq98ty4K6Txejgj834BWQ9uIvm-PkMSh9eDVMS3S1icGCurmZdPBdJpwKTcG6PQG6257dcimP9M7FFfz22dM5cm5DcpJYB__KyixSW595peT/s1600/secure_email.jpg" height="400" width="388" /></a></div>
<br />
Many times we do need to send confidential information via email and we do share critical info using email. This info is then maintained on servers forever - one copy on your account and other on receivers account and can be read / sniffed by people who owns the servers/data. Also servers are backed up and they do ensure users emails are not lost in case of any failure. In practice your confidential info has many copies around the globe that can land up in anyone's hand.<br />
<br />
We all do use popular email services like, gmail/outlook/yahoo/etc. and they do provide secure login over HTTPS/SSL. Email you sent is encrypted from your computer to gmail (as example) server. This email is then forwarded to receivers email server in clear text(un-encrypted format) and can be sniffed by various networking tools. <br />
<br />
Web emails (Gmail, yahoo, outlook, etc.) store your emails as you draft/compose them. Every line you type gets backed up immediately. Any confidential info that you typed gets stored on server and even if you remove/delete those lines, there is already a backup created on servers to refer for Google (example). Thus even if you wipe out confidential content from your email before you send, its still now maintained on server forever and you cant remove it! <br />
<br />
How do you then send confidential info that only receiver can read it ? How can you ensure that you email stored on servers is encrypted ? <br />
<br />
<b>Solution is to use PGP (Pretty Good Privacy) technology</b> which was invented in 1991 by Phil Zimmermann. Yes, its been long time that technology to secure emails is available, however its complicated setup that keeps people away from usage. There are right set of tools available for you to make it easy and send secure emails right from your browser.<br />
<br />
With extensive internet usage in our daily routine and our data in cloud, you need to protect your confidential data in all forms. You need to manage your confidential data the way its transferred & stored. PGP comes in handy here and learning it will help you in long run.<br />
<br />
<b>How it works?</b><br />
PGP uses modern day Public-Private key encryption model combined with conventional secret key for faster encryption. People who wish to send secure emails, need to create a public & private key pair using tools(listed below). Public/private key is nothing but a big mathematical value used to encrypt and decrypt a message. Public-key part of it can be shared with everyone whereas private-key part is to be stored securely and not to be disclosed to anyone. Any message/text, encrypted by public-key can be decrypted only with Private-key is the rule.<br />
<br />
To use PGP, you need to first generate public-private key pair. You then need to share your public-key to people so that they can encrypt their message using your public-key and you can then decrypt that message using private-key. If you wish to send secure email, then you need to get receivers public key for encrypting the message.<br />
<br />
In PGP, a session key or secret-key is also involved. This is to speed up encryption/decryption of your email. This secret-key is generated randomly when you send email and is only used for that email communication. Secret-key is then encrypted using receivers public key.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJi-Xzj1_-cWIZzhECkdaPmno68Uo6BQNykEjo9ifZ8P-JFEiCd6pBiUOgh765sCE3OkfXuGpkwCjymh98R1hVU-lVj_I7yz_9eyt6CIjX927WjCQA6dSnVoXsS2jKdGOYGI6ih58179eh/s1600/1024px-PGP_diagram.svg.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJi-Xzj1_-cWIZzhECkdaPmno68Uo6BQNykEjo9ifZ8P-JFEiCd6pBiUOgh765sCE3OkfXuGpkwCjymh98R1hVU-lVj_I7yz_9eyt6CIjX927WjCQA6dSnVoXsS2jKdGOYGI6ih58179eh/s1600/1024px-PGP_diagram.svg.png" height="640" width="614" /></a></div>
<br />
<br />
<b>What do you achieve using PGP ?</b><br />
<br />
<ul>
<li>Only receiver can read your emails </li>
<li>No one with access to email servers can read / decrypt your emails or modify it </li>
<li>Your data is secure while its transferred from one server to another </li>
<li>With additional PGP setup, you can ensure that the email is coming from trusted friend and that no one on the route has seen or modified it. </li>
</ul>
<br />
<br />
<b>What are high level steps that I need to take ?</b><br />
<br />
<ul>
<li>Create Public-Private Key pair using tools </li>
<li>Share public-key with friends </li>
<li>Store Private-key securely and no one should have access to it </li>
<li>Use PGP tools to encrypt emails and send it </li>
</ul>
<br />
<br />
<b>Mailvelope as browser extension tool for PGP: </b><br />
There are couple of client side tools that you need to use to create public/private keys and then use them in local email client(outlook/thunderbird/etc.). Instead of that there is a better option - Mailvelope. This addon is available for Chrome and Firefox. <a href="https://www.mailvelope.com/">https://www.mailvelope.com/</a><br />
<br />
Mailvelope has resolved the complexity behind PGP and made it easy for every day internet users. Here is video that explain how to setup and use Mailvelope <br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/Ro3MSBS9w-A?feature=player_embedded' frameborder='0'></iframe></div>
<br />
<br />
<b>How to secure you public/private keys:</b><br />
<br />
<ul>
<li>You should be using password manager for storing your passwords. These password managers generally provide secure notes or text boxes for additional notes. Use them to store your public/private keys. Do export keys from Mailvelope and store them in your password manager. </li>
<li>Do not setup Mailvelope on public computer. Uninstall mailvelope if you no longer use laptop to send / receive emails </li>
</ul>
Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com0tag:blogger.com,1999:blog-5616099921379206790.post-6531140525954451482014-05-26T21:32:00.003+01:002014-05-26T21:32:27.563+01:00Don't open short URLs if you get from unknown / un-trusted sources!Many of us on internet have already came across short URLS/links that when clicked take it actual webpage. In many cases you would have wondered what this link is and where is it going to take me? e.g. <a href="http://goo.gl/dFr2Xp">http://goo.gl/dFr2Xp</a> which point to my another blog article.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUsZdmHxV6HGaH32TBlS0eG7ioY6tTIQdPLCFCIgc2K3Bt8oQHdX5GsVJsq75jRqfbsyLIgzpsqjUNeTyYA8WHfhJ-lAeFV2S6ZIBrG3ujFiNEUxZuvk2NCQ2DCot51LfjpIKOEXAfUybs/s1600/s.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUsZdmHxV6HGaH32TBlS0eG7ioY6tTIQdPLCFCIgc2K3Bt8oQHdX5GsVJsq75jRqfbsyLIgzpsqjUNeTyYA8WHfhJ-lAeFV2S6ZIBrG3ujFiNEUxZuvk2NCQ2DCot51LfjpIKOEXAfUybs/s1600/s.png" height="480" width="640" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<h4>
What are short URLs? </h4>
URL shortening is technique used on internet to shorten the long URL/link to a smaller one and that redirects to actual URL when clicked. Its very useful in many cases, e.g. for twitter wherein message length is small and you wish to share a link. Or you bought a book and it has website references using short URLs. <br />
Long URLs are the way websites are developed and needs extra descriptive parameters and values that needs to be passed. E.g. see URL for this blog above, its the way blogger creates a link based on blog title. By shortening URLs, it becomes easy to pass on and type without errors<br />
<br />
<h4>
Advantages it brings in:</h4>
<br />
<ul>
<li>Short in nature and easy to type in from non-digital media (books, billboards, banners, posters, etc.) </li>
<li>Takes small size and looks neat instead of long URLs </li>
</ul>
<br />
<h4>
List of popular services that provide short URL: </h4>
<a href="http://bit.ly/">http://bit.ly</a><br />
<a href="http://tinyurl.com/">http://tinyurl.com</a><br />
<a href="http://goo.gl/">http://goo.gl</a> (From Google)<br />
<a href="http://t.co/">http://t.co</a> (From Twitter)<br />
<br />
<h3>
Issues due to short URL: </h3>
<b>Don’t know what's hiding behind the short URL:</b> This is one of the most dangerous part of short URLs. It may be a safe link and serves the purpose for you, or it may land up in malware and unwanted websites which you never wished to visit. There is no way for user to know if you may face any issue by clicking a link. This is the main advantage which is exploited by hackers and malware writes to hide behind a cute looking URL. <br />
<br />
There has been many more services which has been closed down just due to the fact that users used it extensively to redirect users to po-rn or malicious websites. <br />
<br />
If short URL comes from unknown/un-trusted sources, its better to not click/open it.<br />
<br />
<b>Privacy issue :</b> With four to five major players in this field of short URL, and many websites/users using it, it poses privacy issues to users. Webservers providing short-url can track you as user and collect info about you to know which sites you visit and pass on this info to third-party. It can track your computer address (IP), links you clicked over time and your behavior with short-urls.<br />
<br />
<b>TinyUrl.com was known to distribute Spyware:</b> Not all short-URL services are safe and you cannot trust them. Tinyurl.com has been known for distributing spyware as per wikipedia reports. Files may get downloaded automatically as you navigate with short-url and if you open them, it monitors all your actions and note the keys you type in.<br />
<br />
<b>Websites have stopped using short url in post: </b>Wikipedia and few more websites have stopped using short-urls due to above reasons. Any short URLs entered get ignored and post cannot be saved.<br />
<br />
<h3>
Solution :</h3>
<br />
<ul>
<li>Don’t be click master. Avoid clicking on short URL believing everything is going to be safe. </li>
<li>If you get short-URL from unknown/untrusted sources, then better not click it. </li>
<li>Do no click short URLs in SMS, IM, Whatsapp, emails, blogs and Facebook post. </li>
<li>McAfee also offers short-URL service which can be accessed using this link, You can create your own short URLs safely. http://mcaf.ee/ </li>
</ul>
Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com0tag:blogger.com,1999:blog-5616099921379206790.post-70323638047416513552014-05-20T09:31:00.002+01:002014-05-20T19:16:57.954+01:0010 Ways your computer can get infected by viruses and how to avoid thatGetting infected by Virus on your laptop/desktop is easy as you read below. There is no one good way to be protected against all of them and thus you need to be cautious enough to keep your data and laptop secure. On other hand you don't need to be super paranoid or require geeky skills to be protected - just be aware about your actions and apply common sense.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrU08GFP1tw7pHZhOx4O8dikhPGSNPgngOvPOpSDhJNjda2H5sk0eX2Byegj7GWh_Bgj5fG7JWrZ9_MUOPPkXVgntSxYAlMmOYAZpXWagaSkVjfpQsMBU-jS2aq2fpHTQcHWt93ffOthoG/s1600/DSC_02901.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrU08GFP1tw7pHZhOx4O8dikhPGSNPgngOvPOpSDhJNjda2H5sk0eX2Byegj7GWh_Bgj5fG7JWrZ9_MUOPPkXVgntSxYAlMmOYAZpXWagaSkVjfpQsMBU-jS2aq2fpHTQcHWt93ffOthoG/s1600/DSC_02901.jpg" height="468" width="640" /></a></div>
<br />
<h3>
1. USB/Pen-Drive: </h3>
The biggest reason to get infected is using extensively using USB/Pen drives to share data across multiple machines. This is the most exploited method use by viruses to spread and autorun on machines when inserted.<br />
<br />
This is not restraned only to USB/Pen-drive, but all devices that exposes USB interface to connect to computer. E.g Camera which provides USB to copy photos/videos to your computer, or your mobile phones to copy music/files, Kindle to copy books and external hard-disk that host huge data.<br />
<br />
Any USB/Pen-drive when connected to computer auto-runs set of files and viruses gets the entry point into computer. Viruses hooks on to auto-run applications and launches themselves to run automatically to then infect the machine. Alternatively a machine which is infected monitors any new USB/Pen-drive connected to machine and copies itself to USB to spread itself. <br />
<br />
With USB port becoming standard for mobiles/ camera/ kindle/ mouse/ speaker/ keyboard, viruses can hook on to any of those and spread themselves easily. <br />
<br />
<b>Solution- </b><br />
<br />
<ul>
<li>Disable Windows Auto-run to start programs automatically. This will prevent any virus to start as you insert the infected Pen drive. Here is a short video https://www.youtube.com/watch?v=U6ubWhGVF2U </li>
<li>Always run a Anti-Virus scan when you insert the pen-drive before you start using it. If you have good Anti-virus, most likely it will start as soon as it detects new Pen Drive and prompt you to start scan </li>
<li>Avoid extensive use of pen drive to transfer data between 2-3 computers. If you wish to share file within home, use network storage or web(Google drive, dropbox etc.). Ensure you scan files once you download them from any sources </li>
<li>Avoid connecting your Pen drive to any public computer for data exchange </li>
<li>If you find a Pen Drive in public places then there are high chances that its left behind for infecting machines. Avoid falling into traps with free Pen Drives lying on the road </li>
</ul>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg321_qpwFXDcw0K0uZNlYV7FE8bu690n3tCBh7iXApHBFX59CRAfB8iFSQHCQsJKBn0s7S0WAL0nuZrQgaPG2dllgsjBA5_-QFSQz3AQsthh0RzZI7cCIwcClXgD5r0-OD_xNFcKa6w-CC/s1600/DSC_0281.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg321_qpwFXDcw0K0uZNlYV7FE8bu690n3tCBh7iXApHBFX59CRAfB8iFSQHCQsJKBn0s7S0WAL0nuZrQgaPG2dllgsjBA5_-QFSQz3AQsthh0RzZI7cCIwcClXgD5r0-OD_xNFcKa6w-CC/s1600/DSC_0281.JPG" height="424" width="640" /></a></div>
<div>
<br /></div>
<br />
<h3>
2. Downloading applications from any sources: </h3>
Windows comes with predefined apps and that's enough for most of the time, however if you are extensive user of your computer, you need good editor, or image editor or video editor, movie player, good browsers, and lots of free goodies available online. There is no one good trusted location that is available and thus most of us has to download apps from various sources. With Windows store and app store, its getting better now that people only visit couple of places to download and install apps. <br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEYVP5ptlsm6LczEW1qd5TQZbHvXHWsWj5zpV8GeAXZkf7If-RYUQJdpd29AOQHOBk-4CMj_ZInYB2H9N4HDmtKV4fYeiXlBD0C-zvtK5HgdYVsldzN18bA0tEfTC-UHIz8ErWOHaDguxC/s1600/app-download.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEYVP5ptlsm6LczEW1qd5TQZbHvXHWsWj5zpV8GeAXZkf7If-RYUQJdpd29AOQHOBk-4CMj_ZInYB2H9N4HDmtKV4fYeiXlBD0C-zvtK5HgdYVsldzN18bA0tEfTC-UHIz8ErWOHaDguxC/s1600/app-download.png" height="320" width="320" /></a>However with Windows OS there are huge set of apps that are not available on store for users to download freely and use securely. Many apps still needs to be downloaded from web and then manually installed. This will continue for good long duration and not going to change in a year or so. Result is viruses getting downloaded and installed by you. <br />
<br />
Of course there are rich set of applications which are open-source and free and are maintained by developers around the world which ensures no malicious code gets into products and provide secure applications. Problem here is source from where you download - if its available from well known open-source websites then that should be good enough as the site ensures first level of safely. However if you download same application from a totally different location, then its not guaranteed that its equally good. Trusted source matters most from where you download. Open-source apps can be modified by hackers and re-compiled to be hosted on their sites; which you may download. <br />
<br />
<b>Solution: </b><br />
<br />
<ul>
<li>Scan for all downloads with Anti-Virus </li>
<li>Never download apps from un-trusted sites </li>
<li>Most of websites provide download verification method (signature) which you can use to ensure the file you downloaded is same as provided by manufacturer and not modified on its way </li>
<li>Check for online apps instead of locally downloaded version. If you wish to edit images or videos, there are websites that provide you free online editing with rich set of tools online. You don't need to download and install image editor at all to risk your data and computer </li>
<li>While downloading files, ensure your browser is not flagging red alert for website </li>
<li>Clean up your download folder regularly. Your downloads may be legitimate, however an infected Pen-Drive may write to programs downloaded and when you execute those app, viruses gets loaded. This is about avoiding good applications (downloaded) getting injected with bad code and giving an opportunity for viruses to hide. </li>
</ul>
<br />
<h3>
3. Email attachments: </h3>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqEDO4KEAfCYgFxqHYPmk0xiXG59Lc22qYrlcVHubAYShZ8dunfaenId80Emwn6EFzXQXbvLL-jdzUESy4DZ5jKCs91TQAUSWDd8G_U0418RpOXg8y34WSCHm1Bgs6elxc6HK3Z1HGqRRN/s1600/outlook-express-problems.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqEDO4KEAfCYgFxqHYPmk0xiXG59Lc22qYrlcVHubAYShZ8dunfaenId80Emwn6EFzXQXbvLL-jdzUESy4DZ5jKCs91TQAUSWDd8G_U0418RpOXg8y34WSCHm1Bgs6elxc6HK3Z1HGqRRN/s1600/outlook-express-problems.jpg" /></a></div>
This is another critical point of exploit by viruses/hackers. Emails with intuite/catchy subject line and an attachment is likely to be opened up by users. Attachments can be anything like a image(jpg/png/bmp/etc), document, ppt, xls, PDF, exe, bat, com, msi, zip, inf, gzip and more. In many cases you will never notice anything suspicious as you open the file and execute it and it may still do the damage behind the scene.<br />
<br />
<b>Solution: </b><br />
<br />
<ul>
<li>Never open email attachments from unknown person/banks/institutes </li>
<li>Download and scan with Anti-Virus if its must for you to open up attachments </li>
<li>Avoid forwarding emails with attachments </li>
</ul>
<br />
<h3>
4. OS and application updates: </h3>
Hackers around the world target OS loopholes to get into your machine or Apps that are installed on your computer to get into as backdoor entry. These are security holes that are unintentional and not found by OS developer (e.g. Microsoft) or application developers (e.g. Adobe). Hackers target these security issues and create viruses that exploit them. As more and more security issues are found in wild, they do get patched up and you get a software update based on those. Major reason for software updates are performance issues, security issues and new enhancements. <br />
<br />
With more and more apps you download and install on your machine, there is high likely that some or the other app/OS will have a security issues and there will be patch available from vendor to address those. If you disable auto-updates then you are keeping these security holes open for viruses to get into your computer and do their job.<br />
<br />
<b>Solution: </b><br />
<br />
<ul>
<li>Always update your OS and apps that you use. </li>
<li>Keep the OS with minimal set of third-party apps that are must for your usage. </li>
<li>Do notice newer update alert and ensure you download and install them if required </li>
</ul>
<br />
<h3>
5. Browser plugins / add-ons : </h3>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj66E8-ECCblhCjC07KP1FvW8EDu_0nxPRJJ2rYLb2-WyNlMme-zZEGJ8JPDTiYgHlr6FQ_P8z5IBB8Dpds946iWEHMg_-8viN4X6BySfQcS9Wb_U1u05nntI7Mmr_g_UpdPRljvzsVs_po/s1600/Browser+Toolbars+2+THA+MAX.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj66E8-ECCblhCjC07KP1FvW8EDu_0nxPRJJ2rYLb2-WyNlMme-zZEGJ8JPDTiYgHlr6FQ_P8z5IBB8Dpds946iWEHMg_-8viN4X6BySfQcS9Wb_U1u05nntI7Mmr_g_UpdPRljvzsVs_po/s1600/Browser+Toolbars+2+THA+MAX.jpg" height="300" width="400" /></a>Browser plugins/Add-ons and toolbars that hook onto your browser has access to all that you do online. Every email, every password you type can be captured by addons/toolbars. The most preferred way you get these addon installed is by installing third-party products that does one thing, but installs toolbars for their partners. These unwanted/unused toolbars sit in your browser and can do all sorts of things behind the scene. You need to be extra causious with any toolbar/add-on that gets in to your browser. The most nasty viruses hooks onto browsers and hide underneath; they may not have any UI elements or icons and stil do all malicious their job behind the browser.<br />
<br />
<b>Solution: </b><br />
<br />
<ul>
<li>Review installation of any application. Installation wizard generally provides a hint to what its going to install on your browser. Turn the check-box off to avoid installation </li>
<li>Review all installed toolbars/add-ons/plugins/extension on your favourite browser and keep only the one keep the one you use </li>
<li>Use Google Chrome for that matter to enable/disable add-ons. </li>
<li>Use Private browsing to disables unwanted add-ons during your secret work </li>
</ul>
<br />
<h3>
6. Visiting malicious websites: </h3>
You may visit a website to download a cool screensaver or wallpaper, or may just visit to read an interesting articles, or view all kinds of photos. And we all that we navigate using search results that google/bing and other search engine gives us. Not all websites are safe to browse. There can be array of attacks that can just happen by visiting a website. E.g a download may start automatically, or your Facebook may start showing posts that you never posted, or more similar activities. With newer web technologies (HTML 5), browsers and websites can do more behind the scene which you may not notice and leave your laptop infected.<br />
<br />
<b>Solution: </b><br />
<br />
<ul>
<li>Use browser add-on that provides you website rating in the form of red/green/yellow status. You can safely visit websites with green status and avoid navigating to red. Checkout WOT and McAfee Siteadvisor add-on </li>
<li>Don't be click master on your IM links, email links, website links if you are not sure if they are safe. It may just take one click for bad to happen on your laptop </li>
<li>Install adblock plus browser add-on. It not only blocks all ads, but also filters out any websites that can perform task behind the scene </li>
<li>Configure OpenDNS for free and prevent against fraudulant websites. TBD </li>
<li><br /></li>
</ul>
<h3>
7. Pirating software / movies / music: </h3>
<br />
We all love movies, music and games. Many of us download it for free using torrent. In addition to piracy of copyright content you are promoting hackers and viruses to spread if you do download using torrent. Torrent as technology is great, and there is nothing wrong with torrent in itself. It is the content you download/share which matters most. <br />
<br />
Many of the movies and music needs special codecs and applications to be installed first before you can play on your laptop. These codecs are by and large bad. You download and install a codec and then you find the movie is not playing and was waste of time and resources; behind the scene your laptop is already infected and working against your. <br />
<br />
Latest or best movies are often promoted by hackers/virus writers for you to fall in trap and make it easy for them. Its a carrot!<br />
<br />
<b>Solution: </b><br />
<br />
<ul>
<li>Review what you are downloading using torrent </li>
<li>Review the file format and scan it with anti-virus before you take any action </li>
<li>Do not download any extra audio/video codec to make the movie play </li>
<li>Prefer Youtube/Netflix and other popular methods to watch movies online safely </li>
</ul>
<br />
<h3>
8. Fake anti-virus that pops up and tell your machine is infected: </h3>
As you browse internet, you landup in popup saying you computer is running slow or is infected with red big icons. These are just websites that render webpages and show up fake alerts. If you click and download then your laptop is the prey. Fake Anti-Virus looks exactly like McAfee/Norton/Kaspersky/Other and scare you with fake virus alerts or promise you to improve your computer performance. All that is just to get you download and install their product which does totally different thing. Here is a good article to read about -<br />
<a href="http://www.microsoft.com/security/pc-security/antivirus-rogue.aspx">http://www.microsoft.com/security/pc-security/antivirus-rogue.aspx</a><br />
<br />
<b>Solution: </b><br />
<br />
<ul>
<li>Use ad-block browser add-on to avoid any popups and ads. </li>
<li>Never download any app from these fake popups </li>
<li>If you need to install Anti-Virus, then go to popular Anti-Virus vendors like McAfee / Norton / Kaspersky / Trend micro / or the one recommended by your technical guidance. If you don’t buy medicines on your own and do consult doctor then why not do same for your laptop/network before you install an Anti-Virus? Do search on internet and read before you download and install legitimate Anti-Virus/Firewall. Below are some good references for you to compare and help you select right AV for you </li>
</ul>
<br />
<h3>
9. No Anti-Virus(AV) and firewall or NO up-to-date virus signature : </h3>
As you read above, in all of the instances you need a good Anti-Virus/Firewall installed and enabled. You also need to keep it up-to-date as most of the Anti-Virus products download latest virus signatures to detect newer viruses that are found. <br />
<br />
Windows 7 and Windows 8, comes with Microsoft Windows Defender & Firewall by default. I would recommend a non-Microsoft solution here as they are the experts in security industry and huge amount of research go in to make better security products. If you look <a href="http://av-comparatives.org/">av-comparatives.org</a> (an independent AV testing organization) and their reports they don’t mention Microsoft AV/Firewall anywhere.<br />
<br />
<a href="http://www.av-test.org/">http://www.av-test.org/</a> is another independent AV testing and its one of the most important certification/rating that Anti-Virus companies look for. You now should be able to review yourself which AV is good enough and where to download from.<br />
<br />
<h3>
10. Using Windows XP: </h3>
Yes using Windows XP is known to be worst for security and can get your machine infected easily. Its an old OS and not designed for security in mind. Microsoft has stopped supporting Windows XP this year and will not patch for any security issues reported. You need to upgrade to newer Windows OS.<br />
<br />
Switch to Ubuntu Linux or Windows8 for better security. If your computer is old enough then likely Win8 will not be supported due to minimal hardware requirement. Do install Ubuntu or any other Linux distribution as detailed here. <br />
<br />
<h3>
Conclusion: </h3>
As you read, there are various ways your computer can get infected. You need to keep an eye and be aware of actions you take and implications on your computer/data. Setting up good Anti-Virus, using right browser with add-ons and following best practices listed above should keep your computer/data secure. Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com0tag:blogger.com,1999:blog-5616099921379206790.post-82062431592894430032014-05-17T10:56:00.001+01:002014-05-17T17:10:38.874+01:00Know the unknown phone caller with TrueCallerYou got a phone call from unknown number and you wonder who the person is. A very common scenario for all of us; with marketing calls on rise you never know if its sales call or important call that you should be attending. You wish to keep your phone silent and block all unwanted calls? Solution is to use <a href="http://www.truecaller.com/">TrueCaller app</a> (Android/iPhone).<br>
<br>
<br>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEist22SsWrk25A4py9To5o7WIheIVzKnetIQfAibqbvW1kaMfYIrNMOHNI1Mt5-p8TB9SwRLZK2mcQIgLOCHVliYUBiGogL29e6rfo9DqgcIbxdifbxu_Nuu5DPAUKLdLe_OMnVlCKehOkx/s1600/DSC_0273_.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEist22SsWrk25A4py9To5o7WIheIVzKnetIQfAibqbvW1kaMfYIrNMOHNI1Mt5-p8TB9SwRLZK2mcQIgLOCHVliYUBiGogL29e6rfo9DqgcIbxdifbxu_Nuu5DPAUKLdLe_OMnVlCKehOkx/s1600/DSC_0273_.jpg" height="424" width="640"></a></div>
<br>
<br>
<b>Know who called you: </b><br>
TrueCaller maintains a huge database of contacts and help your display name and phone number of people who called you, even if that contact is not in your phone book. <br>
<br>
Truecaller integrates with phone-call to show name and number of person if its unknown and helps you decide to receive the call or reject it. <br>
<br>
In case you get a miss-call from unknown number, TrueCaller show you name/number of this caller. You don't need to return a call or text back to know who the person is. <br>
<br>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvWjyzLXK5Qmn8sT4mEjasHGJJd7NE_efFqT6GQJlwI-oQNPJZkMwLiGYolPckbJwaPbHslirozdRlTfVGYWcMk7BeEByovStmc4h0ySrcDQOkHJXM6QwOgO1XARyYtLtPd7tLeEUYvEks/s1600/unnamed.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvWjyzLXK5Qmn8sT4mEjasHGJJd7NE_efFqT6GQJlwI-oQNPJZkMwLiGYolPckbJwaPbHslirozdRlTfVGYWcMk7BeEByovStmc4h0ySrcDQOkHJXM6QwOgO1XARyYtLtPd7tLeEUYvEks/s1600/unnamed.jpg" height="400" width="333"></a></div>
<br>
<br>
<b>How does TrueCaller gets this data: </b><br>
As per TrueCaller, they get it from public sources, yellow pages, people who wish to submit info about people from whom they got calls. TrueCaller do NOT use your phone book to send info to them for their usage. <br>
<br>
When you register to TrueCaller, your number gets added to their database. People can know that you call calling, if they too have TrueCaller installed. You too get advantage to let people know that your are calling them even if people don't have your contact details in their phone book.<br>
<br>
<br>
<br>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg69UGYektdfXNz1j8yEp3TZjtKsnM3r1dVLzQnP9NeXH11nDiHHDwBHF_DtG5S1vl6ageLwn0vNVpjKniBlwfbT-ZrZC-UWn2mZRjquo-7j8HjLYkKj5_UPmq1RA1eJPzjsdHnuOosr01F/s1600/device-2014-05-17-083859.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg69UGYektdfXNz1j8yEp3TZjtKsnM3r1dVLzQnP9NeXH11nDiHHDwBHF_DtG5S1vl6ageLwn0vNVpjKniBlwfbT-ZrZC-UWn2mZRjquo-7j8HjLYkKj5_UPmq1RA1eJPzjsdHnuOosr01F/s1600/device-2014-05-17-083859.png" height="400" width="225"></a><br>
<b>Block unwanted spam calls & Text :</b><br>
Marketing and sales calls are common. You may register to 'Do not call me' and avoid people calling you in first place, however its not standardise and globally available. You may still get spam calls. Best way to avoid spam calls is to use TrueCaller. It guards you with regional spam list and blocks all calls/message. <br>
<br>
You can add custom list of contacts that you wish to block for calls/text. <br>
<br>
TrueCaller database for spam numbers will continue to grow as users around the globe submit data, you will get the benefit of it and all unwanted calls get blocked automatically.<br>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj27LjgSXl0kNFoImbdDiqzRKaZBmjG6tMrqylnzbpN8ky1lvdrn8pY3A7ZtYAYf_PdNImbWf3h-BY9cMGHuAs028SE2dSLJCuSnCDqGTOsjFFCowL0hIV51OvYeCZ3ELgzoi4xpm7ddl2K/s1600/device-2014-05-17-083955.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj27LjgSXl0kNFoImbdDiqzRKaZBmjG6tMrqylnzbpN8ky1lvdrn8pY3A7ZtYAYf_PdNImbWf3h-BY9cMGHuAs028SE2dSLJCuSnCDqGTOsjFFCowL0hIV51OvYeCZ3ELgzoi4xpm7ddl2K/s1600/device-2014-05-17-083955.png" height="400" width="225"></a></div>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg69UGYektdfXNz1j8yEp3TZjtKsnM3r1dVLzQnP9NeXH11nDiHHDwBHF_DtG5S1vl6ageLwn0vNVpjKniBlwfbT-ZrZC-UWn2mZRjquo-7j8HjLYkKj5_UPmq1RA1eJPzjsdHnuOosr01F/s1600/device-2014-05-17-083859.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyXhuzCmpARmFCgzfWCumdOiCG0v7KqPrcdI2ato_R9OoBw2MAj6h_zxyHa4oscobbcy2rVss3i-XOP3Y4k-tAR7AUzWmAi0jxx5C-WmiVodLH2FHJSTQgpAzcUwP_U8ZolPOLAnJnLRLe/s1600/device-2014-05-17-083201.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyXhuzCmpARmFCgzfWCumdOiCG0v7KqPrcdI2ato_R9OoBw2MAj6h_zxyHa4oscobbcy2rVss3i-XOP3Y4k-tAR7AUzWmAi0jxx5C-WmiVodLH2FHJSTQgpAzcUwP_U8ZolPOLAnJnLRLe/s1600/device-2014-05-17-083201.jpg" height="400" width="373"></a><br>
<div class="separator" style="clear: both; text-align: center;">
</div>
<br>
<br>
<br>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiq6jgQRp8ZRHKMQsr2kxfidLy3UI5KEs7Qi_BFOqmIDpNlH1gg3YWRDpwU8hQAjVeKDwxO6iA5ozKCHNLEKgpQW1jw-jYyQKKNs2EkXQ1B1AHF-DmTomWHUa5NxZVVO55pBV2Hu_N_EAmO/s1600/device-2014-05-17-084108.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiq6jgQRp8ZRHKMQsr2kxfidLy3UI5KEs7Qi_BFOqmIDpNlH1gg3YWRDpwU8hQAjVeKDwxO6iA5ozKCHNLEKgpQW1jw-jYyQKKNs2EkXQ1B1AHF-DmTomWHUa5NxZVVO55pBV2Hu_N_EAmO/s1600/device-2014-05-17-084108.png" height="400" width="225"></a><br>
<br>
<b>Privacy on Truecaller:</b><br>
Your are exposing your name and number on TrueCaller. They get a valid phone number which is maintained in their database. Even if you don't install, your contact details may get added by your friends or third-party as they interact with you. You can always choose to remove your contact details from TrueCaller website by visiting here - <br>
<br>
You are installing an app that gives away your name/phone-number to public website. You need to configure in such a way that only your friends should be able to search you and not general public. Enable below settings in TrueCaller after you install it.<br>
<br>
TrueCaller request for login using facebook/google credentials. I would recommend NOT to use facebook/googe+ account as it post status on behalf of you on your facebook wall. Also it can get access to all your Facebook data (friends/location/email) which is too much of ask by TrueCaller app.<br>
<br>
How to get TrueCaller:<br>
Download TrueCaller on Android/iPhone/Windows phone http://www.truecaller.com/<br>
<br>
<br>
<!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2F2.bp.blogspot.com%2F-yv0WBbU4hmU%2FU3csaJ1b2WI%2FAAAAAAAAMSw%2F4X-1AiHmKag%2Fs1600%2Fdevice-2014-05-17-083859.png&container=blogger&gadget=a&rewriteMime=image%2F*" with "https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg69UGYektdfXNz1j8yEp3TZjtKsnM3r1dVLzQnP9NeXH11nDiHHDwBHF_DtG5S1vl6ageLwn0vNVpjKniBlwfbT-ZrZC-UWn2mZRjquo-7j8HjLYkKj5_UPmq1RA1eJPzjsdHnuOosr01F/s1600/device-2014-05-17-083859.png" -->Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com1tag:blogger.com,1999:blog-5616099921379206790.post-30532654781712105502014-05-15T00:05:00.001+01:002014-05-15T00:05:36.596+01:00Be Bond online - Privacy on public network & computersBrowsing online brings in privacy and security issues. Browsing on public network or public computer, brings in higher level of privacy issues. What you browse, emails you send/receive , what you chat, your username/passwords all can be known to others by going online on public network/computer. Of course you don’t want all these to be known by others and used against you. So don’t use public network or public computers at all? <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6jiSf3Lo-Go1lDSo3jEUpOxx_1DtqG6WoJO8qbzQJSgHVjEuWHWXMdhcGMJO_ypgylHo8zINad_mY_OXkTqH2o6MX8X2eGWuS4VCelRhp2ikcCHEujnMYAJoR9WT8mxjRWyXW1UBKyQDN/s1600/picjumbo.com_IMG_6850.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6jiSf3Lo-Go1lDSo3jEUpOxx_1DtqG6WoJO8qbzQJSgHVjEuWHWXMdhcGMJO_ypgylHo8zINad_mY_OXkTqH2o6MX8X2eGWuS4VCelRhp2ikcCHEujnMYAJoR9WT8mxjRWyXW1UBKyQDN/s1600/picjumbo.com_IMG_6850.jpg" height="266" width="400" /></a></div>
<br />
<br />
Solution is to use "<a href="https://tails.boum.org/">Tails Linux</a>" operating system running on your USB drive(Laptop/Desktop). Its that easy. Tails(The Amnesic Incognitivo Live System) is a Linux distribution crafted for privacy and security. Its built on free and open source software that everyone can use. Tails Linux gives privacy to anyone anywhere. <br />
<br />
Tails Linux is around five year old and built on top of Debian Linux which itself is known for its high security standards. Purpose of Tails is to provide ready to use Operating system for people which is secure out-of-the box. Below are the notable scenarios that are covered by Tails and why its getting popular(700,000 people use Tails daily). <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLFGVRJHHJPIfvzCI1-FxL9DKtgqQByeat3AnqbtBfgEi1_Brif-ccBxZb7MDu3OjoYln0LVUdtGnN6Tj5CdT_DNuZSRkhtdFfVhoHERShVp-1dfJdhsMHJBENhF4qLbRdFlkhPi893OTw/s1600/Tails-2014-05-14-23-07-08.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLFGVRJHHJPIfvzCI1-FxL9DKtgqQByeat3AnqbtBfgEi1_Brif-ccBxZb7MDu3OjoYln0LVUdtGnN6Tj5CdT_DNuZSRkhtdFfVhoHERShVp-1dfJdhsMHJBENhF4qLbRdFlkhPi893OTw/s1600/Tails-2014-05-14-23-07-08.png" height="300" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
Screenshot of Tails Linux</div>
<br />
<br />
<b>Public network anonymity: </b><br />
Public Wi-Fi is everywhere and will continue to grow. Café, Airports, Hotels, Restaurants, Malls, Bus/trains and many more public places that Wi-Fi is readily available for people to connect, and people do use it actively.<br />
<br />
Tails use "Tor Network" which is free software and open-network that helps people against network tracking and analysis and give privacy. Network traffic travels across multiple networks and it becomes hard for anyone to track source machine. A unique method now used widely for privacy. More on Tor network is here -<br />
<br />
As you reboot laptop, Tails connect to Tor-network and from there on any site you browse will not know which machine/location you are browsing from. No one on web can track you back to the public Wi-Fi that you are connected to. <br />
<br />
<b>Hiding Machine fingerprint: </b><br />
Every network device has a unique address called MAC address. Its built into your hardware and is unique globally and does not change. This MAC address is know to all Wi-Fi routers around you even if you are not connected to it. This machine-fingerprint is used in many ways to track users. Read my Wi-Fi tracking article for details. Anyone can track your entry and exit in an area based on MAC address just because you have Wi-Fi enabled on your devices (Smartphone/tablet/Laptop). <br />
<br />
Tails solve this problem(on laptop) by changing MAC address every time you boot the machine. Random MAC address is generated every time and makes it difficult for anyone to track you back. This is enabled by default and done automatically behind the scene. <br />
<br />
<b>Website anonymity:</b><br />
Websites you visit, plants a cookie in your browser to track it for future reference. Once you go back to that website, it exactly know when was last time you visited the site and can map all your activities on that site. You then start getting a personalized by showing you content that you may like more - This is to enguage user on their website and in-turn make business (ads, marketing/promotions). Websites thus captures your behavior on their site and this data is generally shared/sold across web-sites. All your browsing history is thus tracked and maintained by websites.<br />
<br />
Tails boots as Live Linux CD and thus every time you start the machine it gives you a fresh OS which seems to be booting first time. Any website cookies that are planted gets wiped out as no data is persistent by default. Its similar to private-browsing mode in OS. Websites will consider you as new user and will be not be able to track you based on your earlier visits thus giving you privacy. <br />
<br />
Also as pointed about with 'Tor-network', websites you visit cannot track back the source, making it hard to filter our area specific info. You will see totally different web content on same website, when you browse using Tails OS as compared to your regular OS. Websites, use network address (IP address) to track sources, this address will be different every time you visit a site, making it hard for website to track you.<br />
<br />
<b>Encrypted email and chat: </b><br />
Email and chat are common way of communication on internet. However every email or chat message you send/receive is known by your email/chat provider(google for example). You cannot keep a conversation private with current mechanism. Somewhere some body can read your content and can be used against you.<br />
<br />
Tails OS provide Email and chat client applications that provides privacy. You can encrypt emails/chats and send it to intended person. Only that person will be able to read the content and no one else will. Also, receiving person can be sure enough that its coming from you and no one has seen/modified the content in between. Tails OS provide Clawn Email and Pidgin chat client that ease out setup for privacy (PGP - Pretty Good Privacy) which works on secure public/private key concept. <br />
<br />
<b>Virus protection:</b><br />
Tails is Live Linux CD which means nothing can persist once you reboot. Even if you get infected by virus as you browse, no viruses can continue after reboot. Secondly Linux is secure by design which makes it hard for Virus to infect and live long. Lastly administrator account is disabled by default in Tails which ensure that no access is granted to anyone by anyway. This makes it rock solid OS and you don’t need to worry about Viruses.<br />
<br />
Tails is built on top of Debian Linux which ensures that no malicious code is built into OS in first place. No malicious code can get into open-source software as its been reviewed thoroughly by multiple people around the globe to keep it secure. This adds to the confidence of a strong and secure OS that Tails inherits.<br />
<br />
You cannot download & install any software. It might seem as limitation, however that brings is safety as no third-party untrusted app can go unnoticed. Below is set of apps preinstalled for you to use an for most of the cases that should suffice regular user.<br />
<br />
<b>Secure/Encrypted Storage:</b><br />
You may have data that you wish to carry with you and work on that data. May be some confidential data or personal photos that you wish to read/see. Windows OS does not encrypt any data on your hard-disk by default and that leaves your data available to people if your laptop is stolen. Your data is most important to you and with mobile/laptop theft it can land up in wrong hands.<br />
<br />
Tails OS address this issue by providing a mechanism to create encrypted storage/volume on your USB with a strong password. You can then load this volume with password and read/write it. If you wish only to read the content then Tails load this data in read-only mode and no damage can be made in case something weird happens.<br />
<br />
<br />
<b>Key logger protection:</b><br />
Accessing public computers for any kind of browsing is risky as it can record all your keyboard inputs (emails, username/password and chats) and send it to unintended people. These keyboard tracking can be done by software or hardware mechanism and called as keylogger. There are applications that can capture all your keyboard inputs and store it for later use, or there can be hardware key logging devices that might be connected. In any case keylogger is hidden from you and silently listening to you.<br />
<br />
Tails solve this by providing a on screen keyboard that you can use for username/passwords or any sensitive info you are typing. No hardware can trace that; and as there is no keylogger software that is installed or can be installed, no question of software tracking.<br />
<br />
<b>Browser protection: </b><br />
Browser is what you extensively use online and that needs to be secure enough. Tails run version of Mozilla Firefox browser called Iceweasel which is built for security. In addition it has built in security plugins to make every network connection secure(HTTPs Everywhere and NoScript). <br />
<br />
<b>Rich set of applications to server you:</b><br />
Surely you may need more than thus browser or email/chat client on OS to use. Tails provide you with full set of Office like apps to use. It has OpenOffice apps as replacement for Word, Excel and Powerpoint. <br />
<br />
KeepassX is installed as password manager for offline storage of your passwords. KeePassX is open-source, award winning app for password management and has all required functionality you need. You can maintain your passwords on encrypted storage and use it with KeePassX. <br />
<br />
<b>Other minor features: </b><br />
Tails can bootup looking exactly like Windows XP. User interface (Wallpaper, Icons, buttons) is rendered like XP which can deceive anyone around you to think you are using old XP machine which can be easily hacked (actually not). XP looks also can also help windows user feel like home and don’t need to worry about Linux underneath. <br />
<br />
Tails OS is loaded in RAM memory and gets cleaned up as you reboot. No traces are left behind on hard-disk. Even RAM memory is forcefully zeroed up to clean up and leave no traces on reboot (there are instances where in RAM memory can be accessed after few seconds on machine shutdown).<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTRrP1HWTJmnKznuCtcB3dP9A9lbOMhzz_aFFWcYpFMZ0-yqA1SMreooJBVemwDm6WpRgj11_NI6MtLMuA6jYtH0OAouHdO_H17MY2IVRryaCeB9rMIEqCdMskpyrEdAP1srXE2Mfvg8Vj/s1600/Tails-2014-05-14-23-09-12.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTRrP1HWTJmnKznuCtcB3dP9A9lbOMhzz_aFFWcYpFMZ0-yqA1SMreooJBVemwDm6WpRgj11_NI6MtLMuA6jYtH0OAouHdO_H17MY2IVRryaCeB9rMIEqCdMskpyrEdAP1srXE2Mfvg8Vj/s1600/Tails-2014-05-14-23-09-12.png" height="300" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
Tails OS showcasing XP look and feel</div>
<br />
<br />
<b>Download and Installation</b><br />
You can install Tails on USB/Pen Drive or CD and boot your machine using same<br />
Here is <a href="https://tails.boum.org/download/index.en.html">download link</a>. Here is <a href="https://tails.boum.org/doc/first_steps/installation/manual/windows/index.en.html">installation guide from Windows</a> <br />
<br />
<br />
<b>Conclusion: </b><br />
Tails Linux brings is rich set of functionality to give you privacy from various aspects. Protects your data and prevents you from getting tracked. On the top, its free for anyone to download and install. <br />
<br />
Hope this helps you be like Bond online :-)Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com0tag:blogger.com,1999:blog-5616099921379206790.post-62681974395563846452014-05-11T09:39:00.004+01:002014-05-11T09:41:24.286+01:002 Important settings for your Wi-Fi routerWi-Fi has been successful due to its ease of setup, speed it provides and area it covers. Its perfect for home usage and most of us enjoy that daily. Various network devices (Smartphone, Kindle, Mac, laptops, tablets, XBOX) are Wi-Fi enabled and we connect them happily to Wi-Fi router to get internet access. <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLI4q3oGgepFlCWMuZ4tyDokWTPB2CxPlftseAqCOJBV6UFNbHiW6uNY01znDmsyiaDHyk_id8P_Ue-LU5USMjSA8H8dNQVh7YDSoH-FVvln76sAt9VnArgk-jC449iRjzoIa_brxk4I2V/s1600/Linksys-Wireless-G-Router.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLI4q3oGgepFlCWMuZ4tyDokWTPB2CxPlftseAqCOJBV6UFNbHiW6uNY01znDmsyiaDHyk_id8P_Ue-LU5USMjSA8H8dNQVh7YDSoH-FVvln76sAt9VnArgk-jC449iRjzoIa_brxk4I2V/s1600/Linksys-Wireless-G-Router.jpg" height="342" width="400" /></a></div>
<br />
<br />
Wi-Fi however comes with two security issues. Wireless nature of Wi-Fi can hide all the security holes that a Wi-Fi router has opened up behind the scene. <br />
<br />
<b>Here are two must have settings for Wi-Fi router - </b><br />
<br />
<br />
<ol>
<li>Wi-Fi network password - That encrypts all data going from your device to Wi-Fi router and no body around can sniff what goes on wireless. </li>
<li>Wi-Fi router password - This is the password that you use to login to Wi-Fi router to configure using web interface. This is the point which is most forgotten about and can cause major security issues. </li>
</ol>
<br />
<br />
<b>1. Wi-Fi network password set to WPA2:</b> With newer Wi-Fi routers, it comes in with unique password setup that you have to use on smartphone to connect. This password is generally printed below the router and ready for you to use.<br />
<br />
Wi-Fi network password is secret key that is used between your phone and Wi-Fi router. Communication done over wireless media needs to be encrypted so that no one around you can sniff the wireless signals to see what you are doing. There are 3 encryption standards (WEP, WPA and WPA2) and the best one to configure is WPA2. <br />
<br />
You can easily find out if your Wi-Fi connection is using WEP / WPA / WPA2 by navigating to Wi-Fi settings on your phone/tablet and opening Wi-Fi network details you are connected to. If it says WEP/WPA then its better to change to WPA2. You will need to login to your Wi-Fi router and change the settings. This depends on router you are using and you will have to google how to setup WPA2 on your router make. A sample Linksys method is shown in below image.<br />
<br />
WEP & WPA are older standards and can be cracked by your neighbors in 15-30 minutes to gain free internet access or see all your shared files on other machines. WPA2 comes with highest encryption standards and said to be un-cracked. <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJc66S4sh4m12UBQFZRWVbes5bmVvdbLhYRoNZq9iEJGfpt0YIFDqiZ4SHn0jVspM8z2PngMPHP5uFbsrfJQPuBVDjC-v0o5Y7UgopCXQnjJ46JbxAeBgdecNRMmOt7kZ2U0a6_GrG8Y_W/s1600/WRT110-image03.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJc66S4sh4m12UBQFZRWVbes5bmVvdbLhYRoNZq9iEJGfpt0YIFDqiZ4SHn0jVspM8z2PngMPHP5uFbsrfJQPuBVDjC-v0o5Y7UgopCXQnjJ46JbxAeBgdecNRMmOt7kZ2U0a6_GrG8Y_W/s1600/WRT110-image03.jpg" height="404" width="640" /></a></div>
<br />
<br />
<b>2. Wi-Fi router Web-Page password:</b> This is the login password to configure your Wi-Fi router. All of the routers comes with pre-defined default password. You can look at default password of your router here. http://www.routerpasswords.com/<br />
<br />
With default password available in public, its becomes easy to crack the password, and all that can happen as your browse internet at home. Here is a recent <a href="http://blog.malwarebytes.org/online-security/2014/03/chameleon-wifi-virus-spreads-like-a-cold/">report on Chameleon Virus</a> that infects Wi-Fi router.<br />
<br />
A website can change the software/firmware on your router as you browse and reset all settings. New software/firmware may take 1-2 minutes to reboot your Wi-Fi router and then it can do all sorts of things which you may never notice. It can provide backdoor to your network to anyone, or can be used as email server to spam other users on internet, or it can change your webpages to show mode ads dynamically. And many more things. Wi-Fi router is small enough (3-4mb) and thus downloading and installing that on router may just take couple of minutes to make it work as required.<br />
<br />
Easy way to protect your Wi-Fi router is to change the default password to something strong. Changing the password on router depended on device you got. You need to search for "Changing default Wi-Fi router password for <your device name>" or refer user manual for your device.<br />
<br />
Changing default password on router makes it difficult for anyone to modify the software on router or change settings on it dynamically. In case you forgot the router password, you can reset the router using 'reset' button on it. Refer router manual for details.<br />
<br />
Here is sample page to change router password for Linksys router<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1YG-UpTLISumQcdyhg4slt1A2yGULY95noKDcGDPrvcLhIigfqNqDCuPUPRWd1iyb1fGz3GdXVK7d8AhhCjjT5Z4TnDIbg5gceltrLa0ao94X9y0pGJUHOTGZGrOejJ2vD3SPeafaNvnf/s1600/router_console-administration-tab.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1YG-UpTLISumQcdyhg4slt1A2yGULY95noKDcGDPrvcLhIigfqNqDCuPUPRWd1iyb1fGz3GdXVK7d8AhhCjjT5Z4TnDIbg5gceltrLa0ao94X9y0pGJUHOTGZGrOejJ2vD3SPeafaNvnf/s1600/router_console-administration-tab.jpg" height="520" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
<b>Some other settings that you should also consider :</b></div>
<div class="separator" style="clear: both; text-align: left;">
</div>
<ol>
<li>Change Wi-Fi network name from default to something more meaningful</li>
<li>Change Wi-Fi password once in six months</li>
</ol>
<div>
<b>Monitor which devices connects to your router:</b></div>
<div>
If you have android device then you can install app that can scan your Wi-Fi network and list the number of devices connected. Download and install '<a href="https://play.google.com/store/apps/details?id=com.wwnd.netmapper">Net scan</a>' free app from Google Play.</div>
<div>
<br /></div>
<div>
If you think there are unknown devices, then its time to change Wi-Fi network password and reconnect all your known devices with new password. Any one outside/neighbors will get kicked off as they don't have your new network password to connect.</div>
<div>
<br /></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiv8zC0EpTxV-jfNAC3XeQo8G8q3ekWqvY21UjtAaqUh7z1M1DLl2vLHwWbQbYMWFx3wT6UWcd3uoW24CW0CV6wBmHZeLCXC6XoJd7-pueEG1-zsvJQ0ovIwOKoSsvewsA7RDB0jkwb9LgQ/s1600/Net-Scan.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiv8zC0EpTxV-jfNAC3XeQo8G8q3ekWqvY21UjtAaqUh7z1M1DLl2vLHwWbQbYMWFx3wT6UWcd3uoW24CW0CV6wBmHZeLCXC6XoJd7-pueEG1-zsvJQ0ovIwOKoSsvewsA7RDB0jkwb9LgQ/s1600/Net-Scan.jpg" height="500" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
Hope this helps. Feel free to post comments or queries below.</div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<br />Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com0tag:blogger.com,1999:blog-5616099921379206790.post-73760846842347475352014-05-09T20:28:00.000+01:002014-05-09T20:49:09.485+01:005 Reason to use Linux on Pen DriveBy now you would have heard about Linux Operating system (OS), (if not then do a <a href="http://computer.howstuffworks.com/question246.htm">quick read here</a>). Open source and free nature of Linux has given birth to many Linux distribution, each catered for different reason.<br />
<br />
Linux has matured, stabilized and grown so much that its <b>the</b> most used operating system in world now. Huge number of servers has Linux, Your TV, setup-box, Washing machine, Wi-Fi router, Android, Car, Camera, Flight entertainment system, and many more system run Linux under the hood. This is all capable due to building blocks that open-source and Linux has provide for developers. <br />
<br />
This blog talks about customizing Linux and installing it on Pen Drive and using it for various reasons. If you are new to Linux then you will have to read some more articles around Linux and give a try to install and run couple of Linux distros. You will learn lot in the process and know how system works. If you are Intermediate/geek then lot of things below will come easy to understand and work on.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjifAa3yMpvpDn8BTa3OqC_BynuJntTP688VpiofOjWV-ZMlbqHB1re4sN2sZHifM217t4FbGmB4pYCfv3t9Z-hNNpC7Co2FZHm-qavzQCDuPqMiS7F6EanWrmVbYCALsdHUcS-vrj7WtOt/s1600/ubuntu-precise-pangolin-pendrive+(1).jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjifAa3yMpvpDn8BTa3OqC_BynuJntTP688VpiofOjWV-ZMlbqHB1re4sN2sZHifM217t4FbGmB4pYCfv3t9Z-hNNpC7Co2FZHm-qavzQCDuPqMiS7F6EanWrmVbYCALsdHUcS-vrj7WtOt/s1600/ubuntu-precise-pangolin-pendrive+(1).jpg" height="640" width="640" /></a></div>
<br />
<br />
<b>Linux Distros/Distributions</b> - As pointed above, Linux comes in various shapes and sizes and people have customized it to make it run for various purposes. Many software engineers around world have tweaked Linux and created a new distro. Check out <a href="http://ubuntu.com/">Ubuntu</a>, <a href="http://linuxmint.com/">Linux Mint</a>, <a href="http://fedoraproject.org/">Fedora</a> and more here. <a href="http://distrowatch.com/">http://distrowatch.com/</a><br />
<br />
<b>Why Linux ? </b><br />
<br />
<ul>
<li>Secure by default. Its a modern OS and implements the right architecture to make it secure</li>
<li>Customizable - Linux is the most customizable OS I have ever seen. Look at the number of distros and UI options it provides to user. You can get easy to use Linux (Ubuntu / Fedora or Mint) or get a raw Linux that you can setup yourself if you are geek.</li>
<li>Free apps via 'Software repositories'. Huge set of apps available for free with single place to install. You can be sure of security and price as its installed from one place from trusted source</li>
<li>Linux is the most worked on Operating system by developers around the world. Source code is open to all can that benefits Linux to get issues fixed rapidly</li>
<li>Fast - Installing Linux on any laptop/desktop can make you realize how fast your system responds to you as compared to Windows. No unwanted software, best usage of hardware resources, and customization to suite low & high-end hardware. Try installing Linux on your old laptop to give it a new life.</li>
<li>Free & Open source - Its totally free and open-source. You can use Linux distros for personal and commercial purposes for free. Open-source nature has attracted developers around globe to work on cool technology and make it better everyday. You get advantage of fast pace development of Linux which no other operating system in world provides. </li>
<li>It provides building blocks to make your own Linux catered for specific usage. Look at various devices Linux runs in and that should give you a picture how Linux can be shaped and made to work in variety of hardware </li>
</ul>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/yVpbFMhOAwE?feature=player_embedded' frameborder='0'></iframe></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<b>Why YOU should learn/use Linux ?</b></div>
<div>
1. Linux is not for geeks. Ubuntu / Fedora / Mint Linux has been developed for every day use and you can just start using it with all set of applications installed for you. Apps similar to Word, Excel & PowerPoint all setup for you and you don't need to pay to anyone to use it. No license or fees required!</div>
<div>
<br /></div>
<div>
2. Linux is way to go forward as it provides ton of customizations. You will be using Linux in one or other form and learning/using Linux will help you in long run </div>
<div>
<br /></div>
<div>
3. Buying Windows machine with all set of third-party apps preloaded is going to charge you more. If you are buying new laptop, go for OS free machine and then setup Ubuntu / Fedora / Mint. You will avoid all unwanted apps and promotional software</div>
<div>
<br /></div>
<div>
<b>Give it a try with Linux Live CD:</b></div>
<div>
All Linux Distros provide mechanism for users to try out Linux before you install it - That's called Linux Live CD. You need to download a CD format of Linux and burn it on CD/DVD. You then need to reboot your machine with CD option and you should be able to test drive Linux on your machine. Running Linux-Live does NOT impact your machine in anyway. You can then decide to install if you are happy with the applications and user interface. <br />
<br />
<br /></div>
<div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiy1P5Xx2Pt4p66GxFGeY-DH5aShMMPPo3YmdKzlzuxvsOhvVpIx11yUOkIHfm5S5AEnvPJ1t9qypbCqsog6UwGsrs5Zft69GDX8RF09d395iQy8sMWdtBdtT9M3msueWzy0y5m0fN_AgZ9/s1600/ubuntu.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiy1P5Xx2Pt4p66GxFGeY-DH5aShMMPPo3YmdKzlzuxvsOhvVpIx11yUOkIHfm5S5AEnvPJ1t9qypbCqsog6UwGsrs5Zft69GDX8RF09d395iQy8sMWdtBdtT9M3msueWzy0y5m0fN_AgZ9/s1600/ubuntu.png" height="320" width="400" /></a></div>
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div style="text-align: center;">
Screenshot showing Ubuntu 14.04 LTS</div>
<br />
<h3>
Here are five reasons why you should install Linux on Pen Drive and use it. </h3>
<br />
<b>1. Scan and Clean Windows Viruses: </b><br />
Windows viruses can go deep and infect badly. Viruses can hide themselves and no one can find them (e.g. rootkits). These can be better cleaned by loading Linux OS and then scanning your Windows machine. AntiVirus programs on Windows can detect Windows Viruses and clean them up. Install ClamAV or AVG Linux AntiVirus on you Linux Distro and scan all mounted drives, then reboot to cleaner version of Windows. <br />
<br />
<b>2. Boot your desktop environment on public/friends computer for privacy: </b><br />
<br />
Once you get Linux on your Pen Drive, you can boot to your own Linux environment using USB boot. All modern computers (5-7 year old) do provide boot option which you can enable. Linux from Pen Drive will boot up with all your apps. This will not impact the host Windows OS. There will not be any traces left of browser history or passwords or your files on your friends PC as you operate on your own Linux environment.<br />
<br />
As you own your Linux environment, you can have all your favourite apps and thus you don't need to install/uninstall any software on friends computer - I think its a better way to just use the machine as keyboard and screen and not all the software/OS. <br />
<br />
<b>3. Boot to safe environment (No key loggers): </b><br />
With Linux Distro and applications you install from 'Software repository' its unlikely that your Linux environment can get infected with Keyloggers. Keyloggers are viruses which capture all your keyboard inputes and sends to server, this will include all your emails, username, passwords and credit card info that you enter online. <br />
<br />
Booting from your Pen Drive Linux, no keyloggers from public/friends computer will run and that will ensure everything you type will be safe and not be passed anywhere.<br />
<br />
<b>4. Backup Data from hard-disk if it fails to boot Windows: </b><br />
Hard disk are not lifelong. They come with their max age of usage and using beyond is risky. If your Windows PC is old enough then there are changes that hard-disk can fail and your data may get trapped. Your Windows machine may not boot up and you may not get a chance to backup. Good way to give it a try is to boot using your Linux from Pen Drive. Once your boot Linux, you can try mounting your Windows drive and repair it. You may be able to see files and be able to copy them to external hard-disk. Booting from USB come to rescue when your data is in risk.<br />
<br />
<b>5. Save your Laptop/data from theft: </b><br />
If you can carry entire Linux environment with you in Pen drive then you don;t need a laptop. You can use any public/friends computer for sometime and boot to your favorite environment. A good way to avoid carring laptop/tablet and risk of getting it stolen in public places.<br />
<br />
If you lose your USB, your data on it still can be secure enough. You can encrypt your users home drive while installation and thus to open any file, it will need a password. For a thief or anyone your drive is just an blank USB which can be reused. <br />
<br />
<b>System requirements before you start:</b> Minimum 2 GB Pen Drive & 1 GB of RAM <br />
<br />
<b>How to Install Linux on Pen Drive & use it: </b><br />
Here is step by step guide do install Ubuntu Linux on Pen Drive. I would prefer using <b>Lubuntu OS</b>, as its stable and lightweight <a href="http://www.ubuntu.com/download/desktop/create-a-usb-stick-on-windows">http://www.ubuntu.com/download/desktop/create-a-usb-stick-on-windows</a><br />
<br />
Once you create USB drive with Linux, reboot your machine and select USB boot from your boot setup. Here is how. <a href="http://lifehacker.com/5991848/how-to-boot-from-a-cd-or-usb-drive-on-any-pc">http://lifehacker.com/5991848/how-to-boot-from-a-cd-or-usb-drive-on-any-pc</a><br />
<br />
Feel free to post comments or queries. I will be able to help you out setup your pen-drive or point you to right set of steps if you are facing problem.<br />
<br />
<br />
<br />
<br />
<br />
<br />Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com1tag:blogger.com,1999:blog-5616099921379206790.post-69928296499955112212014-05-07T07:04:00.001+01:002014-05-08T06:20:25.029+01:00Password - The weakest factor online<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Passwords has been a proven way to protect your account and keep your info secure and private. </span><span class="EOP SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Passwords are common and we do use it everyday. Access emails, your system, Facebook, unlocking your phone, access bank online, and many more. An average of 10 passwords are used by any individual (like you) everyday as per reports. </span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">With internet and the number of things you can do online, password has been a common practice. To play a game or post review, you need an account and thus the password. Concept of an account has been strongly developed in internet so that you can log back in anytime and continue to access the information back where you left. An account maps your work, activity on that website which can be saved and later referred back. Now that there is data associated with you account, websites wants to protect users data and thus the password which forms the easies way to authenticate a user. </span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Hackers and malware are on their peek and always looking for access to your account more than anytime before. Password thus has became the weakest factor online. Your privacy, your work, your money, your data and your friends are all maintained by a password.</span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><b>Password statistics:</b></span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
</div>
<ul>
<li><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">90% of passwords are vulnerable to hacking. More details here.</span><span class="EOP SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></li>
<li><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">With top 10,000 most common passwords, 98% of accounts would be accessed</span><span class="EOP SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></li>
<li><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">70% of the people do NOT use unique password for different websites. <a href="http://passwordresearch.com/stats/statistic96.html">Report here</a>. </span><span class="EOP SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></li>
<li><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Around 82% of people have forgotten password used on a website</span><span class="EOP SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></li>
<li><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; margin: 0px; padding: 0px;" xml:lang="EN-US">80% of people do not change bank card PIN. <a href="http://passwordresearch.com/stats/statistic206.html">Report here</a></span></span><span style="color: windowtext; font-size: 11pt; line-height: 17px;"> </span></li>
</ul>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Here are top 500 passwords which forms the 80% of the passwords. Bigger the size, more frequently they are used.</span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"><br /></span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgooyNiLISZXwlh8tSxX5GaW33o0-q66mWyK4acgr-Nf8sWTIECVILm4N_hGB88h3dL2Lle-RGE-SrqeUiyooBgVWz3UDJXHd10obs02nVyuVzmKe-tHhEujHEalMvWDz1eEy-Ki7a8ltfV/s1600/passwordscloud.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgooyNiLISZXwlh8tSxX5GaW33o0-q66mWyK4acgr-Nf8sWTIECVILm4N_hGB88h3dL2Lle-RGE-SrqeUiyooBgVWz3UDJXHd10obs02nVyuVzmKe-tHhEujHEalMvWDz1eEy-Ki7a8ltfV/s1600/passwordscloud.png" height="204" width="640" /></a></div>
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<b><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Why username and passwords required everywhere?</span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></b></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Why a website that you just need to provide review/rating about hotel/movie/restaurant needs you to create a new user account ? There are many such scenarios where in account creation is just not required, however users are forced to do so.</span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;">In most of the cases password does make sense, however in many of the cases, password ideally is an overkill; websites do have commercial reasons attached to force users to create account or access their site using </span><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">Facebook</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;">/Google+ profiles. Every company wants to grow their user base and that directly maps to their profits and business. No wonder why a site that is just asking you to provide a review/rating also needs you to register as user. </span></span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;">Thus looking at web trend, passwords are more going to be asked by websites and you are going to create either new accounts or use your F</span><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">acebook</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;">/Google+ </span><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">profiles</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;"> to register. Either of this puts you in trouble as to maintain a good password for new website or keep an eye on usage of your F</span><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">acebook</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;">/Google+ profile by this website. </span></span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Everyone wants your email ID. Almost all websites now uses email ID as user name. You activate website functionality by validating your email address and thus website gains your email address to send more stuff or remind to revisit the site. Thus account creation becomes the primary requirement on such websites and this is common trend with big and small players on web. </span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<b><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Same passwords for multiple sites?</span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></b></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Its hard to remember strong passwords and that tends to use same password again and again on different websites. A very common trend that needs a change. Using right tools and practice its doable. Below are some techniques to help you generate strong passwords and either remember them or maintain them securely.</span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><b>Email ID as user name :</b></span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Email address as user name is common trend. Your email ID is known to world by different ways and thus half of the info about credentials is exposed. The other half is your password. It then becomes mandatory for your password be strong enough to fight hackers around world as they already know your email ID.</span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Many of us use 1 or 2 primary email IDs. We share these IDs with people to communicate and use same for user name. Thus your email ID has become part of your identity on internet and you share it freely with friends and many offline registrations forms. Any one that now has your name and email ID can give a try to hack your accounts with most common passwords available online.</span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<b><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Strong password difficult to remember ?</span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></b></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Here are some techniques to create strong passwords and remember them </span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
<ul class="BulletListStyle1 SCX132691058" style="margin: 0px; padding: 0px;">
<li class="OutlineElement Ltr SCX132691058" style="margin: 0px 0px 0px 24px; padding: 0px;"><div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Create a pass phrase rather than just a password. It can be your favorite line from book or song. There are plenty of songs that you love and sing</span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
<span class="ListGhost SCX132691058" style="margin: 0px; padding: 0px;"></span></li>
<li class="OutlineElement Ltr SCX132691058" style="margin: 0px 0px 0px 24px; padding: 0px;"><div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Be creative and imaginative to create unique characters that don’t exist</span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
<span class="ListGhost SCX132691058" style="margin: 0px; padding: 0px;"></span></li>
<li class="OutlineElement Ltr SCX132691058" style="margin: 0px 0px 0px 24px; padding: 0px;"><div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Use Book title, serial name or food dish </span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
<span class="ListGhost SCX132691058" style="margin: 0px; padding: 0px;"></span></li>
<li class="OutlineElement Ltr SCX132691058" style="margin: 0px 0px 0px 24px; padding: 0px;"><div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Combination of Multiple cities/places</span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
<span class="ListGhost SCX132691058" style="margin: 0px; padding: 0px;"></span></li>
<li class="OutlineElement Ltr SCX132691058" style="margin: 0px 0px 0px 24px; padding: 0px;"><div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Combination of company names, car models or sports person</span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
<span class="ListGhost SCX132691058" style="margin: 0px; padding: 0px;"></span></li>
<li class="OutlineElement Ltr SCX132691058" style="margin: 0px 0px 0px 24px; padding: 0px;"><div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Combination of name, place or year</span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
<span class="ListGhost SCX132691058" style="margin: 0px; padding: 0px;"></span></li>
</ul>
<div class="OutlineElement Ltr SCX132691058" style="margin: 0px 0px 0px 24px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Avoid using these for passwords</span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
<ul class="BulletListStyle1 SCX132691058" style="margin: 0px; padding: 0px;">
<li class="OutlineElement Ltr SCX132691058" style="margin: 0px 0px 0px 24px; padding: 0px;"><div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Wife, girlfriend, mom, kids, pets names</span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
<span class="ListGhost SCX132691058" style="margin: 0px; padding: 0px;"></span></li>
<li class="OutlineElement Ltr SCX132691058" style="margin: 0px 0px 0px 24px; padding: 0px;"><div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Place where you live</span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
<span class="ListGhost SCX132691058" style="margin: 0px; padding: 0px;"></span></li>
<li class="OutlineElement Ltr SCX132691058" style="margin: 0px 0px 0px 24px; padding: 0px;"><div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Date of birth of your favorite people</span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
<span class="ListGhost SCX132691058" style="margin: 0px; padding: 0px;"></span></li>
<li class="OutlineElement Ltr SCX132691058" style="margin: 0px 0px 0px 24px; padding: 0px;"><div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Common passwords </span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
<span class="ListGhost SCX132691058" style="margin: 0px; padding: 0px;"></span></li>
</ul>
<div class="OutlineElement Ltr SCX132691058" style="margin: 0px 0px 0px 24px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Listed below are tools to help you generate strong passwords and maintain them. These tools have been proven and are industry standards which you should leverage to ease out creating strong passwords and then remembering them. </span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<b><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Google and Facebook as common method to login:</span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></b></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;">Social network has provided a new and unique way of login and that is leveraged by many websites. You don’t need to create account on every websites, however use Google+ or </span><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">facebook</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;"> login method provided on third-party websites. These websites integrate with social networking authentication mechanism to validate a user and then provide you access to functionality.</span></span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">It’s a easy and quick way to gain access to website content/functionality without creating new account. However you have to be careful here are you are exposing lot of data to these websites than you should be. Your email ID, name, where you live, your friend list, your work place, and also an option to post on your wall when they want. That’s too much of info for too little. You may better end up creating a new account rather than giving access to above info to be secure. </span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;">One advantage with Social authentication is that you can go back to </span><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">facebook</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;">/google+ and revert the access to third-party apps/websites anytime. those apps will never be able to gain your updated info or friend list or post on your wall. But they do have your old info which you can not revert.</span></span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; margin: 0px; padding: 0px;">
<h3 style="color: windowtext; padding: 0px; vertical-align: baseline; word-wrap: break-word;">
<span style="font-size: large;"><span class="TextRun SCX132691058" style="color: windowtext; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><b>Better ways to solve the password problem:</b> </span><span class="EOP SCX132691058" style="line-height: 17px; margin: 0px; padding: 0px;"> </span></span></h3>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><b>Two factor authentication -</b> </span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">In simple terms you can consider two factor authentication as "Two Locks" for your account. You need to open both the locks before your get into your account. And to open two locks you of course need two separate keys. </span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;">Two factor authentication is security process in which you use your </span><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">userID+Password</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;"> and physical token. Its "something you know" and "Something you have". E.g. If you wish to login to your email account, your </span><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">email ID</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;"> & password is what "You know" and an addition short numeric code(Verification code) that is available on your phone which acts as "You have".</span></span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-family: Calibri, sans-serif; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Two factor authentication has became industry standard to protect your account and now is provided by many websites. Here is my detailed blog on two factor authentication -</span><span style="color: #0d0e00; font-family: Calibri, sans-serif;"><span style="font-size: 15px; line-height: 17px;">http://softwaresecurityforyou.blogspot.com/2014/04/securing-your-account-with-password.html</span></span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<b><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">Lastpass</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;"> and </span><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">Keepass</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;"> - Password managers you need</span></span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></b></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">Lastpass</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;"> is a browser plugin that manages(stores) your passwords and provides strong security model around itself to avoid exposing your passwords to other. It allows you to create strong passwords by auto-generating complex passwords and then maintaining them for you. Anytime later you revisit that site and navigate to login page, it will populate your username/password once you enter master-password. www.lastpass.com</span></span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;">You just have to remember one password after that; and that is of </span><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">lastpass</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;"> itself. </span><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">Lastpass</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;"> provides good integration with websites and browsers. Also all your data is encrypted and maintained online and thus your password storage is available for you anytime. They provide web and mobile app for ease of use.</span></span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;">Ensure you use two-factor authentication with </span><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">lastpass</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;"> to make it max secured and give you peace of mind enough though all your passwords are stored online.</span></span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;">Here is short video on what is lastpass </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/RM0fzHxMASQ?feature=player_embedded' frameborder='0'></iframe></div>
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"><br /></span></div>
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"><br /></span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<b><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">Keepass</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;"> & </span><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">KeepassX</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;"> password manager</span></span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> -</span></b></div>
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<b><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"><br /></span></b></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">Keepass</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;"> is free, open-source and easy-to-use password manager. It maintains data locally in encrypted fashion and also has master-password to access all your lasswords. </span></span><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">KeepassX</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;"> is </span><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">linux</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;"> version of it.</span></span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"><br /></span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">Keepass</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;"> provides strong password generator functionality and maintenance of it. It create a file that you can take it with you and use on other computer. </span><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">Keepass</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;"> is purely local installation and does not talk to server or sends your passwords to server.</span></span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"><br /></span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;">Security model used by </span><span class="SpellingError SCX132691058" style="background-image: url(data:image/gif; background-position: 0% 100%; background-repeat: repeat no-repeat; border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 1px; margin: 0px; padding: 0px;">Keepass</span><span class="NormalTextRun SCX132691058" style="margin: 0px; padding: 0px;"> and its functionality has gained high number of award and is very well known by professionals around. </span></span><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">http://keepass.info/index.html</span><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"> </span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"><br /></span></div>
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKLulpL5LdEaLyRDbRDsYOOu4mrMIUCtOokxgUdNRTdTAsm-rMMKomWP3YxBoI9qO_YbcoGW-xa8Mq1OdJUatCaZnsnpf8waWMBMF76uczHD0k1Q19JqCk9cU_IOsu8Xx1tSqyfg25rMRu/s1600/main_big.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKLulpL5LdEaLyRDbRDsYOOu4mrMIUCtOokxgUdNRTdTAsm-rMMKomWP3YxBoI9qO_YbcoGW-xa8Mq1OdJUatCaZnsnpf8waWMBMF76uczHD0k1Q19JqCk9cU_IOsu8Xx1tSqyfg25rMRu/s1600/main_big.png" height="305" width="400" /></a></div>
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"><br /></span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US"><b>Common sense about passwords :</b></span><span class="EOP SCX132691058" style="font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; font-size: 8px; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; font-size: 6pt; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
<br /></div>
</div>
<div class="OutlineElement Ltr SCX132691058" style="font-family: Calibri, sans-serif; margin: 0px; padding: 0px;">
<div class="Paragraph SCX132691058" style="color: windowtext; padding: 0px; vertical-align: baseline; word-wrap: break-word;" xml:lang="EN-US">
</div>
<ul style="font-size: 6pt;">
<li><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Create unique passwords for every website</span><span class="EOP SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></li>
<li><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Don’t write down your password</span><span class="EOP SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></li>
<li><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Don’t share your password with anyone</span><span class="EOP SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></li>
<li><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Don’t store password on public computer</span><span class="EOP SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></li>
<li><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Change your password every 6 months</span><span class="EOP SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></li>
<li><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Use two-factor authentication for your important web accounts</span><span class="EOP SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></li>
<li><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Change your password immediately, if you think it is compromised</span><span class="EOP SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></li>
<li><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Don’t use common passwords. Create strong passwords</span><span class="EOP SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></li>
<li><span class="TextRun SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;" xml:lang="EN-US">Use password managers </span><span class="EOP SCX132691058" style="color: windowtext; font-size: 11pt; line-height: 17px; margin: 0px; padding: 0px;"> </span></li>
</ul>
<div>
<span style="font-size: 15px; line-height: 17px;"><br /></span></div>
<div>
<span style="font-size: 15px; line-height: 17px;"><b>Conclusion:</b> </span><br />
<span style="font-size: 15px; line-height: 17px;">With Internet, your accounts can be access globally and that's great. However hackers around globe too can give it a try to hack your account and steal the info and you will never notice. With more accounts required online, you need to have a long term strategy to maintain passwords and follow practices around it. Above article list the ground rules that everyone on internet should follow to maintain high level privacy & security. </span></div>
</div>
Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com1tag:blogger.com,1999:blog-5616099921379206790.post-20552077684547612402014-05-04T18:48:00.000+01:002014-05-29T10:10:33.253+01:00Encrypt personal data with TrueCrypt<span style="color: red;">WARNING - TrueCrypt has stopped development and issued security warning. Please don't use TrueCrpt. Maintaining this blog for historical purposes. Updated 29th May 2014. </span><br />
<span style="color: red;">-----------------------------------------------------------------------------------------------------------</span><br />
<br />
You got personal data or photos that you don't want anyone to see ? Got confidential files in your external-HDD/Pendrive and want to share it with your friends? Or want to create a secure vault to store sensitive data ? Answer is <b>TrueCrypt</b><br />
<br />
TrueCrypt is Open-Source, free disk encryption software available for Windows/Mac & Linux. <a href="http://www.truecrypt.org/">http://www.truecrypt.org/</a><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijF2WddKN_oxzm4z1fr5P2uTRAUnfm7J5kK8aa3qTkngM2_DM4uz1vCs_-jRnAJPggIB_k6zZY9vEstSFjIE9_MhSxUYAjqKDKY8Nk7IQmxG7WbwcjQfV-oPzsYVO4cpERpxfVnJsS1iVa/s1600/Vault-Door.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijF2WddKN_oxzm4z1fr5P2uTRAUnfm7J5kK8aa3qTkngM2_DM4uz1vCs_-jRnAJPggIB_k6zZY9vEstSFjIE9_MhSxUYAjqKDKY8Nk7IQmxG7WbwcjQfV-oPzsYVO4cpERpxfVnJsS1iVa/s1600/Vault-Door.jpg" height="270" width="640" /></a></div>
<br />
<br />
<b>Main features</b> -<br />
<br />
<ul>
<li>Create virtual disk within the real hard drive - You can create a vault and lock it using a password. You can then see all files within it with password</li>
<li>Encrypts entire hard-disk or pen-drive. If your laptop is stolen or you lose pendrive with data then no one can read the content and see your files <br /> </li>
<li>Encryption is automatic and thus you can open / edit files using regular applications such as MS-Word, Excel, etc. </li>
</ul>
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2Yw62arV1RgoLJIJ6WCtu322Zy2PjazWnqkUOm0c4S5c9fd91dwdTi2iE0NDWAmkpSNzsybq47JAvxyUgw6QknnNFL_BCUj7e9b3G9gbo6z-WfnRJ9X24gGdS7Gq577we2L81jictHrAW/s1600/xps_wizard-v6.1a.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2Yw62arV1RgoLJIJ6WCtu322Zy2PjazWnqkUOm0c4S5c9fd91dwdTi2iE0NDWAmkpSNzsybq47JAvxyUgw6QknnNFL_BCUj7e9b3G9gbo6z-WfnRJ9X24gGdS7Gq577we2L81jictHrAW/s1600/xps_wizard-v6.1a.png" height="392" width="640" /></a></div>
<br />
<br />
<b>How to create a secure vault and store files ? </b><br />
<br />
Download TrueCrypt from http://www.truecrypt.org/downloads and then follow Bigginer Tutorial from here - <a href="http://www.truecrypt.org/docs/tutorial#Y0">http://www.truecrypt.org/docs/tutorial#Y0</a><br />
<br />
High level steps detailed in above link -<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<b>Step1</b> - Create a 'Volume' or container in which you will store your files<br />
<br />
<b>Step2</b> - Setting the password to your 'Volume'<br />
<br />
<b>Step3</b> - Mounting the volume as a another drive - E:\ or F:\<br />
<b><br /></b>
<b>Step4</b> - Copy files and close the volume. Any time after that if you wish to open/edit files then follow Step3 and that’s it.<br />
<br />
<b>Secure your files online : </b><br />
You can now backup these volumes which contain all you files on Google Drive or Dropbox and an open it on any other machine with same password. No one will be able to open or see content of this volume as it has a password set.<br />
<br />
<b>Multiple Volumes:</b><br />
TrueCrypt allows you to create multiple volumes with different sizes. Thus you can categorize your files e.g family-photos, bank/tax/expense documents, passport-documents etc. Of course you should give different passwords to each of them and keep a note.<br />
<br />
<b>Can I trust TrueCrypt to be secure enough ?</b><br />
TrueCrypt has been around for a while and proved to be a standard in encryption. It uses right set of methods and keys to ensure data is not accessible without the required password.<br />
<br />
TrueCrypt is open source and thus people around the world can see and find any issues in the source. This give high level of confidence that by now if any flaw would have been there would have been already found and fixed. <br />
<br />
Further reference - TrueCrypt documentation - <a href="http://www.truecrypt.org/docs/">http://www.truecrypt.org/docs/</a>Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com0tag:blogger.com,1999:blog-5616099921379206790.post-74207184654207798292014-05-04T11:44:00.003+01:002015-10-27T14:40:20.236+00:00Malls track your visits by Wi-Fi tracking<b>How does Wi-Fi works ? </b><br />
Wi-Fi is preferred wireless way of internet connectivity on mobile devices. We connect to Wi-Fi at home/office/cafe/Hotels and public places to get fast internet connectivity and do all stuff using it. Usage of Wi-Fi has spread fast with smartphones/tablets as compared to laptops couple of years back.<br />
<br />
Wi-Fi uses network name (SSID) and shared-password to connect and that makes it easy for users to get internet without much hassle. Once you connect to a network, your mobile device remembers the network and tries to auto-connect to it whenever its available.<br />
<br />
Mobile devices store all this Wi-Fi network info and use to auto-connect on periodic basis so as to provide preferred connectivity; and all that happens behind the scene. May be its your android/iphone/blackberry/windows phone/tablet all work same way. Your phone tries to connect to Wi-Fi automatically.<br />
<br />
You can see list of Wi-Fi networks connected by your device going to settings > WiFi <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEga4qAXRxKhY3uywHoTg-p6pDfgNuV0ENoe81I8RqTr0oSPZtlaOR0gG_mqQthyphenhyphencAkAoAPwHQxgQbiw3s8mD_FNHSZoyz1gP9UT_Mo6wguTcXmGwnnzdGSA9ImS4uds3vRXIPDeD-1sLGC6/s1600/blog-wifi-webcast1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="416" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEga4qAXRxKhY3uywHoTg-p6pDfgNuV0ENoe81I8RqTr0oSPZtlaOR0gG_mqQthyphenhyphencAkAoAPwHQxgQbiw3s8mD_FNHSZoyz1gP9UT_Mo6wguTcXmGwnnzdGSA9ImS4uds3vRXIPDeD-1sLGC6/s1600/blog-wifi-webcast1.png" width="640" /></a></div>
<br />
<br />
<br />
<b>What is Wi-Fi tracking ? </b><br />
<br />
Your phone continuously searches for Wi-Fi networks to auto-connect. To do this, it has to broadcast network signals/packets on air and check if network name stored on your phone is available. Thus your phone constantly sends signals(packets) via wireless (air) and waits for response from your Wi-Fi router. If Wi-Fi network is available then it auto-connects to it.<br />
<br />
Your phone has unique address (MAC) and that is used when Wi-Fi signals are sent out. This address does not change and can be effectively used to identify your phone uniquely; and so also you. <br />
<br />
Every time you visit a mall/hotel they can track your visits. With minimal set of Wi-Fi equipment's anyone can track you using these Wi-Fi signals that are sent out from your mobile device. They can exactly know when you came in and how long you were around. As your phone constantly sends Wi-Fi signals which has your unique (MAC) address, anybody can identify your presence in a area without you connecting to any of Wi-Fi networks. <br />
<br />
Malls/Cafes/hotels are setup-ed with Wi-Fi devices that can track your presence and then record this data for commercial/non-commercial purposes. There are companies that develop sophisticated equipment's and websites that can help malls/cafes to know more about you and your visiting patterns. This is exactly called Wi-Fi tracking. Your movement is tracked easily by just the presence of your phone along with you. <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA2-G8cn7xoS_F1d072z6ZfBNiGMJwFVvtU-JLJ-w4a9AE1r_S3xcFg0n9G7lXmR3ztkp-HlGPLffE996tO_AsKF4Uo_1rKKnWzgohq9ep6ghj3y7AxcrQGS4_ZkbCzocySp5ZSzxTpPl0/s1600/MK-BV085_WIFI_G_20120618171507.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="416" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA2-G8cn7xoS_F1d072z6ZfBNiGMJwFVvtU-JLJ-w4a9AE1r_S3xcFg0n9G7lXmR3ztkp-HlGPLffE996tO_AsKF4Uo_1rKKnWzgohq9ep6ghj3y7AxcrQGS4_ZkbCzocySp5ZSzxTpPl0/s1600/MK-BV085_WIFI_G_20120618171507.jpg" width="640" /></a></div>
<br />
<br />
<b>How can it be used against you ? </b><br />
<br />
Just by mere presence of mobile device with active Wi-Fi can track you and your movement around a area. You do not need to do any action or connect to any network, and still you can easily be tracked.<br />
<br />
This info of yours and your pattern of visiting a place can be used for commercial purposes by malls/shops. They know how often you visit and where you ponder around, which section of mall you visit and how long you spend time around your favorite place in mall. This can be used by malls to know what people like and what sales more and what to market more.<br />
<br />
This brings in privacy issue as your presence is tracked by people easily without your notice. You pattern of visits is tracked, If this data is exchanged with others then all your data is exposed and can be used for good/bad reasons.<br />
<br />
Currently this method of Wi-Fi tracking is been actively used by various malls around world. <a href="http://nakedsecurity.sophos.com/2013/05/09/nordstrom-tracking-customer-smartphones-wifi-sniffing/">http://nakedsecurity.sophos.com/2013/05/09/nordstrom-tracking-customer-smartphones-wifi-sniffing/</a><br />
<br />
Seattle police department has setup network that can track all people with mobile devices in city. Read here - <a href="http://www.rawstory.com/rs/2013/11/10/seattle-police-department-has-network-that-can-track-all-wi-fi-enabled-devices/">http://www.rawstory.com/rs/2013/11/10/seattle-police-department-has-network-that-can-track-all-wi-fi-enabled-devices/</a><br />
<br />
Wi-Fi tracking thus can be done by anyone with minimal setup. This info can then be partnered with other vendors doing same things and can result in tracking you around multiple places which hurts peoples privacy. <br />
<br />
<b>Your phone broadcast info where you live, where your work and which hotels you visited </b><br />
<br />
As pointed above, all your Wi-Fi network info you have been connected to is stored by your mobile so that it can search for it and connect later. This list of networks is also broadcasted every time your mobile tries to connect to any Wi-Fi network. <br />
<br />
With Wi-Fi equipment's in place, any one can find which Wi-Fi networks you have been connected to earlier and can detail out all (network SSIDs) which can in turn tell the exact place. Wi-Fi network info are also mapped to actual location by Google and that info is available. Thus a clear loud announcement to everyone around you to know about your home, work and hotels you visited.<br />
<br />
<b>How to prevent it ? </b><br />
<br />
A simple way to protect yourself is to disable Wi-Fi when not in use. By disabling Wi-Fi, no wireless signals(packets) will be sent out and thus no tracking can be done. There are apps that can do this automatically.<br />
<br />
Remove unwanted Wi-Fi networks you no longer need. Navigate to Settings > Wi-Fi > Network list to clean up on regular basis. Remove any Hotel or café Wi-Fi network that you no longer plan to visit. This keeps the list minimal and avoid announcing places you visited earlier.<br />
<br />
Avoid connecting to public Wi-Fi unless its must to do so. Public Wi-Fi act as way to lure people and collect their data on network. Avoid those traps and stay secure. <br />
<br />
<b>Is there App to protect you ?</b><br />
McAfee(Intel Security) has developed an innovative Android app called 'McAfee Safe Wi-Fi'. Its free app and does not require any registration. Small app that solves Wi-Fi tracking problem. You can download from here - https://play.google.com/store/apps/details?id=com.mcafee.safewifi<br />
<br />
<br />
<a href="https://www.hidemyass.com/vpn/r21215/" title="Hide My Ass! Pro VPN"><img src="http://ddfnmo6ev4fd.cloudfront.net/img/banners/2015/09/320x50.gif" alt="HideMyAss.com"/></a>Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com9tag:blogger.com,1999:blog-5616099921379206790.post-438912780599314172014-05-01T10:05:00.000+01:002015-10-27T14:16:28.749+00:00Your Privacy is Fuxxked up!<b>What is Online Privacy and why anyone should care about it online? </b><br />
<br />
Online Privacy is about you and personal privacy concerning your data the way its stored and used by third-parties, and displaying that via internet.<br />
<br />
With internet age, your data is captured every moment with what you do online and is available for companies to use and share with others without you noticing it and that's the reason why you should care. Your identity and data is not only yours anymore.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.hoax-slayer.com/images/privacy.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://www.hoax-slayer.com/images/privacy.jpg" height="424" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<br />
<br />
<b>Google the web king: </b><br />
Every google search you do after login to google is stored. Google exactly know what kind of info you are looking for and what was your search history which it can relate and then show new results. Search done on webpage/tablet will also show up on phone and vice-versa. <br />
<br />
If you have android then you can also see that "Google Now" will show related blogs/articles around your search. E.g. if you search for a name of place then few minutes later you will see a short map with time to travel to that destination will be shown. Its a great personalization and very useful to user. However its a way to show that your search queries are stored and processed for various purposes.<br />
<br />
Every Android user ideally has Google account and that is the way Google brings in gmail / youtube/play and other services to user. All your emails are now with Google and they exactly know what you do and your personality traits. Ads shown by Google are defined by context of your emails.<br />
<br />
You use youtube, and it knows which videos you watched, what you like and what you are likely to view. It show all that closely matches your taste to you and removes all other clutter.<br />
<br />
Google alone brings huge issue of privacy online, and its hard to stay away from Google for all the services that you use.<br />
<br />
Here is Privacy Policy of Google that details what information is collected, how they plan to use and choices Google provide to update this information. <a href="https://www.google.ie/intl/en-GB/policies/privacy/">https://www.google.ie/intl/en-GB/policies/privacy/</a><br />
<br />
As per policy Google collects name, email, phone number, credit-card, address, search query, your photo, you IP address, OS, On Android - call log, sms logs, hardware settings, device unique IDs, browser type, browser language, browser cookies to uniquely identify you, users location via GPS/Wi-Fi/Mobile-tower, <br />
<br />
Google does accept as per their policy that they share this info with partners/companies/individuals outside Google. <br />
Google does a good job of providing us ways to view our web history and then remove items from them. You can also stop recording web-history. <a href="https://history.google.com/">https://history.google.com</a> and you see it all there. You can see all you web history of search, image search, maps, finance, travel, books, videos and more. <br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSsLt9PD6W2nfz4ZzBeJxOtG8m5sWmpgXzoitfU1__NyREzvPSliufgvbD2NhRqibhnfuRGj0-Dn6ZOGRFjTqatngyrBrKJkL9TxzLoHE8uRAozv9zw3rajqgJiL0V9uLKUmtrPqvvTs4R/s1600/google+history.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="490" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSsLt9PD6W2nfz4ZzBeJxOtG8m5sWmpgXzoitfU1__NyREzvPSliufgvbD2NhRqibhnfuRGj0-Dn6ZOGRFjTqatngyrBrKJkL9TxzLoHE8uRAozv9zw3rajqgJiL0V9uLKUmtrPqvvTs4R/s1600/google+history.png" width="640" /></a></div>
<b>Facebook/Social network: </b><br />
<br />
You got facebook account and Facebook knows what you share, your friends, your chat, your likes and dislikes. Your close friends, your relatives and your affairs. Facebook can track you every webpage you visit (via like/share buttons on those pages). Even user who don't have facebook accounts are also tracked by facebook. Facebook recently acquired Whatsapp and thus all chat communication is now known to facebook. <br />
Photos and Videos you like or comment are with facebook. You get tagged in various photos of your friends and all that is with facebook. <br />
<br />
It uses this info for showing ads to you. This info is also shared with other companies for various reasons. Here is Facebook Privacy Policy <a href="https://www.facebook.com/about/privacy">https://www.facebook.com/about/privacy</a>/ . Here is good read on understanding Facebook privacy policy - <a href="http://www.digitaltrends.com/social-media/terms-conditions-facebooks-data-use-policy-explained/#!GWyjH">http://www.digitaltrends.com/social-media/terms-conditions-facebooks-data-use-policy-explained/#!GWyjH</a><br />
<br />
<br />
<b>LinkedIn: </b><br />
If you are working, then its high chance that you have an LinkedIn account with all your info about employer you work/worked for, peers, projects, achievements, skills, recommendations and much more. Anyone can exactly find what you work on and your skillset without you noticing it. Its good and bad. LinkedIn is great for professionals to showcase skills and connect to peers across, however the data we pour in there is huge. Again this data is available to anyone for ads or personalization.<br />
<br />
In addition to LinkedIn, employers do search for social networking and other sites to know more about you before they interview/hire you. And with companies sharing your data, your scores are defined before even you get to interview.<br />
<br />
<b>Whatsapp/Viber/IM chats:</b><br />
Whatsapp and other messengers has sprung up due to smartphone and always on connectivity. Around 500 million users are hooked on Whatsapp alone. Text, Videos and photos are widely shared in 1-to-1 or Whatsapp groups. This info is with whatsapp and now with facebook. Data of 500m young people!<br />
<br />
<b>ISP/Government surveillance:</b><br />
All your data and websites pass through your internet service provider and then on the routers across globe. All this data is tracked and monitor by vendors at various levels. Your ISP, you state/country and all intermediate internet gateways on the way. <br />
<br />
Governments can ask for any of the website companies to share data about a user for any kind of investigations. Your emails/chat/photos/videos/likes and other data can now goes in hand of government without your consent.<br />
<br />
Governments exactly know your income and expenses, credit/debit cards you hold, things you buy and from where you buy.Which place you visit and how often you visit. They can even tell you your monthy income/expense and categorize each item and tell you how much you spend on hotel/ restraurant/ grossery/ medicine / flights or movies you watched. <br />
<br />
<b>Calls/SMS:</b><br />
Skype/Viber and all telephony companies know whom you talk to and how long, even if you delete all your call log or history. All this is available as data to investigate and reuse for various purposes. <br />
<br />
Your phone provider knows where you are so as to connect and ring your phone for incoming call. This info is maintained as you walk/drive. <br />
<br />
<b>Music/Books: </b><br />
If you have kindle/e-book reader then amazon knows which books you read, what's your reading pattern, which books you are likely going to read and show those. It also knows your reading speed and show how long you are going to take to complete a book.<br />
<br />
Spotify and many other music players provide free music service with ads. Great to listen on phone/laptop. You login to these services via Facebook/Google accounts and all that info is captured. You personal favorites, playlist and more.<br />
<br />
<b>Photo/Video: </b><br />
Google/Dropbox/facebook knows which camera you got, where you clicked photos, how many photos you clicked and what's your photography skills look like. <br />
<br />
<b>Smartphone the privacy killer: </b><br />
You got smartphone and it captures all your info, place you visit, websites you navigate, apps you install, games you play, songs you listen time you wake up, chat you do on whatsapp and banks you hold your accounts. It knows how many steps you walk/run daily and how many calories you burnt. Android/iPhone capture all that you do with your phone and most of it does get sent back.<br />
<br />
<b>Hotels/Malls/Shopping: </b><br />
With malls providing you cards to gain points and redeem, exactly knows who you are and what you buy. Which fruits your eat and how healthy you eat. By just entering malls they know you are in using your smartphones wi-fi. How much time you spent in mall and which shop/section you spent most of the time.<br />
<br />
Malls you visit first time also knows about your just due to the fact that you have smartphone with Wi-Fi enabled. They capture all your info, shops you visit and time you spent. Is that your first time in the mall or a returning visitor. Your smartphone keeps searching for known Wi-Fi hotspots and that helps Wi-Fi sniffers to know about your and can track you.<br />
<br />
Almost all hotels now provide Wi-Fi and that forms the entry point of monitoring who connects or who is near by hotel. What time you came in and how long you stayed. <br />
<br />
<b>Other Internet services that we often use:</b><br />
<br />
You use netflix or other movie streaming and it knows what you are watching. <br />
Notes you take on Onenote/Evernote/Google Keep and other sites are available on cloud.<br />
<br />
Tripadvisor and other travel sites exactly know places you like and hotels you visit, they show what's you likely going to book in your next travel destination. <br />
<br />
Modern day cars are connected to internet and keeps track of how you drive, places you visit, FM and songs you listen to and more.<br />
<br />
<b>Data backup:</b><br />
Everyone is concern about backup and dont want to miss photos or documents they have been working. All of this data again goes to cloud services like google Drive or Dropbox or box.net or Amazon. All your data is surely safe to be available for restoring in case you lose your device or your hard-disk fails. <br />
<br />
However you are now giving your data to keep in some other hands and that's all unknown to you. All your private photos/ideas/your work/music and much more is backed up on cloud and managed by some one whom you don't know. Surely this data will be scanned, processed and maintained in a way to make more sense to you and others. <br />
<br />
Stolen/lost devices- <br />
50% of theft happening around world is about mobile/tablet/laptops. All of these are data centric devices and points to your identity. <br />
<br />
<b>Reflection of your data on ads/personalization: </b><br />
Ads you see on internet relate to you more than ad on TV. Google/Facebook/Apple/ other know exactly what you do online and show ads that you are likely to view or interests you.<br />
<br />
All of these data is collected behind the scene and sold from one company to other without your consent or knowledge. Companies make most of it to give you personalized service on their websites and try to engage you most. <br />
<br />
Even with private-browsing modes enabled, your internet service provider, state government, your company knows exactly what you browse. This dump is maintained for long time to refer back.<br />
<br />
Personalization based on your data is great, however huge amount of data is been collected about you every hour/day and stored forever. You never know how it can be used against you or processed for you to provide unique internet experience for you that may be different than reality.<br />
<br />
<b>Best Practices: </b><br />
A good solution is not to use internet at all, however that's not practical as it brings in so many advantages which we have been enjoying. However we should be aware about above listed things and make sure you follow some best practices to keep a tab on your privacy.<br />
<br />
You need to be careful on what you do and how you interact with technology that constantly follows you. Here are some good tips<br />
<br />
<br />
<ol>
<li>Use two-factor authentication to ensure you have high level of protection around your account and no one can hack your account to get all your data. Here are details about two-factor authentication - <a href="http://softwaresecurityforyou.blogspot.ie/2014/04/securing-your-account-with-password.html">http://softwaresecurityforyou.blogspot.ie/2014/04/securing-your-account-with-password.html</a></li>
<li>Review your web history on google and keep it minimal. May be block web-history recoding from google. Review it at <a href="https://history.google.com/">https://history.google.com</a> </li>
<li>Review privacy settings on facebook. Remove unwanted access to apps and fine tune who see your shared info </li>
<li>Use Private-browsing mode if you are searching and don't want google to capture that, of course don't login to browser or google</li>
<li>Be cautious about what you share/like/comment online on social media </li>
<li>Disable Wi-Fi/Bluetooth if not in use </li>
<li>Uninstall unwanted apps that you don't use on smartphones </li>
<li>Ensure you have Anti-theft apps on your mobile devices and you wipe data remotely using them if you lose it. Setup PIN/Password on your mobile devices. </li>
<li>Review your usage of internet and data sharing</li>
<li>Ensure online accounts for data backup are safe and not exposed </li>
<li>Avoid connecting to public Wi-Fi hotspots or use VPN solutions to encrypt all communication. </li>
<li>Use Tor for additional privacy from ISP and intermediate gateways</li>
<li>Setup Google Alert on your name. Visit <a href="http://www.google.com/alerts">http://www.google.com/alerts</a> enter your name, and variations of your name, with quotation marks around each. Select how frequently you want alerts (daily is probably fine for most of us) and where you want them sent. Now onwards if your name appear anywhere on public internet and google finds it, it will notify you.</li>
</ol>
<div>
Stay safe online!<br />
<br />
<br /></div>
<a href="https://www.hidemyass.com/vpn/r21215/" title="Hide My Ass! Pro VPN"><img alt="HideMyAss.com" src="//ddfnmo6ev4fd.cloudfront.net/img/banners/2015/09/320x50.gif" /></a>Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com0tag:blogger.com,1999:blog-5616099921379206790.post-36606531600362957022014-04-30T07:10:00.004+01:002014-04-30T07:15:52.296+01:0010 Reasons to use Google Chrome for SecurityInternet Explorer has been there for good long time now and each version has exposed security vulnerabilities. What that mean to user is that any website that you visit can take control of your computer remotely and can do anything without you noticing it. Microsoft has recently (26th April 2014) notified users about flaw in Internet Explorer <a href="https://technet.microsoft.com/en-US/library/security/2963983">https://technet.microsoft.com/en-US/library/security/2963983</a> . Here is why its time to switch to better options for free.<br />
<br />
As internet has matured new web technologies have immersed. Modern browser has been developed to meet those needs and keep users safe. Google Chrome and Firefox has grabbed market share from IE with due its appealing functionality over IE . Today FireFox has released their new version 29 which has refreshing looks, boost privacy and provides new customization. Try it! <a href="https://www.mozilla.org/en-US/firefox/new/">https://www.mozilla.org/en-US/firefox/new/</a><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMzND7hZa3gaoAqGtgHQW6Dpo7LylnJaVpYyZxV7HIUakZL3To2rKNRdftXu_yLhpe1WwFm0FfdasU7TcdfXXBAU2Nf_d6R1bHG249j_4TVpD4lrMscLzJ0JsW8KQ4qLHM3c7k9DqNM9zq/s1600/Google-Chrome-Logo.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMzND7hZa3gaoAqGtgHQW6Dpo7LylnJaVpYyZxV7HIUakZL3To2rKNRdftXu_yLhpe1WwFm0FfdasU7TcdfXXBAU2Nf_d6R1bHG249j_4TVpD4lrMscLzJ0JsW8KQ4qLHM3c7k9DqNM9zq/s1600/Google-Chrome-Logo.jpeg" height="192" width="320" /></a></div>
<br />
<br />
<b>Why Google Chrome:</b><br />
Google Chrome has became popular since it launched in 2008 and is the fastest growing browser. Its based on open-source project called <a href="http://www.chromium.org/">Chromium</a> which is driven by Google and people around the world.<br />
<br />
Here are some notable features from security point that strongly suggest using Google Chrome or Chromium -<br />
<ol>
<li><b>Secured Tabbed browsing </b>- All new browsers supports browser tabs to visit different websites in different tabs. In Chrome each tab is separate process running on your system which makes it secure. Web-page from one page cannot infect or access data from other. Chrome has made best use of OS security functionality to extend to browser</li>
<li><b>Auto-updates in Chrome</b> ensures you get latest fixes and functionality. As a user you never need to force update or worry about it. It’s a patented technology from Google to update their products silently and automatically</li>
<br />
<li><b>Plugins/add-ons to enhance secure browsing</b>. <a href="http://softwaresecurityforyou.blogspot.ie/2014/04/use-these-browser-plugins-to-keep.html">My other blog</a> details about security enhancing Chrome plugins that you should be using. Most of these are also available in Firefox also</li>
<li><b>Chrome maintains blacklisted (Phishing & malware) websites</b> for protecting users. Users are warned if they are visiting these websites which gives in-built protection without any other plugins</li>
<li><b>Google promotes security research</b> on their Chrome browser and offers bounty if people find security issues in their products. Good few issues has been reported and addressed quickly by Google. Open-source nature provides access to source code that people around world can use and can dig deep to find vulnerabilities. Both of these programs give higher confidence of security</li>
<li><b>Chrome scans files that you download</b> for viruses. A built in virus protection in browser just works</li>
<li><b>Security warnings/alert when web-certificates of websites mismatch</b>, an indication of doggy website. If a website claims like your bank website, however has red warning alert from Chrome, then that's likely fraudulent website</li>
<li><b>Parental controls with in browser</b> - An In-built parental controls to secure your kids online is available for parents to configure. Here is guide available for same - <a href="http://www.howtogeek.com/177958/use-supervised-users-to-set-up-parental-controls-on-a-chromebook-or-just-in-chrome/">http://www.howtogeek.com/177958/use-supervised-users-to-set-up-parental-controls-on-a-chromebook-or-just-in-chrome/</a></li>
<li><b>Private Browsing" mode or "Incognito" mode as in Google Chrome</b>. No traces are left behind when you browse in private mode. No history, no temporary files, no web cookies to track users and no cache. Files you explicitly download do remain. <a href="http://softwaresecurityforyou.blogspot.ie/2014/04/use-private-browsing-mode-for-security.html">Here is my other blog on it</a>.</li>
<li><b>Google Sync</b> - A feature that allows you to login to browser using Google account and then sync your bookmarks, extensions/plugins, history and other configurations. This makes it easy for users to give consistent experience on different machines. All your bank/important website bookmarks are available to use on new machines if you switch between devices.</li>
</ol>
<br />
Oddly, there are some websites that need Internet Explorer only. You will have to stick with IE in those cases and user other for rest.<br />
<br />
Other notable browsers include Opera & Safari from Apple. They too do great job in many aspects of security as listed above. However Google Chrome is its way ahead.<br />
<br />
<b>Note</b> - Chromium is Open-source version of Google Chrome. Both share same code base. Google Chrome gives a touch of Google branding and more suited if you heavy use Google account, which most of us do.<br />
<br />
Other blog reference - <a href="http://tiptopsecurity.com/safest-web-browser-chrome-firefox-ie-opera-safari-comparison-chart/">http://tiptopsecurity.com/safest-web-browser-chrome-firefox-ie-opera-safari-comparison-chart/</a><br />
<div>
<br /></div>
Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com0tag:blogger.com,1999:blog-5616099921379206790.post-30145423706058426472014-04-28T21:10:00.001+01:002014-04-28T21:10:51.595+01:00Windows XP is dead, Why not switch to Ubuntu Linux?Microsoft has stopped supporting its 14 year old Operating system - Windows XP this month(April 2014). No new updates or fixes and security updates will be released to XP machines (Unless you are in government and ready to pay heavy charges). Here are is Microsoft announcement on XP <a href="http://windows.microsoft.com/en-IE/windows/end-support-help">http://windows.microsoft.com/en-IE/windows/end-support-help</a><br />
<br />
While XP was great for personal use, it is one of the least secure Operating System(OS) today. The most vulnerable OS by Microsoft and this is due to its single-user architecture. Microsoft has surely moved ahead with lessons learned and improved with Windows7 and Win8+ . Its still is most exploited OS on planet due to its design.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhU0nm4JF2E1de0zqADC7BELHR3IGlcFPxxXzwzT55HCIGnqQm1DE5UdTnQS-Xd7W2hiRpT7jNOuYwVk705L0Ex8R-q9JWSNB51hVIrzF5i0c-S73p4df7OxzSiBW-g2LkGruUvPHTJxcj5/s1600/Presentation1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhU0nm4JF2E1de0zqADC7BELHR3IGlcFPxxXzwzT55HCIGnqQm1DE5UdTnQS-Xd7W2hiRpT7jNOuYwVk705L0Ex8R-q9JWSNB51hVIrzF5i0c-S73p4df7OxzSiBW-g2LkGruUvPHTJxcj5/s1600/Presentation1.png" height="480" width="640" /></a></div>
<br />
<b>Time to switch to Ubuntu Linux:</b><br />
With no updates on XP from Microsoft, its time for you to switch to better OS. Either upgrade to Win7/Win8 if your machine supports and ready to throw away some cash, OR try out new Ubuntu Linux 14.04.<br />
<br />
Ubuntu (<a href="http://www.ubuntu.com/">http://www.ubuntu.com</a>/) is Linux distribution which is FREE for use. It’s a general purpose OS which comes with set of default application for you to get started immediately. It has built is apps for document, spreadsheet, presentation editing and browser (Firefox). Ubuntu is Linux version which is known for security and stability. Linux is Open-source operating system built by huge set of developers world wide and has been most successful for last 23 years. Linus Torvalds is the person behind building Linux OS, which has made so many technology things possible around us.<br />
<br />
There are other variations of Linux (called as Linux distros). These are different vendors which package linux with different requirements. Some popular Linux distros are - Fedora, Linux Mint, Open Suse, etc. Here is good site to visit to know more about Linux distros - <a href="http://distrowatch.com/">http://distrowatch.com/</a><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgP-VrrOHFajj50JwmKBGMV8PvtwNvfzN4P84jAdJuBs_LUQMForyRDA52Nf83SKp6NapL-GR6yYymFJo3Hwl4x8MYSP4DoiIuXhpz1ppb-5hVoGb5kphYwyC7K6OtpJhf7j41MwGIzS4xZ/s1600/ubuntu1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgP-VrrOHFajj50JwmKBGMV8PvtwNvfzN4P84jAdJuBs_LUQMForyRDA52Nf83SKp6NapL-GR6yYymFJo3Hwl4x8MYSP4DoiIuXhpz1ppb-5hVoGb5kphYwyC7K6OtpJhf7j41MwGIzS4xZ/s1600/ubuntu1.png" height="225" width="400" /></a></div>
<br />
<br />
<b>Performance advantage with Linux:</b><br />
Linux works great on old PCs and you should be able to clearly see performance improvement over Windows. Linux uses resources diligently and give max performance on your hardware. If your hardware/machine is really really old(7+ years) then try other Linux distro like Lubuntu (<a href="http://lubuntu.net/">http://lubuntu.net/</a>) or Puppy Linux - <a href="http://puppylinux.org/">http://puppylinux.org/</a><br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjX1veEFzP82qMf-BDtput0TpYcJEi5ZQAnCGirRxY6gY8-mTDeA4Ogjqphe3uvyc2DWQpM2K1zmWSN70DQoaJ20qtunokyssUvOZQQlXInJX98gYqOt7BxugrBMwpjtv2MG4N0mB_2DZIr/s1600/ubuntu3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjX1veEFzP82qMf-BDtput0TpYcJEi5ZQAnCGirRxY6gY8-mTDeA4Ogjqphe3uvyc2DWQpM2K1zmWSN70DQoaJ20qtunokyssUvOZQQlXInJX98gYqOt7BxugrBMwpjtv2MG4N0mB_2DZIr/s1600/ubuntu3.png" height="180" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
Screenshot showing office applications on Ubuntu 14.04</div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwW4u9jQGjOxaSR_BKcv87s_Qb9ClFizP4BHmOSqamPVA3YCtlGmdw2hbw_6cXAyzN3zLC89E1h6xR2cmxMCbPnFOOd2WspyN96Y5c3ovWO-UE4RhDnV4NE02MusiKj6K8E2I_XAss7i96/s1600/ubuntu2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwW4u9jQGjOxaSR_BKcv87s_Qb9ClFizP4BHmOSqamPVA3YCtlGmdw2hbw_6cXAyzN3zLC89E1h6xR2cmxMCbPnFOOd2WspyN96Y5c3ovWO-UE4RhDnV4NE02MusiKj6K8E2I_XAss7i96/s1600/ubuntu2.png" height="180" width="320" /></a>\</div>
<div class="separator" style="clear: both; text-align: center;">
Screenshot showing lock screen of Ubuntu</div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhip-voDLpqA2toNU1pSgg8GGckUmaZ26W9XSIkM4g59tWsm6T7Nb-XOwoRXTndVwXOeD-txLuiXK8txhcOycPsx_5nHCEoV8T_s88HqvyP8NGJ9YgpWHDQqRM8b4j1LAML41co_g16L0Iu/s1600/ubuntu4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhip-voDLpqA2toNU1pSgg8GGckUmaZ26W9XSIkM4g59tWsm6T7Nb-XOwoRXTndVwXOeD-txLuiXK8txhcOycPsx_5nHCEoV8T_s88HqvyP8NGJ9YgpWHDQqRM8b4j1LAML41co_g16L0Iu/s1600/ubuntu4.png" height="180" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
Screenshot showing Software Package Manager from Ubuntu 14.04 </div>
<br />
<br />
<b>Where all is Linux used ? </b><br />
Open source & free nature has brought huge attention to Linux across globe. All major websites run on Linux (facebook, google, twitter, wikipedia, and many more). Your android has Linux OS underneath. Your TV, washing machine, Wi-Fi router has been built on top of Linux OS. You can connected to Linux already by one or other way.<br />
<br />
<b>Why is Linux secure ?</b><br />
<br />
<ol>
<li>Any one can see the source code of Linux and that makes it most secure. Any new code is reviewed by developers around the world. No commercial software company can afford as many developers on single project has been working on Linux for last 23 years.<br /></li>
<li>Program are run on normal user and not admin(root) user. Any access to damage your system will require admin access and that is not what all applications run with. Keeping access to minimal makes the OS secure.<br /></li>
<li>Its design and architecture is based on Unix which has been around for 41 years now.<br /></li>
<li>Huge set of applications are available via Software package manager in Linux. </li>
<ul>
<li>All apps are build from source and deployed on servers for you to use for free. </li>
<li>You do not (generally) need to visit any third-party website to download and install an app. </li>
<li>This eco-system makes it Linux secure as no unknown sources are executed on your machine. </li>
<li>Entire concept of app-store (Apple/google) has been inspired from linux package manager. </li>
<li>It provides updates for OS and for all apps and that’s a great benefit on Linux. </li>
<li>Also security is built around about this to ensure valid packages are downloaded & installed and users does not need to worry about</li>
</ul>
<li>Networking stack (Communication layer) of Linux prevents viruses from propagating. Networking stack is conservatively build and firewall is at heart of Linux to make it secure. </li>
</ol>
<br />
<span class="Apple-tab-span" style="white-space: pre;"> </span><span class="Apple-tab-span" style="white-space: pre;"> </span><br />
<b>Does that mean there are no Viruses on Linux ?</b><br />
<span class="Apple-tab-span" style="white-space: pre;"> </span>1. No. That’s a myth. There has been viruses reported on Linux and Ubuntu has documented it well for users to know about. Here it is - <a href="https://help.ubuntu.com/community/Linuxvirus">https://help.ubuntu.com/community/Linuxvirus</a><br />
<br />
<span class="Apple-tab-span" style="white-space: pre;"> </span>2. Linux makes it hard for viruses to reproduce and spread due to its architecture and that prevents it out-break on Linux. Here is great article on Anti-Virus from Ubuntu - <a href="https://help.ubuntu.com/community/Antivirus">https://help.ubuntu.com/community/Antivirus</a><br />
<br />
<span class="Apple-tab-span" style="white-space: pre;"> </span>3. There are Anti-Virus applications for Linux and it’s a good practise to install and run them. You would not like to host a windows virus on your linux machine and allow it to spread on other windows machines around right ?<br />
<span class="Apple-tab-span" style="white-space: pre;"> </span><br />
<b>Where can I get Ubuntu and How can I install it ?</b><br />
<br />
<ul>
<li>You can download 32/64 bit Ubuntu from here <a href="http://www.ubuntu.com/download/desktop">http://www.ubuntu.com/download/desktop</a>/ . If your desktop/laptop is fairly old then download 32bit version of it.<br /></li>
<li>Here is step-by-step guide to install Ubuntu - <a href="http://www.ubuntu.com/download/desktop/install-ubuntu-desktop">http://www.ubuntu.com/download/desktop/install-ubuntu-desktop</a><br /></li>
<li>You can install Linux beside your Windows XP/Win7/Win8 without causing any problem. Its called dual boot. You can keep both OS on your computer without causing any problems (unless you mess-up with installation). </li>
</ul>
<br />
<div>
<br /></div>
Mangesh Bhamrehttp://www.blogger.com/profile/13640204061871544267noreply@blogger.com0