Open information - Open Internet

How to be safe is important but what happens if you are unsure or just need to check. Also what services your normal username may be linked to? May be something you may be interested to check.

So there is which if you enter your username it will check against several online services. It also has some other features as well to explore.

Of greater use is  which when you enter your email address it checks against a very large database which contains accounts on various services that have had user details hacked.

If you do find yourself on one of these lists it of course makes sense to change your logon details such as password and any other personel details that may have been changed.


The Tor Browser Bundle is a software tool designed to increase the privacy and security of your Internet activities and habits. It masks your identity and your on-line browsing from many forms of Internet surveillance. Tor can also be useful as a secure means of circumventing electronic restrictions so that you may access or publish blogs and news reports.

Tor protects your anonymity by routing communications through a distributed network of servers run by volunteers from all over the world. Using Tor hides the sites you visit from potential onlookers, and hides your location/identity from those sites. The software is designed also to make sure servers in the Tor network don't know both your location and the sites you are visiting.

Tor also takes steps to encrypt the communication to and through its network, but this measure can not extend all the way to a website which is sending or receiving content over non-encrypted channels (i.e. not providing https access). Nevertheless, the advantage of using Tor when accessing such sites is that Tor can secure your communication up to the step between the last of the Tor servers and the non-secure site. This confines the chance to intercept the content to that last step.

The Tor Browser Bundle consists of the Tor software and a modified version of the Firefox web browser, which is designed to provide extra protection while using it. The browser bundle also includes NoScript and HTTPS-Everywhere add-ons.

Note: There is a trade-off between anonymity and speed. Because Tor facilitates anonymous browsing by bouncing your traffic through volunteers' computers and servers in various parts of the world, it will definitely be slower than using other web browsers on your computer.

Tor Homepage


A Guide to Facebook Security from Facebook  -  facebook_security.pdf
For Young Adults, Parents, and Educators
Linda McCarthy, Keith Watson, and Denise Weldon-Siviy
This online guide explains how you can:
• Protect your Facebook account
• Avoid the scammers
• Use advanced security settings
• Recover a hacked Facebook account
• Stop imposters



Stolen Laptop Recovery

There are tons of features in Prey:  (LATEST NEWS - will now protect your MAC, LINUX and ANDROID Phone)

    • Uses Wifi hotspots or GPS embedded in the device to accurately pinpoint where the laptop is.
    • If Wifi isn’t in use, Prey will try to auto connect to an open hotspot to send you info.
    • Prey is written in Bash and very lightweight. It’s also Portable!
    • You can edit Prey as you like, adding or removing specific tasks, because each task uses a different module.
    • Prey will list running programs and any files that were modified, as well as take a picture of the person if you have an integrated webcam.
    • Messages can be sent to the device to be read on the screen, and even heard by anyone nearby.
    • Last but not least, Prey is open source and FREE for up to three devices, and will run on any laptop.

First, download Prey onto the computer that you wish to track. Click on download and go thru the installation wizard. The download takes barely any time at all and at the end, if you havent configured the tool, it will prompt you to do so.

First thing I need to choose is setting up my reporting method. You have two options- you can either use a control panel interface, or a standalone interface. The difference is, the control panel can be accessed thru the prey website, and is quick and powerful- everything get sent directly to you as the reports come in. The standalone version will send you updates in your email, but to activate Prey to start reporting you need to activate and delete a URL and setup your mail server settings by hand.
Choose the control panel version. You need to create a new user account so type in your name, email address, and password. Change the name and device type. Click Create.

You’ll need to activate your email address, so log into your email, click the link and log in then add devices. Go back to the install and click OK and it tells you congrats now your devices are being tracked!
Now add a device by clicking the orange button. Fill in the name and it generates all your information about the device. Click create and it’s created. It gives you a device key and you can click on the name to configure all your settings. All of these choices are pretty self explanatory and if you don’t know what you’re choosing, hover over the exclamation point and it’ll explain the setting for you.

Now, if your computer gets stolen, log into prey and change the status to missing. Now, updates will be recorded on your prey project page for you to view every 20 minutes (or however many minutes you choose).

'Just to let you know I have it on both my Computers and phone. I literary could go exactly to where the items are, the mapping is that good.'

Most Text and info from


Our email boxes these days are increasing under attack from spam 

So how to cut down on the amount of spam?

  • Always be watchful when sending or receiving emails.
  • If the software you uses a spam filter make sure it is switched on.

The vast majority of email sent every day is unsolicited junk mail. Examples include:

  • Advertising, for example online pharmacies, pornography, dating, gambling.
  • Get rich quick and work from home schemes.
  • Hoax virus warnings.
  • Hoax charity appeals.
  • Chain emails which encourage you to forward them to multiple contacts (often to bring ‘good luck’).

Spammers obtain your email address by

  • Using automated software to generate addresses.
  • Enticing people to enter their details on fraudulent websites. 
  • Hacking into legitimate websites to gather users’ details.
  • Buying email lists from other spammers. 
  • Inviting people to click through to fraudulent websites posing as spam email cancellation services.
  • From names/addresses in the cc line, or in the body of emails which have been forwarded and the previous participants have not been deleted. 
  • Entering competitions and similar on Social Media sites.  

Never reply to spam messages and also try and avoid 'showing images' when reading it, this very act can confirm the email works, so they will use it again!

How to spot spam

Spam emails may feature some of the following warning signs:

  • You don’t know the sender.
  • Contains misspellings (for example ‘p0rn’ with a zero) designed to fool spam filters.
  • Makes an offer that seems too good to be true.
  • The subject line and contents do not match.
  • Contains an urgent offer end date (for example “Buy now and get 50% off”).
  • Contains a request to forward an email to multiple people, and may offer money for doing so.
  • Contains a virus warning.
  • Contains attachments, which could include .exe files, usually they are ZIP files which may be zips (the spammer can trick you there but they will contain some sort of nasty payload)

The risks

  • It can contain viruses and spyware.
  • It can be a vehicle for online fraud, such as phishing.
  • Unwanted email can contain offensive images.
  • Manual filtering and deleting is very time-consuming.
  • It takes up space in your inbox.

email Scams

Scams are generally delivered in the form of a spam email (but remember, not all spam emails contain scams). Scams are designed to trick you into disclosing information that will lead to defrauding you or stealing your identity. 

Examples of email scams include:

  • emails offering financial, physical or emotional benefits, which are in reality linked to a wide variety of frauds.
  • These include emails posing as being from ‘trusted’ sources such as your bank, the Inland Revenue or anywhere else that you have an online account. They ask you to click on a link and then disclose personal information.

Phishing emails

Phishing is a scam where criminals typically send emails to thousands of people. These emails pretend to come from banks, credit card companies, online shops and auction sites as well as other trusted organisations. They usually try to trick you into going to the site, for example to update your password to avoid your account being suspended. The embedded link in the email itself goes to a website that looks exactly like the real thing but is actually a fake designed to trick victims into entering personal information. 

  • The email itself can also look as if it comes from a genuine source. Fake emails often (but not always) display some of the following characteristics:
  • The sender’s email address is different from the trusted organisation’s website address.
  • The email is sent from a completely different address or a free webmail address.
  • The email does not use your proper name, but uses a non-specific greeting such as “Dear customer.”
  • A sense of urgency; for example the threat that unless you act immediately your account may be closed.
  • A prominent website link. These can be forged or seem very similar to the proper address, but even a single character’s difference means a different website.
  • A request for personal information such as username, password or bank details.
  • You weren't expecting to get an email from the organisation that appears to have sent it.
  • The entire text of the email is contained within an image rather than the usual text format. The image contains an embedded link to a bogus site

Use email safely

  • Do not open, respond to, or forward emails which you suspect as being spam
  • Do not open attachments from unknown sources, and take care when from people you now as their account may have been hacked.
  • Do not readily click on links in emails from unknown sources. Instead, roll your mouse pointer over the link to reveal its true destination, displayed in the bottom left corner of your screen. Beware if this is different from what is displayed in the text of the link from the email.
  • Do not make purchases or charity donations in response to spam email. 
  • Don’t click on ‘remove’ or reply to unwanted email.
  • Check junk mail folders regularly in case a legitimate email gets through by mistake.
  • When sending emails to multiple recipients, list their addresses in the 'BCC' (blind copy) box instead of in the 'To' box. In this way, no recipient will see the names of the others, and if their addresses fall into the wrong hands there will be less chance of you or anybody else receiving phishing or spam emails.
  • Similarly, delete all addresses of previous parties in the email string, before forwarding or replying.
  • If you are suspicious of an email, you can check if it is on a list of known spam and scam emails that some internet security vendors such as McAfee and Symantec feature on their websites.
  • Most Microsoft and other email clients come with spam filtering as standard. Ensure yours is switched on. 
  • Most spam and junk filters can be set to allow email to be received from trusted sources, and blocked from untrusted sources. 
  • When choosing a webmail account such as gmail, Hotmail and Yahoo! Mail, make sure you select one that includes spam filtering and that it remains switched on.
  • Most internet security packages include spam blocking. Ensure that yours is up to date and has this feature switched on. 
    • Note that most most Free anti virus software do not provide full protection and after the trial period do not update.
    • ALWAYS keep your antivirus UP TO DATE if you don't you may as well not have one.
    • You only need one active having several installed will cause slowdowns as they fight each other.

The above article was edited from which additional tips.