-
Contact me:
-
ehurst@radixfidem.blog
Categories
Tag Archives: compsec
Wireless Carrier SNAFU (Updated)
You may recall the acronym SNAFU approximates: “Situation Normal, All Fouled Up.” Is anyone really surprised at the depth of detail in which this Carrier IQ company is logging your every touch and use of your smartphone? Pay attention to … Continue reading
Your Facebook Spyware Is from the Government
Forgotten in all the hubbub about OBL is something the Electronic Frontier Foundation reported a few days ago. When fixing computers for people, most of what I do is remove spyware, followed numerically by a handful of viruses. The biggest … Continue reading
Posted in computers, sanity
Tagged compsec, government, oppression, resistance
Comments Off on Your Facebook Spyware Is from the Government
Basic Computer Help Service
This is an outline of what I do when people bring me a computer which isn’t working properly. Aside from undoing mistakes and diagnosing hardware failures, most of it consists of cleaning up the operating system. There are no secrets … Continue reading
Not Migrating: Windows Security Considerations
Just because I’m convinced Linux has a better security posture than Windows does not mean Windows is useless. And sometimes you just don’t need that much control to get things done. Frankly, a badly configured Linux box is as easily … Continue reading
Sanity and Self-Sufficiency
In a previous post, I noted my interest in Linux and Open Source was primarily a matter of self-sufficiency, though I phrased it as a matter of having control over my computer. People want such control when they are ready … Continue reading
Posted in computers, globalism
Tagged compsec, government, internet, linux, redhat, resistance
1 Comment
RHEL for the Clueless: Securing Firefox
How secure is “secure”? Nobody can decide for you. What I offer here is the measures I take before browsing the Net. From what I can tell, these measures are effective in that the data-mining and marketing industry has a … Continue reading
Migrating from Windows to Linux: Security Considerations
First, we have to establish the context. The Internet itself is insecure, and it cannot be made secure. Even if you made your computer or your information cryptologically secure, you cannot prevent physical access to your computer or your person. … Continue reading
Outrigger: 14
It was one of those rare moments when Ripley had a break. Leaned back in his chair, he stared out the window at the light traffic visible in gaps between the other buildings around the warehouse. Krumm walked in carrying … Continue reading
Outrigger: 13
Krumm hadn’t had much time to mess with it, but he decided it would be a good day to test his ability to connect to his server back in the US. A friend of his who ran the program at … Continue reading