How to check that your personal data hasn’t been compromised
One of the ways in which criminals gain access to potential victims is by obtaining lists of names, addresses, phone numbers, credit card numbers, etc.
One of the ways in which criminals gain access to potential victims is by obtaining lists of names, addresses, phone numbers, credit card numbers, etc.
Last week all of Mexico celebrated dia de los muertos. This most colorful of holidays is a joyful time to celebrate the lives of those that have passed on and for most this is not a day to grieve but to give thanks. Perhaps this is as good a time as any for me to remind about one third of you personal computer users out there of a demise that will occur at your house next year.
Recently in this column I mentioned the Electronic Frontier Organization and their web site found at prism-break.org where internet users concerned about their privacy may learn more about secure software and encryption. I warned that there are no simple solutions, so if an easy answer is what you are looking for you may as well stop reading now.
In writing this column I am indebted to the members of my Editorial Review Board who volunteer their time to help make me look good by proofreading this column before it goes to press. These people are friends who live outside of Mexico or people who have moved away but still want to continue reading this column. My agreement with them is that they need to contribute by checking spelling, grammar and style. In spite of everyone’s best effort, sometimes a mistake still manages to show up in print.
Do something! Do something! Do something NOW! That was the refrain Berta was hearing from the renters one weekend morning. Berta is the employee in charge of a rental property and the best cook and housekeeper in San Miguel de Allende. Her technical expertise does not extend very far into network topology or internet troubleshooting though. Berta tries hard to please, sometimes too hard, so with the tenants vociferously wailing that they were being deprived of Facebook, she succumbed to the pressure of the moment.
As a teenager I became an avid Trekie, never missing an episode of the original series, TNG, DS9 or STV. Readers who have never heard of Star Trek may be excused now. Over the years a great deal of the futuristic technology featured in the series has actually become a reality. The latest example is the “replicator” used to turn energy into matter, magically creating anything from a replacement warp core part to a steak dinner.
My inbox has been receiving a number of emails from readers asking me to explain PRYSM, the recently-revealed surveillance program undertaken by the U.S. government.