Thursday, December 30, 2010

“9 ways to increase the security of your laptop while on the road” – Microsoft 2010 Security article, Reference: http://goo.gl/HQt97

I saw this Microsoft article today and thought I would share it:

Using your laptop to get work done away from your office or on the road is becoming widely accepted. But this rapid growth in laptop computing has made portable systems the target for theft around the world. If your laptop computer is stolen, company information can be exposed, as well as your personal and financial information.

Use these 9 tips to learn how you can keep your laptop more secure when you're on the road.

1. Avoid using computer bags

2. Never leave access numbers or passwords in your carrying case

3. Carry your laptop with you

4. Encrypt your data

5. Keep your eye on your laptop

6. Avoid setting your laptop on the floor

7. Buy a laptop security device

8. Use a screen guard

9. Try not to leave your laptop in your hotel room or with the front desk

Follow this link for details: http://goo.gl/HQt97


Thursday, August 5, 2010

Comcast - Monitoring what you do online

Comcast’s “Additional Provisions Applicable To High-Speed Internet Service” Section 3.b “Monitoring of Postings and Transmissions” http://bit.ly/cMu18P Comcast shall have no obligation to monitor postings or transmissions made in connection with HSI. However, you acknowledge and agree that Comcast and its agents have the right to monitor, from time to time, any such postings and transmissions, including without limitation e-mail, newsgroups, chat, IP audio and video, and Web space content. Comcast may also use and disclose them in accordance with the Comcast High-Speed Internet Acceptable Use Policy and other applicable policies, and as otherwise required by law or government request. We reserve the right to refuse to upload, post, publish, transmit or store any information or materials, in whole or in part, that, in our sole discretion, is unacceptable, undesirable or in violation of this Agreement.

Not sure of the accuracy of this following response referenced from: http://bit.ly/aUgv8K

“Which ISPs Hand Private Surfing Info Over To Secretive Private Group Who Monitors It For The Feds?”

But it’s interesting:

Ross Wolf, Aug 3rd, 2010 @ 3:59pm
The FBI recently asked for the power to obtain without warrants, Citizens’ “electronic communication transactional records” including email addresses they used to send communications. If the FBI’s request for warrant-less Internet surveillance is granted, Citizens to avoid federal conspiracy charges will have to report to police (every email) they receive that might allude to anything illegal.

FBI’s request for no warrant Internet surveillance can’t be viewed separately: if pending bills in Congress pass, the FBI can then use its warrant-less Internet surveillance to arrest and indefinitely detain Americans on mere suspicion not evidence, based on their Internet Activity. Private information the FBI derives from warrant-less searches of emails and Internet Activity—could potentially be used by U.S. Government to blackmail, target anyone though government harassment, prosecution or civil asset forfeiture because he or she disagreed with government.

Will lawful Internet Activity, be used by Government to detain/arrest Americans without probable cause? On March 4, 2010, Sen. McCain introduced The “Enemy Belligerent Interrogation, Detention, and Prosecution Act of 2010.” McCain’s bill would eliminate several Constitutional protections allowing Government to arbitrarily pick up Americans on mere suspicion—with no probable cause. Under McCain’s bill, your political opinions and statements made on web postings and in emails against U.S. Government and others could be used by authorities to deem you a “hostile” “Enemy Belligerent” to cause your arrest and indefinite detention. U.S. activists and individuals under McCain’s bill would be extremely vulnerable to detention or prosecution, if (charged with suspicion) of “intentionally providing support to hostilities or an Act of Terrorism”, for example American activists can’t control what other activists might do illegally—they network by email domestically and overseas. The Government under McCain’s bill would need only allege an individual kept in military detention, is an Unprivileged Enemy Belligerent suspected of; having engaged in hostilities against the United States; its coalition partners; or Civilians or (has) purposefully and materially supported hostilities against the United States; its coalition partners or U.S. civilians. Detained Americans can be denied legal counsel.

Alarmingly the Obama Government recently employed a vendor to search Internet social networking sites to collect information about Americans that could potentially be used by this government to injure Americans, for example, if you apply for a federal job, your name might be crossed referenced by the Obama Government with comments you made at Websites against Obama; or if you make application at a bank for a loan the Government has control since the financial crisis, could your Internet comment(s) prevent you getting that loan? Obama’s monitoring of the Internet sites can too easily be used by Government to intimidate, coerce and extort Corporations and Citizens from speaking out.

See McCain’s 12-page Senate bill S.3081 The “Enemy Belligerent Interrogation, Detention, and Prosecution Act of 2010 at: assets.theatlantic.com/static/mt/assets/politics/ARM10090.pdf

Obama gave a speech in May 2010 that asked Congress to pass legislation to give the President power, to detain any person in the U.S. that government deems a “combatant” or likely to engage in a violent act in the future. President Obama wants the power to incarcerate U.S. Citizens not on evidence, but for what they might do. Obama wants the power to override the U.S. Constitution, to detain indefinitely any American based on conjecture her or she might do something violent in the future. If Obama’s proposal to detain Americans without probable cause is approved, and FBI is granted warrant-less searches of the Internet, it is foreseeable Government could use anyone’s Internet activity including emails to claim an individual or lawful organization might do something violent in the future to order their indefinite detainment. See: Obama Sound-Video asking for power to detain people without probable cause at:
http://www.brasschecktv.com/page/630.html

What the recent Washington Post Report, (Secret America) did not mention: in the U.S., government-private contractors and their operatives work so close with U.S. law enforcement, exchanging information to arrest Americans and or share in the forfeiture of their assets, they appear to have merged with police. Similarly in 1933 Hitler merged his private police the Gestapo with German national security. Before the Gestapo was consolidated with the German Government, the Gestapo arrested Citizens and confiscated private property with no legal authority. However U.S. Government has already granted that power to private U.S. contractors. In 1939 all German Police agencies including the Gestapo were put under the control of the "Reich Main Security Office” the equivalent of U.S. Homeland Security.

Can History repeat itself? Should there be a radical change of U.S. Government, history shows law enforcement is generally not replaced; that police will work for—e.g. a fascist U.S. Government; communist or other despot government—against the interests of Citizens. Note: The German police first worked for a democracy before Hitler; then worked for the Nazi Fascists; then joined the Soviet Union’s East German Police (Stasi) believed to be the world most oppressive police force until the German Wall came down. Consequently it should be expected U.S. Government security contractors and private mercenary corporations would work for a despot U.S. Government.

If FBI warrant-less Internet Spying is approved, it is problematic the FBI will share its spying with law enforcement, government contractors and private individuals that have security clearances to facilitate the arrest and forfeiture of Americans’ property—-to keep part of the bounty. Police too easily can take an innocent person’s hastily written email, Internet fax, phone call or web activity out of context to allege a crime or violation was committed to cause an arrest or confiscation of someone’s property. There are over 200 U.S. laws and violations mentioned in the Civil Asset Forfeiture Reform Act of 2000 and the Patriot Act that can subject property to civil asset forfeiture. Under federal civil asset forfeiture laws, a person or business need not be charged with a crime for government to forfeit their property.

Rep. Henry Hyde’s bill HR 1658 passed, the “Civil Asset Forfeiture Reform Act of 2000” and effectively eliminated the “statue of limitations” for Government Civil Asset Forfeiture. The statute now runs five years from when police allege they “learned” that an asset became subject to forfeiture. With such a weak statute of limitations and the low standard of civil proof needed for government to forfeit property “A preponderance of Evidence”, it is problematic law enforcement and private government contractors will want access to FBI, NSA and other government Internet surveillance, including wiretaps perhaps illegal to arrest Americans and to seize their homes, assets and businesses under Title 18USC and other laws.

Of obvious concern, what happens to fair justice in America if police and government contractors become dependent on “Asset Forfeiture” to pay their salaries and operating costs?

Saturday, May 29, 2010

God is doing a mighty work in Cambodia


What an awesome Community Group meeting on Tuesday! I met a couple that gave up nearly everything to move to Cambodia (Greg & Jane). In an outreach of love, to an extremely poor people; God has used them to make an incredible impacted in only three years. They came back to visit; but, they will soon be going back for another three years. I encourage you to check out their webpage.

http://www.drebesincambodia.com


This is a link to one of their videos:

Greg & Jane's ministry

(The video is property of Greg & Jane, and their ministry)

Sunday, May 9, 2010

Wednesday, April 28, 2010

Google warning on fake anti-virus software


I came across this article and felt it necessary to pass it along to you. There is great information on how we users are being taken advantage of. A must read: Because, the best weapon against this sort of trash is to be well equipped with knowledge.

Summary: Key Points

“Fake anti-virus software … a growing threat, according to a study by Google.” “Scammers trick people into downloading programs by convincing them that their PC is infected with a virus. Once installed, the software may steal data or force people to make a payment to register the fake product.” “Fake anti-viruses often are bundled with other malware, which remains on a victim's computer regardless of whether a payment is made.” "The hackers track trending news stories - such as the death of Michael Jackson," he said. "They then create websites stuffed with content, which in many cases can appear on the first page of search results." “Anyone clicking on the link, he said, would be confronted with a pop-up with a link to fake anti-virus software.” “…people should be familiar with their own anti-virus software and should "always be suspicious" if they were confronted with a pop-up telling them you need to download something extra or spend money to clean up a computer.” (BBC News, 2010)

Reference:

BBC News. (2010, April 28). Google warning on fake anti-virus software. Retrieved from http://news.bbc.co.uk/2/hi/technology/10088949.stm

Saturday, April 24, 2010

Our Digital Lives!


30 years ago, I couldn’t have imagined drinking, so willingly, the cool-aid of the digital age. Most phones no longer plug into the wall, but are like Star Trek Portable communication devices. We can talk to phones and computer and get responses without another human intervening (just like Captain Kirk). Now we read books on computer screens, and many of us could not even function without a computer or smart phone. Wait… “I am not a number! I am a free Man!”

Tuesday, April 13, 2010

What was Bob Dylan thinking & feeling?

“…you’re gonna have to serve somebody, yes indeed You’re gonna have to serve somebody, Well, it may be the devil or it may be the Lord But you’re gonna have to serve somebody.” – Bob Dylan Copyright © 1979 by Special Rider Music http://bit.ly/ag1I1A

Sunday, April 11, 2010

Is science important?


And if so; can it heal all the problems that it has caused to life in this “new age”? Problems with, disease, pollution, security, energy, education, food, water, urban sprawl, and global warming? With all its great advances, comes great affects. Because, if science is right, life doesn’t really matter because humans won’t be around in about a thousand; five thousand; fifty thousand; or a million years. According to science, the sun will eventually burn out and all life will be doomed anyway.

Wednesday, February 17, 2010

Brothers that God has used in my Christian growth

Billy Graham - www.billygraham.org
Chuck Smith - www.calvarychapelcostamesa.com
Chuck Swindoll - www.insight.org
Charles Stanley - www.intouch.org
David Jeremiah - www.davidjeremiah.org
John MacArthur - www.gty.org
Ravi Zacharias - www.rzim.org
Alistair Begg - www.truthforlife.org
R.C. Sproul - www.ligonier.org
Woodrow Kroll - www.backtothebible.org
J. Vernon McGee - www.ttb.org
Michael Usef - www.leadingtheway.org

Local Pastors I’ve studied under:
Joe Focht - www.ccphilly.org
Francis Pultro - www.cckingshwy.org
Rob Tarnoviski - www.fmchurch.net

My current Pastor:
John D. Cope - www.kcfonline.org
www.bpnews.net/bpnews.asp?Id=30852

Prophecy of the Crucifixion

I believe one of the major testimonies, concerning the connection between the Old & New Testament, is the Old Testament prophecies. One prophecy I find most compelling is Psalm 22; The Crucifixion of Christ. If we align both Psalm 22 and Matthew 27 together, we get an amazing picture of prophecy foretelling and unfolding. Let me show you what I mean. We will reveal this truth in reverse; let’s start in Matthew.

Please click these links and read; when done, click your back button to bring you back here to continue.

The Crucifixion: Matthew 27:27-54
http://www.biblegateway.com/passage/?search=Matthew%2027:27-54;&version=31;

The Crucifixion: Psalm 22
http://www.biblegateway.com/passage/?search=Psalm%2022;&version=31;

Isn’t it amazing how this prophecy was proclaimed around 600 years before Jesus came to earth?

Here is a link from Christian Apologetics & Research Ministry confirming my findings.
http://www.carm.org/questions/about-jesus/why-did-jesus-cry-out-my-god-my-god-why-have-you-forsaken-me

And here is a link to a list of other prophecies. I found this through a Google search.
http://home.netcom.com/~horse/prophecy.htm

A cursed tree in a perfect world, and a perfect tree in a cursed world

Here is something I’d like to share with you; the correlation between Christ and Adam in the Bible.

Adam was alive; communing with God in paradise. He partook of the tree of good and evil, and became fallen.
Genesis 2:9

We on the other hand, live in a fallen world, but if we partake of the one who was hung on the tree, we gain eternal life and freely commune with God. This means the cross of Christ is the “Tree of Life” for you and me.
Galatians 3:13 Deut. 21:23
Romans 5:12-21