WORKERSEDGE
Menu

Ten simple, common-sense security tips

Security doesn't have to be complicated, as shown by these quick and easy alternatives to the conventional wisdom on passwords, privacy, backups, ID theft, and other tech-safety matters.
A friend took me to task last week for a post I wrote back in January on preventing Google from tracking you when you search. His alternative solution: "Just use Bing."

That got me thinking about other no-brainer approaches to security that thumb their noses at the conventional (and often convoluted and time-consuming) advice of the experts.

Search without footprints via the 'other' search engines

Truly anonymous Web surfing requires the use of a VPN service that blocks your IP address as well as other personal information. (For more on VPN, see the tip below.) If you simply want to prevent a search from being recorded in your Google Web History, use a different search service.

Each search engine uses a unique mix of factors to find pages related to the terms you enter, which proves that there are many routes to the information you need. For an unscientific test, I used Google, Bing, and the Ixquick metasearch engine to look for three unrelated bits of info: the name of the mayor of Terre Haute, Ind.; nonstop airfares from New York to Paris; and the city in which Christopher Columbus died. (No, I'm not planning my next vacation.)

Note that Ixquick doesn't record your IP address when you search.

Google and Bing listed Duke Bennett as the mayor of Terre Haute in their type-ahead suggestions, so I didn't even have to press Enter to find the honorable Mr. Bennett's name. The third entry in Ixquick's first page of search results showed the mayor's name in its summary.

As you might expect, the greatest disparity in results among the three search services in my informal test was the airfare query. Still, the top nonsponsored results returned by all three sites indicated comparable prices.

Picture
The ninth result summary returned by Google listed Valladolid, Spain, as the city in which Columbus died (on May 20, 1506, at the age of 55, by the way). The city's name was shown in the third result summary returned by Bing, and the sixth served up by Ixquick.


Most people use Google for Web searches out of habit, not necessarily because Google is faster or generates more accurate results (maybe it does, maybe it doesn't). Still, the easiest way to search without Google recording it is to use another engine.

Contrive strong passwords based on what you already know

Some security experts instruct us to write down our passwords. Others say never write down passwords or share them with anyone except your friendly local IT staffer.

In a post from last December I described how to master the art of passwords , and back in 2008 I presented what I humbly referred to as the Password Commandments .

Both of those posts mentioned password-management programs, which offer to store your passwords securely, generate strong passwords that you don't have to remember, and prevent reuse of the same password by providing a unique one for each service you log into.

While these utilities have lots of fans, I say, "Thanks, but no thanks." Password managers aren't any less secure than other programs that store your sensitive information. It's just that I have never felt the need for a program dedicated to password management.

I prefer to create my own strong passwords based on phrases that are easy to remember. For example, everyone has memorized some nursery rhyme, poem, or song lyric. Simply use the third letter of each word in a line or two (either skipping words shorter than three letters or using the last or only letter in such words).

Applying that pattern to the opening lines of Bruce Springsteen's "Thunder Road" creates this password: eroarsei. Make it even stronger by adding the second line and inverting the two lines: kasenrersedaeroarsei.


Picture
The calculator at How Secure Is My Password? indicated that the first of the two passwords would take a PC only 52 seconds to crack, but the second would require 157 billion years to decipher, give or take an eon. 


The more often you sign into the particular service, the faster you get at entering such a mnemonic password. I've been using a version of this pattern for years with certain of the services I frequent (remembering to change the password every few months, of course), and nobody's hacked them yet.

You may have noticed that the resulting passwords are all lower case and bereft of numbers or other nonalpha characters. Services that require a mix of upper and lower case, numbers, and/or nonalpha characters are an abomination and should be outlawed. It's easier for users and secure enough to require at least 14 nonrepeating, nonsequential characters that aren't found in any dictionary.

Sign into a free VPN service

Your average telecommuter is familiar with virtual private network (VPN) technology, which organizations use to create secure Internet connections to and from their private networks. As the companies know, there's nothing like VPN to prevent snooping.

The down side of VPN is that encryption usually slows down your network link. Free VPN services also limit your downloads to a certain amount per day. In a post from February 2011 I wrote about the free OpenVPN-based SecurityKiss program.

Last February I tested the free versions of ProXPN and OpenVPN's Private Tunnel, but as that post states , neither program was practical for everyday use. The freebies are intended to entice you into paying for their pro versions.

Still, if you can live with the download restrictions and speed hit, free VPN is the simplest way to be sure you're browsing in private.

Lock your phone, please!

Smartphone thefts are rising faster than Apple's stock price (well, at least the stock was rising before the company's recent production woes, as Investor's Business Daily reports).

One reason high-end cell phones are targeted by thieves is how easy it is to resell the devices. If you haven't locked your phone and added a free remote data-wipe app, the thief could also use or sell the private information you stored on the phone.


In a post last month I described how to prevent phone and tablet theft . A follow-up post examined the security features in Android and Windows phones. 



Most people don't think smartphone screen locks are worth the effort. To me, screen locks are sort of like seat belts in cars in that we're all better off when people use them. If it's your phone that gets stolen, the lock benefits you directly, but everybody benefits indirectly because over time stolen phones will lose some of their value (just like seat-belt use ultimately lowers health-care costs and car-insurance rates).

Stolen cell phones will likely be even less valuable to thieves once the major cell services start blocking reactivation of the devices via the stolen-phone registry promised for the second half of 2013, according to the Wall Street Journal.

All the major carriers have their own stolen-phone registry, so be sure to report your pilfered phone and remotely wipe its data as quickly as possible. The identity you save may be your own.

Take advantage of automatic software updates

Not long ago, many computer-security experts recommended that you download Windows updates automatically but wait a day or two before installing them just in case the updates caused more problems than they solved.

Today, the risk of being victimized by a bad software update is much lower than the risk of a zero-day infection. Make sure Windows is set to download and install updates automatically.

To do so in Windows 7, press the Windows key, type windows update, and press Enter. Click "Change settings" in the left pane and make sure "Install updates automatically (recommended)" is selected.

You can make sure the rest of the software on your system is up-to-date by using a patch-management utility. My favorite of the three free software updaters I tested in May 2011 is Secunia's Personal Software Inspector
.

Use a disposable e-mail address

A person can't spend much time on the Web without encountering a site that can't be used unless you register by providing an e-mail address. Supplying your everyday e-mail address to each Web service that solicits one is just asking for spam.

If there's little chance you'll need to receive a correspondence from the service (once you've confirmed your registration, of course) enter an e-mail address you created with no intention of checking it for incoming messages. Alternatively, you could forward messages received at the throwaway address to a folder of your regular inbox and monitor the folder for received messages as needed.

A post from September 2011 described several free services that protect your e-mail . In November 2010 I explained how to combine and organize multiple e-mail accounts .

Previous posts covered how to forward messages from Gmail to Outlook and Thunderbird , as well as how to reverse the process to have your Outlook and Thunderbird mail appear in your Gmail in-box
.

Be prepared for a computer emergency

Everybody knows you should use antivirus software and a firewall. Raise your hand if you also have a current backup of all your important files and a recent image copy of your hard drive.

Not many hands!

I confess the most recent drive images of my Windows PCs are all more than a year old, and I couldn't tell you the last time I backed up the personal files stored on those systems and on my Mac Mini.

Ever since I started using Google Drive and iCloud as my primary file repositories, I worry less about losing data. Unfortunately, while iCloud lets you encrypt sensitive information you store there, encryption isn't an option on Google Drive.

Back in 2009 I compared three free online storage services that let you encrypt the data you store. Unfortunately, CryptoHeaven now offers only a 30-day free trial of storage plans priced from $8 a month for 200MB.

SpiderOak continues to provide up to 2GB of encrypted storage for free, and SwissDisk -- the service I liked the most -- still gives you up to 50MB of free encrypted storage.

All Windows users should also have a boot disc handy. Microsoft's support site explains how to create and use a Windows 7 system repair disk
.

Limit your online financial activities

It's the 21st century. Only died-in-the-wool Luddites still frequent brick-and-mortar banks.

Well, maybe not. A rocket-scientist friend of mine has been banking for almost 40 years and has never used or been issued an ATM card. Every bit of business he transacts with his bank involves an in-person person.

(He's also the guy who describes his network security as "air": no wireless access on his premises.)

I'm not averse to the occasional ATM transaction -- I only wish there were more deposits and fewer withdrawals -- but I've never signed up for an online bank account. I've never even disclosed my e-mail address to my bank.

That way I know any message purporting to be from my bank is a scam: no ifs, ands, or viruses. Like many people who receive payments for services via PayPal, I regularly transfer PayPal balances to my bank account. But other than PayPal no Web service knows my bank digits. Let's hope this makes me a smaller target for online crooks.

View e-mail as plain text

All the big-name Web mail services require by default that you manually allow images to display in the messages you receive from senders you haven't designated beforehand as trustworthy. Blocking images in messages you receive from unknown senders reduces the chances that an e-mail-borne bit of malware is activated simply by viewing its host message.

In a post from November 2008 I described four productivity-boosting Outlook tweaks . One of the tips covered how to send and receive messages as plain text in Outlook 2003 and 2007 (the steps are similar in Outlook 2010).

A follow-up posted the following month provided several tips for staying safe while using e-mail
 . One of the tips explained how to enable plain text in the Thunderbird e-mail program.

Turn it off? Leave it on? Who knows?

A casual online survey of computer experts leads to the unassailable conclusion that whether to leave your PCs and other network-connected devices on at all times or turn them off when not in use depends.

Depends on what is not so certain.

The consensus of the experts is that powering off networked equipment when not in use reduces slightly the chances of becoming infected. However, network managers and software vendors often apply automatic updates in the middle of the night. Turning off the machine may delay or prevent an important update from being installed.

On the other hand, restarting your PC or smartphone can improve performance by stopping unneeded processes that forgot to shut themselves off and by clearing out memory cobwebs. Then again, restarting may not speed up your machine at all, and the stress of stopping and starting components can reduce their lifespan.

But even in sleep mode, an idle computer consumes some energy. The only way to minimize the amount of electricity you use is to turn off all electric devices when they aren't being used. (This includes all those chargers that remain plugged in after the gizmos they're charging are at 100 percent.)

That's why I say unequivocally: turn them off. Or not.


Powered by Create your own unique website with customizable templates.
  • workersedge
    • The Weekly >
      • The Weeklies >
        • Excuse me while I duck and cover, March 1, 2018
        • We're running out of words, February 7, 2018
        • Help fight information pollution, January 31, 2018
        • Privacy infographic-palooza, January 24, 2018
        • Another great reason to celebrate the life of Martin Luther King Jr., January 17, 2018
        • Bye-bye, Fourth Amendment: Spy agencies feed tips to law enforcement, January 10, 2018
        • Bring virtue to the internet by keeping trackers at bay, January 3, 2018
        • Could artificial intelligence give the tech industry a heart and save us from capitalism run amok? December 21, 2017
        • Your email use is being tracked, and not just by marketers and spammers, December 13, 2017
        • Time to let others do the talking, December 6, 2017
        • Our front-row seat for the crashing and burning of the internet, November 29, 2017
        • Your location location location means money money money for trackers, November 16, 2017
        • YouTube: Unsafe for all ages, November 8, 2017
        • Birthday wishes, November 2, 2017
        • That Weekly when everything was pretty good, or at least not so bad, October 25, 2017
        • Addiction by design: Don't let tech products run your life, October 19, 2017
        • Essential internet privacy tips, 2017 edition
        • Unreported news story: 'Algorithmic takeover' of journalism, September 27, 2017
        • The door slams shut on the open internet, September 22, 2017
        • The best response to the Equifax breach: Don't deal with Equifax, September 13, 2017
        • In business and government, the bullies are calling the shots, September 6, 2017
        • There's no stopping tech giants' surveillance for profit, August 30, 2017
        • How to deter 'fingerprint' trackers from identifying your computers and devices, August 23, 2017
        • That was the week that was, 2017 revival, August 16, 2017
        • Find the internet security level that's right for your needs, August 9, 2017
        • Internet Media 101: The bigger the lie, the greater the profit, August 3, 2017
        • Cyber-crimestoppers: How individuals and companies help nab internet crooks, July 26, 2017
        • A free press: The antidote to authoritarianism, July 19, 2017
        • A novel concept: Let consumers decide which personal data to share with trackers, July 12, 2017
        • We're in the midst of the third American Civil War, and democracy is losing, July 5, 2017
        • Keep online trackers at bay without breaking a sweat, June 28, 2017
        • Pleas for civility meet with... incivility, but that's okay, June 21, 2017
        • The price we pay for unbridled digital surveillance, June 14, 2017
        • Privacy protections may form the basis of antitrust actions against internet giants, June 7, 2017
        • Privacy tips for the most vulnerable: Children and seniors, May 31, 2017
        • Applying Fourth Amendment search protections to data in the cloud, May 24, 2017
        • Just when you thought you couldn't be tracked any closer..., May 17, 2017
        • Facebook addiction turns users into marketing guinea pigs, May 10, 2017
        • America: A tale of two countries, May 3, 2017
        • The internet: Destroyer of truth, justice, and the American Way, April 26, 2017
        • The death and ultimate rebirth of the public internet, April 19, 2017
        • An internet dinosaur spits in extinction's eye, April 12, 2017
        • Trust Busters 2.0: Dismantling modern monopolies, April 5, 2017
        • Simple, free ways to lock down your private data, March 29, 2017
        • Let big data benefit consumers, not marketers, March 22, 2017t
        • Gig economy changes what it means to be an 'employee,' March 8, 2017
        • Privacy: There's just no percentage in it, March 1, 2017
        • Practical security preparations for the worst-case scenario, December 13, 2016
        • The Rough Beast's lies indicate his intentions - Just like the Nazis, December 6, 2016
        • Government phone searches: Return of the 'general warrant', November 29, 2016
        • Before the deluge: Spend your attention wisely, November 23, 2016
        • You can't hide from facial-recognition systems - Or can you? November 16, 2016
        • The 'consumer boycott' of web advertising is gaining momentum, November 8, 2016
        • Encryption: It's not just for banking anymore, November 1, 2016
        • A call to action: Stop the surveillance - by web services, apps, October 25, 2016
        • Web ad networks are malware authors' best friends, October 18, 2016
        • Privacy is becoming fashionable - Yippee! October 11, 2016
        • How do we bridge the growing media and political divides? October 4, 2016
        • Safety essentials: 10-step security revisited, 11 years later
        • Simple ways to limit the private information you surrender on the web, September 20, 2016
        • Top 10 reasons why people hate listicles - and yes, this is a joke headline, September 13, 2016
        • Why internet voting is a terrible idea, September 6, 2016
        • No consent needed for ISPs to scan email and create ad-targeting profiles of non-customers, August 30, 2016
        • The web is broken - Guess who's trying to fix it? August 23, 2016
        • Supreme Court throws 'fruit of the poisonous tree' doctrine under the bus, August 16, 2016
        • Dragging the online trackers - kicking and screaming - into the light of day, August 9, 2016
        • Silly questions: Who 'owns' video captured by police? And is Facebook really 'privacy-enhancing'? August 2, 2016
        • It's official: No expectation of privacy on the internet, June 28, 2016
        • How to wrest control of our government away from corporations, June 21, 2016
        • The fight against privacy smashers continues, June 14, 2016
        • Publishers are losing the battle against their ad-blocking visitors - so what's next? May 31, 2016
        • Tech companies resist government attempts to broaden definition of 'personal information', May 25, 2016
        • Privacy threats on parade, May 17, 2016
        • Government goes dark as private lives are exposed, May 10, 2016
        • The great online-advertising swindle, May 3, 2016
        • Modern news media: Too big not to fail? April 26, 2016
        • Internet Confidential: How to establish a privacy right on the public Internet, April 20, 2016
        • The new browser wars: Thou shalt not block our ads and trackers, April 13, 2016
        • FCC to regulate ISP data collection, but Google, Facebook off the hook, April 6, 2016
        • Five questions, no answers, March 29, 2016
        • How to fix the Internet: Ratchet down the anonymity, lose the ads, March 23, 2016
        • How we lose ourselves in private data collection, March 15, 2016
        • People tracking is about to get even creepier, March 8, 2016
        • Silicon Valley's long-standing connections to the U.S. government, March 2, 2016
        • 2016: The first social-media election, March 2, 2016
        • How to build the future of work, February 24, 2016
        • Why it's a bad idea to trust private companies with the job of protecting our rights, February 16, 2016
        • Your Internet life is an open book: The dark side of online-ad profiling, February 9, 2016
        • Why don't Americans care as much about their privacy as Europeans do? February 2, 2016
        • New fronts open in the battle against privacy-invading online ads, January 26, 2016
        • Fifteen ways to stay safe on the Internet, January 19, 2016
        • Prepare for the inevitable theft of your personal information, January 13, 2016
        • 'Hey, gang, let's put on a government!', January 5, 2016
        • The appropriate response to living in a surveillance state: Ignore it, December 22, 2015 >
          • Legal shorts for December 22, 2015
        • Separating the bitcoin hype from the blockchain substance, December 17, 2015 >
          • Shorts for December 17, 2015: Trump's legal ineptitude, and eight ways the world is getting better
        • Re-reinterpreting our constitutional right to bear arms, December 10, 2015
        • How open data can help save the world, December 2, 2015
        • Consumers may be ready to pay for an ad-free, tracking-free Internet, November 18, 2015
        • Fair use stages a comeback: New protections against copyright abuse, November 10, 2015
        • Welcome to the Age of 'Existential Despair', November 10, 2015
        • Get ready for the Attention Economy, November 4, 2015
        • O'Jitterys Catch a Movie, October 27, 2015 >
          • Tech shorts, October 27, 2015
        • Do we have a right to know what they know about us?, October 20, 2015
        • Facial recognition ushers in the Age of Surveillance, October 13, 2015 >
          • Tech Short, October 13, 2015: ID by face + social profile
          • Legal Short, October 13, 2015: GOP mega-donor sues Mother Jones, loses, sort of
        • Fantasy sports gambling finally gets scrutinized, October 6, 2015 >
          • Tech shorts, October 6, 2015
        • Google, Android, ads, and a tech titan's revenge, September 29, 2015 >
          • Legal shorts, September 29, 2015
        • How to fix problems caused by Apple's flaky iTunes updates, September 23, 2015 >
          • Tech shorts, September 22, 2015
        • Campaign 2016: Where's the love? September 15, 2015 >
          • Tech shorts, September 15, 2015
          • Legal shorts, September 15, 2015
        • Three simple ways to improve your privacy, September 8, 2015
        • Use your free Google Voice number to make and receive phone calls, September 1, 2015
        • Reclaiming our government starts with universal Internet access, August 25, 2015
        • Upon further review, times three, August 4, 2015 >
          • Shorts for August 4, 2015
        • Coming soon: A more trustworthy form of encryption, July 28, 2015 >
          • Tech shorts, July 28, 2015
        • Protect yourself while browsing by enabling click to play, July 21, 2015 >
          • Tech short, July 21, 2015: Computers now tie emotions to facial expressions
        • The connection between poverty, hunger, and obesity, July 14, 2015 >
          • Shorts for July 14, 2015
        • A long-overdue turning of the political tide, July 7, 2015
        • Obamacare: A misstep in the right direction, July 7, 2015
        • Everyday Windows 10 users become beta testers for the Enterprise Edition, June 30, 2015 >
          • Tech shorts, June 30, 2015
        • Obamacare decision imposes limits on executive power, June 30, 2015
        • It's time to get serious about prosecuting Internet threats, June 23, 2015
        • Worst. Supreme. Court. Ever. June 16, 2015 >
          • Tech shorts, June 16, 2015
        • Five indications that we are currently between regimes, June 9, 2015
        • The five-minute Facebook security checkup, June 2, 2015 >
          • Legal shorts, June 2, 2015
        • When ads attack: Web ad networks battle the blockers, May 26, 2015
        • Flying the furious skies: How to stay sane on a commercial flight, May 19, 2015 >
          • Tech shorts, May 19, 2015
        • Online shopping tips: Put differential pricing to work for you, May 12, 2015 >
          • Tech shorts, May 12, 2015
          • Legal shorts, May 12, 2015
        • We're sitting on a big-data gold mine, May 5, 2015 >
          • Legal shorts, May 5, 2015
        • The case against web encryption, Title II designation for ISPs, April 28, 2015 >
          • Tech shorts, April 28, 2015
          • Legal shorts, April 28, 2015
        • More examples of judges clueless about technology... and one that gets it, April 21, 2015 >
          • Tech shorts, April 21, 2015
        • Should all web traffic be encrypted? April 14, 2015 >
          • Anonymous Internet Map, April 14, 2015
        • More reasons why you need to block web ads, April 7, 2015 >
          • Tech shorts: April 7, 2015
          • Legal shorts: April 7, 2015
        • Web 3.0 returns control of personal information to users, March 31, 2015
        • Passwords are about to get some much-needed assistance -- from your body, March 24, 2015
        • An unexpected visit from the Karma Police, March 17, 2015
        • Three views of the future that are certain to curl your hair, March 10, 2015
        • Privacy, Inc.: Welcome to the personal-information marketplace, March 3, 2015
        • The tricks of the malware trade: Don't take the bait! February 24, 2015
        • How to ruin your life in 140 characters or fewer, February 17, 2015
        • Browse better with these three essential freebies (plus one valuable cheapie), February 10, 2015 >
          • Tech shorts: February 10, 2015
        • What's the best way to fix the broken U.S. political system? February 3, 2015
        • Why you should care about your loss of privacy, January 27, 2015
        • The battle against data thieves heats up, January 20, 2015
        • How to combat hate and harassment on the Internet, January 13, 2015
        • Beat ransomware by saving your files to the cloud, January 6, 2015
        • 'The Interview' and 'I Can't Breathe': Connecting the dots, December 29, 2014
        • Cyberwar? Fuhgeddabouddit! There are plenty more serious threats to fret over, December 16, 2014
        • Five fantastic Web freebies, December 9, 2014
        • How Google, Facebook, and Twitter make billions by offering 'free' services, December 2, 2014
        • Telephone tech-support scams are on the rise, November 24, 2014
        • Trading privacy for the public good, November 18, 2014
        • Tor breach shows there's no such thing as Internet anonymity, November 11, 2014 >
          • Hackers owned Home Depot's networks for five months, November 11, 2014
          • Another call for a nationwide breach-notification law, November 11, 2014
        • Comcast battles Netflix, and everybody loses, November 4, 2014
        • Sexting has become part of growing up (gulp!), October 28, 2014
        • Quick, simple fixes for everyday tech glitches, October 21, 2014
        • Battle of the behemoths: Facebook ad network takes on Google, October 14, 2014
        • Instant access to all your recent files, October 6, 2014
        • iPhone's new Medical ID feature could save your life, September 29, 2014
        • Now you can really lock your phone, September 22, 2014
        • Facebook auto-play videos eat up mobile data allotments, September 15, 2014
        • Three free browser add-ons protect against cyber-crime, September 9, 2014
        • Manslaughter conviction expunged after worker dies in baling machine, August 25, 2014 >
          • Google patent infringement: The proof's in the Post-its?, August 25, 2014
          • Control which iPhone apps are allowed to stay 'active' when they're off, August 25, 2014
          • Weekly What? August 25, 2014 >
            • No more 'Like' gates to view content, get rewards, August 25, 2014
            • FTC goes after a company that lost customer data, company cries 'Foul!', August 25, 2014
            • A mobile phone company releases customer data -- and it's a good thing, August 25, 2014
            • Clickless approvals don't qualify as 'reasonable notice' for terms of service, August 25, 2014
            • Baby steps closer to authentication that doesn't rely on passwords, August 25, 2014
        • Most data breaches are the result of weak or stolen credentials, August 18, 2014
        • The best government money -- lots and lots of money -- can buy, August 11, 2014
        • The best browser you're probably not using, August 4, 2014
        • It all depends on who's doing the surveilling -- and why, July 28, 2014
        • Be careful what you comment -- it might get you sued, July 19, 2014
        • Never pay for software again (almost) Plus: The pros and cons of cloud computing, July 14, 2014
        • Mind that download! Free phone apps deliver malware, July 7, 2014
        • How to build the future of work, February 24, 2016
        • The end is near for passwords (not really), February 24, 2016
        • Facebook's latest shenanigans, July 1, 2014
      • Privacy Weeklies >
        • The Weeklies >
          • Excuse me while I duck and cover, March 1, 2018
          • We're running out of words, February 7, 2018
          • Help fight information pollution, January 31, 2018
          • Another great reason to celebrate the life of Martin Luther King Jr., January 17, 2018
          • Bye-bye, Fourth Amendment: Spy agencies feed tips to law enforcement, January 10, 2018
          • Bring virtue to the internet by keeping trackers at bay, January 3, 2018
          • Time to let others do the talking, December 6, 2017
          • Our front-row seat for the crashing and burning of the internet, November 29, 2017
          • YouTube: Unsafe for all ages, November 8, 2017
          • Birthday wishes, November 2, 2017
          • That Weekly when everything was pretty good, or at least not so bad, October 25, 2017
          • Unreported news story: 'Algorithmic takeover' of journalism, September 27, 2017
          • The door slams shut on the open internet, September 22, 2017
          • In business and government, the bullies are calling the shots, September 6, 2017
          • There's no stopping tech giants' surveillance for profit, August 30, 2017
          • That was the week that was, 2017 revival, August 16, 2017
          • Internet Media 101: The bigger the lie, the greater the profit, August 3, 2017
          • Cyber-crimestoppers: How individuals and companies help nab internet crooks, July 26, 2017
          • A free press: The antidote to authoritarianism, July 19, 2017
          • We're in the midst of the third American Civil War, and democracy is losing, July 5, 2017
          • Pleas for civility meet with... incivility, but that's okay, June 21, 2017
          • The price we pay for unbridled digital surveillance, June 14, 2017
          • Privacy protections may form the basis of antitrust actions against internet giants, June 7, 2017
          • Applying Fourth Amendment search protections to data in the cloud, May 24, 2017
          • Just when you thought you couldn't be tracked any closer..., May 17, 2017
          • Facebook addiction turns users into marketing guinea pigs, May 10, 2017
          • America: A tale of two countries, May 3, 2017
          • The internet: Destroyer of truth, justice, and the American Way, April 26, 2017
          • The death and ultimate rebirth of the public internet, April 19, 2017
          • An internet dinosaur spits in extinction's eye, April 12, 2017
          • Trust Busters 2.0: Dismantling modern monopolies, April 5, 2017
          • Gig economy changes what it means to be an 'employee,' March 8, 2017
          • Privacy: There's just no percentage in it, March 1, 2017
          • The Rough Beast's lies indicate his intentions - Just like the Nazis, December 6, 2016
          • Government phone searches: Return of the 'general warrant', November 29, 2016
          • You can't hide from facial-recognition systems - Or can you? November 16, 2016
          • No consent needed for ISPs to scan email and create ad-targeting profiles of non-customers, August 30, 2016
          • Supreme Court throws 'fruit of the poisonous tree' doctrine under the bus, August 16, 2016
          • Silly questions: Who 'owns' video captured by police? And is Facebook really 'privacy-enhancing'? August 2, 2016
          • It's official: No expectation of privacy on the internet, June 28, 2016
          • How to wrest control of our government away from corporations, June 21, 2016
          • The fight against privacy smashers continues, June 14, 2016
          • Publishers are losing the battle against their ad-blocking visitors - so what's next? May 31, 2016
          • Tech companies resist government attempts to broaden definition of 'personal information', May 25, 2016
          • Privacy threats on parade, May 17, 2016
          • Government goes dark as private lives are exposed, May 10, 2016
          • The great online-advertising swindle, May 3, 2016
          • Modern news media: Too big not to fail? April 26, 2016
          • Internet Confidential: How to establish a privacy right on the public Internet, April 20, 2016
          • The new browser wars: Thou shalt not block our ads and trackers, April 13, 2016
          • FCC to regulate ISP data collection, but Google, Facebook off the hook, April 6, 2016
          • How we lose ourselves in private data collection, March 15, 2016
          • People tracking is about to get even creepier, March 8, 2016
          • Silicon Valley's long-standing connections to the U.S. government, March 2, 2016
          • How to build the future of work, February 24, 2016
          • Why it's a bad idea to trust private companies with the job of protecting our rights, February 16, 2016
          • Your Internet life is an open book: The dark side of online-ad profiling, February 9, 2016
          • Why don't Americans care as much about their privacy as Europeans do? February 2, 2016
          • 'Hey, gang, let's put on a government!', January 5, 2016
          • The appropriate response to living in a surveillance state: Ignore it, December 22, 2015 >
            • Legal shorts for December 22, 2015
          • Re-reinterpreting our constitutional right to bear arms, December 10, 2015
          • How open data can help save the world, December 2, 2015
          • Fair use stages a comeback: New protections against copyright abuse, November 10, 2015 >
            • Welcome to the Age of 'Existential Despair', November 10, 2015
          • Do we have a right to know what they know about us?, October 20, 2015
          • Legal shorts, September 29, 2015
          • Campaign 2016: Where's the love? September 15, 2015 >
            • Legal shorts, September 15, 2015
          • Reclaiming our government starts with universal Internet access, August 25, 2015
          • Upon further review, times three, August 4, 2015 >
            • Shorts for August 4, 2015
          • The connection between poverty, hunger, and obesity, July 14, 2015 >
            • Shorts for July 14, 2015
          • A long-overdue turning of the political tide, July 7, 2015
          • Obamacare: A misstep in the right direction, July 7, 2015
          • Obamacare decision imposes limits on executive power, June 30, 2015
          • It's time to get serious about prosecuting Internet threats, June 23, 2015
          • Worst. Supreme. Court. Ever. June 16, 2015
          • Five indications that we are currently between regimes, June 9, 2015
          • Legal shorts, June 2, 2015
          • Legal shorts, May 12, 2015
          • Legal shorts, May 5, 2015
          • Legal shorts, April 28, 2015
          • More examples of judges clueless about technology... and one that gets it, April 21, 2015
          • Legal shorts: April 7, 2015
          • Legal shorts, March 31, 2015
          • Legal shorts: March 24, 2015
          • Privacy, Inc.: Welcome to the personal-information marketplace, March 3, 2015
          • Legal shorts: February 24, 2015
          • What would George Washington think of his country now? February 16, 2015 >
            • Lobbyists thrive by building relationships with lawmakers, February 17, 2015
            • On the fast track to American fascism, February 17, 2015
            • The one Senator who's speaking truth to power, February 17, 2015
            • Fight terrorism by fighting its source: Corruption, February 17, 2015
            • Anonymous users: Your ISP may ID you on demand -- and not even tell you, February 17, 2015
          • Legal shorts: February 10, 2015
          • What's the best way to fix the broken U.S. political system? February 3, 2015
          • The battle against data thieves heats up, January 20, 2015
          • 'The Interview' and 'I Can't Breathe': Connecting the dots, December 29, 2014
          • Cyberwar? Fuhgeddabouddit! There are plenty more serious threats to fret over, December 16, 2014
          • Trading privacy for the public good, November 18, 2014
          • Deregulating the legal profession: Only a matter of time, October 6, 2014
          • Internet companies' transparency reports indicate trademark abuse is on the rise, September 25, 2014
          • Google patent infringement: The proof's in the Post-its?, August 25, 2014
          • Most data breaches are the result of weak or stolen credentials, August 18, 2014
          • The best government money -- lots and lots of money -- can buy, August 11, 2014
          • Have 'money addicts' taken over our political system?, August 11, 2014 >
            • Part 2: Money and political power, August 11, 2014
            • Part 3: A contrived distinction between 'venal' and 'systematic' corruption, August 11, 2014
            • Part 4: Fear of political corruption trumps government economic regulation, August 11, 2014
            • Part 5: Investment-oriented political contributions boost the bottom line, August 11, 2014
            • Part 6: Case study: Corporate political corruption, 19th-century style, August 11, 2014
          • Corporate ownership of the U.S. political process, August 11, 2014 >
            • Part 2: Party perpetuation trumps service to the constituency, August 11, 2014
            • Part 3: Party loyalty trumps independent thought, August 11, 2014
            • Part 4: The roots of corporate 'personhood,' August 11, 2014
            • Part 5: Is political corruption actually on the rise? Who knows?, August 11, 2014
          • It all depends on who's doing the surveilling -- and why, July 28, 2014
          • Be careful what you comment -- it might get you sued, July 19, 2014
          • Supreme Court: You can patent software, but only if it's 'transformative,' June 21, 2014
          • Privacy Manifesto
        • Privacy Tips >
          • Privacy infographic-palooza, January 24, 2018 >
            • Data Collection on Consumers infographic
            • How Companies Identify People
            • PayPal Data Sharing
            • Data Collection Guidelines for Businesses
            • What Does It Mean to Be a Success?
          • Could artificial intelligence give the tech industry a heart and save us from capitalism run amok? December 21, 2017
          • Your email use is being tracked, and not just by marketers and spammers, December 13, 2017
          • Your location location location means money money money for trackers, November 16, 2017
          • Addiction by design: Don't let tech products run your life, October 19, 2017
          • Essential internet privacy tips, 2017 edition
          • The best response to the Equifax breach: Don't deal with Equifax, September 13, 2017
          • How to deter 'fingerprint' trackers from identifying your computers and devices, August 23, 2017
          • Find the internet security level that's right for your needs, August 9, 2017
          • A novel concept: Let consumers decide which personal data to share with trackers, July 12, 2017
          • Keep online trackers at bay without breaking a sweat, June 28, 2017
          • Privacy tips for the most vulnerable: Children and seniors, May 31, 2017
          • Simple, free ways to lock down your private data, March 29, 2017
          • Let big data benefit consumers, not marketers, March 22, 2017t
          • Practical security preparations for the worst-case scenario, December 13, 2016
          • Before the deluge: Spend your attention wisely, November 23, 2016
          • The 'consumer boycott' of web advertising is gaining momentum, November 8, 2016
          • Encryption: It's not just for banking anymore, November 1, 2016
          • A call to action: Stop the surveillance - by web services, apps, October 25, 2016
          • Web ad networks are malware authors' best friends, October 18, 2016
          • Privacy is becoming fashionable - Yippee! October 11, 2016
          • How do we bridge the growing media and political divides? October 4, 2016 >
            • Pew Center Research chart: Political bias of news organizations
          • Safety essentials: 10-step security revisited, 11 years later
          • Simple ways to limit the private information you surrender on the web, September 20, 2016
          • Top 10 reasons why people hate listicles - and yes, this is a joke headline, September 13, 2016
          • Why internet voting is a terrible idea, September 6, 2016
          • The web is broken - Guess who's trying to fix it? August 23, 2016
          • Dragging the online trackers - kicking and screaming - into the light of day, August 9, 2016
          • Five questions, no answers, March 29, 2016
          • How to fix the Internet: Ratchet down the anonymity, lose the ads, March 23, 2016
          • 2016: The first social-media election, March 2, 2016
          • The end is near for passwords (not really), February 24, 2016
          • New fronts open in the battle against privacy-invading online ads, January 26, 2016
          • Fifteen ways to stay safe on the Internet, January 19, 2016
          • Prepare for the inevitable theft of your personal information, January 13, 2016
          • Separating the bitcoin hype from the blockchain substance, December 17, 2015 >
            • Shorts for December 17, 2015: Trump's legal ineptitude, and eight ways the world is getting better
          • Consumers may be ready to pay for an ad-free, tracking-free Internet, November 18, 2015
          • Get ready for the Attention Economy, November 4, 2015
          • Tech shorts, October 27, 2015
          • How to find a reliable network speed test, May 2, 2014
          • Facial recognition ushers in the Age of Surveillance, October 13, 2015 >
            • Tech Short for October 13, 2015: ID by face + social profile
          • Fantasy sports gambling finally gets scrutinized, October 6, 2015 >
            • Tech shorts, October 6, 2015
          • Google, Android, ads, and a tech titan's revenge, September 29, 2015
          • How to fix problems caused by Apple's flaky iTunes updates, September 23, 2015 >
            • Tech shorts, September 22, 2015
          • Tech shorts, September 15, 2015
          • Three simple ways to improve your privacy, September 8, 2015
          • Use your free Google Voice number to make and receive phone calls, September 1, 2015
          • Coming soon: A more trustworthy form of encryption, July 28, 2015 >
            • Tech shorts, July 28, 2015
          • Protect yourself while browsing by enabling click to play, July 21, 2015 >
            • Tech short, July 21, 2015: Computers now tie emotions to facial expressions
          • Everyday Windows 10 users become beta testers for the Enterprise Edition, June 30, 2015 >
            • Tech shorts, June 30, 2015
          • Tech shorts, June 16, 2015
          • The five-minute Facebook security checkup, June 2, 2015
          • When ads attack: Web ad networks battle the blockers, May 26, 2015
          • Flying the furious skies: How to stay sane on a commercial flight, May 19, 2015 >
            • Tech shorts, May 19, 2015
          • Online shopping tips: Put differential pricing to work for you, May 12, 2015 >
            • Tech shorts, May 12, 2015
          • We're sitting on a big-data gold mine, May 5, 2015
          • The case against web encryption, Title II designation for ISPs, April 28, 2015 >
            • Tech shorts, April 28, 2015
          • Tech shorts, April 21, 2015
          • Should all web traffic be encrypted? April 14, 2015 >
            • Anonymous Internet Map, April 14, 2015
          • More reasons why you need to block web ads, April 7, 2015 >
            • Tech shorts: April 7, 2015
          • Web 3.0 returns control of personal information to users, March 31, 2015
          • Passwords are about to get some much-needed assistance -- from your body, March 24, 2015
          • An unexpected visit from the Karma Police, March 17, 2015
          • Three views of the future that are certain to curl your hair, March 10, 2015
          • The tricks of the malware trade: Don't take the bait! February 24, 2015
          • How to ruin your life in 140 characters or fewer, February 17, 2015
          • Browse better with these three essential freebies (plus one valuable cheapie), February 10, 2015 >
            • Tech shorts: February 10, 2015
          • Why you should care about your loss of privacy, January 27, 2015
          • How to combat hate and harassment on the Internet, January 13, 2015
          • Beat ransomware by saving your files to the cloud, January 6, 2015
          • Five fantastic Web freebies, December 9, 2014
          • How Google, Facebook, and Twitter make billions by offering 'free' services, December 2, 2014
          • Telephone tech-support scams are on the rise, November 24, 2014
          • Tor breach shows there's no such thing as Internet anonymity, November 11, 2014 >
            • Hackers owned Home Depot's networks for five months, November 11, 2014
            • Another call for a nationwide breach-notification law, November 11, 2014
          • Comcast battles Netflix, and everybody loses, November 4, 2014
          • Sexting has become part of growing up (gulp!), October 28, 2014
          • Quick, simple fixes for everyday tech glitches, October 21, 2014
          • Battle of the behemoths: Facebook ad network takes on Google, October 14, 2014
          • Instant access to all your recent files, October 6, 2014
          • iPhone's new Medical ID feature could save your life, September 29, 2014
          • Now you can really lock your phone, September 22, 2014
          • Facebook auto-play videos eat up mobile data allotments, September 15, 2014
          • Three free browser add-ons protect against cyber-crime, September 9, 2014
          • Control which iPhone apps are allowed to stay 'active' when they're off, August 25, 2014
          • The best browser you're probably not using, August 4, 2014
          • Never pay for software again (almost), July 14, 2014 >
            • Best free alternatives to top-selling software, July 11, 2011
          • The pros and cons of cloud computing, July 14, 2014 >
            • Three approaches to free encrypted online storage, June 23, 2009
            • Future-proof your data archive, December 30, 2010
            • Ten simple, common-sense security tips, October 9, 2012
          • Browser security settings you gotta change, June 24, 2014 >
            • Beef up Chrome's security, June 24, 2014
            • Batten down the hatches in Firefox, June 24, 2014
            • Enable Internet Explorer's privacy and security features, June 24, 2014
          • Online advertising dangers, June 10, 2014 >
            • U.S. Senate: Self-regulation of online ad networks isn't working, June 10, 2014
            • Free browser extensions give ads the boot, June 10, 2014
            • Claim a property interest in your personal information, June 10, 2014
            • A micropayment alternative to privacy-sucking ads, June 10, 2014
          • Great people make great sites, May 30, 2014
          • Three free privacy add-ons for Firefox and Chrome, May 20, 2014 >
            • Three essential security add-ons for Firefox, Chrome, and IE, May 7, 2013 >
              • How to improve security in Firefox, Chrome, and IE, May 6, 2013
            • Disable third-party cookies in IE, Firefox, and Google Chrome, March 14, 2011 >
              • Add 'do not track' to Firefox, IE, Google Chrome, December 7, 2010
              • Five great Firefox privacy add-ons, July 14, 2010
          • Remove metadata from Office files, PDFs, and images, May 16, 2014
          • Make folders private in Windows 8.1, May 9, 2014 >
            • Enable Vista's hidden administrator, and password-protect its XP equivalent, February 13, 2008
            • How to secure your PC in 10 easy steps, November 15, 2011 >
              • Three approaches to free encrypted online storage, June 23, 2009
              • Amazon Cloud Drive and Box.net go toe-to-toe, April 5, 2011
              • Free VPN service helps keep public Wi-Fi safe, February 14, 2011
              • How to prevent identity theft, September 13, 2011
            • Free utility finds unwanted programs uninstallers miss, February 24, 2014
          • Malware authors target Android phones, May 13, 2014
          • Secure your Facebook account in six easy steps, September 23, 2013
          • How to find the positive in negative comments, April 30, 2014
          • The 'I hate passwords' guide, April 29, 2014
          • Protect your device from malicious ads, April 10, 2014
          • Five ways to save a Web page, September 26, 2011
          • Five essential Windows 8.1 time-saving tweaks, February 3, 2014
          • Best free sites for learning how to write code, December 12, 2013
        • Software Intellectual Property Protections, August 16, 2014 >
          • Introduction: It's a Software World
          • 1. Trademark >
            • a. Registration
            • b. Trademark requirements
            • c. Lanham Act: 15 U.S.C. §§ 1051-1053 and 15 U.S.C. § 1125(a) (a.k.a. § 43(a)) >
              • 1. Distinguish from patent protection
              • 2. Distinguish from copyright protection
              • 3. Trademark-infringement elements >
                • A. Confusion
                • B. Designation of origin
                • C. Famous and distinctive
            • d. Infringement criteria
          • 2. Trade Secrets >
            • a. Uniform Trade Secrets Act
            • b. Software protected by trade secrets
            • c. Limitations on trade-secret protections >
              • 1. Secret and valuable
              • 2. Described with particularity
              • 3. Software trade secrets and patents: Conflicting or complementary?
          • 3. Copyright >
            • a. History of software copyright statute
            • b. Assembling the pieces of the software-copyright jigsaw puzzle >
              • 1. Two types of source code: Declaring and implementing
              • 2. Originality requirement
              • 3. Merger doctrine
              • 4. Abstraction-filtration-comparison test
              • 5. Short phrases
              • 6. Scenes a faire doctrine
              • 7. Structure, sequence, and organization of the Java APIs
              • 8. Interoperability as it relates to copyrightability
              • 9. Fair use
              • 10. Copyright protections vs. patent protections for software
          • 4. Patent >
            • a. U.S. Constitution Article 1 § 8 >
              • 1. In terms of patent law, software is special
              • 2. Software innovations are clearly patentable
            • b. 35 U.S. Code § 101 >
              • 1. Alice Corp. v. CLS Bank International: Procedural history
              • 2. Test for patentability of abstract ideas: Implicit exception to exclusion
            • c. 35 U.S. Code § 102 - Conditions for patentability; novelty, prior art >
              • 1. Section 102(a)'s "known or used" determination (prior art)
              • 2. Section 102(b)'s "on sale" and "disclosure" determinations
              • 3. Section 102(g)'s "abandoned, suppressed, or concealed" determination
            • d. 35 U.S. Code § 103 Conditions for patentability: non-obvious subject matter
            • e. 35 U.S. Code § 112: Specification >
              • 1. Claim construction
              • 2. Doctrine of equivalents and rule of prosecution history estoppel
          • Conclusion
          • Table of Cases
        • Reclaim your personal information
  • Cloud Computing
    • Five tips for protecting cloud data from internal threats
    • What does the future hold for DBAs?
    • Busted: 10 Big Data Myths Exploded
    • Is the cloud ready for speech APIs?
    • From machine learning to super clouds: Competing visions of cloud 2.0
    • Two great reasons for making your cloud data location aware
    • The most common cloud migration mistakes
    • How to prepare for the next cloud outage
    • The new shadow IT: Custom applications in the cloud
    • Drawbacks of running containers on bare-metal servers
    • How to reduce latency in public clouds
    • Mastering the art of container management
    • Hybrid Clouds: Here to stay, or stop-gaps to enterprise cloud?
    • How zero-trust security makes VMs more efficient
    • Ultimate virtualization: The end of infrastructure
    • 21 best orchestration tools for MSPs
    • Cloud governance: The key to effectively scaling your cloud
    • Update or rewrite? A cloud-application perspective
    • New views into cloud application performance
    • Multicloud vs. hybrid cloud
  • The Stories So Far....
  • About
  • workersedge
    • The Weekly >
      • The Weeklies >
        • Excuse me while I duck and cover, March 1, 2018
        • We're running out of words, February 7, 2018
        • Help fight information pollution, January 31, 2018
        • Privacy infographic-palooza, January 24, 2018
        • Another great reason to celebrate the life of Martin Luther King Jr., January 17, 2018
        • Bye-bye, Fourth Amendment: Spy agencies feed tips to law enforcement, January 10, 2018
        • Bring virtue to the internet by keeping trackers at bay, January 3, 2018
        • Could artificial intelligence give the tech industry a heart and save us from capitalism run amok? December 21, 2017
        • Your email use is being tracked, and not just by marketers and spammers, December 13, 2017
        • Time to let others do the talking, December 6, 2017
        • Our front-row seat for the crashing and burning of the internet, November 29, 2017
        • Your location location location means money money money for trackers, November 16, 2017
        • YouTube: Unsafe for all ages, November 8, 2017
        • Birthday wishes, November 2, 2017
        • That Weekly when everything was pretty good, or at least not so bad, October 25, 2017
        • Addiction by design: Don't let tech products run your life, October 19, 2017
        • Essential internet privacy tips, 2017 edition
        • Unreported news story: 'Algorithmic takeover' of journalism, September 27, 2017
        • The door slams shut on the open internet, September 22, 2017
        • The best response to the Equifax breach: Don't deal with Equifax, September 13, 2017
        • In business and government, the bullies are calling the shots, September 6, 2017
        • There's no stopping tech giants' surveillance for profit, August 30, 2017
        • How to deter 'fingerprint' trackers from identifying your computers and devices, August 23, 2017
        • That was the week that was, 2017 revival, August 16, 2017
        • Find the internet security level that's right for your needs, August 9, 2017
        • Internet Media 101: The bigger the lie, the greater the profit, August 3, 2017
        • Cyber-crimestoppers: How individuals and companies help nab internet crooks, July 26, 2017
        • A free press: The antidote to authoritarianism, July 19, 2017
        • A novel concept: Let consumers decide which personal data to share with trackers, July 12, 2017
        • We're in the midst of the third American Civil War, and democracy is losing, July 5, 2017
        • Keep online trackers at bay without breaking a sweat, June 28, 2017
        • Pleas for civility meet with... incivility, but that's okay, June 21, 2017
        • The price we pay for unbridled digital surveillance, June 14, 2017
        • Privacy protections may form the basis of antitrust actions against internet giants, June 7, 2017
        • Privacy tips for the most vulnerable: Children and seniors, May 31, 2017
        • Applying Fourth Amendment search protections to data in the cloud, May 24, 2017
        • Just when you thought you couldn't be tracked any closer..., May 17, 2017
        • Facebook addiction turns users into marketing guinea pigs, May 10, 2017
        • America: A tale of two countries, May 3, 2017
        • The internet: Destroyer of truth, justice, and the American Way, April 26, 2017
        • The death and ultimate rebirth of the public internet, April 19, 2017
        • An internet dinosaur spits in extinction's eye, April 12, 2017
        • Trust Busters 2.0: Dismantling modern monopolies, April 5, 2017
        • Simple, free ways to lock down your private data, March 29, 2017
        • Let big data benefit consumers, not marketers, March 22, 2017t
        • Gig economy changes what it means to be an 'employee,' March 8, 2017
        • Privacy: There's just no percentage in it, March 1, 2017
        • Practical security preparations for the worst-case scenario, December 13, 2016
        • The Rough Beast's lies indicate his intentions - Just like the Nazis, December 6, 2016
        • Government phone searches: Return of the 'general warrant', November 29, 2016
        • Before the deluge: Spend your attention wisely, November 23, 2016
        • You can't hide from facial-recognition systems - Or can you? November 16, 2016
        • The 'consumer boycott' of web advertising is gaining momentum, November 8, 2016
        • Encryption: It's not just for banking anymore, November 1, 2016
        • A call to action: Stop the surveillance - by web services, apps, October 25, 2016
        • Web ad networks are malware authors' best friends, October 18, 2016
        • Privacy is becoming fashionable - Yippee! October 11, 2016
        • How do we bridge the growing media and political divides? October 4, 2016
        • Safety essentials: 10-step security revisited, 11 years later
        • Simple ways to limit the private information you surrender on the web, September 20, 2016
        • Top 10 reasons why people hate listicles - and yes, this is a joke headline, September 13, 2016
        • Why internet voting is a terrible idea, September 6, 2016
        • No consent needed for ISPs to scan email and create ad-targeting profiles of non-customers, August 30, 2016
        • The web is broken - Guess who's trying to fix it? August 23, 2016
        • Supreme Court throws 'fruit of the poisonous tree' doctrine under the bus, August 16, 2016
        • Dragging the online trackers - kicking and screaming - into the light of day, August 9, 2016
        • Silly questions: Who 'owns' video captured by police? And is Facebook really 'privacy-enhancing'? August 2, 2016
        • It's official: No expectation of privacy on the internet, June 28, 2016
        • How to wrest control of our government away from corporations, June 21, 2016
        • The fight against privacy smashers continues, June 14, 2016
        • Publishers are losing the battle against their ad-blocking visitors - so what's next? May 31, 2016
        • Tech companies resist government attempts to broaden definition of 'personal information', May 25, 2016
        • Privacy threats on parade, May 17, 2016
        • Government goes dark as private lives are exposed, May 10, 2016
        • The great online-advertising swindle, May 3, 2016
        • Modern news media: Too big not to fail? April 26, 2016
        • Internet Confidential: How to establish a privacy right on the public Internet, April 20, 2016
        • The new browser wars: Thou shalt not block our ads and trackers, April 13, 2016
        • FCC to regulate ISP data collection, but Google, Facebook off the hook, April 6, 2016
        • Five questions, no answers, March 29, 2016
        • How to fix the Internet: Ratchet down the anonymity, lose the ads, March 23, 2016
        • How we lose ourselves in private data collection, March 15, 2016
        • People tracking is about to get even creepier, March 8, 2016
        • Silicon Valley's long-standing connections to the U.S. government, March 2, 2016
        • 2016: The first social-media election, March 2, 2016
        • How to build the future of work, February 24, 2016
        • Why it's a bad idea to trust private companies with the job of protecting our rights, February 16, 2016
        • Your Internet life is an open book: The dark side of online-ad profiling, February 9, 2016
        • Why don't Americans care as much about their privacy as Europeans do? February 2, 2016
        • New fronts open in the battle against privacy-invading online ads, January 26, 2016
        • Fifteen ways to stay safe on the Internet, January 19, 2016
        • Prepare for the inevitable theft of your personal information, January 13, 2016
        • 'Hey, gang, let's put on a government!', January 5, 2016
        • The appropriate response to living in a surveillance state: Ignore it, December 22, 2015 >
          • Legal shorts for December 22, 2015
        • Separating the bitcoin hype from the blockchain substance, December 17, 2015 >
          • Shorts for December 17, 2015: Trump's legal ineptitude, and eight ways the world is getting better
        • Re-reinterpreting our constitutional right to bear arms, December 10, 2015
        • How open data can help save the world, December 2, 2015
        • Consumers may be ready to pay for an ad-free, tracking-free Internet, November 18, 2015
        • Fair use stages a comeback: New protections against copyright abuse, November 10, 2015
        • Welcome to the Age of 'Existential Despair', November 10, 2015
        • Get ready for the Attention Economy, November 4, 2015
        • O'Jitterys Catch a Movie, October 27, 2015 >
          • Tech shorts, October 27, 2015
        • Do we have a right to know what they know about us?, October 20, 2015
        • Facial recognition ushers in the Age of Surveillance, October 13, 2015 >
          • Tech Short, October 13, 2015: ID by face + social profile
          • Legal Short, October 13, 2015: GOP mega-donor sues Mother Jones, loses, sort of
        • Fantasy sports gambling finally gets scrutinized, October 6, 2015 >
          • Tech shorts, October 6, 2015
        • Google, Android, ads, and a tech titan's revenge, September 29, 2015 >
          • Legal shorts, September 29, 2015
        • How to fix problems caused by Apple's flaky iTunes updates, September 23, 2015 >
          • Tech shorts, September 22, 2015
        • Campaign 2016: Where's the love? September 15, 2015 >
          • Tech shorts, September 15, 2015
          • Legal shorts, September 15, 2015
        • Three simple ways to improve your privacy, September 8, 2015
        • Use your free Google Voice number to make and receive phone calls, September 1, 2015
        • Reclaiming our government starts with universal Internet access, August 25, 2015
        • Upon further review, times three, August 4, 2015 >
          • Shorts for August 4, 2015
        • Coming soon: A more trustworthy form of encryption, July 28, 2015 >
          • Tech shorts, July 28, 2015
        • Protect yourself while browsing by enabling click to play, July 21, 2015 >
          • Tech short, July 21, 2015: Computers now tie emotions to facial expressions
        • The connection between poverty, hunger, and obesity, July 14, 2015 >
          • Shorts for July 14, 2015
        • A long-overdue turning of the political tide, July 7, 2015
        • Obamacare: A misstep in the right direction, July 7, 2015
        • Everyday Windows 10 users become beta testers for the Enterprise Edition, June 30, 2015 >
          • Tech shorts, June 30, 2015
        • Obamacare decision imposes limits on executive power, June 30, 2015
        • It's time to get serious about prosecuting Internet threats, June 23, 2015
        • Worst. Supreme. Court. Ever. June 16, 2015 >
          • Tech shorts, June 16, 2015
        • Five indications that we are currently between regimes, June 9, 2015
        • The five-minute Facebook security checkup, June 2, 2015 >
          • Legal shorts, June 2, 2015
        • When ads attack: Web ad networks battle the blockers, May 26, 2015
        • Flying the furious skies: How to stay sane on a commercial flight, May 19, 2015 >
          • Tech shorts, May 19, 2015
        • Online shopping tips: Put differential pricing to work for you, May 12, 2015 >
          • Tech shorts, May 12, 2015
          • Legal shorts, May 12, 2015
        • We're sitting on a big-data gold mine, May 5, 2015 >
          • Legal shorts, May 5, 2015
        • The case against web encryption, Title II designation for ISPs, April 28, 2015 >
          • Tech shorts, April 28, 2015
          • Legal shorts, April 28, 2015
        • More examples of judges clueless about technology... and one that gets it, April 21, 2015 >
          • Tech shorts, April 21, 2015
        • Should all web traffic be encrypted? April 14, 2015 >
          • Anonymous Internet Map, April 14, 2015
        • More reasons why you need to block web ads, April 7, 2015 >
          • Tech shorts: April 7, 2015
          • Legal shorts: April 7, 2015
        • Web 3.0 returns control of personal information to users, March 31, 2015
        • Passwords are about to get some much-needed assistance -- from your body, March 24, 2015
        • An unexpected visit from the Karma Police, March 17, 2015
        • Three views of the future that are certain to curl your hair, March 10, 2015
        • Privacy, Inc.: Welcome to the personal-information marketplace, March 3, 2015
        • The tricks of the malware trade: Don't take the bait! February 24, 2015
        • How to ruin your life in 140 characters or fewer, February 17, 2015
        • Browse better with these three essential freebies (plus one valuable cheapie), February 10, 2015 >
          • Tech shorts: February 10, 2015
        • What's the best way to fix the broken U.S. political system? February 3, 2015
        • Why you should care about your loss of privacy, January 27, 2015
        • The battle against data thieves heats up, January 20, 2015
        • How to combat hate and harassment on the Internet, January 13, 2015
        • Beat ransomware by saving your files to the cloud, January 6, 2015
        • 'The Interview' and 'I Can't Breathe': Connecting the dots, December 29, 2014
        • Cyberwar? Fuhgeddabouddit! There are plenty more serious threats to fret over, December 16, 2014
        • Five fantastic Web freebies, December 9, 2014
        • How Google, Facebook, and Twitter make billions by offering 'free' services, December 2, 2014
        • Telephone tech-support scams are on the rise, November 24, 2014
        • Trading privacy for the public good, November 18, 2014
        • Tor breach shows there's no such thing as Internet anonymity, November 11, 2014 >
          • Hackers owned Home Depot's networks for five months, November 11, 2014
          • Another call for a nationwide breach-notification law, November 11, 2014
        • Comcast battles Netflix, and everybody loses, November 4, 2014
        • Sexting has become part of growing up (gulp!), October 28, 2014
        • Quick, simple fixes for everyday tech glitches, October 21, 2014
        • Battle of the behemoths: Facebook ad network takes on Google, October 14, 2014
        • Instant access to all your recent files, October 6, 2014
        • iPhone's new Medical ID feature could save your life, September 29, 2014
        • Now you can really lock your phone, September 22, 2014
        • Facebook auto-play videos eat up mobile data allotments, September 15, 2014
        • Three free browser add-ons protect against cyber-crime, September 9, 2014
        • Manslaughter conviction expunged after worker dies in baling machine, August 25, 2014 >
          • Google patent infringement: The proof's in the Post-its?, August 25, 2014
          • Control which iPhone apps are allowed to stay 'active' when they're off, August 25, 2014
          • Weekly What? August 25, 2014 >
            • No more 'Like' gates to view content, get rewards, August 25, 2014
            • FTC goes after a company that lost customer data, company cries 'Foul!', August 25, 2014
            • A mobile phone company releases customer data -- and it's a good thing, August 25, 2014
            • Clickless approvals don't qualify as 'reasonable notice' for terms of service, August 25, 2014
            • Baby steps closer to authentication that doesn't rely on passwords, August 25, 2014
        • Most data breaches are the result of weak or stolen credentials, August 18, 2014
        • The best government money -- lots and lots of money -- can buy, August 11, 2014
        • The best browser you're probably not using, August 4, 2014
        • It all depends on who's doing the surveilling -- and why, July 28, 2014
        • Be careful what you comment -- it might get you sued, July 19, 2014
        • Never pay for software again (almost) Plus: The pros and cons of cloud computing, July 14, 2014
        • Mind that download! Free phone apps deliver malware, July 7, 2014
        • How to build the future of work, February 24, 2016
        • The end is near for passwords (not really), February 24, 2016
        • Facebook's latest shenanigans, July 1, 2014
      • Privacy Weeklies >
        • The Weeklies >
          • Excuse me while I duck and cover, March 1, 2018
          • We're running out of words, February 7, 2018
          • Help fight information pollution, January 31, 2018
          • Another great reason to celebrate the life of Martin Luther King Jr., January 17, 2018
          • Bye-bye, Fourth Amendment: Spy agencies feed tips to law enforcement, January 10, 2018
          • Bring virtue to the internet by keeping trackers at bay, January 3, 2018
          • Time to let others do the talking, December 6, 2017
          • Our front-row seat for the crashing and burning of the internet, November 29, 2017
          • YouTube: Unsafe for all ages, November 8, 2017
          • Birthday wishes, November 2, 2017
          • That Weekly when everything was pretty good, or at least not so bad, October 25, 2017
          • Unreported news story: 'Algorithmic takeover' of journalism, September 27, 2017
          • The door slams shut on the open internet, September 22, 2017
          • In business and government, the bullies are calling the shots, September 6, 2017
          • There's no stopping tech giants' surveillance for profit, August 30, 2017
          • That was the week that was, 2017 revival, August 16, 2017
          • Internet Media 101: The bigger the lie, the greater the profit, August 3, 2017
          • Cyber-crimestoppers: How individuals and companies help nab internet crooks, July 26, 2017
          • A free press: The antidote to authoritarianism, July 19, 2017
          • We're in the midst of the third American Civil War, and democracy is losing, July 5, 2017
          • Pleas for civility meet with... incivility, but that's okay, June 21, 2017
          • The price we pay for unbridled digital surveillance, June 14, 2017
          • Privacy protections may form the basis of antitrust actions against internet giants, June 7, 2017
          • Applying Fourth Amendment search protections to data in the cloud, May 24, 2017
          • Just when you thought you couldn't be tracked any closer..., May 17, 2017
          • Facebook addiction turns users into marketing guinea pigs, May 10, 2017
          • America: A tale of two countries, May 3, 2017
          • The internet: Destroyer of truth, justice, and the American Way, April 26, 2017
          • The death and ultimate rebirth of the public internet, April 19, 2017
          • An internet dinosaur spits in extinction's eye, April 12, 2017
          • Trust Busters 2.0: Dismantling modern monopolies, April 5, 2017
          • Gig economy changes what it means to be an 'employee,' March 8, 2017
          • Privacy: There's just no percentage in it, March 1, 2017
          • The Rough Beast's lies indicate his intentions - Just like the Nazis, December 6, 2016
          • Government phone searches: Return of the 'general warrant', November 29, 2016
          • You can't hide from facial-recognition systems - Or can you? November 16, 2016
          • No consent needed for ISPs to scan email and create ad-targeting profiles of non-customers, August 30, 2016
          • Supreme Court throws 'fruit of the poisonous tree' doctrine under the bus, August 16, 2016
          • Silly questions: Who 'owns' video captured by police? And is Facebook really 'privacy-enhancing'? August 2, 2016
          • It's official: No expectation of privacy on the internet, June 28, 2016
          • How to wrest control of our government away from corporations, June 21, 2016
          • The fight against privacy smashers continues, June 14, 2016
          • Publishers are losing the battle against their ad-blocking visitors - so what's next? May 31, 2016
          • Tech companies resist government attempts to broaden definition of 'personal information', May 25, 2016
          • Privacy threats on parade, May 17, 2016
          • Government goes dark as private lives are exposed, May 10, 2016
          • The great online-advertising swindle, May 3, 2016
          • Modern news media: Too big not to fail? April 26, 2016
          • Internet Confidential: How to establish a privacy right on the public Internet, April 20, 2016
          • The new browser wars: Thou shalt not block our ads and trackers, April 13, 2016
          • FCC to regulate ISP data collection, but Google, Facebook off the hook, April 6, 2016
          • How we lose ourselves in private data collection, March 15, 2016
          • People tracking is about to get even creepier, March 8, 2016
          • Silicon Valley's long-standing connections to the U.S. government, March 2, 2016
          • How to build the future of work, February 24, 2016
          • Why it's a bad idea to trust private companies with the job of protecting our rights, February 16, 2016
          • Your Internet life is an open book: The dark side of online-ad profiling, February 9, 2016
          • Why don't Americans care as much about their privacy as Europeans do? February 2, 2016
          • 'Hey, gang, let's put on a government!', January 5, 2016
          • The appropriate response to living in a surveillance state: Ignore it, December 22, 2015 >
            • Legal shorts for December 22, 2015
          • Re-reinterpreting our constitutional right to bear arms, December 10, 2015
          • How open data can help save the world, December 2, 2015
          • Fair use stages a comeback: New protections against copyright abuse, November 10, 2015 >
            • Welcome to the Age of 'Existential Despair', November 10, 2015
          • Do we have a right to know what they know about us?, October 20, 2015
          • Legal shorts, September 29, 2015
          • Campaign 2016: Where's the love? September 15, 2015 >
            • Legal shorts, September 15, 2015
          • Reclaiming our government starts with universal Internet access, August 25, 2015
          • Upon further review, times three, August 4, 2015 >
            • Shorts for August 4, 2015
          • The connection between poverty, hunger, and obesity, July 14, 2015 >
            • Shorts for July 14, 2015
          • A long-overdue turning of the political tide, July 7, 2015
          • Obamacare: A misstep in the right direction, July 7, 2015
          • Obamacare decision imposes limits on executive power, June 30, 2015
          • It's time to get serious about prosecuting Internet threats, June 23, 2015
          • Worst. Supreme. Court. Ever. June 16, 2015
          • Five indications that we are currently between regimes, June 9, 2015
          • Legal shorts, June 2, 2015
          • Legal shorts, May 12, 2015
          • Legal shorts, May 5, 2015
          • Legal shorts, April 28, 2015
          • More examples of judges clueless about technology... and one that gets it, April 21, 2015
          • Legal shorts: April 7, 2015
          • Legal shorts, March 31, 2015
          • Legal shorts: March 24, 2015
          • Privacy, Inc.: Welcome to the personal-information marketplace, March 3, 2015
          • Legal shorts: February 24, 2015
          • What would George Washington think of his country now? February 16, 2015 >
            • Lobbyists thrive by building relationships with lawmakers, February 17, 2015
            • On the fast track to American fascism, February 17, 2015
            • The one Senator who's speaking truth to power, February 17, 2015
            • Fight terrorism by fighting its source: Corruption, February 17, 2015
            • Anonymous users: Your ISP may ID you on demand -- and not even tell you, February 17, 2015
          • Legal shorts: February 10, 2015
          • What's the best way to fix the broken U.S. political system? February 3, 2015
          • The battle against data thieves heats up, January 20, 2015
          • 'The Interview' and 'I Can't Breathe': Connecting the dots, December 29, 2014
          • Cyberwar? Fuhgeddabouddit! There are plenty more serious threats to fret over, December 16, 2014
          • Trading privacy for the public good, November 18, 2014
          • Deregulating the legal profession: Only a matter of time, October 6, 2014
          • Internet companies' transparency reports indicate trademark abuse is on the rise, September 25, 2014
          • Google patent infringement: The proof's in the Post-its?, August 25, 2014
          • Most data breaches are the result of weak or stolen credentials, August 18, 2014
          • The best government money -- lots and lots of money -- can buy, August 11, 2014
          • Have 'money addicts' taken over our political system?, August 11, 2014 >
            • Part 2: Money and political power, August 11, 2014
            • Part 3: A contrived distinction between 'venal' and 'systematic' corruption, August 11, 2014
            • Part 4: Fear of political corruption trumps government economic regulation, August 11, 2014
            • Part 5: Investment-oriented political contributions boost the bottom line, August 11, 2014
            • Part 6: Case study: Corporate political corruption, 19th-century style, August 11, 2014
          • Corporate ownership of the U.S. political process, August 11, 2014 >
            • Part 2: Party perpetuation trumps service to the constituency, August 11, 2014
            • Part 3: Party loyalty trumps independent thought, August 11, 2014
            • Part 4: The roots of corporate 'personhood,' August 11, 2014
            • Part 5: Is political corruption actually on the rise? Who knows?, August 11, 2014
          • It all depends on who's doing the surveilling -- and why, July 28, 2014
          • Be careful what you comment -- it might get you sued, July 19, 2014
          • Supreme Court: You can patent software, but only if it's 'transformative,' June 21, 2014
          • Privacy Manifesto
        • Privacy Tips >
          • Privacy infographic-palooza, January 24, 2018 >
            • Data Collection on Consumers infographic
            • How Companies Identify People
            • PayPal Data Sharing
            • Data Collection Guidelines for Businesses
            • What Does It Mean to Be a Success?
          • Could artificial intelligence give the tech industry a heart and save us from capitalism run amok? December 21, 2017
          • Your email use is being tracked, and not just by marketers and spammers, December 13, 2017
          • Your location location location means money money money for trackers, November 16, 2017
          • Addiction by design: Don't let tech products run your life, October 19, 2017
          • Essential internet privacy tips, 2017 edition
          • The best response to the Equifax breach: Don't deal with Equifax, September 13, 2017
          • How to deter 'fingerprint' trackers from identifying your computers and devices, August 23, 2017
          • Find the internet security level that's right for your needs, August 9, 2017
          • A novel concept: Let consumers decide which personal data to share with trackers, July 12, 2017
          • Keep online trackers at bay without breaking a sweat, June 28, 2017
          • Privacy tips for the most vulnerable: Children and seniors, May 31, 2017
          • Simple, free ways to lock down your private data, March 29, 2017
          • Let big data benefit consumers, not marketers, March 22, 2017t
          • Practical security preparations for the worst-case scenario, December 13, 2016
          • Before the deluge: Spend your attention wisely, November 23, 2016
          • The 'consumer boycott' of web advertising is gaining momentum, November 8, 2016
          • Encryption: It's not just for banking anymore, November 1, 2016
          • A call to action: Stop the surveillance - by web services, apps, October 25, 2016
          • Web ad networks are malware authors' best friends, October 18, 2016
          • Privacy is becoming fashionable - Yippee! October 11, 2016
          • How do we bridge the growing media and political divides? October 4, 2016 >
            • Pew Center Research chart: Political bias of news organizations
          • Safety essentials: 10-step security revisited, 11 years later
          • Simple ways to limit the private information you surrender on the web, September 20, 2016
          • Top 10 reasons why people hate listicles - and yes, this is a joke headline, September 13, 2016
          • Why internet voting is a terrible idea, September 6, 2016
          • The web is broken - Guess who's trying to fix it? August 23, 2016
          • Dragging the online trackers - kicking and screaming - into the light of day, August 9, 2016
          • Five questions, no answers, March 29, 2016
          • How to fix the Internet: Ratchet down the anonymity, lose the ads, March 23, 2016
          • 2016: The first social-media election, March 2, 2016
          • The end is near for passwords (not really), February 24, 2016
          • New fronts open in the battle against privacy-invading online ads, January 26, 2016
          • Fifteen ways to stay safe on the Internet, January 19, 2016
          • Prepare for the inevitable theft of your personal information, January 13, 2016
          • Separating the bitcoin hype from the blockchain substance, December 17, 2015 >
            • Shorts for December 17, 2015: Trump's legal ineptitude, and eight ways the world is getting better
          • Consumers may be ready to pay for an ad-free, tracking-free Internet, November 18, 2015
          • Get ready for the Attention Economy, November 4, 2015
          • Tech shorts, October 27, 2015
          • How to find a reliable network speed test, May 2, 2014
          • Facial recognition ushers in the Age of Surveillance, October 13, 2015 >
            • Tech Short for October 13, 2015: ID by face + social profile
          • Fantasy sports gambling finally gets scrutinized, October 6, 2015 >
            • Tech shorts, October 6, 2015
          • Google, Android, ads, and a tech titan's revenge, September 29, 2015
          • How to fix problems caused by Apple's flaky iTunes updates, September 23, 2015 >
            • Tech shorts, September 22, 2015
          • Tech shorts, September 15, 2015
          • Three simple ways to improve your privacy, September 8, 2015
          • Use your free Google Voice number to make and receive phone calls, September 1, 2015
          • Coming soon: A more trustworthy form of encryption, July 28, 2015 >
            • Tech shorts, July 28, 2015
          • Protect yourself while browsing by enabling click to play, July 21, 2015 >
            • Tech short, July 21, 2015: Computers now tie emotions to facial expressions
          • Everyday Windows 10 users become beta testers for the Enterprise Edition, June 30, 2015 >
            • Tech shorts, June 30, 2015
          • Tech shorts, June 16, 2015
          • The five-minute Facebook security checkup, June 2, 2015
          • When ads attack: Web ad networks battle the blockers, May 26, 2015
          • Flying the furious skies: How to stay sane on a commercial flight, May 19, 2015 >
            • Tech shorts, May 19, 2015
          • Online shopping tips: Put differential pricing to work for you, May 12, 2015 >
            • Tech shorts, May 12, 2015
          • We're sitting on a big-data gold mine, May 5, 2015
          • The case against web encryption, Title II designation for ISPs, April 28, 2015 >
            • Tech shorts, April 28, 2015
          • Tech shorts, April 21, 2015
          • Should all web traffic be encrypted? April 14, 2015 >
            • Anonymous Internet Map, April 14, 2015
          • More reasons why you need to block web ads, April 7, 2015 >
            • Tech shorts: April 7, 2015
          • Web 3.0 returns control of personal information to users, March 31, 2015
          • Passwords are about to get some much-needed assistance -- from your body, March 24, 2015
          • An unexpected visit from the Karma Police, March 17, 2015
          • Three views of the future that are certain to curl your hair, March 10, 2015
          • The tricks of the malware trade: Don't take the bait! February 24, 2015
          • How to ruin your life in 140 characters or fewer, February 17, 2015
          • Browse better with these three essential freebies (plus one valuable cheapie), February 10, 2015 >
            • Tech shorts: February 10, 2015
          • Why you should care about your loss of privacy, January 27, 2015
          • How to combat hate and harassment on the Internet, January 13, 2015
          • Beat ransomware by saving your files to the cloud, January 6, 2015
          • Five fantastic Web freebies, December 9, 2014
          • How Google, Facebook, and Twitter make billions by offering 'free' services, December 2, 2014
          • Telephone tech-support scams are on the rise, November 24, 2014
          • Tor breach shows there's no such thing as Internet anonymity, November 11, 2014 >
            • Hackers owned Home Depot's networks for five months, November 11, 2014
            • Another call for a nationwide breach-notification law, November 11, 2014
          • Comcast battles Netflix, and everybody loses, November 4, 2014
          • Sexting has become part of growing up (gulp!), October 28, 2014
          • Quick, simple fixes for everyday tech glitches, October 21, 2014
          • Battle of the behemoths: Facebook ad network takes on Google, October 14, 2014
          • Instant access to all your recent files, October 6, 2014
          • iPhone's new Medical ID feature could save your life, September 29, 2014
          • Now you can really lock your phone, September 22, 2014
          • Facebook auto-play videos eat up mobile data allotments, September 15, 2014
          • Three free browser add-ons protect against cyber-crime, September 9, 2014
          • Control which iPhone apps are allowed to stay 'active' when they're off, August 25, 2014
          • The best browser you're probably not using, August 4, 2014
          • Never pay for software again (almost), July 14, 2014 >
            • Best free alternatives to top-selling software, July 11, 2011
          • The pros and cons of cloud computing, July 14, 2014 >
            • Three approaches to free encrypted online storage, June 23, 2009
            • Future-proof your data archive, December 30, 2010
            • Ten simple, common-sense security tips, October 9, 2012
          • Browser security settings you gotta change, June 24, 2014 >
            • Beef up Chrome's security, June 24, 2014
            • Batten down the hatches in Firefox, June 24, 2014
            • Enable Internet Explorer's privacy and security features, June 24, 2014
          • Online advertising dangers, June 10, 2014 >
            • U.S. Senate: Self-regulation of online ad networks isn't working, June 10, 2014
            • Free browser extensions give ads the boot, June 10, 2014
            • Claim a property interest in your personal information, June 10, 2014
            • A micropayment alternative to privacy-sucking ads, June 10, 2014
          • Great people make great sites, May 30, 2014
          • Three free privacy add-ons for Firefox and Chrome, May 20, 2014 >
            • Three essential security add-ons for Firefox, Chrome, and IE, May 7, 2013 >
              • How to improve security in Firefox, Chrome, and IE, May 6, 2013
            • Disable third-party cookies in IE, Firefox, and Google Chrome, March 14, 2011 >
              • Add 'do not track' to Firefox, IE, Google Chrome, December 7, 2010
              • Five great Firefox privacy add-ons, July 14, 2010
          • Remove metadata from Office files, PDFs, and images, May 16, 2014
          • Make folders private in Windows 8.1, May 9, 2014 >
            • Enable Vista's hidden administrator, and password-protect its XP equivalent, February 13, 2008
            • How to secure your PC in 10 easy steps, November 15, 2011 >
              • Three approaches to free encrypted online storage, June 23, 2009
              • Amazon Cloud Drive and Box.net go toe-to-toe, April 5, 2011
              • Free VPN service helps keep public Wi-Fi safe, February 14, 2011
              • How to prevent identity theft, September 13, 2011
            • Free utility finds unwanted programs uninstallers miss, February 24, 2014
          • Malware authors target Android phones, May 13, 2014
          • Secure your Facebook account in six easy steps, September 23, 2013
          • How to find the positive in negative comments, April 30, 2014
          • The 'I hate passwords' guide, April 29, 2014
          • Protect your device from malicious ads, April 10, 2014
          • Five ways to save a Web page, September 26, 2011
          • Five essential Windows 8.1 time-saving tweaks, February 3, 2014
          • Best free sites for learning how to write code, December 12, 2013
        • Software Intellectual Property Protections, August 16, 2014 >
          • Introduction: It's a Software World
          • 1. Trademark >
            • a. Registration
            • b. Trademark requirements
            • c. Lanham Act: 15 U.S.C. §§ 1051-1053 and 15 U.S.C. § 1125(a) (a.k.a. § 43(a)) >
              • 1. Distinguish from patent protection
              • 2. Distinguish from copyright protection
              • 3. Trademark-infringement elements >
                • A. Confusion
                • B. Designation of origin
                • C. Famous and distinctive
            • d. Infringement criteria
          • 2. Trade Secrets >
            • a. Uniform Trade Secrets Act
            • b. Software protected by trade secrets
            • c. Limitations on trade-secret protections >
              • 1. Secret and valuable
              • 2. Described with particularity
              • 3. Software trade secrets and patents: Conflicting or complementary?
          • 3. Copyright >
            • a. History of software copyright statute
            • b. Assembling the pieces of the software-copyright jigsaw puzzle >
              • 1. Two types of source code: Declaring and implementing
              • 2. Originality requirement
              • 3. Merger doctrine
              • 4. Abstraction-filtration-comparison test
              • 5. Short phrases
              • 6. Scenes a faire doctrine
              • 7. Structure, sequence, and organization of the Java APIs
              • 8. Interoperability as it relates to copyrightability
              • 9. Fair use
              • 10. Copyright protections vs. patent protections for software
          • 4. Patent >
            • a. U.S. Constitution Article 1 § 8 >
              • 1. In terms of patent law, software is special
              • 2. Software innovations are clearly patentable
            • b. 35 U.S. Code § 101 >
              • 1. Alice Corp. v. CLS Bank International: Procedural history
              • 2. Test for patentability of abstract ideas: Implicit exception to exclusion
            • c. 35 U.S. Code § 102 - Conditions for patentability; novelty, prior art >
              • 1. Section 102(a)'s "known or used" determination (prior art)
              • 2. Section 102(b)'s "on sale" and "disclosure" determinations
              • 3. Section 102(g)'s "abandoned, suppressed, or concealed" determination
            • d. 35 U.S. Code § 103 Conditions for patentability: non-obvious subject matter
            • e. 35 U.S. Code § 112: Specification >
              • 1. Claim construction
              • 2. Doctrine of equivalents and rule of prosecution history estoppel
          • Conclusion
          • Table of Cases
        • Reclaim your personal information
  • Cloud Computing
    • Five tips for protecting cloud data from internal threats
    • What does the future hold for DBAs?
    • Busted: 10 Big Data Myths Exploded
    • Is the cloud ready for speech APIs?
    • From machine learning to super clouds: Competing visions of cloud 2.0
    • Two great reasons for making your cloud data location aware
    • The most common cloud migration mistakes
    • How to prepare for the next cloud outage
    • The new shadow IT: Custom applications in the cloud
    • Drawbacks of running containers on bare-metal servers
    • How to reduce latency in public clouds
    • Mastering the art of container management
    • Hybrid Clouds: Here to stay, or stop-gaps to enterprise cloud?
    • How zero-trust security makes VMs more efficient
    • Ultimate virtualization: The end of infrastructure
    • 21 best orchestration tools for MSPs
    • Cloud governance: The key to effectively scaling your cloud
    • Update or rewrite? A cloud-application perspective
    • New views into cloud application performance
    • Multicloud vs. hybrid cloud
  • The Stories So Far....
  • About