Happy International Data Privacy Day!

In 2009 the U.S. Congress decided to recognize Data Privacy Day for years in the future (nationaldaycalendar.com).  We appreciate a day to promote privacy.  We are in the works to support encrypted email on this website.

Data Privacy Day “is celebrated every January 28 and is an international effort to promote the importance of data privacy” (taken from https://www.us-cert.gov/ncas/current-activity/2017/01/24/Data-Privacy-Day-Events).  It started when Convention 108 was signed on January 28,

 » Read more..

List of Cryptocurrency Accessories

List of Cryptocurrency Accessories
Ethereum – Gold Plated “Cryptocurrencies You Hold”
Gold Ripple – “Cryptocurrencies You Hold”
KeepKey: the Simple Cryptocurrency Hardware Wallet
Ledger Nano S Bitcoin Wallet Bundle With VUVIV Micro-USB Adapter and USB-C Adapter for MacBook (3 Items)
Ledger Nano S Cryptocurrency Hardware Wallet
Ledger Nano S – Cryptocurrency Hardware Wallet With MintCell Magnetic USB Cable and Cable Tie
Trezor Bitcoin Wallet black
Trezor bitcoin wallet white

 » Read more..

List of Bitcoin and Other Cryptocurrency Books

List of Bitcoin and Other Cryptocurrency Books

The Age of Cryptocurrency: How Bitcoin and the Blockchain Are Challenging the Global Economic Order
The Bitcoin Big Bang: How Alternative Currencies Are About to Change the World
Bitcoin: Everything You Need to Know about Bitcoin, how to Mine Bitcoin, how to Buy BTC and how to Make Money with Bitcoin.
Bitcoin for Dummies
Bitcoin From Beginner To Expert: The Ultimate Guide To Cryptocurrency And Blockchain Technology
Bitcoin Rebellion – the Beginning
Bitcoin: The Ultimate Guide from Beginner to Expert: Bitcoin and Cryptocurrency
Bitcoin: The Ultimate Guide to the World of Bitcoin,

 » Read more..

How Do You Troubleshoot a Car Alarm Remote Control Device (aka Key Fob)?

Problem scenario
Your remote control to the car alarm (aka key fob) is not working reliably.  You need to get into your car or at least disarm the the alarm on-demand.  How do you get the keyless entry device (or the alarm remote control or key fob) to work reliably to it will deactivate or activate the alarm when you need it to happen?

Solution
Possible solution #1
Tighten the screws in the back or the side. 

 » Read more..

A Long List of Computer Forensics Books

5 Important Facts You Need to Know About Computer Forensics by Trisha Halfacre
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory by Michael Hale Ligh, Andrew Case, Jamie Levy and  AAron Walters
The Basics of Digital Forensics, Second Edition: The Primer for Getting Started in Digital Forensics by John Sammons
Computer Forensics by Marie-Helen Maras
Computer Forensics and Cyber Crime: An Introduction (3rd Edition) by Marjie T.

 » Read more..

A List of E-Discovery Books

Cloud Computing and Electronic Discovery (Wiley CIO) by James P. Martin and Harry Cendrowski
E-Discovery and Data Privacy: A Practical Guide by Catrien Noorda and Stefan Hanloser
E-Discovery and the Federal Rules of Civil Procedure: A Pocket Guide by Bradley Schaufenbuel
E-discovery: Creating and Managing an Enterprisewide Program – A Technical Guide to Digital Investigation and Litigation Support by Karen A. Schuler
e-Discovery: Current Trends and Cases by Ralph C.

 » Read more..

Comprehending Being Sued for Online Postings (e.g., Frivolous Libel Lawsuits)

Worried about being sued for something you posted online?  You may need to educate yourself about the risks.

American citizens may want to understand the context of online defamation by buying Be Careful Who You SLAPP by Delfino and Day.  To learn about strategic lawsuits designed to silence people in the USA, there is no better book than SLAPPs: Being Sued for Speaking Out by Rock Pring.  For British citizens or those interested with English law,

 » Read more..

How Do You Protect Your Privacy When You Are Traveling?

Updated on 1/1/18

Problem scenario
You want to travel and protect your privacy.  You use a cell phone, smart phone, and/or laptop like anyone else.  What can you do to enhance or preserve your privacy?

Solution
There are three parts to this solution.  The first part involves items you would bring with you.  The second part is for items that help secure your home when you are away. 

 » Read more..

How Do You Transfer Data without Using Network Connectivity from a Smart Phone or Tablet to a USB Stick?

Problem scenario
You have a smart phone (iOS, Android, BlackBerry, Microsoft Lumia, Windows 10 Mobile, or Windows Phone etc.) and you have a limited data plan.  You want to copy over (or bring/move) files (e.g., numerous photos).  The problem is that you do not want to use hundreds of megabytes of data from your roaming MiFi/3G/4G monthly plan.  It takes a great deal of manual labor to select the files and then transfer them (e.g.,

 » Read more..