I have been on a quest for many years to simplify and lower the cost of our very expensive cable TV, entertainment and Internet smartphone services. Given the above hardware configuration with multiple TVs without tuners, I had been in a quandary for years.
The Internet is stalking you. It is useful but it can become your worst enemy. As you now know, governments and corporations around the world expend vast resources and expense to spy upon your Internet use, phone conversations, email, GPS location and much more. Almost every facet of our daily lives are being scrutinized. Thousands of identity thieves, hackers, and criminal organizations are watching your Internet activity and installing malware on your Internet devices. You need my writing!
The Internet is Infected! The Ultimate Cyber Security Guide for Small Business and Home Computing!
If you find the information on this blog valuable you will find my upcoming three volume cyber security books infinitely more so! Visit my website at http://thatcybersecurityguy.com. My 8 years of research and 900 written pages are about much more than just cyber security as my writing presents valuable small business and general home computer knowledge. Visit me on Twitter @ThatCyberSecGuy. See the ACLU video "Invasion of the Data Snatchers" at YouTube to understand why you need my books and PDF files on the infected Internet.
Saturday, April 30, 2016
TV and Phone Plans from the past that we all have to get past!
I have been on a quest for many years to simplify and lower the cost of our very expensive cable TV, entertainment and Internet smartphone services. Given the above hardware configuration with multiple TVs without tuners, I had been in a quandary for years.
Friday, April 29, 2016
How we came to own 5 TVs, other streaming Internet devices, and how you might relate
Sunday, April 24, 2016
Cutting the Cable Cord, Confessions of a TV Addict with 5 TVs!
This series of ThatCyberSecurityGuy blog entries took years of experimentation, limited technology purchases over years of study, near death experiences, and a lot of dedication as life moved on during the recent years of our entertainment world’s revolution. As smartphones and other devices leave the PC and laptop world behind (somewhat), so has the streaming TV content world left satellite and cable TV behind! Years ago, for the most part, power hungry Plasma TVs quickly came and went. Less power hungry Liquid-Crystal-Display (LCD TV) were rapidly replaced with more energy-efficient and high-quality picture LED TVs. Writing and researching my book “The Internet is Infected!” for five years did not allow me the luxury to investigate TV entertainment technology to cut the cable cord before now. The truth is this cheap technology was not available back then and I was too busy launching my business, attending classes along with a multitude of other things. However, a major priority in the evenings, I would always set aside a few moments of fun time to just surf the web and read about the inconsequential entertainment options in hopes of cutting our monthly expenses and cable cord was a major priority! I’m happy to say, that moment has come at last! You can negotiate your download speed with an ISP.
Advantages:
- Significant savings, our bill for cable + Internet was $129 a month.
- Comcast Xfinity Internet Blast offered Internet download speed up to 150 Mbps for $60 a month.
- AT&T U-verse HSIA 75 was $35 a month for a 1-year term with a download speed of up to 75 Mbps.
- Wowway.com had $25 a month for a 30 Mbps download speed.
- Sling streaming service for $20 will give you access to ESPN and other channels that the other streaming services do not provide.
- Hulu streaming service for $12.00 a month, Hulu only streams in 720p.
- Netflix streaming service is $9.00 a month but it does not offer downloads. Content can be dated.
- Amazon Prime is $99.00 a year or $8.25 a month but that does include free 2-day shipping on orders purchased.
- Streaming will go in and out if/when your ISP has problems. You will find your devices losing reception more frequently than cable TV. To ensure that you can stream to your smart or Roku TVs you may need to pay your ISP for a maintenance plan. When the squirrels chew on the cable leading to your house you don’t want to face a $200 bill to have a service technician to replace that cable.
- Streaming requires a bit of configuration, work and initial set up of all your Internet devices. This leads to security concerns as the inclination is that once everything is set up to leave the status quo. The reality is that you should be changing your passwords at least once a year, but even I admit that I have not done that. Roku wanted a credit card and personal information for me to pay my Hulu bill, for example. If a hacker gets in there I’m in trouble. Same goes for Netflix and Amazon.
- Streaming devices require maintenance. The firmware and apps have regular updates. This can be annoying when you are settling in for the evening and just want immediate gratification. If you don’t have built in Roku or smart TV streaming you will have the added expense of purchasing these devices separately, which can be unsightly and require an extra cabling expense. However, cable TV devices, often require the same cabling.
- Without Internet devices such as computers, Smartphones, and Tablets you may miss such things as the latest sporting events, infotainment news from CNN, CNBC, FOX, and HLN. However, if you have a browser and Internet access there are usually other options for this type of viewing. For example, CBS made the Super Bowl available to a broad range of streaming devices without login. So yes, even after cutting the cable cord I could stream the Super Bowl to my Roku TV having the annual party or I could have traveled to my local American Legion hall or a sports bar to get rowdy with the folks.
- Netflix is the biggest streaming service in the United States. It has an amazing movie collection and catalog of TV titles, sometimes months old and a great selection of old films. It also has original content such as “House of Cards”.
- Amazon Video on Demand has over 75,000 of your favorite movies and hit TV shows. Amazon, like Netflix, has a good offering of old and new hits for movies but unlike Netfilx, it has for a price, more current U.S. TV shows including premium cable shows from HBO and Showtime for a price. It also has original content such as “Transparent, Alpha House, and Mozart in the Jungle” among others, which have not been as popular as “House of Cards”.
- Hulu Plus has a better selection of current TV shows than Amazon Prime and Netfilx, and carries some TV channel series that the other two do not. Hulu is the best way to watch shows from NBC, FOX and Comedy Central. You gain access to full seasons of shows instead of the last four of five episodes that cable “On Demand” offers.
- Giving up cable means losing ESPN and our favorite U.S. infotainment news channels but much of their content can be found online or at your local gym. If you are hankering for the latest news, the BBC at https://www.BBC.com for example has a lot of news you can stream for free if you want to read about the real things taking place in our world (other than Donald Trump and the endless coverage of the U.S. presidential election). Aljazeera America at http://america.aljazeera.com has a ton of relevant news that you can stream and read about world events. It was the best news channel I witnessed for real news while serving in Kuwait during the Iraq war and the only one we watched for real news. Then there is also http://www.npr.org where you can listen and watch a commentary and news on variety of topics anytime you want.
Friday, April 8, 2016
Apple's response to my commentary on privacy in support of their FBI stance!
________________________________________________________
March 27, 2016
Thanks for contacting us. We welcome your feedback on Privacy and Security. Apple strives to provide a positive experience to our customers. You can submit feedback here:
http://www.apple.feedback
Please be assured that Apple values the time and consideration that you invested in your email. Thank you for taking the time to share your thoughts with us..
Sincerely,
Apple Customer Care
________________________________________________________
No wonder Apple is one of the leading U.S. companies. Kudos to Apple!
Wednesday, March 9, 2016
The answer to why the FBI does not ask the NSA to break into the terrorist phone and demands Apple do it!
Therefore, in February 2016, the FBI asked for $38 million in funding to counter the growing use of encryption technology employed. This is a drop in the bucket compared to the estimated $52.6 billion dollar BLACK BUDGET. The U.S. BLACK BUDGET spans over a dozen agencies that make up the National Intelligence Program. The top five agencies, by spending:
The above information was taken from http://www.washingtonpost.com/wp-srv/special/national/black-budget.
Looking at the chart above, the requested FBI budget for 2016 is $8.48 billion. Some of the breakdown of that budget is as follows as taken from https://www.fbi.gov/news/testimony/fbi-budget-request-for-fiscal-year-2016, “The request includes a total of $8.4 billion for salaries and expenses, supporting 35,037 permanent positions (13,074 special agents, 3,083 intelligence analysts, and 18,880 professional staff), and $68.9 million for construction. Two program enhancements totaling $20 million are proposed: $10.3 million to increase cyber investigative capabilities, and $9.7 million to leverage Intelligence Community Information Technology Enterprise (IC ITE) components and services within the FBI.
The FY 2016 request includes the cancellation of $120 million from Criminal Justice Information Services (CJIS) excess surcharge balances and $91.4 million in non-recurred spending ($50.4 million in the salaries and expenses account and $41 million in the construction account).
Overall, the FY 2016 request represents a net increase of $47 million over the FY 2015 enacted levels, representing an increase of $88 million for salaries and expenses and a decrease of $41 million for construction.”
As you can see from the above numbers most of the FBI budget supports their 35,037 employees. Comparing their $8.4 billion dollar budget to the $52.6 billion dollar black budget leaves the FBI very limited resources to spend on cyber security and breaking encryption. Something U.S. taxpayers have to ask themselves is, with such a well-funded cyber security and encryption breaking BLACK BUDGET, why does the FBI need such underfunded and redundant cyber security expenditures?
Therefore, how does the FBI get around their lack of ability to break encryption when they are blocked from using the unlimited BLACK BUDGET cyber security/encryption breaking capabilities? They do so by asking U.S. companies to put in easy backdoors nullifying the encryption techniques being employed to protect data. Once those backdoors are leaked, the Russians, Chinese, criminals, and back hat hackers now have an easy path to get at the data stored on those devices. This results in a HUGE loss of intellectual property in the United States to other countries.
Ironically, the FBI states that preventing intellectual property theft is a priority for them. However, these engineered backdoors may have enabled the biggest theft of trade secrets and infringements on products that impact consumers’ data, health and safety, such as counterfeit aircraft, car, and electronic parts in U.S. history. The FBI even admits that much of theft takes place overseas, and costs U.S. businesses billions of dollars a year as well as robs the nation of jobs and lost tax revenues. In Fiscal Year 2011, federal agencies only made 24,792 intellectual property rights seizures valued at $178.3 million. (See: https://www.fbi.gov/about-us/investigate/white_collar/ipr/ipr, https://www.dhs.gov/topic/intellectual-property-rights)
Compare that trivial number to the 2013 report documented by the Huffington Post, which concluded that hacking costs the overall U.S. economy as much as 100 billion each year. That means we are countering 0.1783% of all intellectual property being stolen in the U.S. and to counter that threat, “U.S. companies are spending millions of dollars securing their networks, buying insurance and repairing their reputations after getting hacked.” (See: http://www.huffingtonpost.com/2013/07/25/hackers-jobs_n_3652893.html)
How much of those numbers that can be traced back to encryption backdoors is unknown. For example, a stolen cell phone of a corporate executive or integral employee may have given up a treasure trove of information such as corporate accounts and passwords that hackers exploited later. Another example is perhaps the personal information on a hacked phone gave a criminal the ability to blackmail a knowledgeable corporate employee. The possibilities for the invasion and exploitation of easy FBI backdoors to iPhones are endless and this is a rabbit hole that should not be opened when there are U.S. BLACK BUDGET options that can achieve the same results.
Friday, February 26, 2016
In interview after interview everyone is missing the point behind Apple's battle with the FBI
Folk's, I'm growing very tired of listening to radio and TV interviews that are all missing the point behind Apple's battle with the FBI. It is certainly about privacy but that is just the Tip of the Iceberg. Here is something for you to think about as NPR and others only put lipstick on the FBI pig!
About 10 to 12 years ago the government passed legislation to ensure that customers private, personal, and financial information, which is collected and manipulated by corporations, is to remain as secure as possible under penalty of prosecution.
Apple, in direct response to that concept, created an operating system that explicitly complies with the heart and soul of that mandate. As a result, Apple, itself, cannot even access that data on the person's device, a phone.
The government has now mandated that Apple violate that principle by writing code against that security which, after it is written, has no reasonable guarantee that such code would remain under the control of responsible users. The case in point is Edward Snowden, who the NSA thought would not violate the secrecy of the NSAs violation of data gathering without due process.
If the government (NSA) cannot protect its own dirty secrets (The Atom bomb, the Hydrogen bomb and so on), how will the government (FBI) protect the code they had the courts mandate to be written? How is Apple going to protect itself from prosecution when that release ultimately happens? Catch 22.
Even if Apple is not ever prosecuted does every United States citizen want to surrender all the data they store on their smartphones to the Russian mafia or the Chinese syndicates? This last sentence is something you won't hear any radio or TV interview mention!
Thursday, February 18, 2016
Apple fights an unprecedented battle! The U.S. government threatens what is left of the security and privacy of every U.S. Citizen!
Taken from my book:
On July 11, 2014 in an interview with the Guardian, William Binney, a 30-year veteran of the intelligence community stated the following as fact; "At least 80% of all audio calls, not just metadata, are recorded and stored in the US… At least 80% of fiber-optic cables globally go via the US… This is no accident and allows the US to view all communication coming in... The NSA lies about what it stores… The ultimate goal of the NSA is total population control…" William Binney resigned from the NSA on October 31, 2001 because he was disgusted by Washington's move towards mass surveillance. The difference between Binney and Snowden was his high rank and that he did not take any documents as proof with him. From that time forward, he has been an outspoken critic of the NSA's unnecessary mass surveillance stating, "it's better than anything that the KGB, the Stasi, or the Gestapo and SS ever had!" He likes to mock the NSA by pointing out such things as how the NSA's mass gathering of data did not stop 9/11, missed Russia's intervention in Ukraine, the Islamic States' take-over of Iraq and has stopped zero terror attacks inside the US. Because of his vocal criticism he has been persecuted with investigations, had his home raided by the FBI who also took his computer and backup disks, had his security clearance revoked, which forced him to close a profitable $300,000 a year business and spend $7,000 on legal fees. In his Guardian interview he laid down the gauntlet by saying, "There are no other views for the judges to consider. There have been at least 15-20 trillion constitutional violations for US domestic audiences and you can double that globally. I call people who are covering up NSA crimes traitors." Binney expressed publically on CBN in July 2014 that the ultimate goal of the NSA is total population control. He also stated that Internal Revenue Service has "direct access" to the NSA's domestic spying data and was likely using it to target the tea party. (See: http://www.theguardian.com/commentisfree/2014/jul/11/the-ultimate-goal-of-the-nsa-is-total-population-control, http://www.cbn.com/cbnnews/us/2014/August/Whistleblower-NSA-Goal-Is-Total-Population-Control)
- GnuPG - The core; this is the actual encryption tool.
- Kleopatra - A certificate manager for OpenPGP and X.509 (S/MIME) and common crypto dialogs. (See: http://docs.kde.org/stable/en/kdepim/kleopatra/kleopatra.pdf)
- GPA - An alternative certificate manager for OpenPGP and X.509 (S/MIME).
- GpGOL - A plugin for Microsoft Outlook 2003/2007/2010/2013 (email encryption).
- GpgEX - A plugin for Microsoft Explorer (file encryption).
- Claws Mail - A complete email application with crypto support.
- Gpg4win Compendium - The documentation (for beginner and advanced users), available in English and German.
You have it within your power to turn back these draconian invasions into our privacy. Support Apple in their fight for your privacy. Encryption is simply a method of encoding information that makes it more difficult for someone to view if our files or messages are intercepted. Mankind has been employing, developing and using encryption for thousands of years, and it is time we all do so safely when using our infected Internet. Encryption seems like a lost art to the common person, but it need not be. This skill is mandatory to develop to be able to survive in today’s digital world. If you want to keep the data that you exchange with your business partners or family secure, it is essential that you master this skill.
Tuesday, December 29, 2015
Cleanup your Disk Files and Backups with CCleaner Duplicate File Finder
What I found was I had many duplicate files on my newly upgraded Windows 10 computer. Once upon a time I had stored files on cloud drives such as SpiderOak and Windows Live Mesh. Mesh was deprecated and replaced with OneDrive and SpiderOak became unusable after I accidentally went over my 2GB storage limit. I also had copied files to various directories on my computer, which also created duplicates. Working with other people, such as my artist and editor, I had created many revisions of files. These important files were still stored on my local computer hard drive, my backups, and USB drives. In the past, I would bring up multiple copies of Windows Explorer (now called File Explorer avoiding confusion thank god in Windows 10 as I teach classes on Windows 7!) and try to root out and destroy duplicate files. As you can imagine this was incredibly time consuming and proved ultimately to be an impossible task.
For many years I have been using and advocating that everyone using Windows install and use the free (or paid for) Piriform CCleaner tool. (See: http://www.piriform.com/ccleaner) I use it to cleanup temporary files, wipe out cookies, look at startup files and more. However, when I embarked on my disk file cleanup project I discovered the CCleaner also has a Duplicate File Finder tool. This tool proved to be a quick and easy way for me to find all of those old duplicate files that were in my Mesh, SpiderOak and backup directories. It made the elimination of all those duplicate files on my hard drive, backups and USB drive possible. Try it out and I bet you will be surprised to discover how many duplicate files you have on your devices.
WinMerge Large File Compare Work-A-Round
What is cool that now WinMerge will work with all files enabling you to clean up all your backups!
Wednesday, December 9, 2015
Merge the files on your hard disk, cloud drive, USB drives and backups with WinMerge.org open source software
Wednesday, October 14, 2015
How to upgrade Windows 7 to Windows 10 Safely
Advantages:
- In my book, “The Internet is Infected!” I wrote extensively about how to use VMware Player and VirtualBox to install and load up Windows 7 with virtual Linux OSs. Windows 10 comes with a built in Hyper-V virtualization solution that may be better. I will blog about Hyper-V in the future when I can find time to try it out with some Linux installs.
- Windows 10 comes with a built-in email app that was as easy to setup as inputting your email address and password. I tried it with Yahoo, Outlook and Gmail, and it worked perfectly for all three.
- I only have a few third party applications installed but there is a noticeable performance improvement over Windows 7. My very old HP-dv6t laptop is screamingly fast.
- Windows 10 comes fully integrated with Windows Defender and Windows Firewall. Windows Defender uses real-time protection to scan everything you download or run on your PC. In Windows 7 we had to install and update Microsoft Security Essentials. If you prefer other more highly rated antivirus software Windows Defender will turn itself off when you install another antivirus app alleviating the concern of conflicting antivirus software running.
- Windows 10 is fully integrated with Microsoft’s OneDrive cloud storage. Your OS is automatically set up for it when you log in with a Microsoft Account. In my case I set up/logged in to Microsoft’s new email app and OneDrive was available. It is as easy to use as drag and drop using the Windows 10 “File Explorer”. If you right click on the OneDrive icon in the notification area, you can select Settings and do things such as select folders to sync, access your files remotely and more. OneDrive is offering a whopping 15 GB of storage which is more data than most of us can produce in our lifetimes! (See: https://en.wikipedia.org/wiki/OneDrive)
Disadvantages:
- While I’m still learning the Windows 10 start button, if you can call it that, it does not appear to be very configurable. There are too many options/links presented there to be able to sift through quickly. For example, in order to make more of a profit, it looks like Microsoft is guiding users to Grove Music, The Weather Channel, Movie and TV, their Store, and so on. If I want these things I will add them myself, I don’t need them in my face all time on the menu. The menu should be what is available to run on the computer and not about what is on the Internet; that’s why we have browsers to do that sort of thing. However, they can be manually removed.
- I mentioned the privacy concerns above. In this release, Microsoft is sharing more information about your computer and what you are doing with it in this release.
- There is no way to disable automatic updates. With Windows 7, I had control over when I would expose my computer to Internet and update the OS. I usually did this late at night while watching Netflix. Now when I am using a hotspot Microsoft will announce to the hackers my computer is connected and polling the Internet for updates. This is very disturbing!
________________________________________
My laptop was running a loaded up version of Windows 7 Premium. Sometime after the July 29, 2015 release of Windows 10, I registered the laptop for an upgrade to Windows 10. As with all Microsoft releases I waited a few months to see if there were any major problems with the 10 release. All the articles I have read have praised Microsoft for a smooth rollout of Windows 10 and its new interface.
Because Windows 10 had addressed many of the complaints I had heard about in Windows 8 and 8.1, I wanted to take the plunge and upgrade my laptop. I registered it and attempted the upgrade to 10. The upgrade failed so I examined the event log, searched for the error code on the Internet and tried various fixes. The Microsoft community recommended the usual stuff such as:
- Turn off my antivirus (which was Security Essentials)
- Make sure the computer is not configured for a proxy
- Turn off all services except the Microsoft services
- Open a command prompt with “Run as Administrator” and type “sfc /scannow”
- Manually reset the Windows Update process
- Delete the C:\$Windows~BT folder and everything in the download folder
Therefore, I decided to change strategies. I used an old hard drive for my laptop that I swapped with my Windows 7 drive, zeroed it and loaded it up with a fresh install of Windows 7 Ultimate. I applied all system updates and left the Windows 7 OS as clean as possible. (NOTE: You have to have SP1 installed) I was hoping I would not have to upgrade to 10 by having a clean version of Windows 7. I downloaded Windows 10, burnt the ISO file to a DVD and attempted to do a clean install. (See: https://www.microsoft.com/en-us/software-download/windows10) The install prompted for a Windows 10 license key so I tried my Windows 7 keys. I had no luck there so I was stuck with doing an upgrade which I was adverse to do.
To do an upgrade:
- Activate Windows 7 (required to upgrade, which is unfortunate. It is always nice to see if things are going to work before burning a new Windows OS activation).
- Log in to Windows 7 as administrator.
- Run the “setup.exe” from autoplay or from the DVD drive.
- On the “User Account Control” confirmation box, click Yes to continue. Windows will prepare the files for installation.
- On the “Get important updates” window, make sure that the “Download and install updates” radio button is selected.
If you want to do a clean install there is hope. There is an excellent article at http://arstechnica.com/gadgets/2015/07/how-to-do-a-clean-install-of-windows-10-from-windows-7-and-8/ that describes how to do that in a two-step process. It is fairly straightforward and requires an upgrade, creation of a Window 10 install DVD, and then a reinstall of Windows 10 which is pretty slick. After purchasing a new terabyte SSD for my old laptop I chose to use this option. The results were pronominal! A clean install that for my old laptop turned it into a Ninga warrior. I highly recommend this upgrade option.
You may also want to burn a reinstall Windows 10 DVD for your current computer which the article above describes how to do. Unfortunately, with that DVD this license key may only work on your current hardware with that DVD. Other computers with different hardware will likely require my procedure outlined above.
When you are done and the Windows 10 OS is stable you may want to clean it up (See: http://windows.microsoft.com/en-US/windows7/How-do-I-remove-the-Windows-old-folder).
- Open Disk Cleanup by clicking on the Start button, In the search box, type Disk Cleanup, and then, in the list of results, click Disk Cleanup. If/when prompted click on the drive where you just installed/upgraded to Windows 10.
- In the Disk Cleanup dialog box, on the Disk Cleanup tab, click on Clean up system files. Once again, choose the drive you just upgrade to Windows 10.
- Select the Previous Windows installations(s) check box, and any other boxes for the files you want to delete, and then click OK.
- In the dialog message that appears, click Delete Files.
Wednesday, September 9, 2015
Upgrade the Samsung Galaxy S2 SGH-T989 to the Jelly Bean OS
When you visit https://www.samsung.com/us/kies you will see two versions of Kies to download so make sure you get and run the Kies installation software built for your phone. In my phone's case, I needed Kies 2.6, which provides support for devices launched before September 2013. I renamed the file Kies2.6Setup.exe and then downloaded the Kies3Setup.exe file so I could also work on my wife's Samsung Galaxy S4 phone later. No matter what you see on the Internet, Kies is your one stop shop in which to use a USB cable:
- Keep your device updated to the latest software updateTransfer photos and videos to your PC
- Master your music library if you have one
- Backup important content from your device such as contacts, text messages, etc.
- If you choose to perform the following procedure, make sure:
- Your phone is FULLY CHARGED
- The weather outside is AOK
- Your Internet connection is flawless and pray that once you start it does not go out
- Make sure all applications on your computer, except Kies, are not running
- There is nothing (animals, kids, wife, yourself) that will touch your computer once the update starts
- Don't open any menus or press any buttons on your computer, external hard drives, etc.
- Don't accept any phone calls or use the call button on your phone
- Do not connect any other devices to your computer such as MP3 players, cameras, etc.
- Make sure the cable cannot become disconnected by anyone or anything
- You see the update successfully applied screen at the end after a very long time
- Software update for SGH-T989 successfully completed.
- Device will now restart.
- Disconnect and reconnect the cable. OK
Congratulations, you now have an old/new phone that you will have to learn how to navigate and use all over again. However, all that it cost you was your time and not another $700 out of pocket! Plus, now you can now brag to all your geek friends how you upgraded your phone to Jelly Bean.
Friday, August 28, 2015
How to Update the software to Jelly Bean on a T-Mobile Samsung Galaxy S2 SGH-T989
- A rooted device may cause updates to fail, unstable mobile phone operation, and/or other problems.
- It is recommended to use an official Samsung USB cable.
- Please fully charge the battery of the mobile device.
- Please back up your data.
- Please do not open any menus by pressing any buttons.
- Do not connect any other mobile device (MP3 players, cameras, external hard drive etc.) to the PC.
- You cannot use the call function.
- Please do not disconnect the cable until the update is complete.
Saturday, July 18, 2015
Switching your Samsung Galaxy phone to a new carrier, the new AT&T GoPhone plan!
After a lot of research I decided on the AT&T GoPhone plan.
- 4G LTE speeds on the AT&T network
- No annual contract, no credit check
- Easy activation
- Great plan choices to fit your needs
- Convenient and flexible - Renew your service when you need it for up to one year after your plan expires
- Variety of refill card plans at Walmart from which to choose
- Once plan is established you can purchase refill cards at any AT&T store easily with credit card or pay online
- If the device is financed using T-Mobile’s Equipment Installment Plan (EIP), all payments must be satisfied and the device must be paid in full.
- If the device is on an account that is under a service contract term, at least 18 consecutive monthly payments must have been made or the account has migrated to Simple Choice no contract rate plan.
- If the device is associated with a canceled account, the account balance must be zero, including all pending charges.
- T-Mobile may request proof of purchase or additional information in its discretion and certain other exceptions may apply.
How To Setup your Windows 7 VPN Client to use at Hotspots Everywhere
Click on Start > in the search bar type VPN and then select Set up a virtual private network (VPN) connection.
In my book we set up an SSH server; we learned that most ISP's assign a DHCP IP address to our cable modem. This means that this IP address can shift from time to time. Therefore, I showed you how to set up your router to use http://dyn.com to set up a domain name and automatically update your router whenever your IP address changes. This used to be a free service but now you will have to pay a nominal cost to maintain a domain name that will always keep you pointed at your local network. We did this so that whenever we are at some other place in the world our shifting IP address never prevents us from connecting to our network.
In the Create a VPN connection dialog enter your Internet address: that can be a domain name or the IP address of the router or server to which you want to connect (e.g. yourdomainname.dyndns.org). If you're connecting to a work network, your IT department will provide you the address, username and password to use.
The Destination name: field is how you have to identify the connection so it can be resolved on your local network. The destination name is your VPN server computer name that you made note of while setting it up. The default, which is "VPN Connection", must be overridden with your VPN server's hostname.
At the bottom are three options from which you are to choose. Check Use a smart card if you are using one > if this is your laptop or you share it with others check Allow other people to use this connection > if you want to set up the connection, but not connect, select Don't connect now;… otherwise, leave it blank, Next. I recommend that you never select Don't connect now, as you will have to go back, experiment and reconfigure everything if it does not work the first time you try to connect.
On the next screen, you can either put in your username and password or leave it blank. You'll be prompted for it again when you establish the actual connection. For convenience, enter both and check Remember this password. If your Internet device is ever lost or stolen you can easily and quickly delete the server VPN connection information. Click on the Connect button at the bottom and the Connecting to VPN server name… screen will appear. If you are successful you should see the You are connected message which means you have a working VPN connection.
To connect, click on the Windows network logo on the lower right part of your screen, then select Connect under VPN Connection.
In the Connect VPN Connection box, enter the appropriate domain and your login credentials, and then click on the Connect button.
To delete your client VPN connection:
1. Bring up the Network and Sharing Center.
2. Click on the Change adapter settings link on the left pane.
3. You will then see the adapters and the VPN connection, right-click on the VPN connection and select Delete.
To use your laptop remotely at a hotspots in the future, click on the network icon on the lower right of the task bar and pick the client VPN Connection that we just configured > click on the Connect information and enter your username and password.
Disabling your VPN Connection when it is not in use
When you are not on the road and just using your local network, you should disable your VPN connection. You can do this by telling your router not to forward incoming connections to your Windows VPN server or by deleting the connection from your VPN server. To delete the connection right click on the Start button > in the Search box type Network and Sharing and click on Network and Sharing Center or right click on the desktop Network icon and arrow down to select Properties > on the left, click on Change adapter settings > right click on the Incoming Connections network connection and arrow down to select Delete, Yes.
The other option is to disable the connection in your router by logging in and clicking on the Advanced tab at the top > click on Advanced Setup > arrow down to select Port Forwarding / Port Triggering and delete the VPN-PPTP port 1723 service forwarded to your VPN server.
Troubleshooting your Windows VPN Connection Setup
You will find the procedure and steps above detailed at Microsoft, as well as at many websites and blogs. I often wonder if these authors actually get their VPN connections working or just say that they do. After following the detailed steps above, unfortunately for me, when I attempted to connect to my VPN server I received the following message:
The "Connection failed with error 800" message indicates that your connection is unable to reach the VPN server behind your router and/or software firewalls so you have to start eliminating the usual suspects. First try disabling the Windows firewall on your VPN server by clicking on Start > Control Panel > select the Windows Firewall icon > on the left click on the Turn Windows Firewall on or off and disable your Windows Firewall.
If that does not work, make note of your cable modem IP address and try taking your router out of the loop. Hook your cable modem directly to the local VPN server and travel to a nearby hotspot to try to connect to your VPN server via your cable modem's IP address.
Try to connect multiple times so that if your VPN server is rejecting your connection it will be reflected in its event logs, this will provide irrefutable evidence that your remote connection never made it to your VPN server. Log in and view the VPN server event logs by clicking on Control Panel > select Administrative Tools > select Event Viewer > under Windows Logs click on System and examine your errors & warnings. If, for some reason, you do not see any messages indicating that your Windows VPN server rejected a connection for some reason you will have to look elsewhere for the problem. In my case, when trying to establish a VPN connection from my client laptop it was:
Connecting to domainname using 'WAN Miniport SSTP'…
Connecting to domainname using 'WAN Miniport PPTP'…
After viewing the VPN server event logs it was obvious that the VPN client connection never even made it to the server, so what to try next? Bypass your cable modem and router and just try connecting to your VPN server using its local network IP address (e.g. 192.168.1.x). Hopefully, this will solve your problem or at the very least you will get yourself one step closer to getting a working VPN to use at hotspots. In my case I got the following error message on my VPN client:
"Error 720: A connection to the remote computer could not be established. You might need to change the network settings for this connection."
I looked at the VPN server event logs and at last found an error message at last indicating that it was rejecting the connection, "CoId={CB8A5A38-787F-4EEF-A931-D0232ADB8A21}: The user asuscrosshairv\User connected to port VPN3-1 has been disconnected because no network protocols were successfully negotiated." When scouring the Internet for a solution, I found the answer at http://www.chicagotech.net/VPN/error720b.htm, which described this as a weird problem that may arise due to a Protocol issue on the remote computer. This explanation is not very scientific but to establish a VPN connection I had to perform the following steps on the VPN server, right click on the Network icon on the desktop arrow down to select Properties, which will open up the Network and Sharing Center > on the left menu click on Change adapter settings > right click on Incoming connections TBD… > click on the Networking tab at the top > double click on Internet protocol version 4 (TCP/IPv4) >tick Specify IP address and type the IP range values that includes your remote device local network and later your cable modem IP address from your ISP, OK.
After performing these steps, I at last had a VPN connection at last via my local area network. The next step is to change the Internet protocol version 4 (TCP/IPv4) IP addresses to the address range of your cable modem and attempt to connect from a hotspot.
Web pages I looked at to research and put together this blog entry:
http://lifehacker.com/5900969/build-your-own-vpn-to-pimp-out-your-gaming-streaming-remote-access-and-oh-yeah-security
http://www.howtogeek.com/135996/how-to-create-a-vpn-server-on-your-windows-computer-without-installing-any-software/
http://power-byte.wonderhowto.com/how-to/mastering-security-part-2-create-home-vpn-tunnel-0130261/
http://www.pcworld.com/article/2030763/how-and-why-to-set-up-a-vpn-today.html
http://technet.microsoft.com/en-us/library/cc733803%28v=ws.10%29.aspx
Tuesday, January 20, 2015
What is "No Fault Insurance" and how are you protected?
- If you are injured in an accident, PIP will cover all medical costs. If you injured and cannot work or are killed PIP will cover up to 85% of the income that you would have earned for up to three years. The phrase "up to 85%" is capped at a fixed amount, which changes every year. Effective 10/1/13, the maximum was set at $5,282 a month. There is also a $20 allowance to pay for household services that you can no longer perform because of the accident.
- No-fault is required to provide up to $1 million for any damage that the owner's car does to another person's property, such as houses, trailers, buildings and fences. It will also pay for damage that your car does to another person’s properly parked vehicle, but it will not pay for any damage to cars in a moving accident or for an improperly parked car.
- The Residential Liability Insurance protects the driver from being sued in the event of an auto accident, except in many special circumstances that will vary from No-Fault state to No-Fault state. In Michigan, the exceptions include when someone is killed, seriously injured, or permanently disfigured; if you are in an accident with a non-resident who is an occupant in a vehicle not registered in Michigan; you are in an accident in another state; if you are more than 50% at fault in an accident with an uninsured vehicle up to $1,000.
- Now the question became what could be done about the deductible on my claim? Because we were friends a check passed hands covering my cost, end of story, but what if you are not so lucky?
- If you can get the insurance company information from the "at-fault" driver who struck your parked car, you can get their insurance company to pay for the repairs and no deductibles would be involved. Your car would be fixed with nothing out of pocket for you.
- If you have "Standard or Broad Collision" you can have your insurance company pay for the damages, less your deductible.
- Have the person who hit your car pay to have it repaired.
If you can prove that someone stuck your properly parked car, that someone is liable for the full amount of the damages to your car even in a no-fault state. If the other driver doesn't have insurance or lacks the appropriate coverage, you can sue them for damages. If you have collision coverage you may want to leave it up to your insurance company to pursue them for damages as you can go after your deductible in small claims court if it is $1,000 or less. The sad news is that in small claims court, even if you get a judgment in your favor it does not necessarily mean that you will collect and there is a lack of recourse in the U.S. that you can pursue without great expense.
In a moving accident, if the other driver has no-fault insurance and is proven to be over 50% at fault, you are very limited in what you can get back in court. In most no-fault states, if all you have is a deductible to cover, you can certainly sue to have them cover up to $1,000 in most no-fault states. Michigan law has a "mini-tort" provision in their no-fault law that allows the victim to collect up to $1,000 in damages from the "at fault" driver. (See: http://www.michigan.gov/documents/cis_ofis_ip202_25083_7.pdf)