special ucs ces 2009 report

Transcription

special ucs ces 2009 report
ISSN 1061-5725
This Month’s Presentation
Volume 27, No. 1
January2009
SPECIAL
UCS
CES 2009
REPORT
www.ucs.org
This Month’s Meeting:
Wednesday 14th at 7 pm
Check Out the
Introduction to
GhostSurf
Platinum
On Page 4
And The Review
on Page 11
Fond Memories:
Guess Which Year?
Utah’s Award Winning Computer Magazine!
™
By Cliff Millward, Editor
[email protected]
Old Stuff?
I hesitate to write my column this month because at
this month’s meeting, members will be telling you the
“latest and greatest” about CES. My information may be
“old stuff.” However, I will cite a few items.
Browser Stats
From January to December, last
year, the browser market share/usage
changed:
* IE, down 7.32 percent
* Firefox, up 4.36 percent
Recent
Trends
* Safari, up 2.11 percent
* Chrome, up 1.04 percent
However, don’t depend on these figures. Many users have multiple browsers, so usage counts more than
“Marketshare.” What browser(s) do you use?
I have not attended any Vegas function since I was
denied a press pass. I don’t know why as I am editor of
this publication and The Point, the American Federation
of Teachers State Publication. Somehow I must be on a
“persona non gratis” list. Once you are on one of these
lists, it is difficult to get yourself removed.
I would love to go to these shows, but I am not young
anymore and must rest occasionally. There are almost no
places to sit down at the show. However, the press rooms
have couches to relax upon, but I am denied entrance to
them, so I don’t go anymore.
Just My Cups of Tea
Seagate Technology improved the storage for disk
drives recently by announcing shipments of a drive that
features a single-platter 500GB disk. They also announced
a 3.5-inch, 7200-rpm drive that packs 1TB of data on two
disks. The drive’s Serial ATA interface delivers a data rate
Page 2
of up to 160MB per second. The new Barracuda features
perpendicular magnetic recording. A one TB single platter should be available in about two years. (I don’t know
if I can “drink” that much T.”
Obama Hackers
President-elect Barack Hussein
Obama successfully used the internet in
the last election, but it has attracted some
unsavory characters.
Some hackers are sending out spam
claiming to be a video showing an interview with Obama and his advisors. The
video is an .exe file (Ed. Note: never click
on an .exe file unless you are sure it is
“clean”) that is actually a Trojan. Clicking
on it downloads the Trojan. Unfortunately, some major
anti-virus programs are not detecting it!
The Trojan steals online banking credentials, and
opens up a backdoor and downloads another piece of
code that lets it track what the user does. The Trojan uses
“fast flux,” a technology that changes to a new server if
the current one is blacklisted.
They are usually east to identify because they use
very long domain names
IBM Looks at Small Things
IBM and Stanford University have created a microscope that, with further development, could give 3D
images of proteins.
The imaging technique can peer below surfaces of
cells without damaging organic material, according to
IBM.
…so much for hiding behind molecules. My DNA can
be researched to build clones (that’s good??)
Finè
Blue Chips Magazine —January 2009
Blue Chips
Magazine
“Utah’s Award Winning Publication”
Magazine Staff
Editor — Cliff Millward
Review Program Liaison — James Alexander
Review Product Editor — Donna Nendell
Review Editor/Product Recruiter — Don Nendell
Photography — LeRoy Johnson
Proof Reader — Larry Lamph, Doug Jackson
Advertising Rates
Ad costs 2 Page Spread Full Page Half Page Quarter Page Business Card 1 month $150
$100
$50
$25
$15
3 months $400
$275
$130
$70
$30
6 months $700
$500
$250
$130
$60
Charter Member of the
Association of PC User Groups
955-9633
250-2269
565-9594
565-9594
12 months
$1200
$900
$450
$225
$120
Full page size is 7½ x 10 inches. All other page sizes are based on a 7 x 10
inch page in order to conform to editorial style. Half-page ads may be 7 x 5 inches
or 3½ x 10 inches. Quarter-page ads are 3½ x 5 inches. Business card ads are 3½
x 2½ inches.
Classified Advertising
Utah Blue Chips members may place personal classified ads at no charge.
Maximum ad size is 7 lines, 35 characters per line.
Submissions
Members are encouraged to submit text articles for publication in ASCII
text only. Photos in .TIF or .JPG format only. Line graphics, tables, in almost any
vector or .TIF format. Do not imbed graphics or tables in text files. All articles
must be received by the 15th of the month preceding the month of publication. All
articles become the property of the Utah Computer Society and by submitting an
article, the author gives permission for the Blue Chips Magazine Staff to edit the
submission. The author also gives permission for republication in other users groups’
communications.
Officers and Trustees
Eve. Phone
E-mail
President, Stuart Gygi
V. Pres., Larry Lamph
Secretary, Lowell Kenedy
Treasurer, John Witzel
Doug Jackson
576-1891
571-2908
278-3035
296-1390
322-2337
[email protected]
[email protected]
lkenedy@ucs,org
witzelj@ucs,orgtt
[email protected]
Information
Persons or companies may join or renew at the meeting, or by sending a check payable
to the Utah Computer Society to:
Utah Computer Society
Membership Secretary
5435 Riley Lane
Murray, Utah 84107
Individual memberships are $25/year.
Business Memberships are $35.00 a year.
Corporate sponsorships are available at two levels. Corporate Sponsors enjoy all benefits
of membership including multiple individual membership and prepaid advertising coverage.
Contact a Board Member for more information.
Other important information:
Permission to Copy
Permission is granted to other nonprofit PC user groups to reproduce any
article published in this newsletter, provided credit is given Blue Chips Magazine
and the author (s) of the reproduced materials. Reprinted articles are subject to the
terms of their respective copyright holders.
Meeting Information
Group Business (James Alexander)
Magazine (Cliff Millward)
Web Site
WebMaster
Membership (evenings) (Bob)
MONTHLY MEETING LOCATION
2nd Wednesday of every month
January
Renewals
Glen Guiver
Frank Herriott
Larry Lamph
University of Utah, Union Building, 7:00 p.m.
Page 3
Blue Chips Magazine —January 2009
http://www.ucs.org
250-2269
955-9633
http://www.ucs.org
262-6045
262-6045
Page 4
Blue Chips Magazine —January 2009
Introduction to GhostSurf Platinum Review
Security-Related Report
By Don Nendell
“Happy New Year Everyone!”
Prolog
I trust that you all have sufficiently
recovered from Xmas and the merriment of New Year’s Eve. Donna and I
sincerely hope and pray that all of your
“Resolutions for 2009” actually do come
true for you and yours - this time!
A votre santé!
Seeing that
“bubbly” graphic
somehow, and for
some strange reason, or other,
brought out
“long forgotten” memories of my
more rowdy USAF flying days, drinking
nights, and throwing empty glasses into
the Officer’s Club fireplace. As a result,
“I’m feel’n my Cheerios,” today.
Both of these thoughts are dating me,
that’s for sure. Must be the New
Year, surely?
Segue to Today
After seeing the
eWeek Magazine The
Year in Review (December 15, 2008) issue,
I got to thinking - strange
as that may seem - that one “critical
area” of my previous 57 BCM “Security-Related” Reports and Reviews
I haven’t covered to date is “Surfing
the Internet Anonymously.” What
really brought this front and center,
however, was an “unopened” shrink-
wrapped box of Ghost Surf Pro that,
somehow, was just lying there on my
side desk simply crying for me to open
up, and slip silently into “action?”
Sir Arthur Conan Doyle said, “There
is nothing as deceptive as an obvious
fact.”
With interest definitely piqued, I
decided to find out how far Ghost Surf
Pro was out
of date; yikes
vintage 2002.
But, it says it
works for XP,
so all isn’t
lost after all, I
could still use
it on my “main
squeeze” PC,
Page 5
Blue Chips Magazine —January 2009
Security Report
that malicious XP I keep yapping about
(HIAWP).
With a guilty conscious, I started
right away checking out the lineage
of Ghost Surf (~) revisions: ~Pro,
~2005, ~2006, ~2007, and ~Platinum. Pretty impressive! OK! I’m only
four (4) versions out of date. Not really
so bad, but certainly not all that good.
Then I started my deep Internet
search on a subject that I am familiar
with from having previously attended a
goodly number of DEFCON’s and Black
Hat Briefings, but had no experience
using first-, second-, or even, off-hand.
Whoa! This is actually turning out to be
quite fascinating. I should have done all
this way back in 2002 with Ghost Surf
Pro. “But better late than never,” I murmured under my breath. And, it most
definitely deserves a Review all of its
own. Game on! So here come numbers
58 and 59, if I’ve counted correctly?
200 Proof
“Security-Related”
And now, we come to
the only “Security-Related” stretch I’ll be making
herein, and hereon, which
immediately returns us to
my New Year’s greetings
above and the alcohol references therein. A 100%
“Security-Related” alcohol corollary is 100%
pure ethanol; which is
actually 200 US proof,
and is used strictly for industrial or
scientific purposes only. Besides
being 100% illegal, if it is ingested it is
guaranteed to cause severe side effects.
Any recollections I personally have
to the term, “100% pure alcohol,”
are “past references” to “Torpedo
Juice.”
F r o m
Wikipedia,
the free encyclopedia:
“‘Torpedo
Juice’ is a
term used to
describe an alcoholic beverage in World
War II which
was made from
the high grain
[ethyl] alcohol
fuel used in [US Mark 14] torpedo motors. [The origin of this term was from a
typical recipe which was two parts ethyl
alcohol and three parts pineapple juice].
. . . With the introduction of the electric
powered US Mark 18 torpedo, ethyl
alcohol was no longer required for torpedoes. . . . [The term “Torpedo Juice,”
however, is multi-faceted, and is
still widely used to this day]”
Which also
brings to mind,
I vi vi d l y r e member being
mesmerized
watching the
submarine film
‘‘Destination
Tokyo” (1943),
which starred
Cary Grant as
the mythical
Seadragon’s
skipper.
It featured
a “submarine
appendectomy” accomplished about 150 feet below
the surface of the South China Sea in
1942 by a 22-year-old pharmacist’s mate
and an assistant. The crew sterilized
the operating instruments with boiling
water and used “Torpedo Juice,” the
alcohol that fueled the Seadragon’s torpedoes, to kill germs, and pajamas were
substituted for surgical scrubs.
During my interim Internet research I found many fascinating references to “Torpedo Juice.” A great one
comes from the National Naval Aviation
Museum, the largest Naval Aviation museum in the world, and one of the most
visited museums in the state of Florida
(See graphic bottom left.)
“For the happiest life, days should
be rigorously planned, nights left open
to chance.” - Mignon McLaughlin.
BTW That may be true generally speaking, but, it most definitely is not true when it comes
to this month’s Security-Related
Report subject, which is:
Anonymous Surfing
“Q. What do nude volleyball and
the Web have in common? A. Both offer the same amount of privacy.” - Old
Anonymizer.com Web Site
Point of Interest. The first
Internet anonymizer was Anonymizer.
com, developed in
1997 by Lance Cottrell during studies
towards a Ph.D. in
Astrophysics at the
University of California, San Diego. One can immediately
understand why he did it? Cottrell is a
noted privacy advocate.
Considerations of Anonymous Surfing (~):
1) What is ~?; 2) Why would you
want to do ~?; 3) Who does ~?; 4) What
is the cost of ~?; 5) How is ~ done?; 6)
When is ~ done?; and 7) Where is ~
done?
1. What is ~? Definition from
WiseGeek <www.wisegeek.com>:
“Anonymous surfing allows you to wander the Internet without leaving any
track of your computer’s IP (Internet
Protocol) address. This is accomplished
via a proxy service.
“When surfing the Web from the
privacy of your
living room, den
or office, it may
seem as if your
movements online are completely anonymous.
Unfortunately,
the opposite is
true. Everywhere
Page 6
Blue Chips Magazine —January 2009
you go you
can be tracked
through your IP
address. The IP
is a numerical
value that maps
back to your ISP
(Internet Service Provider)
and ultimately
to your specific
computer. It is
linked to your
computer by assignment to your login
username and password.
“When you request a website by
clicking on a link or bookmark, your
computer sends its IP address to the
website along with the request for the
page. The destination server answers
by sending the requested page to your
return address. Your computer receives
the HTML data and the browser turns it
into a graphic page you can view. In this
way, websites can keep track of every
page you view by logging your requests
along with your IP [my emphasis
here].
“Anonymous
Surfing defeats
this ability by using a go-between
proxy that ‘stands’
between the surfer’s computer and the
Web. This intermediate server, or proxy,
handles all of your computers requests
for you. Your requests go to the proxy,
which relays them to the Web. The
website sends the requested pages back
to the proxy server, which then forwards
them to your computer. Websites can
only log the proxy’s IP address, not
yours. It’s rather like having a valet run
all of your errands for you, so that the
valet’s face is the only familiar face on
the Web.”
2. Why would you want to do ~?
There are many reasons why people use
web anonymizing services to surf anonymously. They range all the way from:
to maximize their privacy, to simple
paranoia (protecting personal data), to
hiding browsing activities from others
(including parents, spouses, or even
other organizations), and/or to bypass
web blocking applications that would
prevent access to Web sites or parts of
sites that the user wants to visit.
However, it seems that those web
anonymizing services have flaws that
allow web sites to bypass those anonymizers and retrieve information about
the user’s system (See vulnerabilities
below).
By surfing the Web you are exposed
to hackers, bombarded by advertisements and subjected to spyware, malware, malicious Bots, and virtually
anything conceivable?
Everything you do and download online can be watched. Hackers,
Webmasters, any other users of your
computer, and even your boss can see
your surfing habits. Worst of all, you
make your personal and credit card
information readily available, which
can easily lead to Identity (ID) theft,
amongst other chilling thoughts. It’s
mostly all about Money, you know? It’s
called cybercrime.
Bottom line. The obvious purpose
to anonymously surf the web is for your
own personal privacy, security, and
peace of mind. Take a look at what I
found out about my own PC before I
started all this research, and that’s not
all either.
FYI You can see some of the wide
range of data that web sites can read
from your own browser, as well, including your IP address and other identifying
information, at the following sites: IP
Info <http://www.lawrencegoetz.com/
programs/ipinfo/>; Network-Tools.com
<http://network-tools.com/analyze/>;
and, 404 Research Lab Supersleuth
<http://www.plinko.net/404/supersleuth.asp>.
This is pretty scary stuff,
folks!
3. Who does ~? Gizmo’s Allan
Marillier at <www.techsupportalert.
com/best-free-anonymous-surfingservice.htm> says, “The most obvious
Page 7
Blue Chips Magazine —January 2009
anonymous browsing application for
most people is in internet cafes, on
public terminals, using wireless or even
wired access points away from home, or
in fact, on any PC including your own,
where you don’t want to leave traces
of your private surfing activities. Some
other browsing activity cleaners exist
that clear the cache, cookies, history
and other traces, [and] some are even
available as a standard in most browsers, but anonymous browsing goes a
step further. What attracts me is not
so much the privacy aspect, but rather
the security potential, because all of
the anonymizing browser proxy based
services create a secure encrypted connection between the
PC you are using and
the first anonymizing
proxy server. [They’d
grow old trying to
figure that out]
“This allows you to safely transmit
information without little risk of local
interception, making it ideal for surfing
on open Wi-Fi networks, or in hotels [,
or] while traveling. Previously, secure
surfing on such networks required the
use of private VPN networks, generally
an option only available to corporate
employees, those with the available
money to pay for it and the technically
savvy. . . . Whatever the reasons anyone may have for using anonymizing
browsing, commercial services that offer
anonymity are doing well, and a number of both free and subscription based
browsing applications and services have
become available.”
Remember the 1998 movie Enemy of the State? Well, you darn
well should. If not, hustle out and get
it at the closest movie rental store, and
then imagine yourself in the place of the
lawyer character Will Smith is portraying? It can really happen, and it can
happen to you, and definitely on
the web, as well!
4 What is the cost of ~? The
first consideration for us here probably
has to be the “Total Cost of Ownership
(TCOO). To fully appreciate the value
of anonymity online, consider the basics of web browsing. Pricing for
the service runs the gamut from
“Free” to $9.95-$13.95/month;
and purchased usually in the
$30-$40 range with one year of
proxy server service. And “Free” is
always good, right? But, in this case I’m
just not so sure, as are others with a lot
more experience in this matter than I.
For instance consider these questions:
1) Who exactly pays for the Bandwidth
you will use?; 2) The persons controlling
the proxies are in a “great” position to
exploit you, if they so desire, and then
again, how do you know they aren’t?; 3)
What services are offered by these proxies, if any, and who provides the Tech
Support, if needed?; and, 4) How do you
know there isn’t a Trojan Horse, or some
such creature, embedded in the software
they use? Et cetera. Et cetera.
There are many free proxy programs
for anonymous surfing, but most rely on
using ‘unwilling’ proxy servers. These
are private business servers configured
incorrectly to leave open ports, which
anonymous surfing programs can exploit. Enthusiasts use port scanners
to check for unsecured networks, then
they post those addresses publicly on a
daily basis. When administrators realize
the breach, the port is normally closed.
Therefore, using manual anonymous
surfing programs means constantly perusing the available list of proxy servers,
and changing them accordingly. Purists are willing to do this, because they
believe it is the safest way to achieve
anonymous surfing.
FYI Lifehacker at <http://lifehacker.biz/> has some “Free” anonymous
surfing sites listed for you to check
out - If that’s the way you way to
be! ;-}
The alternative is to join a Web
service that will provide a toolbar to use
in place of the standard URL (Universal
Resource Locator) in your browser. You
can surf normally, using the toolbar address field to enter website addresses.
The toolbar calls upon its own server to
act as the proxy. Most sites that provide
anonymous surfing of this type charge
a monthly or yearly fee for the service,
while others offer free trials.
Certain websites do indeed offer
free anonymous surfing, but the client must surf from their website.
Moreover, the proxy handles requests
from paying clients before handling free
proxy requests, which can ultimately
make anonymous surfing veerryy
sloooww. But then, after all you get
what you pay for, don’t you? “Free”
isn’t really free; you have to pay the
piper someway/somehow (See pitfalls
below).
5. How is ~ done? This is where
our Review of Ghost Surf Platinum
enters the picture (See the Review immediately following this Report).
a. The leading web anonymizers
are simply web sites that proxy HTTP
requests.
Caveat. However, some features
in the leading browsers allow remote
web sites to collect this information
about you and your PC “even when a
page is accessed using anonymizers.”
For example, using JavaScript, a remote
site can retrieve the local machine’s IP
address and send it to the remote server.
Also, using special HTML tags (like the
META tag’s REFRESH property) can silently redirect the browser to the “original site,” bypassing the anonymizer
(without the user’s knowledge). These
issues basically render the anonymizers
ineffective, since they do not really hide
information from a remote site.
b. In the meantime, all users’
identities are verified instantly with
Page 8
Blue Chips Magazine —January 2009
servers based
on a unique
machine fingerprint that
each computer has.
Caveat.
From this point
on, all subsequent
user activity from their original location
can be traced directly back to that location, albeit their home (or office), or even
the network that is connecting to any
local, or national ISP, on their behalf.
c. After typing in the URL of the
desired web site, for example, our
imaginary <www.somewhere.com>,
the anonymizer will retrieve and display
the HTML page using the anonymizer’s
server instead of the client’s machine.
In this case, the remote server knows
nothing about the client’s machine, only
what’s coming from the anonymizer’s
server.
d. Ever wonder how web sites
seem to know so much about users? Well, without an anonymizer server shielding them, once a user is online,
everything they do is recorded
and stored in various ways. For
example, within moments of logging
online, packets of data are dumped
back into the user’s cache, cookies are
planted, and trails are laid that connect
the dots from their starting and ending
points online.
e. At the end of each browsing session, each and every site they visited has
recorded where they had been before
they arrived, what they did at that site,
how long they stayed, and what they
did next. And then, simply because of
this record about their surfing activities,
the very next time they go online, any
previously visited site(s) will know that
they’ve returned, and consequently, can
tailor their advertisements directly toward the user, or simply bombard them
with junk, if they choose to do so.
BTW Question.
Have you ever
wondered how
some of those
sexually explicit images just
up and appear
on your browser for no reason, or
on the very next time you go surfing? Answer. Well, you probably
just accidentally hit that porno
web site along the way, then too,
or maybe you were directed there
without you ever knowing how
it happened, right? Well, that’s
what this Report is trying to get
across to you, “Stuff happens,”
you know. Well, that’s what the
bumper stickers/license plates tell
us, anyway! ;-}
My license plate should read:
4MERUTE SBALLCOACH (But
THEN that’s too big, isn’t?)
FYI. Here’s a Safe Surfing Corollary for you to check out: 10 ZDNet
Images and an explanation on “How to
run Internet Explorer securely”
can be found at: < http://content.
zdnet.com/2346-12691_22-87874-1.
html?tag=nl.e539 >. Once there one can
find the key configuration changes one
can make to disable various features and
reduce the attack surface in Microsoft’s
Internet Explorer. The guide there
provides a walk-through of IE 6.0, but
applies to the latest IE 7.0 as well.
Taking one good example from it
that applies specifically for us herein
is the Multimedia section under the
Internet Explorer Advanced tab
(In the Advanced tab, you can find default settings used by all zones). They
tell us, “The settings contained in the
Multimedia section have features that
you can adjust to protect against some
potential vulnerabilities. For instance,
attackers may be able to track your
usage or exploit the software you use
to play multimedia data. CERT/CC
recommends disabling the options to
play sounds and videos by unchecking
these boxes” (See graphic). There’s a lot
more there. Check it out; “you’ll be very
glad you did.”
6. When is ~ done? It’s done
all the time. And you’ll be doing it too,
after you’ve once read the Ghost Surf
Platinum Review, I’m sure. Meanwhile, here’s some sound advice we all
should take to heart. It comes from Jim
Rjindael.
FYI. Our current Encryption standard,
the Advanced Encryption Standard
(AES) Algorithm (Rjindael), is based
upon, and named for this man’s work.
“Sit you up and take heed,” as Yoda
would implore us to do.
“I have worked in IT security for
nearly 20 years and have seen how ‘experts’ deal with security. I don’t trust
anyone with my information or details.
As such I write under the awful but recognisable [sic, he’s English] corruption
of the magnificent cipher developed
by Joan Daemen and Vincent Rijmen.
The Internet is an information gold
mine - just make [sure] your personal
details aren’t included. Our governments, identity thieves and all sorts of
people with different agenda are watching us[,] make sure you stay low key
Page 9
Blue Chips Magazine —January 2009
online!” - Jim Rjindael - EzineArticles.
com Expert.
Note. Jim has written 21 articles on Anonymous Surfing, see
them all at: <http://ezinearticles.
com/?expert=Jim_Rjindael>
Also Note FYI. Information on the
AES algorithm (Rjindael) is available,
including test values, intellectual property (IP) statements, and specifications.
Those who are interested in the AES
specification (i.e., the actual standard)
should refer to the FIPS 197. You can
also do a search for “Jim Rjindael”.
A point of reference. My DYCRAV
AutoEnc Security Suite Application (See my August 2006 BCM
Review 1 ) uses the AES 256-bit
Encryption Algorithm (Rjindael) to
secure the Drag and Drop (DnD),
Dual-layer, Compressed and Encrypted file(s).
7. Where is ~ done? Again we
hear from Jim Rjindael. “Real
Anonymous Internet Surfing takes
some Effort. There are many people
out [there working very hard] to trap
our data and surfing patterns, [such as]
hackers, identity thieves, spammer[s]
and even our Governments. Just search-
ing for a few free anonymous proxies
on the Internet is unlikely to be a great
experience. Even if you are lucky enough
to avoid the proxies that have been
deliberately set up to trap the thrifty
anonymous surfer by some Eastern
European Identity thieves, you may find
one of the servers which has been setup
to track your surfing and then send you
a deluge of targeted SPAM.
“Those who find a clean anonymous
proxy[,] which does its job[,] will eventually probably give up using it because it
will be incredibly slow. All the time your
every visit to every website will be logged
and recorded at your local ISP - along
with your emails backed up on tape and
left there for who knows to see.
“If you really want to have anonymous Internet surfing - you need a fast
secure anonymous proxy, the facility
to switch proxies seamlessly with no
effort [and], all your web traffic needs
to be encrypted from the client and
back again. You will then be completely
anonymous online and your ISP logs will
be completely secure and unreadable to
anyone just like mine!” - Jim Rjindael,
Anonymous Internet Surfing - The
Art of Surfing in Secret
in the current economic downturn. . . . Finally, more than nine
out of 10 adults said the Internet
has improved at least one aspect
of their lives. Within this group,
the most popular improvements
included staying in touch with
friends and family and being able
to shop more effectively. “ - Antone
Gonsalves, InformationWeek (December 15, 2008)
Note. I invite you to pay particular attention to the 2008 series:
Encryption -What’s That Report1
(July 2008); Encryption - Why
Report1 (August 2008); Security
News n Views Part2 Report1 (September 2008); and, Security News
n Views Part3 Report1 (November
2008).
If what Gonsalves reports can
truly be believed, then one can certainly understand why Anonymous
web surfing might be high on that 46%
group of women’s list of priorities.
Makes immanent sense to me, as it allows a user to visit Web sites without
allowing anyone to gather information
about which sites the user visited. I just
have to wonder about their “SAFE
surfing” habits though?
A. N. Onymous claimed: “Liberals
are very broad-minded; they are always
willing to give careful consideration to
both sides of the same side.”
It’s time now to respectfully
refer you to the May 2008 BCM
Security-Related News and Views
101 Report1, as well as, all the other
Security-Related Reports1 in the
series I’ve been sharing with you
here over the years in BCM.
Back to Surfing Basics.
Say What?
Before we leave the subject of introductory “safe surfing,” with tongue
in check, we see that truth is indeed
stranger than fiction. Point in fact: U.S.
Adults Choosing Internet Over
Sex. “Nearly half of the women
aged 18 to 44 surveyed, or 46%,
said they would rather go without
sex for two weeks than give up the
Internet for the same amount of
time. . . . Some 30% of the male
respondents said the same. . . . The
November poll, released Monday,
found that most adults consider
the Internet essential to daily life
And, it’s also time to bid you a
fond adios/adieu, and point you
in the direction of the Ghost Surf
Platinum Review, which appears
on the very next page.
Buena Suerte!
Bon Chance! Enjoy!
Happy New Year!
Bye!
Footnotes
See the actual Reports/Reviews
in the Blue Chips Magazine Archives
at <www.ucs.org>. Note. Always
choose the .pdf format for its
beauty.
1
Page 10
Blue Chips Magazine —January 2009
GhostSurf Platinum
Windows Review
Invisibility on the Internet
Reviewed by Don Nendell
Manufacturer:
Process Software
959 Concord Street
Framingham, MA 01701
Phone: (800) 722-7770 (508) 879-6994
FAX: (508) 879-0042
e-mail: [email protected]
Tech Support:
Hours of operation: 8:30 A.m. to 7:00
P.M. EST
Phone Support is available for purchase. If
you purchase phone support, the support phone
number will be in your confirmation e-mail.
E-mail support is available 24/7. You can
use their support web page to send your question
to Tenebril’s customer service representatives. You
will receive a response ASAP by e-mail.
Supported Operating Systems:
Windows 2000 SP4/XP SP2/Vista (32 bit
only)
Minimum System Requirements:
CPU: 300 MHz or better
256 MB RAM
80 MB hard disk space
Internet Explorer 6.0 or higher
Internet connection (for automatic updates)
Simple Description:
Anonymous Internet connections that allow
you to “Surf the Internet Invisibly”
Where to purchase:
GhostSurf Platinum is available immediately on the Internet at <www.tenebril.com>, as well as from the extensive
network of Tenebril Authorized Resellers.
GhostSurf Platinum is also sold through all
major electronics retailers.
Pricing:
GhostSurf Platinum with 1-Year Updates
$49.95; 1-Year Renewals $24.95
GhostSurf
Platinum with
2-Year Updates
$99.90 $54.90 (save
$45); 2-Year Renewals $39.95
GhostSurf
Platinum Volume
Licensing (1-Year Updates): 2-user: $79.95,
5-user: $189.95, 10user: $349.95
15-day “Free” trial (25.7 MB download from)
Tenebril (web site)
Benefits:
Save on New GhostSurf Platinum 5.1 (See
2-year Updates pricing above)
Encrypts your Internet connection
Erases all traces of your Web surfing
Removes aggressive spyware
Prevents identity theft and credit card
fraud
Secures confidential files
Eliminates online ads
About Tenebril
Tenebril, Inc. is a leading security and privacy technology company creating innovative,
award-winning solutions for home and enterprise
customers. Unlike traditional approaches to the
growing spyware problem, the patent-pending
Tenebril Spyware Profiling Engine™ is uniquely
capable of defeating quickly-mutating spyware to
provide zero-day protection. Led by a seasoned
team of software industry veterans, the company’s product lines are distributed worldwide via
multiple channels including e-commerce, retail,
security experts, and a direct sales force.
Tenebril was founded in 1998 and was
acquired by Process Software, a unit of HALO
Technology Holdings, Inc. (OTCBB: HALO) in
August 2006. Process Software (www.process.
com) is a premier provider of communications
software to mission critical environments. With
over 20 years in business, Process Software serves
thousands of customers, including many Global
2000 and Fortune 1000 companies.
Prolog
Red Skelton, famed comedian (July
18, 1913 - September 17,
1997), said, “All
men make mistakes, but married men find
out about them
sooner.”
Ergo, CYA Disclaimer: No
matter how this looks to all of
you, I am not, repeat NOT, in the
habit of reading any “Advice to
the Troubled/Lovelorn” columns.
But, this particular piece was
just sitting there on the Salt Lake
Tribune Comic Section right next
to my JUMBLE PUZZLE, as “Big
As Life,” and, needless to say, I
just couldn’t pass it up, you see?
Anyway, being very apropos to
our Review subject herein, plus it
being a real first for me, as well,
here it is FYI.
“While I’m away, readers give the
advice” - Carolyn Hax, Salt Lake Tribune Advice Column Writer, Salt Lake
Tribune, 12/26/08, p.E14.
Page 11
Blue Chips Magazine —January 2009
“‘Privacy is dead in the electronic world. On spying on teenagers. The sooner that children learn that
electronic communications are not private, the better they will be. Teenagers,
and for that matter, many adults, seem
to think that their electronic communications can remain private. Messages
(and photos) on Facebook, MySpace,
e-mail, iChat and cell phones are not private. They are easily retrieved, by those
who are not particularly technologically
savvy and by those who may not have
your children’s best interests at heart.
Online messages may easily be viewed
by people other than the intended recipient. These messages can live forever in
cyberspace. . . . There is no such thing
as respecting electronic boundaries. The
newspaper is filled with stories of people
who went to jail because they failed to realize that electronic communications are
almost impossible to erase completely.’
- A Mother Who Is Weary of Fighting
This Battle, Among Others. . .”
The Concern Is?
There are many, and varied, good
reasons people have for wanting to surf
anonymously. They run the gamut. They
range from outright simple paranoia
of protecting personal data, to hiding
Internet browsing activities from anyone and everyone, which may include
parents, spouses, or other persons and/
or organizations. Simply stated, they
want anonymity, which is defined as
follows:
Wordnet:
The noun has one meaning:
Meaning #1: the state of being
anonymous
Synonym: namelessness
Wikipedia:
Anonymity is derived from a Greek
word meaning “without
a name” or “namelessness”. In colloquial
use, the term typically refers to a person,
and often means that
the personal identity, or
personally identifiable information of
that person is not known.
Noun. anonymity (countable and
uncountable; plural anonymities)
1. (uncountable) The quality or state
of being anonymous; anonymousness.
2. (countable) That which is anonymous.
Verb. to anonymize (third-person
singular; simple present anonymizes;
present participle anonymizing; simple
past and past participle anonymized)
1. (transitive) To render anonymous.
Adjective. anonymous
1. Wanting a name; not named and
determined, as an animal not assigned
to any species.
2. Without any name acknowledged,
as that of author, contributor, or the
like: as an anonymous pamphlet; an
anonymous benefactor; an anonymous
subscription.
3. Of unknown name; whose name is
withheld: as, an anonymous author.
Synonyms. nameless, unidentified, unknown, unnamed
Note. Like the Utah Utes football team—
is was nationally (including KSL TV) before they upset the
vaunted Alabama Crimson Tide in
the 2009 Sugar Bowl 31-17.
So, What’s It All About, Alfie?
By surfing the Web you are exposed
to hackers, bombarded by advertisements and subjected to spyware, mal-
Page 12
Blue Chips Magazine —January 2009
ware, Trojans, BOTS, and a whole host
of other nefarious “Bad Guys!” Everything you do and download while you
are surfing the Internet, can be watched.
Hackers, Webmasters, and even your
boss, whomever that may be, plus others
who might access your computer, can
easily see your surfing habits.
Worst case scenario. Your personal
data (albeit medical, financial, credit
card information, et al.), is most definitely easily readable.
To which Tenebril responds, “Since
anti-virus and firewall programs do not
adequately address these issues, the
obvious answer has to be GhostSurf
Platinum (GSP). GhostSurf Platinum provides a secure surfing experience by protecting your privacy and preventing damaging Internet threats from
infecting your PC. GhostSurf ensures
your safety online with an anonymous,
encrypted Internet connection. It stops
sophisticated spyware, eliminates ads,
encrypts data stored on your PC, and
erases your tracks - all which can help
prevent identity theft and credit card
fraud. . . . [It can accomplish this because] GhostSurf provides not only the
ability for anonymous surfing through
anonymous proxy[,] but gives you the
option to surf anonymously with [an]
encrypted internet connection. . . . With
GhostSurf, you’re invisible and in control online.” OK! OK!
Before GSP
This is really fascinating stuff.
As mentioned above, it is a very
simple matter for website operators, ISP’s, spammers, hackers,
and others to determine your IP
address, your ISP location, and
lots, lots more.
1. As a good example, here’s
what I got thrown back at me from
the Internet, before I installed
GhostSurf Platinum (GSP):
“Your IP Address: 71.199.7.60(*)
Your ISP: c-71-199-7-60(*).
hsd1.ut.comcast.net
[(*) Note. The Data has been
changed for obvious reasons,
Duh!]
Using such information, a
hacker could attempt to break into
your computer, websites could
keep records of your visits, and
tracking software could map a
path to your geographic location.
Some bulletin board type websites
even display your IP address for
public view when you post a message.”
(Source: IP Address Changer)
2. And, this one was the most
eye-opening of the bunch. It comes
from Are you Surfing Anonymously?
Posted on Audit My PC <www.auditmypc.com/anonymous-surfing.asp>.
Here’s what they reported on my PC
when I visited them:
“Below is information that you are
giving away right now as you visit sites.
Anonymous surfing is easy if you know
what type of information to block. The
end goal is to give away as little information about yourself as possible. . . . We
are not doing anything special here, we
are simply reading the information your
computer is providing about you and
displaying that back in a form you can
understand. To surf anonymously, you
need to first understand exactly what
you are giving away
Your computer is connecting to the
internet at West Jordan, UT, in the US,
with an IP of 71.199.7.60(*)
Your UserAgent is being reported
as:
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.5)
Gecko/2008120122 Firefox/3.0.5
Your Referrer is being reported as:
[This was a first time visit, therefore, no
‘referrer’]
Your IP Address is 71.199.7.60(*)
Your Host Name is c-71-199-760(*).hsd1.ut.comcast.net”
[(*) Note. The Data has been
changed again for obvious reasons!]
3. And finally, About.com:Web
Search at:
<http://websearch.about.com/od/
searchingtheweb/a/anonymous.htm>
has an article, Anonymous Surfing 101:
Free Anonymous Web Surfing - What
is it? By Wendy Boswell, About.com. In
the article there is a link to Leader (when
security matters) at:
<http://leader.ru/secure/who.html>,
which gave me pretty much essentially
the same information about my PC as I
got from Audit My PC above. They even
had the Referrer: http://websearch.
about.com right. The only thing missing;
however, they didn’t have a map, like
Audit My PC did.
Oh! BTW As an aside, About.com
had a fabulous ad with a female talking head from Site Pal that followed
my mouse pointer all over the graphic.
Well, a man has to have a little fun while
“Surfing,” doesn’t he?
Anyway, I’ve seen enough
now to really make a believer out
of me!
May I respectfully suggest that at
this juncture you refer to my previous
Introduction to GhostSurf Platinum Report (See pg. 5 of this BCM
issue) for a more complete rundown
on Anonymous Web surfing. But, as a
quick refresher, it goes something like
this: 1) Services that provide anonymity
disable pop-up windows and cookies
and conceal the visitor’s IP address;
2) These services
typically use a proxy
server to process
each HTTP request;
3) When the user requests a Web page
by clicking a hyperlink or typing a URL
into their browser,
the service retrieves
and displays the information using its
own server; and, 4)
The remote server
(where the requested
Web page resides)
receives information
Page 13
Blue Chips Magazine —January 2009
about the anonymous Web surfing service in place of the user’s information.
Which brings us to. . . .
GhostSurf Platinum,
Front and Center!
Sir, Yes Sir!
Report!
Sir! GhostSurf Platinum (GSP)
is the industry’s most comprehensive
Internet privacy product making users
virtually invisible on the Internet and
ensuring a secure surfing experience.
GhostSurf Platinum is the first privacy solution that protects users from
identity theft and fraud, and with the
5.0 version introduced on April 1, 2008
it added new anti-spyware technology, a
full version of the new SpyCatcher 5.0
release (a $29.95 value), plus Windows
Vista support. SpyCatcher’s enhanced
Profiling Engine offers proactive protection by monitoring a user’s PC for
any suspicious activity that is typical
of spyware. It stops any action from
taking effect before a PC is put at risk.
SpyCatcher also provides a wealth of
information on what applications are
running. Users can decide to allow, or
block, and remove any applications
based on this information. Sir!
With over half a million customers,
GSP has been a market leader in Internet Privacy technology for more than
six years. GhostSurf Platinum 5.0
integrated a number of state-of-the-art
technologies to create unmatched privacy protection. GSP: 1) Routes online
activity through private anonymous
hubs; 2) Encrypts Internet connec-
tions; 3) Erases traces of surfing using
Department of Defense standards for
data destruction; 4) Enables novice PC
users to remove and block the most aggressive spyware with SpyCatcher 5.0;
5) Provides a secure location to store
confidential files with an encrypted and
password-protected digital lockbox; 6)
Enables even novice PC users to erase
all traces of their online activity, encrypt
their Internet connection and remove
aggressive spyware automatically. and
7) Eliminates online ads. Sir!
Brian McDonald, Process Software
President and CEO said, “Spyware continues to pose a serious risk to online
consumers as spyware vendors use
more complex methods to steal information. We have upgraded GhostSurf
Platinum Internet privacy security
suite to include a new full version of
SpyCatcher 5.0 which includes a more
powerful technology to protect users.”
According to the National Cyber Security
Alliance, spyware infests more than 90
percent of all PCs. This fast-growing
Internet threat is also one that is least
apparent; spyware silently bypasses firewalls and anti-virus software, affecting
computer performance and introducing
security risks, often without a user’s
knowledge.
“Advances in spyware programming require a solution that is designed
specifically to meet the growing threat.
SpyCatcher is the only antispyware
that uses multiple layers of technology
including advanced behavioral detection to stay ahead of spyware attacks.
SpyCatcher enables users of all technical
abilities to remove even the most aggressive spyware automatically”. Sir!
What’s New in
GhostSurf Platinum 5.1
1) Updated user-friendly interface;
and, 2) A new SpyCatcher version with
improved proactive spyware protection: a) Profiling Engine™ includes
real-time advanced behavioral-based
detection; b) DeepDefense prevents
the installation of rootkits, keyboard
loggers, and other malicious programs
safely. It intercepts all API calls, which
blocks the installation of aggressive spyware; c) Vendor Tracking provides
users with a list of certified vendors
that have applications running on their
PCs. Users can set policies by vendor;
d) ClearView Application Control
provides a detailed list and description
of the applications running on your
PC. Users can set application policies
from this information; e) Installation
Tracking provides you with a wealth of
information on potentially unwanted applications. You can allow, or block, and
remove applications more thoroughly
so that no traces remain which could
potentially harm your system; and, f)
No-risk Spyware Removal (with
SpyCatcher) enables users to recover
all removed files and programs that were
previously blocked from running.
FYI According to the National Cyber Security
Alliance, spyware
infests more than
90 percent of all
PCs. This fastgrowing Internet
threat is also one
that is least apparent; spyware silently bypasses firewalls
and anti-virus software, affecting computer performance and introducing security
risks, often without a user’s knowledge.
Advances in spyware programming
require a solution that is designed specifically to meet the growing threat.
SpyCatcher is the only antispyware that
uses multiple layers of technology including advanced behavioral detection to stay
ahead of spyware attacks. SpyCatcher
enables users of all technical abilities to
remove even the most aggressive spyware
automatically. Sir!
Andrew Garcia, on eWeek.com,
(January 9, 2006), wrote in his article,
Fighting Spyware Is Never-Ending Battle, “Early blocking technologies using real-time scans that instigate
Page 14
Blue Chips Magazine —January 2009
scanning and cleaning as files are written
to disk have proved insufficient against
the latest hardened threats, but newer
technologies seen from vendors [such
as] . . . Tenebril, Inc. . . are increasingly
using kernel-level drivers to identify
threats before they are installed.” Sir!
How GhostSurf Platinum Works
GhostSurf Platinum ensures that
users are invisible and in control online
by: 1) routing their online activity through
private anonymous hubs; 2) encrypting
their Internet connection; 3) erasing traces
of their surfing using Department of Defense standards for data destruction; 4)
enabling novice PC users to remove and
block even the most aggressive spyware
with SpyCatcher; 5) providing a secure
location to store confidential files; and, 6)
eliminating online ads. Sir!
Installation
GhostSurf Platinum installed
flawlessly, near seamlessly (See my
explanation Note below), and with an
absolute minimum of effort. By way of
explanation, when you install GhostSurf, or AdArmor, the installer will
ask you if you want to anonymize or
block ads all the time. If you left this
item selected, the proxy was configured to start whenever your computer
starts. If not, you can tell the proxy to
start automatically by right-clicking its
menu in your system tray and choosing
“Run on Startup.” If this item does
not appear, the proxy is already
configured to run on startup.
Note. As mentioned above, the
whole installation process would have
been absolutely “seamless” if, repeat
if, every type of browser’s proxy
would have been configured automatically, not just Internet Explorer’s browser. A
small price to pay, I guess, as I was able to
configure my Firefox 3’s proxy settings all
by my lonesome - naturally with the help
of GhostSurf’s Help file.
Page 15
Blue Chips Magazine —January 2009
Page 16
Blue Chips Magazine —January 2009
Page 17
Blue Chips Magazine —January 2009
Page 18
Blue Chips Magazine —January 2009
Page 19
Blue Chips Magazine —January 2009
Page 20
Blue Chips Magazine —January 2009
Proxy Information
This is what you pay your
money for. GhostSurf’s proxy
ferries data between your Internetenabled applications and the Internet.
As data passes through it removes
personally-identifying information
and may reroute the data to hide your
location and encrypt it to prevent others from seeing where you’re surfing.
Repeat Note. It’s important to
run the proxy whenever you’re using
the Internet. When the proxy is running, all your GhostSurf settings
(from ad blocking to privacy protection) are enforced.
GhostSurf’s Proxy
(Now see the CBC2 graphics
again) GhostSurf’s proxy manages
ad-blocking and privacy protection
for AdArmor and Privacy Control
Center, respectively. When you’re
surfing the Internet, the proxy intercepts data before it leaves your
computer and filters out personal
information (if this is the setting
you’ve chosen in the Privacy Control
Center). It will also reroute your data
through Tenebril’s anonymous hubs
to prevent websites’ tracing you, and
will encrypt your data if you are
surfing in secure mode. When data
comes back from the Internet, the
proxy will remove cookies, pop-ups,
ads and other nuisances.
Caveat. Because the proxy does
the work for the Privacy Control
Center and AdArmor, it must be
running while you’re surfing, or you
will not, repeat, will not enjoy the
benefits of GhostSurf.
More about the proxy
When GhostSurf’s proxy is running, you’ll see GhostSurf’s icon in
your system tray. As you surf, the icon
will blink orange. This indicates that
the proxy is receiving data from your
web browser and is anonymizing it, or
that the proxy has received data from
the Internet and is passing it to your
browser.
You can move your mouse over the
proxy’s icon to get statistics on its work.
Plus you can right-click the proxy’s icon
and choose “Proxy Information” from
the menu that appears to get more
information on your settings. If you’re
surfing in secure mode, you’ll also see a
lock icon next to the proxy icon. Moving
the mouse over the lock will show you
some information about the proxy’s
security strength.
With that, please refer again to
the CBC2 graphics to see how GSP
works graphically:
Graphic 1 Main Window
The GhostSurf Platinum main
window provides easy access to all features. GhostSurf Platinum protects
your privacy and prevents Internet pests
from spoiling your online experience.
Graphic 2 Advanced Anonymous Surfing Tools
State-of-the-art surfing tools in
GhostSurf Platinum encrypt your
Internet connection and route your surfing through private anonymous hubs.
It makes users virtually invisible on the
Internet and ensures a secure surfing
experience.
Graphic 3 Includes SpyCatcher
v5.1
Page 21
Blue Chips Magazine —January 2009
GSP includes SpyCatcher v5.1 which runs completely separate from
GSP.
Note. SpyCatcher (when sold
separately, costs $29.95 for 1-year
with updates).
Benefits: 1) Allows novice PC users
to remove aggressive spyware; 2) Stops
next-generation, mutating spyware;
3) Blocks reinstallation of aggressive
spyware; 4) Prevents identity theft;
and, 5) Removes spyware safely and
automatically.
Features: 1) Continuous Protection constantly secures computers
from known and unknown spyware
- even hyper-mutating and customcoded attacks. Eliminating the window of vulnerability for infection that
signature-based solutions inadvertently
give unknown spyware; 2) Real-Time
Detection immediately identifies
emerging spyware before it can attack,
eliminating the delayed response typical
of signature-based anti-spyware and the
false positives of behavior-based solutions. Detects spyware deeply embedded
in the operating system and scans system memory, registry files, hard disks,
network drives, and other devices for
spyware; and, 3) Safe Remediation
automates and simplifies the spyware
removal process and assures that only
damaging spyware programs - not legitimate programs that serve a purpose
- are removed.
Graphic 4 Realtime Spyware
Behavioral Monitoring
When SpyCatcher detects potential spyware behavior from an unrecognized application, it prompts you to
set a policy for the application that is
causing the behavior, and (if applicable)
the vendor that launched the application. A behavior is a specific action or
combination of potentially undesirable
actions performed by an application (or
its components).
Graphic 5 Unparalleled Tracks
Cleaning and File Deletion
Items stored on your PC such as
Web history, cache, clipboard, cookies
and more create a complete trail of your
online activity. Protect your privacy and
wipe these files away to Dept. of Defense
standards for data destruction. GhostSurf Platinum is powerful enough to
prevent undelete tools and aggressive
hardware recovery systems from retrieving these deleted files and can even go
as far as to remove residuals left on your
computer by previously deleted files.
Graphic 6 Total Control Over
What’s on Your Screen
AdArmor enables you to eliminate
all types of advertisements, including
pop-ups, in-page and paid search engine
ads, as well as ActiveX, flashing text,
animated images and more. You can
even block access to Web sites you
deem inappropriate.
Graphic 7 Encrypt Confidential
Files and Documents
Control access to important data
by creating an encrypted, password
protected location to store sensitive information. GhostSurf Platinum is the
most comprehensive Internet privacy
product available.
Note. It is this “Encryption” capability that intrigues me most. See
“On the positive side” below for
the way (Tao) to distribute those
“Encrypted” Files and Documents
securely and “Anonymously.”
In Conclusion
What if? I wonder, would we even
have that old fable to share with our
children if Little Red Riding Hood would
have been invisible to the “Big Bad Wolf”
by being shielded with a GhostSurf
Platinum-like “Ghillie suit?” Well, it’s
a thought?
I leave you with yet another reason why GhostSurf Platinum with
SpyCatcher is so important to everyone. This just hot off the presses,
dated January 2, 2009 from Processor
Magazine News, Page 9, Sophos Report
Reveals Increase In Cybercrime. Last
year proved to be a monumental year
for the expansion of global crime on
the Web. The Sophos annual security
threat report has disclosed that Sophos
detected a newly infected Web site every
4.5 seconds for every hour of the day,
each day of the year. . . . Graham Cluley,
senior security consultant at Sophos
(www.sophos.com), states that a layered
defense plan is paramount, because today’s criminals primarily use the Web as
their method of infection. Now, we can
add surfing anonymously to our layered
defense plan; GhostSurf Platinum,
to be precise.
On the negative side. The only
drawback I can see is having to pay for
phone Technical Support. I’ve mentioned that “fine point” to the Tenebril
representative, and they are addressing
that possibility, as we speak. This would
give them a truly great product and service all the way around.
On the bright side. I have also
suggested to their representative that
all Tenebril needs to complete their
wonderful “anonymity” package is to
have the capability of checking the
“anonymity of any PC on their
web site,” like Audit My PC has.
Note. Go to <www.auditmypc.
com> and click on the “anonymous
test” tab and surprise (scare?)
yourself.
On the positive side. What a
fabulous capability I now possess: 1)
I can surf anonymously with GhostSurf Platinum; 2) Have SpyCatcher
watching my back during my Internet
soirees; and, 3) Be able to exchange
“secure (“Secret”) documents” with my
DYCRAVTM AutoEncTM Suite (See my
2006 BCM Review1).
“Now that’s anonymity,” as Crocodile Dundee would say. I can only sinPage 22
Blue Chips Magazine —January 2009
cerely hope that you avail yourself of all
these same capabilities and relieve some
of the daily stresses and strains induced
by simply “Surfing the Internet!”
On the fabulous side. HIAWP2,
especially an invisible one running GhostSurf Platinum. Get it
today. You’ll be ever thankful for the
advise, and be greatly relieved when you
do. Amen!
“If some
day you’re not
feeling well,
you should remember some
little thing I
have said or
done and if it
brings a smile
to your face
or a chuckle
to your heart
then my purpose as a clown has been fulfilled.”
- Red Skelton.
Happy Surfing! Here’s wishing
you and yours a Happy, Abundant, Safe, Healthful and Successful New Year!
Ciao!
Footnotes
See the actual Reports/Reviews
in the Blue Chips Magazine Archives
at <www.ucs.org>. Note. Always
choose the .pdf format for its
beauty.
2
Happiness Is A Working PC my hard-earned by-line.
1
Don’s Political Statement!
Page 23
Blue Chips Magazine —January 2009
Utah Blue Chips Calendar
January 2009, February 2009
UBC
General Meeting
U of U
7:00 p.m.
CES
Magazine
Deadline
U of U
7:00pm
UCS
Board of
Trustees
C&C Bldg.
Room
N3005
6:30 p.m.
UBC
General Meeting
U of U
7:00 p.m.
TBA
Magazine
Deadline
Blue Chips — Utah’s Computer Guide in the 21st Century