HOW TO SURVIVE IN THIS CRAZY CYBER WORLD

HOW TO SURVIVE
IN THIS CRAZY
CYBER WORLD
a semi-satirical, unofficial, politically incorrect, brutally honest,
yet, fairly comprehensive, step-by-step(ish) guide
(with an unnecessary amount of punctuation)
BY:
ALEXANDER SHULMAN
(a generally horrible hum an being)
JUNE 2014
PREFACE
The world is a scary and violent place. The world-wide web is even more so.

More than 160,000 new malware samples appear every day.1 (from Panda Security)

In the last 12 months, half of all American adults were hacked.2 (from Ponemon)

In the last quarter of 2013, 17 out of every 1,000 computers were infected with malware.3 (from
Microsoft)
Those are scary facts. But, these, I think, are slightly more alarming:

79% of all of those notified did not take any action after finding out.4 (From idRADAR)

Out of all infected systems, 95% were infected because the user clicked on something they
shouldn’t have.5 (from some place I can’t remember)
That means it’s not just the bad guys who are in the wrong. Yes, I’m talking about you, dear reader.
But, it’s ok (not really, but we’ll get there). I understand that most people just don’t know what they
can do. And so, without further ado, enter this guide.
With this (unfortunately, lengthy) step-by-step guide, I hope to provide some clarity on what even the
most technically-challenged of us (well, of you, really) can do to prevent themselves from becoming a
victim of technological malice, as well as to provide some tips on keeping yourself and your electronics
happy.
Now, I’m going to be upfront: this guide is kind of Windows-centric. Two reasons – 1) I hate Apple,
and have worked with/researched their stuff nowhere near enough to consider myself an expert on it.
2) Unix/Linux people tend to know this kind of stuff already.
However, a lot of things I will talk about in this guide are not just applicable to Windows systems.
OBLIGATORY INDEX FOR QUICK CLICKING AND PERUSING:
1) To do before we set off on the grand adventure .........................................................................2
2) Connecting ............................................................................................................................ 8
3) Cruising through the internets ............................................................................................... 10
4) Passwords ........................................................................................................................... 12
5) Social media ........................................................................................................................ 14
6) Email .................................................................................................................................. 17
7) Going Mobile: The Wide, Open World ...................................................................................... 19
8) Travelling ............................................................................................................................ 22
If you don’t have the time to be edumacated and just want a short list of things to do, click >>HERE<<
1
http://www.net-security.org/malware_news.php?id=2776
http://money.cnn.com/2014/05/28/technology/security/hack-data-breach/
3
http://www.networkworld.com/news/2014/050714-malware-infections-tripled-in-late-281377.html
4
https://www.idradar.com/sites/default/files/docs/idRADAR%20Quarterly%20Consumer%20Research_June20141.pdf
2
5
Cannot, for the life of me, remember where I read that… but I totally did…
1
1) TO DO BEFORE WE SET OFF ON THE GRAND ADVENTURE:
A) ANTIVIRUS
Have one. There are plenty of free choices out there, so there is no excuse not to have one. But, not
all antiviruses are created equal. If you google “Best Antivirus,” you will get about 74,200,000 results,
with many claiming to be “the one.” In the end, it all comes down to independent testing. While
performance tests do vary from month to month, top contenders tend to remain toward the top as a
rule of thumb.
Now, there are some who say antiviruses are useless because they, at best, block 99% of all viruses.6
But, I think that blocking 99% of threats is better than not blocking any at all. So, girls, let’s talk
‘options.’
As of mid-May 2014, these were the best choices:
PAID SOLUTIONS

Bitdefender Antivirus Plus (2014) | $39.95
http://www.bitdefender.com/solutions/antivirus.html
According to the many, many mentions on their site, they are
number 1 this year. According to independent testing, they
are correct. And, with the quality and number of features in the
package, I’m obliged to agree.
Also, it looks kinda cool 
Feature list from their site: Antivirus and Antispyware, Bitdefender Safepay™, Security Report,
Wallet, Bitdefender Autopilot™, Online Privacy Protection, File Shredder, Two-way Firewall,
Parental Control, Cloud Antispam, Secure Online Storage, Device Anti-Theft.

Norton AntiVirus (2014) | $49.99 | http://us.norton.com/antivirus/
In the past (2008-2012), the Norton brand went from a beloved savior to the hated
villain as their products turned from “I will defend your system” to “… so that even
you can’t use it.” Since then, they got better. Folks at Norton rewrote their product
from the ground up and have returned to, once again, being the contender they
once were.
Feature list from their site: Keeps you safe when you surf, shop and bank online,
Protects you from social media scams, Stops both today's and tomorrow's online
threats, Blocks infected and dangerous downloads

Webroot SecureAnywhere Antivirus (2014) | $39.99
www.webroot.com/us/en/home/products/av
This is a surprisingly tiny, and very easy to use, program that goes about
protecting your system in a slightly different way. If it detects something really
serious it cannot fix, it creates a secure communications channel to HQ, where an
actual human being assists in getting the bugger off your system.
Feature list from their site: Detects and blocks known and unknown viruses and
threats, "Ridiculously fast scans" keep you protected without interruptions or
slowdowns, Real-time anti-phishing blocks fake websites that trick you into
entering personal information and threat shields warn you of potentially infected
websites before you visit.
6
http://gcn.com/blogs/cybereye/2014/06/antivirus-useless.aspx
2

Kaspersky Anti-Virus (2014) | $39.95 | http://www.kaspersky.com/anti-virus
While I’ve personally never used it (because it’s made by the Soviets), Kaspersky
tends to consistently get very good reviews in independent testing. Also, the
company is quite active in the antivirus community with their education and
research projects, frequently finding and publicizing new threats that endanger us
all (they are probably the ones creating them… >_>)
Feature list from their site: Antivirus protection, Preventing the exploitation of
software vulnerabilities, Protection against screen lockers, System Watcher, Web
protection, URL Advisor, File Advisor, Anti-phishing protection, Minimal
consumption of PC resources, Rapid start-up, shutdown and reaction times.
FREE SOLUTIONS
While there is a general sense of “you get what you pay for,” there are some very good free AVs one
can get.

AVG AntiVirus FREE 2014 | http://free.avg.com/us-en/free-antivirus-download
AVG tops my list (and independent test lists). I’ve been using it for a couple of
years now, and have no complaints. Not as feature rich as the paid counterparts,
but it does what it’s supposed to.
Antivirus, Link protection, File shredder. That's what you are getting for free. And, unless you
absolutely need to have parental controls and various bells and whistles, this is a fantastic choice.

Avira Free AntiVirus (2014) | Free | http://www.avira.com/en/avira-free-antivirus
#1 contender in September of last year, Avira recently slipped to #2 spot (just barely).
Avira uses “Cloud-based protection” during its scans, so you need a frequent connection to
the interwebs to take full advantage of its capability. What you get: Advanced Real-Time
Protection, AntiAd/AntiSpyware, Browser Tracking Blocker, Website Safety Advisor (as a
Firefox/Chrome extension). Avira is a very good choice if you are “always on.”

Avast! 2014 | Free | http://www.avast.com/index
… is also one of my personal favorites. Free version gives you the Antivirus, Antimalware Protection, Anti-spyware, and Anti-rootkit. It’s a little bit more difficult to
navigate at first, but it is also a very solid choice. Of these three, I do think Avast
has the best customer service, if you need to reach out to an actual human… but that is a
personal opinion.

FortiClient 5.0 | Free | http://www.forticlient.com/
Forticlient comes with several features that make it awesome: AntiVirus, SSL VPN, Web
Filtering, IPsec VPN, Application Firewall, Two-Factor Authentication, Vulnerability Scan,
WAN Optimization. The reason why it’s further down on the list, is that, while having a
collection of really good “how to” videos, it does require quite a bit of technical know-how to
operate.
One thing of note:
Companies need moneys to exist. And, while these are all truly free, they are peppered with links
encouraging you to “buy this to make it even better.” Buying it does improve the product, as it gives
you more features (detection/cleaning rates stay the same, however) … but then, if you want
features, may as well start out with a paid product.
3
ALSO
Malwarebytes Anti-Malware 2.0 | Free | https://www.malwarebytes.org/downloads/
According to PCMag, “When other antivirus products fail, tech support agents
turn to Malwarebytes Anti-Malware 2.0.”7 While I don’t know if I agree with this
100%, Malwarebytes is definitely a good program to have on your computer
‘just in case.’
Also, if you think your computer is infected and you can’t install one of the
abovementioned products (because, sometimes, viruses block you from installing an antivirus
program), you can give Malwarebytes Chameleon a go: https://www.malwarebytes.org/chameleon/. It
is awesome.
ALSO ALSO
>> NEVER DO THIS <<
7
http://www.pcmag.com/article2/0,2817,2455505,00.asp
4
B) SPRING CLEANING
As we use our computers more and more, they tend to get filled up with random crap; temporary files,
remnant artefacts, unused programs… they all slow down your computer. Once in a while, (optimally,
more frequently than once a year during actual spring time), it’s a REALLY good idea to clean stuff up a
bit. Also, when you get a new computer, nowadays, it usually comes pre-installed with a LOT of stuff
you either will never use, or just plain don’t want on your system. So, let’s clean those up a bit.
Note: I list these things in the order I do them when people ask me to un-screw their computer. Some
people would prefer to do the last step first, and then proceeding with the list. Some people don’t
bother doing the first step at all. … It really comes down to preference.
OS FEATURES
I will start with a very important principle of cybersecurity:
system hardening, or “locking doors you do not use.”8
You see, there is a lot going on behind the scenes in your
computer… a lot of doors opening and closing to allow for
day to day operations. A lot of it is good; making your
computer go on ticking. However, the more stuff you have
going on, the more doors you have open. Sometimes, you
have open doors without even realizing it.
Let me give you some examples:



Let’s say, at home, you have a printer connected directly
to your computer. It’s connected by USB cable, and you
are the only one using it. Do you really need your
computer to keep open the door marked “print using the
internet?”
Don’t have a touchscreen monitor? Why have “Tablet PC
Optional Components” enabled? You can’t use any of
those features anyway.
When was the last time you actually played Minesweeper
or Purble Place (whatever the hell that is)? Those games
can also keep doors open.
Why do I keep talking about doors?
One of the ways bad guys try to enter your system is
through those openings. So, let’s close ‘em up!
There are a ton of guides and videos out there on how to do it, and all of them can be found by
Googling. Here’s a link just in case you’re lazy:
https://www.google.com/search?q=Turn+Windows+features+on+or+off
A couple of things:


Turning a feature off does not uninstall it. If you disabled something and later find that you need it,
you can always turn it back on.
If you are not sure if you need a feature, simply Google it’s full name to learn what it does. If
you’re not using it, there’s no harm in disabling it.
8
Yes, I’m trying to describe open ports and innate application vulnerabilities. I know it’s not the best analogy.
Tech savvy gurus: just move along, dammit.
5
UNUSED PROGRAMS
LOOK AT THIS.
Does it make you cry? It makes me cry.
Nowadays, most new computers come pre-installed
with stuff you just don’t need or want. Also, most of us
tend to install stuff on our computers… which we end
up never using. This makes most people “cyber
hoarders.”
It’s ok. The first step is admitting it. I’m here to help.
Uninstalling a program you will never use has a freeing
effect, allowing both, yourself and your computer, to
breathe just a little bit better. (It’s also going to close
some doors those programs might have open.)
Now, doing this can be scary for some. Thankfully, there are videos.
9
University of Michigan-Flint has a quick walkthrough for Windows 8, 7, and XP:
http://www.umflint.edu/helpdesk/perm/windows/how-to-uninstall-a-program-on-windows-7-xp-andvista/
Anyways, now you know how to. But, what should you uninstall? A couple of tips:

Sort by Publisher (just click once on the Publisher tab)

Unless you are specifically uninstalling a Microsoft program, ignore ones where Microsoft is listed as
publisher

If the Name says “toolbar” or “browser add-on,” it’s probably safe to remove

If you are unsure about something, just type the name exactly how it appears into Google to learn
more about it
CCLEANER
Extra big picture for an extra awesome product.
Literally, “Crap Cleaner” … from when we were less politically correct, back
in the day. Fantastic program. What it does is scan for various system files
and keys that are no longer needed by your system and deletes them to
free up space and remove possible confusion.
According to the Piriform website, “CCleaner is the number-one tool for
cleaning your Windows PC. It protects your privacy online and makes your
computer faster and more secure.” I’m going to tell you, that statement is
true. I’ve been using this program for many, many years, and have not
had a single complaint with its performance.
Very easy to use, very difficult to mess up. I’m a firm believer this should
be on every Windows computer.
Get it here: https://www.piriform.com/ccleaner
9
If you are using an Apple, I will once again recommend you smash it with a hammer. Usually fixes things.
6
DEFRAGMENTATION
(SKI P THI S STEP I F YOU ARE USI NG A SOLID STATE DRIVE (SSD))
From time to time, you should pamper your computer a bit… let it de-stress, and generally unwind…
give it the spa treatment, if you will.
You see, as you use your computer, files are constantly being written to the hard drive. Usually, they
are placed wherever there is space for them (think: 16-year-old’s bedroom). Defragmenting, or
“defragging” as the cool kids call it, is the process that takes each of those randomly-placed files and
puts them next to their long-lost relatives. This makes your computer not work as hard when it needs
to find something.10
Operating systems tend to have native capability to defragment: Windows has “Disk Defragmenter”
program; OSX has a “throw against the wall” function (I’m told); and Linux has a “defrag” command,
though, due to the way Linux/Unix operating systems work, it’s really not needed.
Windows Disk Defragmenter is a silent worker. But, if you want something graphically pretty (perhaps,
dare I say even, sexy), and with customization options out the wazoo, there are other defrag options
available:

Defraggler | Free | https://www.piriform.com/defraggler
By the same people who make CCleaner, is a defrag program that gives you options. Most defrag
tools only allow you to defrag an entire drive. Defraggler lets you specify one or more files,
folders, or the whole drive to defragment. It also has an option to defragment free space, which
improves Windows' performance when writing new files. (Trust me, it’s kind of a big deal.)

Auslogics Disk Defrag Free | http://www.auslogics.com/en/software/disk-defrag/download/
Also a top contender with lots of great features and customizations. One feature that separates
it from Defraggler is that they have a “portable version” as a single, 3.7Mb .exe file that
doesn't require installation and can be run directly from a USB drive
Note: If you are running Windows 7 or higher, you may already have defragmentation automatically
turned on (usually set to run at 1AM on a Wednesday). The defrag window should tell you.
ACTUAL CLEANING
Yes, as in, actually cleaning the thing. No, not just dusting off the outside and calling it a day. The
inside bits as well.
As you use your system, dust tends to gather up inside, caking on top of various components and
making them heat up more than they normally do or, in case of the fans, not move the precious cool
air around as well. This tends to have effects on system performance.
The prospect of opening up a computer can be scary for most, but I’m about to put your fears at rest.
Meet your new best friend: Compressed Air. It has so many uses! Clear dust from electronics! Scare
the crap out of household pets! Turn it upside down and supercool your beer! (do be careful with this
one) 11
Cleaning your laptop is quite easy. Here, watch this 2-minute video:
http://www.youtube.com/watch?v=EWwejCKVGOY
If you have OCD (or, CDO, since it has to be alphabetical), several hours, and a desire to make your
laptop even cleaner than how you received it from the store, this 11-step guide is for you:
http://www.wikihow.com/Clean-a-Laptop
Cleaning your desktop is also easy. Turn it off, unplug it, pop the hatch, and blow compressed air on
anything that looks dusty. (depending on where you live, be ready for a big dust cloud.) Voila, you’re
done. (It may take a few go-arounds, depending on how dirty it was)
10
Ok, settle down tech-heads, I know that’s not quite what happens, but you try explaining this to your grandma.
Get it here: http://www.amazon.com/b?node=3012916011. They even have a 220+MPH “hurricane” version, in
case you want to blow your face off. (The writer of this guide provides the information “as is” and will not be held
responsible for blown-off faces, frozen-off “bits,” or pets with PTSD.)
11
7
2) CONNECTING
Assuming you actually followed the above, your computer should be
nice, and clean, and happy. So let’s talk connections.
Connecting to the internet is analogous to setting off on a grand
adventure toward a magical land containing all of the knowledge of the
human race … and pictures of cats. Getting on the internets can be
accomplished using a private (ISP) or a public (public WiFi) connection.
With a private connection, you pay an Internet Service Provider (ISP) to
give you a dedicated line that is your and yours alone; you then have an
option of sharing it via WiFi and such. On top of giving you a personal
access to the internets, ISPs work with various other important internet people to ensure the integrity
of your communication, making sure the bits actually make it from A to B. With a public connection
(usually, free public WiFi), before getting to the part where ISP whisks your data away, your
information has to go through a bit to which other people are also connecting. Passing through this
zone can actually put your information as risk, as security configurations for this zone tend to be at the
mercy of whoever is providing the WiFi access, and are not usually anywhere as stringent as the
security configurations required of the ISPs by various regulations.
Think about it as a swimming pool. In your private pool, you are nice and safe and can do as you want
without people seeing/judging you. In a public pool, which is generally crowded and generally
disgusting, can still do those things, but people will judge… and, also, you have no way of knowing who
is currently peeing into the pool… or who is there “just to watch.”
Thankfully, there is a way to protect one’s information when connecting to a public access point.
VPNS
A Virtual Private Network (VPN) is a computer program that works by creating a secure communication
channel between your device and another device in a known safe zone (ex: not in the public pool) in
such a way that all communications between yourself and that device are encrypted. VPN also offers
several other benefits besides encryption.
A 2-minute video with a brief overview of what a VPN is and does
can be found here:
http://www.youtube.com/watch?v=rFg7TSwVcL4
(Courtesy of CyberGhost)
There are a multitude of VPN services out there, both paid and free. While I
could recommend some that I personally like, http://www.bestvpn.com does a
great job in breaking it down; sorting VPNs by price, features, compatibilities,
and other criteria.
One thing it doesn’t really cover is free VPNs. Usually, I would not recommend
a free VPN as they tend to have two things in common:


12
They tend to require mid-to-high level of technical expertise, as they
require one to configure all connections by hand.
They provide no guarantees. The contact information of providers of the "device in a known safe
zone" are rarely disclosed, so it is usually impossible to know if the individuals providing the other
device are not themselves monitoring the communications.
However, there are two I will mention: FortiClient 5.0 (previously discussed in the antivirus section)
and CyberGhost (www.cyberghostvpn.com/en). Both of these offer a free VPN service that I can
confidently call safe, and CyberGhost is actually easy to use.
12
Fear my l33t clipart skillz.
8
PROXY
A lot of people confuse proxies with VPNs, so I’d like to take some time to briefly address them.
People use a proxy to hide their identity on the internet, and, sometimes, bypass some firewalls that
may be restricting their browsing. Most proxies are free, so it is a very popular choice among the “free
internet” crowd. The biggest difference between proxies and VPNs is that proxies DO NOT ENCRYPT
YOUR COMMUNICATIONS.
An example: After hitting the proxy server, it would be hard to know that it was you
who was actually looking for those My Little Pony pictures (for anyone sitting between
you and that proxy server, there would be no problem in finding that out).
However, if you used a VPN, those people wouldn’t even know that you are secretly a Brony.
I hope that cleared some stuff up.
THE BROWSER CHOICE
Microsoft frequently pushes out updates to their Internet Explorer browser. The rolling joke among the
cybersecurity community is “Oh look! It now lets you download [another browser] faster!”
Let’s face it; especially with the additional bad rep recently circulated through the news, IE is far from
the best choice for an internet browser. Maybe, one day, Microsoft realizes this and does what Norton
did by completely rewriting it. But, I won’t hold my breath.
To be considered a good browser, it must fulfill the following criteria:



Be simple to use
Hog as few computer resources as possible
Have the ability to keep you safe from malware and third-party tracking
With those requirements in mind, Google Chrome (www.google.com/chrome) and Mozilla Firefox
(www.mozilla.org/en-US/firefox/new/) are the two biggest contenders in this field, with Safari and
Opera bringing up the rear.
Personally, I’m a fan of Chrome, sometimes play around with Firefox, and loathe the fact that some
government sites only play nice if you’re using Internet Explorer. In the end, the choice is up to you.
With both Chrome and Firefox being as customizable as they are, it really comes down to personal
preference.
If you’re curious about what the world is using, here are the numbers (world survey Jan2014)13:
Chrome
34.95%
Internet Explorer
30.275%
Firefox
18.00%
Safari
8.70%
Opera
1.925%
Other
6.15%
Bottom line: You have options.
13
http://en.wikipedia.org/wiki/Usage_share_of_web_browsers
9
3) CRUISING THROUGH THE INTERNETS
Well, now that your computer is all clean and ready to face the great vast expanses of the interwebs,
let’s take a look at how we can keep it that way. But, before we get there, let’s have a quick lesson
about the internets.
Every page on the internet is made up of elements, each using various languages and resources to
display the information on the site.



HTML (Hypertext Markup Language) makes up the base of every web page, staying what things
should be displayed on the page.
CSS (Cascading Style Sheets) are all about what the elements on the site look like; what font for
the text, color, etc.
Javascript/Flash allows you to actually view those cat videos and click those pretty buttons.14
SCRIPTS
91% of web exploits target Java.15 (CISCO) If CISCO says it, it must be true. So, how can we protect
ourselves from this Java threat? After all, I wants my daily dose of cat. Answer: Easy.
Script blockers are addons one can install in one’s browser to block Java scripts from being run. Once
set up, these block all scripts on every site you visit, unless you tell them not to do so.
Now, I’m not going to lie… they are a bit of a pain to use at the very beginning. Every first time you
visit a new site, chances are that it will be blank or drastically stark until you tell the blocker to allow
the site. As the interwebs is a complicated place, and a page can use resources from different websites
at the same time, usually, you will have to allow several sites to display their content.
Example: On YouTube, you may want to allow youtube.com, google.com, and ytimg.com (the site that
displays YouTube images/video previews) while blocking everything else.
Sounds like a pain, but, the blockers remember your choices and will continue to unblock the allowed
sites from that point on. So, really, it’s a one-time inconvenience, and you can always change your
mind and block/allow previously allowed/blocked sites.

Chrome: NotScripts
https://chrome.google.com/webstore/detail/odjhifogjcknibkahlpidm
dajjpkkcfn
I’ve been using it for several years now, and it is, by far, the
handiest security extension I’ve had the pleasure of installing.
Unfortunately, the set up is the most complicated part of using it as
it requires you to create a password and save it into a particular file
on your computer. But, once you do, you will immediately notice a
difference.

Firefox: NoScript
https://addons.mozilla.org/enUS/firefox/addon/722
Works on the same exact premise.
NoScript is easier to set up; it only
requires you install it before being 100%
operational. If you’re using Firefox, this
extension is a must have.
14
15
Yes, this is a gross generalization. Please don’t kill me.
http://www.cisco.com/web/offers/lp/2014-annual-security-report/index.html (Registration required)
10
Ad block
Tired of those ads with all their blinking and sound playing and popping up in random windows? Well,
do I have a solution for you!
Adblock Plus https://adblockplus.org/ is a browser extension available for every
browser out there.
ABP works on the same principle as the script blockers mentioned above, but
targeting ads.
Personally, I think this should be included in every browser as ads tick me off.
But, I also understand that a LOT of sites rely on profits from ads to stay afloat
and continue to provide their awesome content. So, what makes this browser
add-on awesome is that it lets you configure itself to block all ads in the world or
to allow ads to display on some sites (to show your support for your content
providers).
One more thing about this topic: Sometimes, besides being annoying, ads can carry viruses. By
blocking ads, you stop that method of attack as well. … Just something to think about.
WEB OF TRUST
From the Web of Trust website16:
Web of Trust (WOT) is a website reputation and review service that helps
people make informed decisions about whether to trust a website or not. WOT
is based on a unique crowdsourcing approach that collects ratings and reviews
from a global community of millions of users who rate and comment on
websites based on their personal experiences.
WOT works in a very simple way - it shows website reputations as traffic lights next to search results
when using Google, Yahoo!, Bing or any other search engine. They are also visible next to links in social
networking sites like Facebook and Twitter and email like Gmail and Yahoo! Mail as well as other
popular sites like Wikipedia. By clicking the traffic light icons you can find out more information about a
website’s reputation and other users’ opinions.
It’s free, get it here:
Chrome: https://chrome.google.com/webstore/detail/bhmmomiinigofkjcapegjjndpbikblnp
Firefox: https://addons.mozilla.org/en-US/firefox/addon/3456
16
https://www.mywot.com/en/aboutus
11
4) PASSWORDS
The world runs on passwords, with username/password combinations being
the most common, and widely accepted, way of authenticating access to
one’s account … and we forget them so, so frequently.
Ok, I will admit it. A lot of the fault lies with security admin people.
You see, it’s just so much easier to require you to create a ridiculously hard
to guess password than to have *us* expend *our* time out of *our* lives
that we can be spending watching cat videos. You understand, right?
I’m glad you do!
And, now that we all realize that no one is to blame, we can safely proceed
with the rest of our lives.
All jokes aside, though, unfortunately, the problem with crazy passwords
requirements is not going to go away anytime soon. So, let’s talk solutions.
THE PROBLEM 17
But! Before I get there, I should really mention some mistakes that a
LOT of people make that can place their accounts, their information,
and, sometimes, themselves in danger.18

Writing down passwords
Who can possibly remember that crazy password? I better jot it
down, but on the back of this Post-It note that I will keep next to
my computer, because no one ever actually looks at the sticky
side. Ooh! Maybe, I’ll hide it under my keyboard; no one will
ever look there! I r smart.
Actually, no. I’m sorry to say, but those are all very old tricks, and people have been doing these since
the invention of passwords … and have been getting their passwords stolen and used against them.
You see, as soon as you make your password physical-manifest, you are making it possible for other
people to see it. Stop doing it! If you can’t, and absolutely must have it written down somewhere,
continue reading; I’ll give you a better option in a bit.
 Reusing passwords across websites
An average human being with access to the interwebs has a membership with multitude of sites, and
having a different password for every one of them is … difficult, so many people don’t. Which is bad.
As a general rule of thumb, one can break down those sites into two categories: critical and noncritical.
Critical: I will cry if someone gets into this account and does stuff. (Bank accounts, Facebook, etc)
>> make sure to have different, unique passwords <<
Non-critical: I won’t cry if someone gets into this account. (www.canadianliving.com)
You can use one password. It’s not “great” to do, but it’s acceptable.
 Pattern-based passwords
With the stupid complexity requirements, people have figured out that they can makes lines, or shapes,
or patterns on the keyboard, while randomly pressing the shift key, and call it a complex password.
And, you know, it looks like a complex password. So, why not?
Well, hackers know people are doing this. So, pattern-based passwords are actually the first on their
list to try when hacking your account. STOP DOING IT!
17
18
There are volumes of books written about passwords. I’m just listing the most common errors I’ve encountered.
Especially, in the case of a disgruntled ex.
12
THE (A) SOLUTION
Let’s look at what would be considered a strong password: 01J&Jw^aH. Try to remember it. Kinda
difficult, right? What if I told you it is actually a beloved childhood rhyme about two intrepid
adventurers and their quest for water? Still nothing? Ok, let’s break it down.
J&J: Jack and Jill
w^: went up
aH: a hill
01: It’s the first line of the rhyme.
And, when the time comes for you to select a new password, just go with the next line.
*explosion noises*
Mind … BLOWN
*explosion noises*
But, yeah. It’s that simple.




Pick a random book you normally have handy
Pick a random page to start
Come up with a couple of rules: capitalize all nouns; turn every ‘and’ into &; turn every money,
cash, or dollar reference into $; etc …
… And, there you have it! Easy, right? 19
THE (ANOTHER) SOLUTION
Password managers are awesome. Pretty much, what they are, are programs you can install on your
computer/cellphone/whatever that remember your passwords for you. Not only that, they come up
with crazy passwords for every different site you go to (so, now you have unique passwords for every
site), and give you options to auto-fill-in the information when you get to the site’s log-in page. To
keep your passwords safe, they encrypt them so only you can use them. All you need to do is
remember is one master password which is used to decrypt all of the others. Most of them also come
with several other really cool features (like, let you know if a site was recently hacked and you should
change your password.) Here are the top contenders in this field:

Dashlane | Free or $30/yr | https://www.dashlane.com
is my personal choice, and have been using it since its infancy. For free, you get several great
features. Only listing the two big ones (shamelessly stolen from their site):

Password Manager: Automatically import your passwords from any
browser into your secure password vault. Save any missing passwords
as you browse. Make passwords right within your browser. Get
automatic alerts when websites get breached. And with their autologin, you will never have to type any password on any of your devices
again. It’s that simple.

Digital Wallet: Securely store your payment details in Dashlane’s online
wallet. Get express checkout and flawless form filling everywhere you
shop online. Automatically capture receipts of all your purchases.
Always have your digital wallet on you, and never have to store your credit
cards on sites that you don't completely trust.
For $30/year, you get the ability to sync across multiple devices and the ability to access your
passwords through a secure web portal for when you are travelling/don’t have your device handy.

1Password | $50 / $70 for family license | https://agilebits.com/onepassword
1Pass has been around longer than Dashlane, and is also a very solid choice, offering
both Password manager and a Digital Wallet. Three reasons why it’s #2 in my list:
1) It doesn’t have a free version
2) It’s Apple-centric
3) It requires a Dropbox account/service in order to sync your devices.
19
Boston U has a nifty guide: http://www.bu.edu/infosec/howtos/how-to-choose-a-password/
13
5) SOCIAL MEDIA
Oy vey. Where do I start?
Humans are social animals (like penguins, but
with thumbs and Botox), so, innately, we have a
want to share (well, most of us). And, a lot of
us do. Everything from how cute our cat is, to
how a super cool but super-secret thing is about
to happen at our company but we’re not telling,
to how our boss doesn’t like that we bring
“fluffy” to work.20
The point is, most people put stuff out in the
open which either should not be put out, or that
should not be put out “in the open.” In this
section, I will not talk as much about the first
part as about the second. After all, in ‘Murica,
we are free to post what we want. (Whether or not we should do it is an entirely different question,
which is best left up to the clearly well-informed individuals doing the posting.)
Now, I’m going to focus on Facebook-like sites, as everyone and their mother has an account for those.
However, these tips are applicable to every social media site out there, and their implementation is
fairly similar.
A) SET YOUR PRIVACY SETTINGS
There is a HUGE difference between “My friends can do this” and “Friends of my friends can do this.”
We all have one of those friends who is, and this is a very technical term, “an attention whore,” more
than happy to accept any and all friend invites on Facebook. (If you don’t, and you yourself have over
500 friends most of whom you’ve never actually met, the first step is admitting you have a problem.)
In any case, let me tell you a story:
A few years ago, I was asked to look into a suspicious individual who was asking some very weird
questions on one of the unofficial “spouses of the company”-type Facebook community pages. Well, I
did. The guy turned out to be a terrorist. Yes, you read that right; an actual, bona fide terrorist, like,
on an FBI watch list and everything. What was he doing on the invite-only page (besides looking for
vegan cupcake recipes that may come close to being edible)?
There is a quote I read a while ago: “Using public sources openly and without resorting to illegal
means, it is possible to gather at least 80 percent of all information required about the enemy.”21
Guess where that’s from. I’ll tell you: the Al Qaeda Training Manual.
So, how did this terrorist get onto this “by invite only” Facebook community page? Well, it turns out,
the settings on this community page allowed Friends of Friends to read/post on it, and one of the
genuine members of the page was a technical term who happened to accept a friend invite from Ahmed
the (now hopefully dead) Terrorist.
The point of the story is: Do you really want Joe the
Hacker/Terrorist/Generally-Bad-Guy to see your wedding photos? Pictures
of your kids? To know where you live or hang out? To know your deepest
thoughts, quirks, secrets, desires, and lunch aspirations?
I wouldn’t.
Facebook
Privacy
Dinosaur says:
22
SET YOUR
DAMN PRIVACY
SETTINGS,
DAMMIT.
20
Despite the numerous references to cats, the author does not, in fact, own a fluffy personification of evil.
A very long, but interesting read (if it’s your thing). Al Qaeda and the Internet: The Danger of “Cyberplanning”
http://strategicstudiesinstitute.army.mil/pubs/parameters/articles/03spring/thomas.pdf
22
The Facebook Privacy Dinosaur did not actually ever say this. Please do not sue me.
21
14
B) BE WARY OF STRANGERS
People lie. The internet makes it easy for people to lie about their identities and motives. (Also, it
tends to be a portal for alter-egos, where people become a different person just by “logging on.”)
So, a couple of tips to address this concern:

Only “friend” people you know.
I know, this one is hard, especially for technical terms I previously mentioned. But, think about it
this way: How much do you know about people you’ve actually met? How much do you know about
people you’ve never met? Hopefully, this little exercise has proven that you don’t want random
creepy strangers to have access to your info.

Consider limiting the number of people who are allowed to contact you through these sites.
There are privacy settings on every site which would allow only your friends (whom you’ve met,
right?) to contact you, blocking everyone else. These same settings also, usually, allow you to
group your contacts into neat little groups, and set privacy controls to each group. Now, this may
limit you from getting random messages from a secret admirer, but it will also stop you from being
a victim of many types of social engineering frauds.

If you interact with people you do not know, be cautious about the amount of
information you reveal and about agreeing to meet them in person.
This should be a no-brainer. And, if you haven’t learned this from McGruff the
Crime Dog by now, I don’t know any words that would drive the point home.
C) BE SKEPTICAL
People lie. A lot. Especially on the internet.
Some, just want to fluff up their importance a bit; others; want
to mislead people for fun; and the rest, just want to watch the
world burn.
Yes, my dear reader, people are evil (especially grandmas).
Whenever you meet a new person on the internet, ask yourself
a few questions:
1) What are the chances that what they are saying is not true?
Um… that’s it, actually; just that one question. But, keep asking yourself it from time to time.
D) LIMIT THE AMOUNT OF PERSONAL INFORMATION YOU POST
While we would all love to hear about the consistency of your muffin this morning, there is some
information that, as a general rule, you should not

Do not post information that would make you vulnerable, such as your address or information about
your schedule or routine
If a bad guy can look at your profile and learn what school your kids are going to, there’s an issue.
Same if they can know exactly where you will be at what time of the day. Think before you post!

When your friends post things about you (or tag you in some pictures), make sure the combined
information out there is not more than you would be comfortable with strangers knowing
If you feel uncomfortable, ask them to un-tag you, or to take the information down. Even though
there is no way to permanently delete information once it hits the interwebs, this will make sure
they bad guys will have to actually work… and most of them are really only looking for easy targets.

On the same note, think before posting stuff about your friends
If you’re going to ask them not to make you a vulnerable target, don’t make them a vulnerable
target. It’s just about common courtesy.
15
E) REMEMBER THE INTERNET IS A PUBLIC RESOURCE
Back in November of 2013, Jack Vale, a comedian known for his YouTube Channel23, conducted a social
experiment where he freaked out random people by randomly approaching them and telling them their
personal details like name, occupation, favorite sports team, or child’s and pets’ names.24 Needless to
say, it freaked many people out.
How did he do it? All he did was: pull up Twitter or Instagram on his cellphone and do a simple search
for posts that were near his location. After seeing the screen names/names/whatever from those
posts, he then searched the Book of Faces for the people and read up a bit.
That’s it. No scary hacker voodoo. He just read the info that people freely plastered all over the
internets.
It’s not an invasion of privacy, because when you post by-minute, play-through updates on the
consistency of your milkshake, you are making a choice to no longer be private.
Think before you post/tweet/’gram!
ALSO: FACEBOOK-SPECIFIC
The good folks at Facebook wrote a fairly comprehensive guide
on how to not become a victim through their site. If you use
Facebook, it is definitely worth a read. Find it here:
https://www.facebook.com/safety/attachment/Guide%20to%2
0Facebook%20Security.pdf
ESPECIALLY: LINKEDIN-SPECIFIC
For those who don’t know about LinkedIn, it is a site similar to
Facebook, minus all the cat videos.
The focus of LinkedIn is to serve as a base for work-related
professional connections, allowing one to more easily access
their professional network for questions, advice, or referral purposes.
After accepting someone’s request for connection on LinkedIn, you are providing the individual with the
ability to know about your current and previous places of work, your performance at those locations, as
well as give them access to your other work-related contacts (unless you turn that function off).
The problem arises when a bad guy joins the site with a fake profile (because, remember, people lie)
and sends an invite to an “Open Linker,” someone who always accepts connection requests. Open
Linkers, as a general rule, do not block their connections from viewing each other, which means
nothing stops the bad guy from sending connection requests to everyone the Linker “knows,” and so
on, and so forth.
A Facebook hack/”drama” post can lead to temporary drama. A LinkedIn hack could lead to you losing
your job. I am hoping you can see how this is bad.
While Facebook allows you to put your contacts into groups, LinkedIn does not. This makes it even
more imperative that you only connect with people you actually know.
23
24
http://www.youtube.com/user/jackvalefilms
http://www.tomsguide.com/us/comedian-psychic-posts,news-17882.html
16
6) EMAIL
We all know that email is important, whether it’s a mistyped missive from our grandma about a recent
apple pie attempt or a heartbreaking note from a Nigerian prince asking for your help to transfer
millions of dollars from point A to point B. Also, all of us get it. And if we don’t, we’re either on a
beach sipping mojitos or are stranded on some deserted island trying to spell out HELP using emus
(there is no in-between). So, since it’s important, here are some fun facts25: In 2013,

spam made up approximately 70% of inbound mail

59% of all messages included malicious attachments

41% of all included malicious links
That’s bad. So, let’s talk about it.
SPAM
I do not like this, Sam I Am, I do not like this icky spam.26
Thankfully, our email programs are getting fairly good at filtering spam from regular mail; so good that
sometimes regular mail ends up in the spam folder. However, they do need your help from time to
time. Here is how you can help your spam blocker:

If a spam email makes it through the filter:
Don’t just delete it, tell your email program it is spam.

Likewise, if a real email gets into a spam folder:
Tell your email that email is to be trusted. Some services can take it a step further and allow you
to create what’s called a “whitelist” of email addresses that are always trusted. If you are using an
email address to only talk to several people, this is a really good option.

NEVER reply to a spam email.
Even to “unsubscribe.” As soon as you do, you will be overwhelmed with more spam than your
email would be able to block.
Note: Sometimes, things you get are not actually from friends. Two things can happen:

Email spoofing
With some tools, bad guys can fake what their name looks like to you, making it look like a
message is coming from your best bud “Jeff,” and not a “murderous bad guy.” If you are not
expecting a message, there is nothing wrong with contacting that person through a different
medium (like: a phone call) and asking if they were the one who contacted you.

Account highjacking
Some viruses can take over an email or social media account and use it to send messages with
either copies of itself or links to convenient locations where you can download it by yourself. The
messages are usually brief and misspelled, which could be hard to detect if your friends are
generally retarded and usually write that way. Just follow the aforementioned advice.
ATTACHMENTS
No matter how seemingly interesting a title of an attachment may be, attachments from people you
don’t know can carry viruses and all sorts of other nasties. Heck, even attachments from people you
know can do that. Point is: DON’T RANDOMLY OPEN ATTACHMENTS.
US Computer Emergency Readiness Team (US-CERT) has a fairly decent guide about email attachment
dangers. Even though it was written in 2009, things have not really changed in this regard. Read it
here: http://www.us-cert.gov/ncas/tips/ST04-010.
25
26
http://www.net-security.org/secworld.php?id=16897
Again, please don’t sue me.
17
LINKS
Before I launch into what will, undoubtedly, be an award-winning explanation of links
and what they do, I would like to do a magic trick: To start this trick, please join me
on Yahoo.com.
If you clicked it, you will be, again undoubtedly, amazed by my technological prowess…
until I tell you that a 6 year old can come up with a craftier lure.
It’s true. Links don’t always point to the sites they claim. Also, there are a LOT of
sites out there with similar names to famous ones everyone knows, and those sites usually have bad
stuff on them. So, there are four things to keep in mind when you come across a link you were not
expecting:

Hover
If you hover your mouse over a link without clicking, the address it will take you shows up either in
a bubble over it or somewhere on the bottom of your screen.

Spellcheck
Once you see the link, make sure the name of the site you are going to is actually spelled correctly.

Web of Trust
If you are unsure about a site, Google it and use the Web of Trust (previously discussed here) to
tell you if the site is legit.

Be careful of URL Shorteners
URL shorteners are sites that take any link and make it smaller, so a long, hard to remember link
address can be turned into something like “bit.ly/blarg” (DO NOT ACTUALLY TRY THAT ADDRESS).
URL shorteners were initially created because of the Twitter’s 140 character limit, but have long
been adopted as a mainstream.
There are over 100 URL shorteners. The most common ones are: bit.ly, goo.gl, t.co, and ow.ly.
IF YOU’RE EXTRA PARANOID (OR ARE DOING NAUGHTY STUFF)
The Free Software Foundation recently held a world-wide “Reset the Net”
event which was aimed at stopping mass surveillance efforts of world
governments on the good, common folk of the world. To do so, they
have assembled a series of tools that help encrypt one’s emails for
when they travel through the dangerous web of prying eyes. They also
wrote a step-by-step walkthrough on their installation and use. It
takes about half an hour to set up.
Get at it here: https://emailselfdefense.fsf.org/windows.html
A note: While extra protection never hurts anyone, this is the one time I
will say that most people don’t need to do this.
The world should be free, man.
18
7) GOING MOBILE: THE WIDE, OPEN WORLD
… are everywhere, and everyone has one… even the Amish folk.27 And, because they are tiny(ish),
they are easily lost/misplaced/stolen. In fact, crimes involving mobile devices account for 18% to over
40% of all crimes out there, depending on city, ranging from casual thefts to full-blown armed stickups
(multiple sources).
And, not only that, there are other threats against them out there too! Pets! Weather! Magnets!
Those little pointy things we need to get into places! (keys, I think, most people call them) Viruses!
Yes, phones can get Virtually Transmitted Diseases; after all, they are just tiny, overpriced, easily
breakable computers (except Nokias, which are actually used at CERN to split atoms)28.
So, let’s talk protection, as losing a personal phone is always horrible (especially if it's a $600
smartphone full of family pictures). Thankfully, there are several applications, or “apps” as the cool
kids are calling them, one can install to help secure your phone against the many dangers of life, the
universe, and everything (exclusions: liquids, microwaves, rabid badgers, toddlers).
PROTECTION SUITES
Protection suites are apps you can install on your cellphone/tablet/whatever to protect the device from
viruses and provide some anti-theft capability.
A note about such programs: there are THOUSANDS apps promising good antivirus capabilities. A lot
of them are shams, or do provide some antivirus capability but at a cost of general badness befalling
yourself or your device. So, it is imperative to install protection software ONLY from 1) trusted sources
and 2) trusted companies.
Now that that’s out of the way, behold my recommendations29:
(note: A lot of the following info was shamelessly stolen via copy/paste from the Gizmodo “How to Find
your Missing Phone” guide30 and then slightly edited… because I’m only slightly not lazy.)

Avast Mobile Security & Antivirus | Android | Free | $1.99/mo or $14.99/yr
Avast is one of the most popular security solutions for Android, with over 50 million people
using the software to protect their devices. For free, you get a LOT of features:
Antivirus/Anti-Spyware/Anti-Ransomware, Privacy Reports for your apps, SMS and Call
Filter, Web Shield, Network usage meter, App locking, Backup, Firewall (if your device is
rooted devices), and a whole slew of anti-theft features like locate/lock/wipe your phone,
turn on a siren noise, and generally control your phone form the web. You get even more cool
features for the paid version.

Bitdefender Mobile Security & Antivirus | Android | Free | $9.95/yr
Is also a full protection suite that is worth mentioning. It allows you to locate and erase
your phone, and throws in a remote lock as well. This keeps your phone secure against the
prying eyes and wandering fingers until you pick it up. Bit Defender can only be uninstalled
by authorized users. If someone tries to bypass that by swapping SIM cards, BD will text
the new number to a phone of your choosing, force the phone to answer your call, and then
remotely wipe the phone via SMS command. Once you get the thief on the line, you should
probably yell something to the effect of, "IF I CAN'T HAVE HER, NO ONE WILL" just before sending
the self-destruct text. Drama! Excitement! Destruction! These extra features don't come free, but
given that the full anti-theft service extends to all your devices—laptops, phones, and tablets alike—
ten bucks is a good investment.
27
http://americanroadmagazine.com/forum/uploads/1315975248/gallery_13589_112_1296.jpg and
http://www.ohgizmo.com/2008/08/04/maple-wooden-phone-might-appeal-to-amish-teens/
28
http://www.smbc-comics.com/?id=3155 (no confusion allowed)
29
Yes, there are a lot more choices out there, but 1) these are independently tested to be good, 2) are user
friendly, and 3) actually care about their customers (good customer support experiences)
30
http://gizmodo.com/how-to-find-your-missing-phone-1184906204
19

Lookout Security & Antivirus | Android/iOS | Free | $3/mo or $30/yr
Lookout Security & Antivirus by Lookout Mobile Security is considered "freemium," also with
over 50 million installs. This total security suite protects your phone against loss or theft as
well as provides continuous protection against viruses. For $3 a month (or $30 annually),
you get the antivirus service, backup and restore features to save and reload your contacts,
photos, and call history, and several anti-theft options. In
addition to the standard map-based location, tracking and forced ringing
features, Lookout also offers Signal Flare, which saves the phone's last
known location when the battery dies, and the Lock Cam, which emails
you a picture of anyone that incorrectly enters the lock screen
combination three times. 

Plan B | Android | Free
Made by the same people. This app is made for those who have lost their phone without
installing any software beforehand. Have no fear! There's Plan B! Plan B is a remotely
installed, barebones tracker app. First, open a browser window and log on to Google Play.
Install the app onto your phone via Play, wait ten minutes for it to download and install,
then text "locate" to your number from another phone. The app will triangulate its position
based on Wi-Fi and GPS signals and send you a single email if it's sitting still, or continuously for a
duration of 10 minutes if the device is on the move. You just have to keep texting "locate" until you
catch up with it (and hope that the battery's still going). Not the best choice, true, but it gives you
more information to work with.
ALSO, JUST TO PROVE THAT I’M WILLING TO PLAY NICE:
People frequently tell me there are no viruses for Macs, to which I frequently respond that they are
wrong, and then frequently to stab them in their delusional aorta. But, since they still remain defiant
about accepting reality, I will not further shatter that illusion by the allusion of existence of antivirus
programs for Macs.
BUT!
I know that having an idevice lost/stolen still sucks, as I have been witness to the various, related
lamentations. So, if you are an unfortunate owner of an Apple device, these are some anti-theft
options for you31:

Find My iPhone | iOS | Free.
The original lost phone tracking service for iOS. This free app locates and tracks your lost or
stolen Apple devices—not just iPhones but iPads and MacBooks as well—not to mention
ringing the unit, displaying a message for whoever finds it, and remotely lock or wipe the
device altogether. The app is free on iTunes. You do need to be on iCloud, but if you’re a
MacHead, you probably already on it… are in it?... have it…? I really don’t know about
iStuff.

GadgetTrak | iOS | $4
For a little more advanced protection, GadgetTrak offers remotely activated GPS location
tracking, push notifications to trick a thief into giving away his position, and the ability to
use your lost phone's camera from the comfort of your home to take a picture of whomever
took it. It'll cost you $4, but that is much cheaper compared to a brand new phone. (Just
make sure to enable password-protected delete for this app)
31
Also mostly stolen from Gizmodo’s guide.
20
VPNS
Remember our conversation about using public WiFi? If you don’t, read it: here.
Cellphones, more than computers, need to have secure connections, because they are always on and
we use them for EVERYTHING. Now, due to the way cell transmission works, one pretty much needs to
be a government power to monitor and spy on your cell’s GSM or CDMA connection. However, as soon
as you go WiFi, now you are in control of the access point’s provider (or, sometimes, the bad guy who
“pwns” the access point). Again, with the options, I’m gonna give you three (they work on Android and
iOS devices):

VyprVPN | 3-day free trial | $6.77/mo - $120/yr, depending on plan and options
From bestvpn.com: Making their presence felt in the internet space since 1994, with
200,000 IP addresses and 700+ servers, VyprVPN has been a force to reckon with in the
VPN industry. Golden Frog, the company behind VyprVPN operates via its very own private
server clusters based in North America, Europe and Asia. They also own the networks to
these centers, which means they can achieve very impressive speeds, which is the most
important part of a VPN. VyprVPN has an average speed retention of 93% (meaning you only lose
7% of your speed when you turn it on.)
Honestly, VyprVPN is great. Their connection speeds are very good, their customer service is fantastic,
and they are reliable. The only downside is money. (even requiring credit card info for the free trial )
Their $6.77/mo plan is only good for one device, and while it does a good job at hiding your location,
the encryption protocols they use would not really deter a determined bad guy. It does give you 10GB
of secure online storage, so that’s something to think about. Their $8.33/mo plan, however, offers
much better encryption, a NAT firewall, access for two devices at the same time, and 25GB of storage.
So, if you can afford to part with $100 for the year, this is definitely the way to go.

ExpressVPN | $12.95/mo - $99.95/yr | 30 day money-back guarantee
Frequently changing places with VyprVPN as #1 mobile VPN provider, ExpressVPN is also a
good choice, if you have the moneys. They have 50 servers in 39 countries, so you have
options. ExpressVPN has 24/7 (even on holidays) support people that are actually very
good, and willing to work with you for hours, if need be, to solve any issues.
With their plan, you get 2 simultaneous connections, 93-94% speed retention, and 99.9% uptime. It is
a very solid choice, especially if you are looking to put VPN on more than one device (cell/tablet,
cell/computer, etc.)

AVAST SecureLine | 7-day free trial | $2.59/mo or $19.99/yr
I’ve always been a fan of AVAST and what they do, so I do tend to use their products… and,
this is actually my personal choice for a VPN (because I’m a cheapskate, and don’t need the
extra features). This was originally free, but became a paid service as it grew in popularity
and AVAST could not keep up with the demand while providing a good service for free.
With SecureLine, you don’t get that many bells and whistles. There is a limited server pool (9, in
total, in 6 countries), a one-click dashboard widget, and 92% speed retention. If the only thing you
are using your VPN is for connecting to a US-based server, this is a good, significantly cheaper,
option.
Note:
Whichever VPN service you go with, you will, most likely, at least once, be faced with a PPTP vs L2TP vs
OpenVPN vs SSTP choice. Here’s a quick rundown:




PPTP: It’s generally considered as very insecure, not really providing any serious level of protection
L2TP: Good security, but easily locked by country firewalls and tends to be a bit slow
OpenVPN: Is usually the way to go. It’s fast and secure, but is still
SSTP: Is good, but is Windows only, so you will not see too much of this for mobile devices
21
8) TRAVELLING
We do it. A lot. And we always bring a tonne32 of stuff with us. Frequently,
we don’t use most of it, but “it’s nice to have.” While I could go on for hours
about how the world is filled with thieves and charlatans out to steal our
shineys, I won’t; if, dear reader, you haven’t learned that fact already,
experience (and an evening of tears) truly is the best teacher.
In this final section, I will talk a bit about keeping your stuff where you want
it to stay, how to protect your information, and will provide some general,
non-cyber-specific tips that are generally good to know during one’s travels.
INFORMATION SECURITY
If you are paranoid about securing your information while travelling (as well you should be), here’s
what you do:

Hard drive encryption
Data at Rest is a tech term referring to data that is just there (like, in a case of a
powered-off computer/tablet/whatever).
Normally, a bad guy would be able to turn on your device and access the info on it. If
you use a Data at Rest encryption, the bad guy would be prompted to enter a
password as soon as the device powered on, blocking their access to even the startup screen.
Windows, actually, comes with a build-it version of this that, surprisingly, doesn’t
suck, is free, and is natively a part all recent versions of Windows: BitLocker. PCWorld has a really
good guide on how to set it up33. And, after you’ve set it up, you can also use the same tool to
encrypt your thumb drives. Fairly useful.
Now, this is something you would do before you set off on your travels, and does take a bit of an
initial time investment, but it is definitely worth it.

Hardware Encrypted Drives
If you want to take your data security to another level, there are hardware-based
encrypted devices. Two companies that instantly jump to mind are LOK-IT and
Apricorn. Both companies make fantastic portable storage solutions (thumb
drives and portable hard drives) that use military-grade encryption, are travel
tough, and look kinda cool. 
The best part, they are operating system independent, and are REALLY easy to
use. So, if you have information to protect, this is definitely the route for you.

Connecting
I’ve discussed this in depth before, so I’m just going to mention two points: Make sure to have
your VPN going when you connect to a new WiFi and make sure to disconnect when you’re done
using it. Remember: if you are not on the network, your computer/cellphone cannot be accessed.
It’s just that simple.

Logons
If you absolutely cannot use a VPN (or if you have to use someone else’s device) to log onto a web
site, there is no guarantee that a bad guy did not get your log-in. As soon as you can/are back
home, change your password for that site. If you had to log onto a finance site, monitor your
accounts closely for any potential nefarious activity.
32
33
It’s proper, British English *holds up pinky finger*
http://www.pcworld.com/article/2308725/a-beginners-guide-to-bitlocker-windows-built-in-encryption-tool.html
22
SPHYSICAL SECURITY
Depending what places you travel, and at what hotels/hostels you stay, the threat to the security of
your stuff can vary greatly. For example, if you are staying in a hostel, there is a high probability that
an inebriated prostitute will go through your stuff; however, if you’re staying at a 5-star hotel, chances
are that she will be referred to as a high-priced “escort”.
I jest, of course. The chances of stuff going missing from a five-star hotel room are significantly lower,
but it can still happen. So, what can one do? Secure your stuff! Not necessarily all of it, as stapling
underwear to mahogany end tables is generally frowned upon, but you should definitely secure your
valuables (i.e. electronics). Let’s look at some things:

Hotel safes
Don’t trust them. There are many, many reasons why I say that, which I’m not going to get into.
Just trust me on this. Secure-It makes a couple of good travel-friendly products34 that secure your
stuff from while you are either travelling to while you are taking that well-deserved dip in a
refreshing pool. Take a look at them, you might like ‘em.

Laptop security cables (a la http://www.amazon.com/Sendt-Notebook-Laptop-CombinationSecurity/dp/B008A4F8UA/) start at approximately $5. (ok, that one doesn’t. It’s “fancy”) While
designed for laptops, they can be used for many other types of electronics as majority of
manufacturers also include security cable ports on non-laptop items. If you need to leave your
laptop behind, lock it to something sturdy, like a bed frame, or a rabid badger, and go off to wander
the streets of a foreign land with peace of mind.
GENERAL NON-CYBER TIPS
In this very last section of the guide, I shall impart on you several pieces of ancient Chinese wisdom
which deal with travel.
Piece #1: If you don’t need it, don’t bring it
The less stuff you have with you, the less stuff you have to protect.
Piece #2: Use an RFID-blocking wallet35
This will stop bad guys from remotely scanning the information on your ID and credit cards.
Piece #3: Separate your sources of money
Don’t keep all your money in one place, so, in case you get pickpocketed, you still have moneys.
Piece #4: Scan all your documents
If you have copies of all your documents easily accessible in your email, you will thank me if they
are ever lost/stolen.
Piece #4: Avoid beggars and gypsy-analogues
While it is a human desire to help someone in trouble, remember: people lie. Most of the beggars
you see in tourist places are exceedingly good at conning you out of moneys.
Piece #5: People lie
Experts are not always experts. The food is not always “safe”. The chloroform-soaked rag does not
smell like cookies.
And, lastly, Piece #6: Do research
Before setting off on your grand adventure, do your research. Learn local laws, customs, and basic
phrases. If you don’t look like a hapless tourist, you won’t be treated as such.
34
http://www.secure-it.com/shop/product_info.php/products_id/187 and
http://www.secure-it.com/shop/product_info.php/cPath/80/products_id/258
35
http://www.thinkgeek.com/product/8cdd/
23
THE AWESOME STEP-BY-STEP GUIDE
(A RIDICULOUSLY ABRIDGED VERSION)
1. Get an Antivirus that doesn’t suck. If you want recommendations, read the damn guide.
2. Clean your Computer!
a. Uninstall crap you don’t need/use.
b. Actually clean the thing.
3. Install a VPN! Pick one from this site: http://www.bestvpn.com
4. Stop using Internet Explorer! Get Chrome or Firefox.
5. Install security addons for your browser:
a. Script blocker: Chrome|NotScripts Firefox|NoScript
b. AdBlocker: https://adblockplus.org/
c. Web of Trust: https://www.mywot.com/
6. Passwords:
a. Stop being stupid trying to hide them, you are not winning.
b. Be smarter in making up passwords
c. Use a password manager: https://www.dashlane.com
7. Social media: USE YOUR PRIVACY SETTINGS, DAMMIT.
8. Email: Don’t poke stuff you should not poke. (applies to life, in general, as well)
9. Cellphones/Tablets:
a. Install an Antivirus. (Yes, cellphones can get viruses)
b. Protect your stuff from theft
c. Use a VPN on it (same list as above)
10. Travelling:
a. Leave stuff you don’t need at home
b. Use protection when hooking up with random networks and people
c. Don’t be a target
24
ABOUT THE AUTHOR
Alexander Shulman, AS, SA, Sec+, CDMC, CDFE, WWBBD
is a generally horrible human being, surviving this harsh
and cruel world primarily on coffee and hatred.
Originally born on the seventh level of Hell (it used to be
called a “Circle”, but we got an elevator now… it’s much
nicer, much more convenient), he moved to New York City
at an early age, where, as a teen, he began his diabolical
plan™ to take over 1/8th of the worldalso™.
At the moment, the plan™ has been put on hold due to
badger-related reasons.
COFF
WHY I WROTE THIS GUIDE
All jokes aside, personnel and information security is both my job and my passion.
Due to my strong technical background, I am constantly approached by friends and coworkers with
questions ranging from how to protect themselves on the internet to why their personal laptop seems
to hate them. While I’m more than happy to fix things for them (I love solving the puzzle of the
problem), due to my job, I know that I won’t always be within an easy reach.
By writing this guide, I’m hoping to put some of the mystique of what I do aside and ‘put the power in
the hands of the users,’ as they say in the IT realm. After all, knowledge is power. And, the only way
to survive in this frequently changing world, full of the Internet of Things stuff, is to learn at least a bit
about it.
Hopefully, I’ve succeeded and you learned something while getting a laugh.
If not, *shrugs*
With best regards,
Alex
25