BUSTED BY ECCIE!

warren's Avatar
I use Ubuntu Linux and google chrome and it has very little issue and is super fast.
I know this my not help but avoid virus and spyware is easy with linux.
I use Adblock Plus for the ads on eccie...
two surefire ways I use:

1. Budman is right, I can't live without my logictek mouse anymore without the extra buttons, but I'm a geek. Get one and the default for the button under the scroll opens a new google search window, witch will cover up any window open. problem fixed. little mouse button your so won't even know you hit a button or clicked it.

2. I have dated intelligent women before, if they saw me looking at a blank search screen, they would know something was up. (yeah, paranoid, but if they are right, is it still paranoia) I keep two browsers open, and one minimized at the bottom with Facebook or whatever open. When someone walks in, I just click the other browser I have minimized and it opens covering the other window.


P.S. I learned the second one from a friend who liked to check out porn at work
Colonel Jim's Avatar
I use Firefox and when I'm on hobby sites I always open another tab with something like a news page or photography/aviation/any-hobby-but-this-one. When I see or hear her coming close, it's a simple matter to click on the other tab and read intensely.
The Dark Passenger's Avatar
But....who will keep these wonderful ladies in business if we all stopped cheating on our wives?

On the wife and browser issue....special warning for those with iPads....it's very easy to get busted. (I did get busted one time via iPhone -- my last non-hobby thing.) Use a browser which offers password protection, I am using Mercury. I can't PW protect the Pad itself But staying UTR takes work. Originally Posted by TexanAtPlay
One the iPhone/iPad it's very easy to clear your browsing history. Simply go to Settings > Safari > and you will find 3 options: Clear History/Clear Cookies /Clear Cache. Click on all 3 and your tracks should be covered.

On the desktop, both Safari and Chrome offer a Private Browsing mode that will clear everything for you once you close the browser. I believe FireFox has a similar setting.

On the Mac specifically, there are swipe gestures that will quickly move you between different desktop spaces. For example, you could have one desktop space with your browser and another desktop space with your mail program. If the wife or SO happens to walk in, a quick swipe on your mouse or track pad will slide the current desktop off screen and slide in a more innocent desktop space. Problem solved.
I use an iPad and keep it password protected. I sit in the same room on opposite sides with my wife, I browse while she reads. If she gets up, I turn off the iPad and close the cover and say "honey can I get you something?"
OldGrump's Avatar
You could keep several tabs open to business sites. Just click on one of them.

The windows+M works, but you are probably browsing with your mouse so you finger is already on the "trigger".
PLEASE get rid of the popups - it about ended my hobby days before they really got going! Originally Posted by mkbrown
The pop-up blocker in Google toolbar works for me. I did not even know that ECCIE uses pop-up ads until now.
Diabolo's Avatar
The pop-up blocker in Google toolbar works for me. I did not even know that ECCIE uses pop-up ads until now. Originally Posted by edm_fw
He isn't talking about pop-up ads but instead the pop-up notification that appears when a user receives a new private message (PM).
He isn't talking about pop-up ads but instead the pop-up notification that appears when a user receives a new private message (PM). Originally Posted by Diabolo
Oh. I forgot about those because I turned off PMs a long time ago. I was getting too many stupid questions from people I wasn't interested in talking to.
Guest010619's Avatar
Just have the CPU connected to the power strip and hit the kill switch. Or pull the plug with your toes...
OUCH! although I see you still managed to post about it later...... you must've had a hell of an excuse for her lol
I use Ubuntu Linux and google chrome and it has very little issue and is super fast.
I know this my not help but avoid virus and spyware is easy with linux. Originally Posted by warren
I use Ubuntu as well (2 years running) and it works GREAT!

there is a version called "Ultimate Edition" which has 3 flavors, Normal, Gamers and Lite.

Normal and Games come in 32 bit or 64 bit normal is what I use.. Gamers has tons of games installed..

Lite, however is good for lower powered machines.. I run it on a p3 with 512 meg ram and it works fine)

the new version of Lite looks alot like XP too
I read this article on a survivalist site but seems it would work well keeping everyone safer...

James,
I took notice of the malware warning in your blog regarding Bitcoin and some of the suggestions to thwart it. I'd like to throw my 2 cents in and suggest your readers check out ironkey.com Ironkey makes a thumb drive that is like no other device on the market. I just bought one and I love it. I will describe what it does and why your readers may want to consider getting one as part of their COMSEC arsenal. I purchased the 16 GB model and the cost including delivery was $228. Yes, that is expensive, but wait until I describe what it can do.
A little history on this device is in order. It was designed by U.S. Naval Intelligence and the largest purchasers of this product is the U.S. Government. I know what you're thinking, if the Government knows about it, I don't want one. The hardware and software for this device is devoid of a back door and the mathematical algorithms that trigger the cryptochip are totally random, not even Ironkey can unlock them once they are initiated. They warn you that if you forget your password you're on your own.
1. When you insert the 2.0 USB device for the first time you'll be taken through a process to get it going. I takes about 20 minutes and that includes setting up your Ironkey account. You'll be given the option to "back-up" your data on Ironkey's servers. I chose not to exercise that option for obvious reasons. The web site has great tutorials for first time users (highly recommended)
2. The set up process has you create a password for the device.
3. Now the fun begins. The next time you plug it in, a menu pops up and you have to enter your password. If you enter the password wrong more than 10 times, the memory of the device will be permanently bleached (erased) and it cannot be recovered. Worried about key loggers? Key loggers are a real threat to your privacy. Hackers can actually log what keys you are using and identify all your passwords as you type. You can type in your password if you wish but I don't recommend it for that reason. There is a little icon on the start up menu and when you click on it a visual QWERTY board pops up on the computer screen. You simply "click" your password with your mouse instead. Even this method can be hacked if the hackers are really sophisticated so Ironkey answers that problem as well. Within the QWERTY board there is a command that allows the QWERTY board to be "shuffled" Basically all the letters and numbers get scrambled and will not be located where they would normally be so you can click your password in and if anyone was actually trying to decipher it they would not be able to.
4. The entire device is water proof. It is made of steel and you can drive over it with your car or throw it against a wall and it won't damage it. The entire system is encased in a hard resin epoxy so that if you tried to break it open it would destroy the cryptochip beyond any hope of recovery. You can kind of get the picture of where this is going, this company takes privacy seriously.
5. Here is where this thing gets really interesting. In the control panel there is an application called "identity manager" It works in a couple of different ways, and here is the first example. You click on it, then click on "add" and type in the web address where you want to go and the passwords that go along with it such as your bank accounts. Once you've done that you simply open the "identity manager" and click on that account. The system will launch the web browser, fill in your passwords and log you in all by itself so that key loggers have no chance in tracking your key strokes. The second way is to go to your web sites yourself and enter your own passwords. After you're done, you'll notice a brief pause and wonder what is going on. The system will pop up a screen and ask you if you want the "identity manager" to remember this and do you want to add it to the "identity manager" If you say yes then you have essentially done what I described in step #1 above.
6. So you're saying to yourself: "So what, I'm still on the net and therefore I'm still vulnerable" Well that's where you'd be wrong. You see, the Ironkey has it's own built in Mozilla Firefox web browser and this particular version has an integrated feature called "Secure Sessions" that can be toggled on and off mine is always set to the "ON" position. You can also import other applications into it such as Internet Explorer and Outlook just to name a few. During "Secure Sessions" you are invisible on the net. You don't exist at all. The signals "tunnel" through existing traffic without anyone knowing you're there and it gets even more intense than that. Let's say I'm writing you an e-mail like I'm doing right now and I'm operating in "Secure Session Mode" I can actually choose what part of the world I want to appear from. That's right! If I want my e-mail to originate from an IP address in Africa then I can do that. I can bounce it around the globe to multiple countries or continents if I choose. If I don't choose to do so, it'll randomly do it on it's own anyway. For true anonymity you do need to have an e-mail account that was not set up from your computer. Yahoo, GMail and others log the original computer that the e-mail account was first set up on. The public library or some other random computer that can't be associated with you comes to mind when doing this. [JWR Adds: I concur on the need to use tunneling. Even for those that don't opt to use Ironkey, I recommend the web-based Strong VPN tunneling service for both e-mail and web browsing.]
7. Anything you do on the Ironkey will not leave a trace on the computer it is plugged into. Period. We don't ever want to end up on some "undesirables list" so should your computer ever fall into the wrong hands there will never be a trace of your activity on the net or any application that is on the computer while using the Ironkey. The files extracted will show up on your "Recent Files" menu but when you click on them to open the application you get a message telling you that you need to plug a computer in. That's operating under the assumption that you get sloppy and forget to clear the "Recent Files" on a daily basis. So why do you get a message telling you you need to plug a computer in to view these files? The answer is simple, the Ironkey is it's own mini computer inside a thumb drive that borrows needed files from your drive to operate but never leaves a trace that it did so. I turned a friend of mine (college degree in computer guru science) loose on my computer to test Ironkey's claims. He can't find any history on the drive of any activity I've had while my Ironkey was busy doing what it does.
I think the Ironkey is a must have piece of COMSEC hardware.
Thanks for the work that you do, I hope you and your readers find this helpful. - M.Y.
---------------------------------------------------------------------------------
Any thoughts?
I like the idea of the IronKey because, if your SO, her lawyer, or the D.A., tries to find where you have been all they have to do is check the registry. This is how they find out what you have searched even after you have cleared the history. I am not computer savvy but want to learn more to help cover my tracks. I think the Ironkey might be a blessing.

I know thises posts I am leaving are not about stealth while the SO is in the room, but.... why would you do that? Think your just asking for trouble and trying to get caught!!!