SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Downloaden Sie, um offline zu lesen
The Veterans'
Guide
to Protecting Your
Privacy
and Staying Safe
Online
JINGER JARRETT
Copyright
2013, Jinger Jarrett, All rights reserved.
Apart from any fair dealing for the purposes of research or private
study, or criticism or review, as permitted under the Copyright,
Designs and Patents Act 1988, this publication may only be
reproduced, stored or transmitted, in any form or by any means,
with the prior permission in writing of the author. Inquiries
concerning reproduction outside those terms should be sent to the
author.
The use of registered names, trademarks etc. in this publication
does not imply, even in the absence of a specific statement, that
such names are exempt from the relevant laws and regulations
and therefore free for general use.
The publisher makes no representation, express or implied, with
regard to the accuracy of the information contained in this book
and cannot accept any legal responsibility or liability for any
errors or omissions that may be made.
Author Website: http://jingerjarrett.com/
Dedication
This book is dedicated to my daughters: Ashley, Danielle and
Alexandra. They are the most important people in my life and
have done more for me than anyone. You have no idea how much
I appreciate it. You are the main reason I am still here.
Gallant Few
http://gallantfew.org
Proceeds from the sale of the software with affiliate
programs that are listed in this report will be donated to help
the work and mission of this organization. (Please feel free to
distribute this as widely as possible in support of Gallant Few.
You may give it away but please do not sell it.)
INTRODUCTION
If all that cloak and dagger stuff some veterans wanted to
engage in online worked, I wouldn't have the ability to tell your
life's story in 15 minutes. The problem with lying or trying to
mask the details of your life without a really good cover story is
that eventually it catches up with you and destroys your
reputation, you get exposed, and everyone knows who you really
are, or you end up compromised and hacked. If you're a veteran
who owns a business, you don't want to risk having your business
compromised, your reputation ruined and all your money stolen
because you didn't protect yourself.
There are real ways to protect your privacy online, reduce
your chances of getting hacked and keep your information safe.
I've been on the Internet since 1995, and I was a computer tech in
the Army back in the 80s. I've learned a few things along the way,
and I want to share those things with you so you stay safe and
don't get ripped off, scammed or have your privacy compromised.
There five lessons plus the lesson on navigating the Veterans'
Affairs system to help you get your benefits. Part of the course is
in text to present the resources you need for your computer. The
rest is presented in video to show you how to get the job done
quickly and make yourself secure.
Use this information for good. It is meant to protect you and
keep you safe. This is my gift to the Veterans' community. I didn't
serve in combat, and I was never combat arms. However, I can
help protect you now if you are willing to listen. Thank you for
your service. No one left behind. Not on the battlefield. Not in
life.
Sincerely,
Jinger Jarrett
http://jingerjarrett.com/
Lesson 1 - Secure Your Computer
Starting right now let's secure your perimeter online and
offline as far as protecting yourself against intruders on your
computer and the internet. Although some of this information will
seem basic to some of you, to others it will really open your eyes
to the threats online. Use this material to your benefit and stay
safe.
One of the most important lessons I ever learned when I was
in the Army was "hide in the open." We went to the field once
when I was in Germany. The rest of the time we were working on
mission, which was handling the communications for all the bases
where we had detachments. Running communications, both
secure and unsecure. I was a crypto tech. I worked on encryption
devices like red phones.
When we went to the field, we had a refresher class on
camouflage training. Standing 20 feet in front of us was a soldier
no one saw. Why? Because he painted his face and camouflaged
his gear so well he blended right in.
The lesson is that if you blend right in, people don't generally
mess with your stuff. The most vulnerable are those who act like
they have something to hide. People will mess with you. I have
been hacked twice since I came online back in the mid 90s: once
on my Google account by someone in the Phillipines and once on
my web hosting at Hostgator. Both were in the last 2 years.
(Someone installed 100 websites on my account. Once I found
out about it, I changed hosting.)
Yep, I'm loud and I'm proud. I make a lot of noise because I'm
a marketer, and you don't make any money if you don't market.
Doesn't mean I have my stuff hanging out there for anyone to see.
The first step here is to secure your computer. The easiest way
for hackers to get into your computer is if you have Remote
Desktop enabled. Disable Remote Desktop by going to Start
(bottom left corner), Control Panel, and look for RemoteApp and
Desktop Communications or something similar and disable any
connections you have.
Next, make sure your operating system is up to date. This is
an easy one. Set automatic updates and keep it up to date. Hackers
exploit these security holes, and if your software is up to date, this
is the easiest way to be protected. This is also on the control panel
screen. Windows Update. Click on it and go to change settings
and set your system to automatically update.
Three is to make sure you have a good anti virus and firewall
on your system. Get rid of the stuff that comes with your system
because there is plenty of free stuff online that works. I use to use
Avast! and it caught a trojan on Facebook for me. I changed to
AVG because Phoenix said it was better at protecting your
computer. It is very good and will protect you online and offline. I
also use Windows Firewall. It is available through the control
panel. Open control panel and then open Windows Firewall. Turn
it on.
Install Malware Bytes or something similar and use it to scan
for viruses, adware, etc. This program is free. It is good for
finding that stuff that is slowing down your computer.
Next, you want to clean up your computer. Temporary files
clog your computer, corrupt, and cause problems. For this I use
Slim Cleaner, and I clean and defrag my computer with it about
once a week. You may not use your computer that much. Do it at
least once a month.
Make sure all the software on your system is up to date
because this is also another way hackers exploit your system.
Install a different browser than Internet Explorer. I use Google
Chrome. It's fast, lightweight and it's backed by a multi billion
dollar company run by a computer geek who loves to make tools.
Firefox is also good. (Make sure you read the advice from
Phoenix as he disagrees with me on this issue. Whatever you
choose, it is important to me you get the protction you need.)
Back up your data. If your computer crashes, you don't want
to lose your valuable stuff. I use Live Drive. It is a simple to use
program. Cost you about $8 a month. There's others. I like Live
Drive because it's so easy to use, and they make multiple backups
of your stuff so you can find stuff from up to 30 days ago.
Finally, create a separate admin account. This is an account
you will use to install software or work on your computer if
anything goes bad. Go to the Control Panel and click on Users.
Create a new user called anything but Admin. Name it something
that is not easy to guess. Use a secure password. Write it down if
you have to. Then go to whatever user you are using and remove
the admin privileges and add a password.
One word about passwords here: Semper Fi, Sua Sponte or
God are not good passwords. Never use words or identifying
information like birthdays. Never. When we start talking about
protecting yourself online, I'll show you how to handle
passwords.
That is all for today. Tomorrow we start working on the
internet.
Homework Assignment
1. Turn off Remote Desktop.
2. Update your Windows.
3. Install antivirus and firewall. http://avg.com
4. Install Malware Bytes or something similar and run a full
scan. http://www.malwarebytes.org/
4. Clean up your computer. http://slimcleaner.com/
5. Update your software.
6. Change your browser. http://www.google.com/chrome/?
7. Set up a separate admin account.
Here is a security checklist to help you. It provides further
instructions and tutorials. If you get stuck on any step, ask. Don't
minimize this step because each day we will build on this. When
we're finished, we'll have you as secure as you can possibly be.
All the tools included here are free.
http://www.selectrealsecurity.com/security-checklist
Lesson 2: Usernames, Passwords, Email and
Shopping Online
Your next step is to examine your usernames, passwords,
email and online shopping habits to see if there is a better way to
make yourself secure.
The equipment I worked on in the Army encrypted the data
before sending it across Arpanet. It is a 128 bit random cipher,
and it has never been broken by the enemy. It was compromised
on the USS Pueblo, 1968. Never broken though. I mention this
because this is the minimum strength encryption on your
browsers.
Usually when someone is compromised online, that person
has inadvertently downloaded a program that records keystrokes
on the computer. Downloads come from either your email or a
site you have visited, so make sure your browser and antivirus are
always up to date so this stuff doesn't get missed. You can look
up hacking statistics in the search engines. I won't go into big
details here. Knowing why it's done helps you protect yourself
against it.
http://www.websitedefender.com/web-security/web-
hacking-facts/
Hacking may be done by someone who knows you. That's
why it's so important to secure your information in a way that you
are not compromised on a personal level. Easy passwords are also
a problem. The longer and the more random a password, the
longer it takes to crack.
When you download something in your email, make sure you
run your antivirus. It's why I use AVG. It tells me if an
attachment is infected before I download. Also, if you receive
"official" emails, run your cursor over the links in the email to
make sure they are legitimate. Not long ago I received an email
from Yahoo telling me they were shutting down my account. Not
so. In official emails, like Pay Pal, they know your name.
The importance of usernames is in protecting your identity
and privacy. If this is your concern, then make sure you don't use
a username that connects you to who you are. I've done
background checks on people to find out if I was being scammed,
and usernames are a great way to track people down. All you
have to do is drop the person's username into Google and follow
the trail. Since I own a business and am branding, using my name
helps others find me.
Same thing with email. Never post your email on a website.
This is a great way for others to find out stuff about you and those
sites get spidered. Your email ends up on a list, and you get tons
of spam.
Don't give your email to people you don't want to have it. It's
a good idea to have at least 2 email addresses, one public and one
private. For a public email, I usually use Gmail. With billions of
dollars behind the company and a techno geek running the show,
it works pretty well. My private email, which I pay for, is at
Yahoo.
Passwords are one of the easiest ways to get compromised.
Sua Sponte, Semper Fi, God, password and any identifying
information related to who you are is the first thing people use to
try and hack into your accounts. More than one vindictive
girlfriend or boyfriend has used this information to do deadly
deeds, so make sure you use passwords that are random and
secure. Add an extra layer of security to protect yourself by
password protecting your desktop, and if you use the tools I'm
about to recommend, have a master password.
Nothing is hack proof. Everything from the Marine Corps to
the IRS has been successfully hacked. It doesn't mean you can't
protect yourself effectively and slow them down to the point they
leave you alone.
If you are banking, shopping, or doing any type of activity
online that has to do with money, use 17 digit random passwords
for those accounts. Anything you want to really protect, use 17
digit random passwords. When you pay for your purchase, make
sure it shows https:// in the browser address bar. This means that
it is secure and the site has a valid security certificate.
Limit your information. I use Pay Pal to shop online a lot,
especially with my business, and it helps me to control where my
financial information is and where it is stored. (It is also owned
by Ebay, another billion dollar company, and they take
compromises in security seriously.)
The fewer places you have that information available, the
better. Control your important information. You can also buy
American Express, Master Card, and Visa gift cards, as well as
use a prepaid debit card online instead of your regular cards to
protect yourself. This gives you an additional layer of security,
especially with prepaid debits because you can buy and recharge
those at a CVS or other store that sells prepaid debit.
Now if you're like me, I'm too lazy to remember all those 17
digit passwords, so I use tools to help me keep track, and these
have an added layer of security for you by allowing you to use a
master password. This means before the password is entered into
the form, you have to enter the master password into the software
first. Two tools you can use, and both have free and very low cost
versions and are available on multiple platforms are:
http://roboform.com
http://lastpass.com
I use Roboform because I can load it onto a flash drive and
then take it with me. Helpful when you are on public computers
and need your passwords.
One caveat here: don't put your shopping information like
addresses, phone numbers, credit card information or anything
like that into the software. Enter that manually on sites as you go.
Avoid having that information available on your computer unless
you absolutely have to.
Some additional tips here:
1. To protect your surfing habits, set your browser to clear the
history and files when you close it. Look under Settings to do
this.
2. If you have sensitive files on your computer you want to
make unrecoverable, then use Slim Cleaner to shred them.
Periodically wipe the white space on your drive too.
3. If you need to send secure email, use secure email tools or
email accounts that actually use encryption to encrypt your
information before it is sent out.
You can get many of these tools for free, and all these tools
will keep prying eyes out. Here's a good one that's been around
for years. (Make sure you read the terms and conditions on this
stuff so you understand what you are getting and what they can
legally do.)
http://www.hushmail.com/
4. Want to surf anonymously? Many of your browsers
allow you to switch to safe browsing or secure
browsing. (In Google Chrome it's incognito. Use the
box in the top right corner of your browser to access
this feature.) You can also look at websites online
without having it show up in your history.
http://hidemyass.com
Just pop the URL in and visit the site.
In the next lesson I talk about Google, and then we'll move
onto Facebook. Since so much hacking goes on with Web 2.0
sites, it's a good idea to know how to protect yourself here.
Google also has some great tools like email, Google Voice,
Google Drive and others you can use for free.
Homework Assignment
1. Download one of the tool bars and set it up on your
computer. Use it to generate your passwords. Make sure you add
a Master Password.
2. Update any passwords you need to update to secure your
accounts.
3. Remember: information control. The fewer sites where you
have sensitive information, the less opportunity for compromise.
Lesson 3 - How to Use Google to Secure Your
Privacy
Today's lesson is in video. This is so I can show you all the
cool tools Google has to offer to help you protect yourself online.
In order to access this lesson, you will need to use the private
link. I don't want everything I know to be public knowledge.
Access the link here:
https://www.youtube.com/watch?v=Gov7PtBsMQ8
I used BB Flashback Express to make the video. It is free.
http://www.bbsoftware.co.uk/BBFlashBack_FreePlayer.aspx
Homework
1. Sign up for a Google Account. It is free.
https://accounts.google.com/SignUp
2. Once you have signed up and verified your account, then
go to the Google search and search for Google Products. This
allows you to access all the Google products and set up the
measures I suggested in the video. I have included the link here.
However, Google often changes them without updating, so if you
can't find this page, then it has been moved.
http://www.google.com/about/products/
Final Note: When you set up your security questions, don't
use things that are easy to guess. Make it something you
remember. For example, Mother's maiden name: none or some
other random answer that only makes sense to you. You can also
use a backup email if you forget your password.
Lesson 4 - Protecting Yourself Against
Identity Thieves, Stalkers, and Keeping
Yourself Safe
This video shows you three different places to use to help you
identify where your information is available online and then
shows you how to erase this information to protect yourself.
Sites Used
http://mylife.com
http://spokeo.com
http://google.com/
Homework
Sign up for a free account with My Life. Use this site to help
you purge the internet of records you don't want others to have. If
you have not signed up for a Google account and are using this to
help you secure your identity, then make sure you do so.
If you plan to use the dating section of My Life, make sure
you read the online dating safety tips first.
https://www.youtube.com/watch?v=oh_x1X3YU-o
Lesson 5 - Protecting Yourself on Facebook
Facebook is one of the top sites on the internet. It's also one of
the most dangerous if you don't understand how to protect
yourself. Hackers, viruses, and other stuff can be a landmine.
This video shows you how to protect yourself on Facebook.
https://www.youtube.com/watch?v=VBnnQYTe8Ls
Lesson 6 – Google Maps: Protecting Your
Physical Location
I know where you live. I know what your house looks like.
Not really. If I wanted to find out though, then this is the tool I
would use because it uses satellite technology, along with using a
private company called Tele Atlas. The information is quite
comprehensive, and as you can see in the video, reveals a lot
more information than you think. That's why, if privacy and
security is that important to you, make sure you only use your
address as needed to do things online and always keep it secure.
One suggestion I would make is to get a post office box. Have
all your mail sent there. Now it may not work when you are using
government agencies. It will help you cover your tracks with
everything else.
https://www.youtube.com/watch?v=LYQQ7bXsBGg
Lesson 7 – Navigating the Ebenefits System
Benefits are an important part of a veterans' life.
Understanding how to get your records, find benefit information,
see what benefits are available to you is crucial to your success in
collecting those benefits. Here is how you access the Ebenefits
system, access your military records and check to see if you have
any state benefits available to you.
https://www.youtube.com/watch?v=9T8mrdY4oMc
Bonus: Additional Tips to Help You Stay
Secure
I contacted a fellow veteran who is also a security consultant
and asked him for his best advice. Here it is.
If you would like to contact the Phoenix, this visit his site:
http://warmastersapprentice.com/
1) Touching the keyboard, can give away your 'position' so a
keyscrambler is an absolute, "encrypting" every single key that is
touched, so you and those that "need to know" will get your
message, and those that should not, yet still try are going to have
one heck of challenge breaking into an "A and B conversation," to
C their way into your data. If on a budget, a free to quite pricey
version can be found here. http://www.qfxsoftware.com/
You may argue that I.E.. is lacking in many aspects, but I
have taught a legion of beginners to so-called experts and even
alleged elites--where the holes are that can be filled--with all of
the many of 'booby-traps', alarms of a sort, and downright 'nuclear
weapons' should anyone dare to even gaze at [their] servers, or
any one workstation that any [lazy/apathetic] user might take a
seat in front of. [Civilians] can never be trusted to be completely
diligent as you or I my Mistress. None. I have had to have a
"Plan Bravo to Zippo" to compensate for each that I have had to
protect from bodily harm to economic ruin. Including, having
their own mammals that worked with them, alongside them--
stealing from them--innovative ideas that could help our wounded
to those wounded in spirit.
I cannot stress the importance of having encryption within the
hardware that only a finite few would or should, have a need to
know about. Please, consider my words...
2) As far as privacy is concerned, "Big Data" is or "Big
Brother" has been alive and well, as you wrote [correctly], since
the mid-1950's. And it was 'given up', "the Arpanet," or "Ape-
Net," as it was known in my time "in the machine" (my military
service) and in a certain circle prior to that, in the prime simply
because it can never be fully secured, and hence the worst
decision was made: handing it over to public sector mammals in a
municipality near you and I.
It was "all downhill from there."
To [semi-] protect each that uses this tool, like 'the Flame that
can provide warmth and comfort'--and kill you--each, as you also
stated correctly, must never fully rely on anyone else, as even the
postal service 'sells' each of our data without our consent, and oft
times without our knowledge.
Hence physical 'junk mail' appearing in our mail-box at the
end of our driveway's. Or 'Spam' in our most secure e-mail
accounts. We are betrayed every nanosecond, every single day.
So to "cover" of tracks, or obscure the trail behind us (how
copy?), I would and have provided the following [options] to
captains of industry, to those with children they want to protect
while on any child-oriented site, a [serious] set of or multiple
layers of [armor]. Most can be found here.
http://www.cnet.com/
Besides
1) "Cookienator": Automatically removes malicious 'cookies'
that report your usage, or 'track' how, where, and what your
viewing (each "page"), and any and all "Third Party" or 'uninvited
guests' that want to walk in on your [computer] system, no matter
how big or small.
2) IObits' http://www.iobit.com/ "Advanced SystemCare"
(version 6.3 is the current), and the "IObit Malware Fighter": are
titans that few will attempt to penetrate if they try to set a "bot" of
some sort to a "Trojan" program through a provider into the
systems connected to it. 'We' got burned last year via COX, as
well as Yahoo, MSN, and Google, by some heavy hitters in
Europe last year, and though they got busted by a collaboration of
"folks with stinking badges," the 'bots' they had sent out prior to
their arrests were "timed' and retrieved user data which was sent
to another part, a separate server or servers, at another position in
another part or region of our planet.
A note regarding Advanced SystemCare: In settings, the user
must take some time, and go into the setting of the software under
"Ignore List," then remove the plethora of cookies 'they' believe
most "go to" most often. One has to look for the 'Browser
Cookies' tab, then remove what is seen from the list on the right
(Cookies to keep), to the left (Cookies to Delete), so any trace,
anything that is overt to sublime is safely removed. Each has a
scanning and defrag utility embedded that can be set up easily.
And IObit has a separate 'Defrag' software package as well--that
anyone--that takes I.T. security an 1/8th as seriously as 'our'
cadre, and I mean you and I alone, should definitely have in their
'armory'. And each can turn off the computer they are installed
on--"Off."
3) "AVG Anti-Virus Free Edition 2013," is some really
hardcore, "high-speed, low-drag" [Sierra]. If you use it, I pray
you will use it wisely and prudently. You can hurt somebody
with [that thing] and "its all funny until some loses an eye."
All are, in a way, part of a "fire and forget" 'alarm system',
wholly attached to an electronic arsenal...
4) "CCleaner": http://www.piriform.com/ccleaner (that is
not a typographical error) by these [friendlies], is quite good for
removing any 'junk files, including anything that is intention set
by the Google browser by any that chose to use it, and any logs,
or any other forensic data, that could and would be used to "sell
you," or persecute you, by any hacker of any skill level. There is
an 'enhancement tool'--aptly known as CCleaner Enhancer for a
'military' cleaning and removal of underlying 'junk' programs on
any system reach out for and take up space on anyone's system.
In the 'Settings' tab, under 'Options', you should set the option for
"Secure file deletion (Slower)" which makes a 35 pass--'Very
Secure Overwrite'--so "bad-guys cannot even find what you have
done nor where you have done it.
5) "Glary Utilities": http://www.glarysoft.com/ found here,
does much of the same as CCleaner, but there are a myriad of
'definitions' out there, none exactly the same, so it is prudent to--
in this case--"kill them all"--in a 'crossfire' of a sort. If one utility
does not, or cannot do the job completely, another Bravo-Foxtrot-
Gulf from another position probably will...
I absolutely do believe in "overkill," but I believe you already
knew that about your apprentice long ago...
6) "Spybot - Search & Destroy" http://www.safer-
networking.org/ (I just love their name), found here along with a
serious review, should and can, be set to "go green" as soon as the
user turns on their system, to just prior to connecting to the 'Net,
which, in turn--SHOULD BE BEFORE THE USER CONNECTS
THEIR ETHERNET CORD TO THEIR MODEM. It is designed
to "cover the user" as "they go in," no matter which browser each
uses, and hence, the inherent liabilities of any and all browsers--
including--Googles, which are legion (more in a minute about that
version of 'Chrome'). And after disconnecting from the 'Net, a
built-in "Search & Destroy" utility (you know me my dear Sister;
"back up, back up, back up." Did I, or can I say "back up" or
"crossfire" enough? They bring an ill-advised attack, my tripwire
(think a "Claymore Mine" attached to an I.C.B.M.) goes "BOOM"
and then some, incinerating anything and everything, that sets it
off.
7) "Malwarbytes 'Anti-Malware' software" is a very good
tool, but I 'update it no less than 3 to 7 times if I have a system
attached to the 'Net, as a new version of attack is always a threat,
and hence it is prudent to carry "rounds for any and all new
occasions" not known before "we go outside the perimeter." So
even if a 'pop-up' stating that a new definition is not shown, if you
[click] on the tab "Update," then the 'button' "Check for Updates,"
8 out of 10 times, a slightly new version and hence definition
from a wholly new threat is ready for the public should any be so
diligent in their endeavor for a secure Internet experience.
Hiding in the Open: "Stealth"; 'Phoenix' Style
Again, I strongly suggest, no matter what software program
each may be comfortable with, complacency can "leave a mark."
So "Tor," and "Jon/Do", help augment your Internet
presence/camouflage, and make any and all that might try to track
the user more difficult. It is infinitely harder to hit something that
cannot be seen in the prime...
If you really 'need' to use Google, or in any other browser;
1) Abines' 'Do Not Track Me', http://www.abine.com/
2) And 'Ghostery', http://www.ghostery.com/ found here,
does more than help "cover you as you go in," on any and all
known browsers--they have a 'plug-in' for everyone on their home
site--no matter which browser each uses or is ultimately
comfortable using.
3) 'AVG Do Not Track' though very good, disables itself
(very different than the Abine version) if you are in "InPrivate,"
mode in Internet Explorer, or "Incognito" mode in Google.
4) Within Googles 'Settings', the 'plug-in' 'Disconnect', an
extension which stops major 'third' parties and search engines
from tracking the webpages you go to and any searches you do,
should absolutely be installed. And on a side note; Google keeps
any and all search attempts you might make--forever--and worse,
every "Tweet" has been archived at the [U.S.] Library of
Congress eternally as well.
Get Additional Help
Thank you for taking the time to read my report and watch the
videos. Questions or comments? I'm always happy to help. You
can contact me as follows:
Facebook – http://www.facebook.com/jingerjarrett
Military Veterans Worldwide: Vets Serving Vets. Jobs,
Benefits and More. - This is my baby. We're here to serve
veterans. Tons of content and resources, as well as personalized
help at the individual level to help you get what you need. We're
volunteers, and this is a labor of love. Started out under a different
name. Now we serve veterans worldwide.
https://www.facebook.com/groups/usmilitaryveteransdrea
mjobs/
My Support Desk – http://jingerjarrett.com/support/ - I'm
always happy to help by asking any questions you have.
About the Author
Jinger Jarrett is a former US Army soldier (1982 - 1986). She
served with the 535th
Signal Company in both Grafenwoehr and
Nuremberg West Germany from 1984 – 1986 as a 32F, Fixed
Ciphony Repair. Her secondary MOS was 71L, Administrative
Specialist.
From 1991 – 1998, she served in the Michigan Army National
Guard, 1460th
Transportation Company, Midland, Michigan as a
71L. She transferred to MTC at Camp Grayling where she
completed the 46Q, Print Military Journalist course and then
worked in the Public Affairs Office. With the help of the GI Bill,
she earned a Bachelors of Applied Arts with majors in both
Journalism and English Language as Literature.
Since 2001 she has owned an online business. She teaches one
person businesses how to start a business online and then market
online for free. Her book, ”Hour of Power: When Jesus, Zen and
Quantum Physics meet the US Army” is available on Amazon, as
well as all major online digital bookstores and is designed to help
beginners to develop the right mindset for succeeding in online
business through the use of Quantum Physics and the laws of the
universe.
Website: http://jingerjarrett.com/
Amazon: http://www.amazon.com/author/jingerjarrett

Weitere ähnliche Inhalte

Was ist angesagt?

Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetDaniel Owens
 
Internet security.spyware
Internet security.spywareInternet security.spyware
Internet security.spywarediwakar sharma
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationJeff Zahn
 
The ultimate-money-making-guide-with-torrents
The ultimate-money-making-guide-with-torrentsThe ultimate-money-making-guide-with-torrents
The ultimate-money-making-guide-with-torrentsbart84571
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Ultimate Guide to Setup DarkComet with NoIP
Ultimate Guide to Setup DarkComet with NoIPUltimate Guide to Setup DarkComet with NoIP
Ultimate Guide to Setup DarkComet with NoIPPich Pra Tna
 
Blind date with ur girlfriend
Blind date with ur girlfriendBlind date with ur girlfriend
Blind date with ur girlfriendGajendra Saini
 
Communications Technology For Social Spaces Assignment 3 Formative
Communications Technology For Social Spaces    Assignment 3 FormativeCommunications Technology For Social Spaces    Assignment 3 Formative
Communications Technology For Social Spaces Assignment 3 Formativegueste5e957
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programsAmmar Hasayen
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Password hacking
Password hackingPassword hacking
Password hackingAbhay pal
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 
Innovations2009 Part Two
Innovations2009 Part TwoInnovations2009 Part Two
Innovations2009 Part TwoBritt Watwood
 

Was ist angesagt? (20)

Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet security.spyware
Internet security.spywareInternet security.spyware
Internet security.spyware
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
The ultimate-money-making-guide-with-torrents
The ultimate-money-making-guide-with-torrentsThe ultimate-money-making-guide-with-torrents
The ultimate-money-making-guide-with-torrents
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Ultimate Guide to Setup DarkComet with NoIP
Ultimate Guide to Setup DarkComet with NoIPUltimate Guide to Setup DarkComet with NoIP
Ultimate Guide to Setup DarkComet with NoIP
 
Blind date with ur girlfriend
Blind date with ur girlfriendBlind date with ur girlfriend
Blind date with ur girlfriend
 
R@1n
R@1nR@1n
R@1n
 
Communications Technology For Social Spaces Assignment 3 Formative
Communications Technology For Social Spaces    Assignment 3 FormativeCommunications Technology For Social Spaces    Assignment 3 Formative
Communications Technology For Social Spaces Assignment 3 Formative
 
R@1n
R@1nR@1n
R@1n
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internetsecurity
InternetsecurityInternetsecurity
Internetsecurity
 
Innovations2009 Part Two
Innovations2009 Part TwoInnovations2009 Part Two
Innovations2009 Part Two
 

Andere mochten auch

Sendingo / Technologie, Bezpieczeństwo i Case Studies
Sendingo / Technologie, Bezpieczeństwo i Case StudiesSendingo / Technologie, Bezpieczeństwo i Case Studies
Sendingo / Technologie, Bezpieczeństwo i Case StudiesSendingo Sp. z o. o.
 
XmarX device
XmarX deviceXmarX device
XmarX deviceYunShi
 
Presentacion de Traiborg
Presentacion  de TraiborgPresentacion  de Traiborg
Presentacion de Traiborgluis castillo
 
Programación de grafica por computadora
Programación de grafica por computadoraProgramación de grafica por computadora
Programación de grafica por computadoraBlanca Hernandez
 
Bottup ucab-caracas-julio-2011
Bottup ucab-caracas-julio-2011Bottup ucab-caracas-julio-2011
Bottup ucab-caracas-julio-2011Espacio Público
 
El curioso mundo de las abejas...
El curioso mundo de las abejas...El curioso mundo de las abejas...
El curioso mundo de las abejas...maromarher
 
2 smart energy management junio'15
2 smart energy management junio'152 smart energy management junio'15
2 smart energy management junio'15_cmv_
 
Tema10. contenidos las rocas(2)
Tema10. contenidos las rocas(2)Tema10. contenidos las rocas(2)
Tema10. contenidos las rocas(2)miguetxebe
 
How to get structure and control in your CRM system
How to get structure and control in your CRM systemHow to get structure and control in your CRM system
How to get structure and control in your CRM systemPer Löfgren
 
Pensamiento critico (etica)
Pensamiento critico (etica)Pensamiento critico (etica)
Pensamiento critico (etica)RositaCT
 
02 educación ecológica - ing. diego bernal (08-02-213)
02   educación ecológica - ing. diego bernal (08-02-213)02   educación ecológica - ing. diego bernal (08-02-213)
02 educación ecológica - ing. diego bernal (08-02-213)NabiParaiso
 
TVSD For Jobs, Rabat, STI Forum 2014
TVSD For Jobs, Rabat, STI Forum 2014TVSD For Jobs, Rabat, STI Forum 2014
TVSD For Jobs, Rabat, STI Forum 2014Satu Järvinen
 
Juli 2013 stephan_combitherm_englisch
Juli 2013 stephan_combitherm_englischJuli 2013 stephan_combitherm_englisch
Juli 2013 stephan_combitherm_englischtonykilian
 
INSPIRER... Présentation des solutions Mediatic Conseils
INSPIRER... Présentation des solutions Mediatic ConseilsINSPIRER... Présentation des solutions Mediatic Conseils
INSPIRER... Présentation des solutions Mediatic ConseilsMichel COLIN
 
Use Of Terlipressin In Septic Shock
Use Of Terlipressin In Septic ShockUse Of Terlipressin In Septic Shock
Use Of Terlipressin In Septic Shockdrbarai
 

Andere mochten auch (20)

Sistema erp
Sistema erpSistema erp
Sistema erp
 
Sendingo / Technologie, Bezpieczeństwo i Case Studies
Sendingo / Technologie, Bezpieczeństwo i Case StudiesSendingo / Technologie, Bezpieczeństwo i Case Studies
Sendingo / Technologie, Bezpieczeństwo i Case Studies
 
Evaluación Sensorial
Evaluación SensorialEvaluación Sensorial
Evaluación Sensorial
 
XmarX device
XmarX deviceXmarX device
XmarX device
 
Presentacion de Traiborg
Presentacion  de TraiborgPresentacion  de Traiborg
Presentacion de Traiborg
 
Programación de grafica por computadora
Programación de grafica por computadoraProgramación de grafica por computadora
Programación de grafica por computadora
 
Bottup ucab-caracas-julio-2011
Bottup ucab-caracas-julio-2011Bottup ucab-caracas-julio-2011
Bottup ucab-caracas-julio-2011
 
El curioso mundo de las abejas...
El curioso mundo de las abejas...El curioso mundo de las abejas...
El curioso mundo de las abejas...
 
2 smart energy management junio'15
2 smart energy management junio'152 smart energy management junio'15
2 smart energy management junio'15
 
Novedades en MetaTrader 4 y mql4
Novedades en MetaTrader 4 y mql4Novedades en MetaTrader 4 y mql4
Novedades en MetaTrader 4 y mql4
 
Tema10. contenidos las rocas(2)
Tema10. contenidos las rocas(2)Tema10. contenidos las rocas(2)
Tema10. contenidos las rocas(2)
 
How to get structure and control in your CRM system
How to get structure and control in your CRM systemHow to get structure and control in your CRM system
How to get structure and control in your CRM system
 
Pensamiento critico (etica)
Pensamiento critico (etica)Pensamiento critico (etica)
Pensamiento critico (etica)
 
El papa edh
El papa edhEl papa edh
El papa edh
 
02 educación ecológica - ing. diego bernal (08-02-213)
02   educación ecológica - ing. diego bernal (08-02-213)02   educación ecológica - ing. diego bernal (08-02-213)
02 educación ecológica - ing. diego bernal (08-02-213)
 
TVSD For Jobs, Rabat, STI Forum 2014
TVSD For Jobs, Rabat, STI Forum 2014TVSD For Jobs, Rabat, STI Forum 2014
TVSD For Jobs, Rabat, STI Forum 2014
 
Juli 2013 stephan_combitherm_englisch
Juli 2013 stephan_combitherm_englischJuli 2013 stephan_combitherm_englisch
Juli 2013 stephan_combitherm_englisch
 
Recomendaciones para Plan de banda ancha perú
Recomendaciones para Plan de banda ancha perúRecomendaciones para Plan de banda ancha perú
Recomendaciones para Plan de banda ancha perú
 
INSPIRER... Présentation des solutions Mediatic Conseils
INSPIRER... Présentation des solutions Mediatic ConseilsINSPIRER... Présentation des solutions Mediatic Conseils
INSPIRER... Présentation des solutions Mediatic Conseils
 
Use Of Terlipressin In Septic Shock
Use Of Terlipressin In Septic ShockUse Of Terlipressin In Septic Shock
Use Of Terlipressin In Septic Shock
 

Ähnlich wie The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120jram2113
 
Beating the beast goldmine
Beating the beast goldmineBeating the beast goldmine
Beating the beast goldmineChiragKumar51
 
SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016Gene Ferro
 
Privacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonPrivacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonMateus BahiaRicardo
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crssapphirecrs
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.Acageron
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 
Take Back Your Online Privacy: Simple Computer Security
Take Back Your Online Privacy: Simple Computer SecurityTake Back Your Online Privacy: Simple Computer Security
Take Back Your Online Privacy: Simple Computer SecurityKit O'Connell
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
Techniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools SaferTechniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools Safernerakmac
 
Speed Up Your Computer
Speed Up Your ComputerSpeed Up Your Computer
Speed Up Your Computerroselynolinar
 
How to remove pro search.me
How to remove pro search.meHow to remove pro search.me
How to remove pro search.me森泉 小
 
Hacking for Beginners The Ultimate Guide For Newbie Hackers
Hacking for Beginners The Ultimate Guide For Newbie HackersHacking for Beginners The Ultimate Guide For Newbie Hackers
Hacking for Beginners The Ultimate Guide For Newbie HackersJahaSoft
 
Elastix network security guide
Elastix network security guideElastix network security guide
Elastix network security guideCristian Calderon
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-Hjmoore55
 

Ähnlich wie The Veterans' Guide to Protecting Your Privacy and Staying Safe Online (20)

Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
 
Beating the beast goldmine
Beating the beast goldmineBeating the beast goldmine
Beating the beast goldmine
 
SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016
 
Privacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonPrivacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of non
 
Hackers secrets
Hackers secretsHackers secrets
Hackers secrets
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crs
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Take Back Your Online Privacy: Simple Computer Security
Take Back Your Online Privacy: Simple Computer SecurityTake Back Your Online Privacy: Simple Computer Security
Take Back Your Online Privacy: Simple Computer Security
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Techniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools SaferTechniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools Safer
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Speed Up Your Computer
Speed Up Your ComputerSpeed Up Your Computer
Speed Up Your Computer
 
How to remove pro search.me
How to remove pro search.meHow to remove pro search.me
How to remove pro search.me
 
Hacking for Beginners The Ultimate Guide For Newbie Hackers
Hacking for Beginners The Ultimate Guide For Newbie HackersHacking for Beginners The Ultimate Guide For Newbie Hackers
Hacking for Beginners The Ultimate Guide For Newbie Hackers
 
Elastix network security guide
Elastix network security guideElastix network security guide
Elastix network security guide
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-H
 

Mehr von Jinger Jarrett

The Millionaire Affiliate Marketer's Playbook: Strategies for Wealth.pdf
The Millionaire Affiliate Marketer's Playbook: Strategies for Wealth.pdfThe Millionaire Affiliate Marketer's Playbook: Strategies for Wealth.pdf
The Millionaire Affiliate Marketer's Playbook: Strategies for Wealth.pdfJinger Jarrett
 
Affiliate Titan 2.0 - The Facts
Affiliate Titan 2.0 - The FactsAffiliate Titan 2.0 - The Facts
Affiliate Titan 2.0 - The FactsJinger Jarrett
 
WP Link Shield: How to Stop Losing Affiliate Commissions and Make More Sales
WP Link Shield: How to Stop Losing Affiliate Commissions and Make More SalesWP Link Shield: How to Stop Losing Affiliate Commissions and Make More Sales
WP Link Shield: How to Stop Losing Affiliate Commissions and Make More SalesJinger Jarrett
 
8 Reasons to Cloak Your Affiliate Links
8 Reasons to Cloak Your Affiliate Links8 Reasons to Cloak Your Affiliate Links
8 Reasons to Cloak Your Affiliate LinksJinger Jarrett
 
Top 5 Tips for Starting a Veteran Owned Business
Top 5 Tips for Starting a Veteran Owned BusinessTop 5 Tips for Starting a Veteran Owned Business
Top 5 Tips for Starting a Veteran Owned BusinessJinger Jarrett
 
7 Myths Veteran Have About Post Traumatic Stress
7 Myths Veteran Have About Post Traumatic Stress7 Myths Veteran Have About Post Traumatic Stress
7 Myths Veteran Have About Post Traumatic StressJinger Jarrett
 
5 Simple Strategies to Help You Make Money on craigslist
5 Simple Strategies to Help You Make Money on craigslist5 Simple Strategies to Help You Make Money on craigslist
5 Simple Strategies to Help You Make Money on craigslistJinger Jarrett
 
10 Essential Strategies to Help You Succeed in Affiliate Marketing
10 Essential Strategies to Help You Succeed in Affiliate Marketing10 Essential Strategies to Help You Succeed in Affiliate Marketing
10 Essential Strategies to Help You Succeed in Affiliate MarketingJinger Jarrett
 
5 Simple Strategies to Help You Succeed in an Online Business
5 Simple Strategies to Help You Succeed in an Online Business5 Simple Strategies to Help You Succeed in an Online Business
5 Simple Strategies to Help You Succeed in an Online BusinessJinger Jarrett
 
Top 7 Personal Development Tips to Help You Be Your Best
Top 7 Personal Development Tips to Help You Be Your BestTop 7 Personal Development Tips to Help You Be Your Best
Top 7 Personal Development Tips to Help You Be Your BestJinger Jarrett
 
7 Steps to Living at Your Full Potential
7 Steps to Living at Your Full Potential7 Steps to Living at Your Full Potential
7 Steps to Living at Your Full PotentialJinger Jarrett
 
The Science of Getting Rich VS The Secret: What's the Difference?
The Science of Getting Rich VS The Secret: What's the Difference?The Science of Getting Rich VS The Secret: What's the Difference?
The Science of Getting Rich VS The Secret: What's the Difference?Jinger Jarrett
 
7 Simple Ways to Be Happier
7 Simple Ways to Be Happier7 Simple Ways to Be Happier
7 Simple Ways to Be HappierJinger Jarrett
 
5 Reasons Why The Science of Getting Rich Isn't Working for You and How to Fi...
5 Reasons Why The Science of Getting Rich Isn't Working for You and How to Fi...5 Reasons Why The Science of Getting Rich Isn't Working for You and How to Fi...
5 Reasons Why The Science of Getting Rich Isn't Working for You and How to Fi...Jinger Jarrett
 
The Science of Getting Rich - 7 Principles From Chapter Sixteen
The Science of Getting Rich - 7 Principles From Chapter SixteenThe Science of Getting Rich - 7 Principles From Chapter Sixteen
The Science of Getting Rich - 7 Principles From Chapter SixteenJinger Jarrett
 
Veterans' Resource Guide
Veterans' Resource GuideVeterans' Resource Guide
Veterans' Resource GuideJinger Jarrett
 
Internet Marketing Tips Guide
Internet Marketing Tips GuideInternet Marketing Tips Guide
Internet Marketing Tips GuideJinger Jarrett
 

Mehr von Jinger Jarrett (19)

The Millionaire Affiliate Marketer's Playbook: Strategies for Wealth.pdf
The Millionaire Affiliate Marketer's Playbook: Strategies for Wealth.pdfThe Millionaire Affiliate Marketer's Playbook: Strategies for Wealth.pdf
The Millionaire Affiliate Marketer's Playbook: Strategies for Wealth.pdf
 
Affiliate Titan 2.0 - The Facts
Affiliate Titan 2.0 - The FactsAffiliate Titan 2.0 - The Facts
Affiliate Titan 2.0 - The Facts
 
WP Link Shield Review
WP Link Shield ReviewWP Link Shield Review
WP Link Shield Review
 
WP Link Shield: How to Stop Losing Affiliate Commissions and Make More Sales
WP Link Shield: How to Stop Losing Affiliate Commissions and Make More SalesWP Link Shield: How to Stop Losing Affiliate Commissions and Make More Sales
WP Link Shield: How to Stop Losing Affiliate Commissions and Make More Sales
 
8 Reasons to Cloak Your Affiliate Links
8 Reasons to Cloak Your Affiliate Links8 Reasons to Cloak Your Affiliate Links
8 Reasons to Cloak Your Affiliate Links
 
Top 5 Tips for Starting a Veteran Owned Business
Top 5 Tips for Starting a Veteran Owned BusinessTop 5 Tips for Starting a Veteran Owned Business
Top 5 Tips for Starting a Veteran Owned Business
 
7 Myths Veteran Have About Post Traumatic Stress
7 Myths Veteran Have About Post Traumatic Stress7 Myths Veteran Have About Post Traumatic Stress
7 Myths Veteran Have About Post Traumatic Stress
 
5 Simple Strategies to Help You Make Money on craigslist
5 Simple Strategies to Help You Make Money on craigslist5 Simple Strategies to Help You Make Money on craigslist
5 Simple Strategies to Help You Make Money on craigslist
 
10 Essential Strategies to Help You Succeed in Affiliate Marketing
10 Essential Strategies to Help You Succeed in Affiliate Marketing10 Essential Strategies to Help You Succeed in Affiliate Marketing
10 Essential Strategies to Help You Succeed in Affiliate Marketing
 
5 Simple Strategies to Help You Succeed in an Online Business
5 Simple Strategies to Help You Succeed in an Online Business5 Simple Strategies to Help You Succeed in an Online Business
5 Simple Strategies to Help You Succeed in an Online Business
 
Top 7 Personal Development Tips to Help You Be Your Best
Top 7 Personal Development Tips to Help You Be Your BestTop 7 Personal Development Tips to Help You Be Your Best
Top 7 Personal Development Tips to Help You Be Your Best
 
7 Steps to Living at Your Full Potential
7 Steps to Living at Your Full Potential7 Steps to Living at Your Full Potential
7 Steps to Living at Your Full Potential
 
The Science of Getting Rich VS The Secret: What's the Difference?
The Science of Getting Rich VS The Secret: What's the Difference?The Science of Getting Rich VS The Secret: What's the Difference?
The Science of Getting Rich VS The Secret: What's the Difference?
 
7 Simple Ways to Be Happier
7 Simple Ways to Be Happier7 Simple Ways to Be Happier
7 Simple Ways to Be Happier
 
5 Reasons Why The Science of Getting Rich Isn't Working for You and How to Fi...
5 Reasons Why The Science of Getting Rich Isn't Working for You and How to Fi...5 Reasons Why The Science of Getting Rich Isn't Working for You and How to Fi...
5 Reasons Why The Science of Getting Rich Isn't Working for You and How to Fi...
 
The Science of Getting Rich - 7 Principles From Chapter Sixteen
The Science of Getting Rich - 7 Principles From Chapter SixteenThe Science of Getting Rich - 7 Principles From Chapter Sixteen
The Science of Getting Rich - 7 Principles From Chapter Sixteen
 
Veterans Resume Guide
Veterans Resume GuideVeterans Resume Guide
Veterans Resume Guide
 
Veterans' Resource Guide
Veterans' Resource GuideVeterans' Resource Guide
Veterans' Resource Guide
 
Internet Marketing Tips Guide
Internet Marketing Tips GuideInternet Marketing Tips Guide
Internet Marketing Tips Guide
 

Kürzlich hochgeladen

Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan
 
(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)oannq
 
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...JeylaisaManabat1
 
南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证kbdhl05e
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxShubham Rawat
 
E J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxE J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxJackieSparrow3
 

Kürzlich hochgeladen (6)

Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
 
(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)
 
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
 
南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptx
 
E J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxE J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptx
 

The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

  • 1. The Veterans' Guide to Protecting Your Privacy and Staying Safe Online JINGER JARRETT
  • 2. Copyright 2013, Jinger Jarrett, All rights reserved. Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the author. Inquiries concerning reproduction outside those terms should be sent to the author. The use of registered names, trademarks etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant laws and regulations and therefore free for general use. The publisher makes no representation, express or implied, with regard to the accuracy of the information contained in this book and cannot accept any legal responsibility or liability for any errors or omissions that may be made. Author Website: http://jingerjarrett.com/
  • 3. Dedication This book is dedicated to my daughters: Ashley, Danielle and Alexandra. They are the most important people in my life and have done more for me than anyone. You have no idea how much I appreciate it. You are the main reason I am still here. Gallant Few http://gallantfew.org Proceeds from the sale of the software with affiliate programs that are listed in this report will be donated to help the work and mission of this organization. (Please feel free to distribute this as widely as possible in support of Gallant Few. You may give it away but please do not sell it.)
  • 4. INTRODUCTION If all that cloak and dagger stuff some veterans wanted to engage in online worked, I wouldn't have the ability to tell your life's story in 15 minutes. The problem with lying or trying to mask the details of your life without a really good cover story is that eventually it catches up with you and destroys your reputation, you get exposed, and everyone knows who you really are, or you end up compromised and hacked. If you're a veteran who owns a business, you don't want to risk having your business compromised, your reputation ruined and all your money stolen because you didn't protect yourself. There are real ways to protect your privacy online, reduce your chances of getting hacked and keep your information safe. I've been on the Internet since 1995, and I was a computer tech in the Army back in the 80s. I've learned a few things along the way, and I want to share those things with you so you stay safe and don't get ripped off, scammed or have your privacy compromised. There five lessons plus the lesson on navigating the Veterans' Affairs system to help you get your benefits. Part of the course is
  • 5. in text to present the resources you need for your computer. The rest is presented in video to show you how to get the job done quickly and make yourself secure. Use this information for good. It is meant to protect you and keep you safe. This is my gift to the Veterans' community. I didn't serve in combat, and I was never combat arms. However, I can help protect you now if you are willing to listen. Thank you for your service. No one left behind. Not on the battlefield. Not in life. Sincerely, Jinger Jarrett http://jingerjarrett.com/
  • 6. Lesson 1 - Secure Your Computer Starting right now let's secure your perimeter online and offline as far as protecting yourself against intruders on your computer and the internet. Although some of this information will seem basic to some of you, to others it will really open your eyes to the threats online. Use this material to your benefit and stay safe. One of the most important lessons I ever learned when I was in the Army was "hide in the open." We went to the field once when I was in Germany. The rest of the time we were working on mission, which was handling the communications for all the bases where we had detachments. Running communications, both secure and unsecure. I was a crypto tech. I worked on encryption devices like red phones. When we went to the field, we had a refresher class on camouflage training. Standing 20 feet in front of us was a soldier no one saw. Why? Because he painted his face and camouflaged his gear so well he blended right in.
  • 7. The lesson is that if you blend right in, people don't generally mess with your stuff. The most vulnerable are those who act like they have something to hide. People will mess with you. I have been hacked twice since I came online back in the mid 90s: once on my Google account by someone in the Phillipines and once on my web hosting at Hostgator. Both were in the last 2 years. (Someone installed 100 websites on my account. Once I found out about it, I changed hosting.) Yep, I'm loud and I'm proud. I make a lot of noise because I'm a marketer, and you don't make any money if you don't market. Doesn't mean I have my stuff hanging out there for anyone to see. The first step here is to secure your computer. The easiest way for hackers to get into your computer is if you have Remote Desktop enabled. Disable Remote Desktop by going to Start (bottom left corner), Control Panel, and look for RemoteApp and Desktop Communications or something similar and disable any connections you have. Next, make sure your operating system is up to date. This is an easy one. Set automatic updates and keep it up to date. Hackers
  • 8. exploit these security holes, and if your software is up to date, this is the easiest way to be protected. This is also on the control panel screen. Windows Update. Click on it and go to change settings and set your system to automatically update. Three is to make sure you have a good anti virus and firewall on your system. Get rid of the stuff that comes with your system because there is plenty of free stuff online that works. I use to use Avast! and it caught a trojan on Facebook for me. I changed to AVG because Phoenix said it was better at protecting your computer. It is very good and will protect you online and offline. I also use Windows Firewall. It is available through the control panel. Open control panel and then open Windows Firewall. Turn it on. Install Malware Bytes or something similar and use it to scan for viruses, adware, etc. This program is free. It is good for finding that stuff that is slowing down your computer. Next, you want to clean up your computer. Temporary files clog your computer, corrupt, and cause problems. For this I use Slim Cleaner, and I clean and defrag my computer with it about
  • 9. once a week. You may not use your computer that much. Do it at least once a month. Make sure all the software on your system is up to date because this is also another way hackers exploit your system. Install a different browser than Internet Explorer. I use Google Chrome. It's fast, lightweight and it's backed by a multi billion dollar company run by a computer geek who loves to make tools. Firefox is also good. (Make sure you read the advice from Phoenix as he disagrees with me on this issue. Whatever you choose, it is important to me you get the protction you need.) Back up your data. If your computer crashes, you don't want to lose your valuable stuff. I use Live Drive. It is a simple to use program. Cost you about $8 a month. There's others. I like Live Drive because it's so easy to use, and they make multiple backups of your stuff so you can find stuff from up to 30 days ago. Finally, create a separate admin account. This is an account you will use to install software or work on your computer if anything goes bad. Go to the Control Panel and click on Users. Create a new user called anything but Admin. Name it something
  • 10. that is not easy to guess. Use a secure password. Write it down if you have to. Then go to whatever user you are using and remove the admin privileges and add a password. One word about passwords here: Semper Fi, Sua Sponte or God are not good passwords. Never use words or identifying information like birthdays. Never. When we start talking about protecting yourself online, I'll show you how to handle passwords. That is all for today. Tomorrow we start working on the internet. Homework Assignment 1. Turn off Remote Desktop. 2. Update your Windows. 3. Install antivirus and firewall. http://avg.com 4. Install Malware Bytes or something similar and run a full scan. http://www.malwarebytes.org/ 4. Clean up your computer. http://slimcleaner.com/ 5. Update your software. 6. Change your browser. http://www.google.com/chrome/?
  • 11. 7. Set up a separate admin account. Here is a security checklist to help you. It provides further instructions and tutorials. If you get stuck on any step, ask. Don't minimize this step because each day we will build on this. When we're finished, we'll have you as secure as you can possibly be. All the tools included here are free. http://www.selectrealsecurity.com/security-checklist
  • 12. Lesson 2: Usernames, Passwords, Email and Shopping Online Your next step is to examine your usernames, passwords, email and online shopping habits to see if there is a better way to make yourself secure. The equipment I worked on in the Army encrypted the data before sending it across Arpanet. It is a 128 bit random cipher, and it has never been broken by the enemy. It was compromised on the USS Pueblo, 1968. Never broken though. I mention this because this is the minimum strength encryption on your browsers. Usually when someone is compromised online, that person has inadvertently downloaded a program that records keystrokes on the computer. Downloads come from either your email or a site you have visited, so make sure your browser and antivirus are always up to date so this stuff doesn't get missed. You can look up hacking statistics in the search engines. I won't go into big details here. Knowing why it's done helps you protect yourself against it.
  • 13. http://www.websitedefender.com/web-security/web- hacking-facts/ Hacking may be done by someone who knows you. That's why it's so important to secure your information in a way that you are not compromised on a personal level. Easy passwords are also a problem. The longer and the more random a password, the longer it takes to crack. When you download something in your email, make sure you run your antivirus. It's why I use AVG. It tells me if an attachment is infected before I download. Also, if you receive "official" emails, run your cursor over the links in the email to make sure they are legitimate. Not long ago I received an email from Yahoo telling me they were shutting down my account. Not so. In official emails, like Pay Pal, they know your name. The importance of usernames is in protecting your identity and privacy. If this is your concern, then make sure you don't use a username that connects you to who you are. I've done background checks on people to find out if I was being scammed, and usernames are a great way to track people down. All you
  • 14. have to do is drop the person's username into Google and follow the trail. Since I own a business and am branding, using my name helps others find me. Same thing with email. Never post your email on a website. This is a great way for others to find out stuff about you and those sites get spidered. Your email ends up on a list, and you get tons of spam. Don't give your email to people you don't want to have it. It's a good idea to have at least 2 email addresses, one public and one private. For a public email, I usually use Gmail. With billions of dollars behind the company and a techno geek running the show, it works pretty well. My private email, which I pay for, is at Yahoo. Passwords are one of the easiest ways to get compromised. Sua Sponte, Semper Fi, God, password and any identifying information related to who you are is the first thing people use to try and hack into your accounts. More than one vindictive girlfriend or boyfriend has used this information to do deadly deeds, so make sure you use passwords that are random and
  • 15. secure. Add an extra layer of security to protect yourself by password protecting your desktop, and if you use the tools I'm about to recommend, have a master password. Nothing is hack proof. Everything from the Marine Corps to the IRS has been successfully hacked. It doesn't mean you can't protect yourself effectively and slow them down to the point they leave you alone. If you are banking, shopping, or doing any type of activity online that has to do with money, use 17 digit random passwords for those accounts. Anything you want to really protect, use 17 digit random passwords. When you pay for your purchase, make sure it shows https:// in the browser address bar. This means that it is secure and the site has a valid security certificate. Limit your information. I use Pay Pal to shop online a lot, especially with my business, and it helps me to control where my financial information is and where it is stored. (It is also owned by Ebay, another billion dollar company, and they take compromises in security seriously.) The fewer places you have that information available, the
  • 16. better. Control your important information. You can also buy American Express, Master Card, and Visa gift cards, as well as use a prepaid debit card online instead of your regular cards to protect yourself. This gives you an additional layer of security, especially with prepaid debits because you can buy and recharge those at a CVS or other store that sells prepaid debit. Now if you're like me, I'm too lazy to remember all those 17 digit passwords, so I use tools to help me keep track, and these have an added layer of security for you by allowing you to use a master password. This means before the password is entered into the form, you have to enter the master password into the software first. Two tools you can use, and both have free and very low cost versions and are available on multiple platforms are: http://roboform.com http://lastpass.com I use Roboform because I can load it onto a flash drive and then take it with me. Helpful when you are on public computers and need your passwords. One caveat here: don't put your shopping information like
  • 17. addresses, phone numbers, credit card information or anything like that into the software. Enter that manually on sites as you go. Avoid having that information available on your computer unless you absolutely have to. Some additional tips here: 1. To protect your surfing habits, set your browser to clear the history and files when you close it. Look under Settings to do this. 2. If you have sensitive files on your computer you want to make unrecoverable, then use Slim Cleaner to shred them. Periodically wipe the white space on your drive too. 3. If you need to send secure email, use secure email tools or email accounts that actually use encryption to encrypt your information before it is sent out. You can get many of these tools for free, and all these tools will keep prying eyes out. Here's a good one that's been around for years. (Make sure you read the terms and conditions on this stuff so you understand what you are getting and what they can legally do.)
  • 18. http://www.hushmail.com/ 4. Want to surf anonymously? Many of your browsers allow you to switch to safe browsing or secure browsing. (In Google Chrome it's incognito. Use the box in the top right corner of your browser to access this feature.) You can also look at websites online without having it show up in your history. http://hidemyass.com Just pop the URL in and visit the site. In the next lesson I talk about Google, and then we'll move onto Facebook. Since so much hacking goes on with Web 2.0 sites, it's a good idea to know how to protect yourself here. Google also has some great tools like email, Google Voice, Google Drive and others you can use for free. Homework Assignment 1. Download one of the tool bars and set it up on your computer. Use it to generate your passwords. Make sure you add a Master Password. 2. Update any passwords you need to update to secure your
  • 19. accounts. 3. Remember: information control. The fewer sites where you have sensitive information, the less opportunity for compromise.
  • 20. Lesson 3 - How to Use Google to Secure Your Privacy Today's lesson is in video. This is so I can show you all the cool tools Google has to offer to help you protect yourself online. In order to access this lesson, you will need to use the private link. I don't want everything I know to be public knowledge. Access the link here: https://www.youtube.com/watch?v=Gov7PtBsMQ8 I used BB Flashback Express to make the video. It is free. http://www.bbsoftware.co.uk/BBFlashBack_FreePlayer.aspx Homework 1. Sign up for a Google Account. It is free. https://accounts.google.com/SignUp 2. Once you have signed up and verified your account, then go to the Google search and search for Google Products. This allows you to access all the Google products and set up the measures I suggested in the video. I have included the link here.
  • 21. However, Google often changes them without updating, so if you can't find this page, then it has been moved. http://www.google.com/about/products/ Final Note: When you set up your security questions, don't use things that are easy to guess. Make it something you remember. For example, Mother's maiden name: none or some other random answer that only makes sense to you. You can also use a backup email if you forget your password.
  • 22. Lesson 4 - Protecting Yourself Against Identity Thieves, Stalkers, and Keeping Yourself Safe This video shows you three different places to use to help you identify where your information is available online and then shows you how to erase this information to protect yourself. Sites Used http://mylife.com http://spokeo.com http://google.com/ Homework Sign up for a free account with My Life. Use this site to help you purge the internet of records you don't want others to have. If you have not signed up for a Google account and are using this to help you secure your identity, then make sure you do so. If you plan to use the dating section of My Life, make sure you read the online dating safety tips first. https://www.youtube.com/watch?v=oh_x1X3YU-o
  • 23. Lesson 5 - Protecting Yourself on Facebook Facebook is one of the top sites on the internet. It's also one of the most dangerous if you don't understand how to protect yourself. Hackers, viruses, and other stuff can be a landmine. This video shows you how to protect yourself on Facebook. https://www.youtube.com/watch?v=VBnnQYTe8Ls
  • 24. Lesson 6 – Google Maps: Protecting Your Physical Location I know where you live. I know what your house looks like. Not really. If I wanted to find out though, then this is the tool I would use because it uses satellite technology, along with using a private company called Tele Atlas. The information is quite comprehensive, and as you can see in the video, reveals a lot more information than you think. That's why, if privacy and security is that important to you, make sure you only use your address as needed to do things online and always keep it secure. One suggestion I would make is to get a post office box. Have all your mail sent there. Now it may not work when you are using government agencies. It will help you cover your tracks with everything else. https://www.youtube.com/watch?v=LYQQ7bXsBGg
  • 25. Lesson 7 – Navigating the Ebenefits System Benefits are an important part of a veterans' life. Understanding how to get your records, find benefit information, see what benefits are available to you is crucial to your success in collecting those benefits. Here is how you access the Ebenefits system, access your military records and check to see if you have any state benefits available to you. https://www.youtube.com/watch?v=9T8mrdY4oMc
  • 26. Bonus: Additional Tips to Help You Stay Secure I contacted a fellow veteran who is also a security consultant and asked him for his best advice. Here it is. If you would like to contact the Phoenix, this visit his site: http://warmastersapprentice.com/ 1) Touching the keyboard, can give away your 'position' so a keyscrambler is an absolute, "encrypting" every single key that is touched, so you and those that "need to know" will get your message, and those that should not, yet still try are going to have one heck of challenge breaking into an "A and B conversation," to C their way into your data. If on a budget, a free to quite pricey version can be found here. http://www.qfxsoftware.com/ You may argue that I.E.. is lacking in many aspects, but I have taught a legion of beginners to so-called experts and even alleged elites--where the holes are that can be filled--with all of the many of 'booby-traps', alarms of a sort, and downright 'nuclear weapons' should anyone dare to even gaze at [their] servers, or
  • 27. any one workstation that any [lazy/apathetic] user might take a seat in front of. [Civilians] can never be trusted to be completely diligent as you or I my Mistress. None. I have had to have a "Plan Bravo to Zippo" to compensate for each that I have had to protect from bodily harm to economic ruin. Including, having their own mammals that worked with them, alongside them-- stealing from them--innovative ideas that could help our wounded to those wounded in spirit. I cannot stress the importance of having encryption within the hardware that only a finite few would or should, have a need to know about. Please, consider my words... 2) As far as privacy is concerned, "Big Data" is or "Big Brother" has been alive and well, as you wrote [correctly], since the mid-1950's. And it was 'given up', "the Arpanet," or "Ape- Net," as it was known in my time "in the machine" (my military service) and in a certain circle prior to that, in the prime simply because it can never be fully secured, and hence the worst decision was made: handing it over to public sector mammals in a
  • 28. municipality near you and I. It was "all downhill from there." To [semi-] protect each that uses this tool, like 'the Flame that can provide warmth and comfort'--and kill you--each, as you also stated correctly, must never fully rely on anyone else, as even the postal service 'sells' each of our data without our consent, and oft times without our knowledge. Hence physical 'junk mail' appearing in our mail-box at the end of our driveway's. Or 'Spam' in our most secure e-mail accounts. We are betrayed every nanosecond, every single day. So to "cover" of tracks, or obscure the trail behind us (how copy?), I would and have provided the following [options] to captains of industry, to those with children they want to protect while on any child-oriented site, a [serious] set of or multiple layers of [armor]. Most can be found here. http://www.cnet.com/ Besides 1) "Cookienator": Automatically removes malicious 'cookies' that report your usage, or 'track' how, where, and what your
  • 29. viewing (each "page"), and any and all "Third Party" or 'uninvited guests' that want to walk in on your [computer] system, no matter how big or small. 2) IObits' http://www.iobit.com/ "Advanced SystemCare" (version 6.3 is the current), and the "IObit Malware Fighter": are titans that few will attempt to penetrate if they try to set a "bot" of some sort to a "Trojan" program through a provider into the systems connected to it. 'We' got burned last year via COX, as well as Yahoo, MSN, and Google, by some heavy hitters in Europe last year, and though they got busted by a collaboration of "folks with stinking badges," the 'bots' they had sent out prior to their arrests were "timed' and retrieved user data which was sent to another part, a separate server or servers, at another position in another part or region of our planet. A note regarding Advanced SystemCare: In settings, the user must take some time, and go into the setting of the software under "Ignore List," then remove the plethora of cookies 'they' believe most "go to" most often. One has to look for the 'Browser Cookies' tab, then remove what is seen from the list on the right
  • 30. (Cookies to keep), to the left (Cookies to Delete), so any trace, anything that is overt to sublime is safely removed. Each has a scanning and defrag utility embedded that can be set up easily. And IObit has a separate 'Defrag' software package as well--that anyone--that takes I.T. security an 1/8th as seriously as 'our' cadre, and I mean you and I alone, should definitely have in their 'armory'. And each can turn off the computer they are installed on--"Off." 3) "AVG Anti-Virus Free Edition 2013," is some really hardcore, "high-speed, low-drag" [Sierra]. If you use it, I pray you will use it wisely and prudently. You can hurt somebody with [that thing] and "its all funny until some loses an eye." All are, in a way, part of a "fire and forget" 'alarm system', wholly attached to an electronic arsenal... 4) "CCleaner": http://www.piriform.com/ccleaner (that is not a typographical error) by these [friendlies], is quite good for removing any 'junk files, including anything that is intention set by the Google browser by any that chose to use it, and any logs, or any other forensic data, that could and would be used to "sell
  • 31. you," or persecute you, by any hacker of any skill level. There is an 'enhancement tool'--aptly known as CCleaner Enhancer for a 'military' cleaning and removal of underlying 'junk' programs on any system reach out for and take up space on anyone's system. In the 'Settings' tab, under 'Options', you should set the option for "Secure file deletion (Slower)" which makes a 35 pass--'Very Secure Overwrite'--so "bad-guys cannot even find what you have done nor where you have done it. 5) "Glary Utilities": http://www.glarysoft.com/ found here, does much of the same as CCleaner, but there are a myriad of 'definitions' out there, none exactly the same, so it is prudent to-- in this case--"kill them all"--in a 'crossfire' of a sort. If one utility does not, or cannot do the job completely, another Bravo-Foxtrot- Gulf from another position probably will... I absolutely do believe in "overkill," but I believe you already knew that about your apprentice long ago... 6) "Spybot - Search & Destroy" http://www.safer- networking.org/ (I just love their name), found here along with a serious review, should and can, be set to "go green" as soon as the
  • 32. user turns on their system, to just prior to connecting to the 'Net, which, in turn--SHOULD BE BEFORE THE USER CONNECTS THEIR ETHERNET CORD TO THEIR MODEM. It is designed to "cover the user" as "they go in," no matter which browser each uses, and hence, the inherent liabilities of any and all browsers-- including--Googles, which are legion (more in a minute about that version of 'Chrome'). And after disconnecting from the 'Net, a built-in "Search & Destroy" utility (you know me my dear Sister; "back up, back up, back up." Did I, or can I say "back up" or "crossfire" enough? They bring an ill-advised attack, my tripwire (think a "Claymore Mine" attached to an I.C.B.M.) goes "BOOM" and then some, incinerating anything and everything, that sets it off. 7) "Malwarbytes 'Anti-Malware' software" is a very good tool, but I 'update it no less than 3 to 7 times if I have a system attached to the 'Net, as a new version of attack is always a threat, and hence it is prudent to carry "rounds for any and all new occasions" not known before "we go outside the perimeter." So even if a 'pop-up' stating that a new definition is not shown, if you
  • 33. [click] on the tab "Update," then the 'button' "Check for Updates," 8 out of 10 times, a slightly new version and hence definition from a wholly new threat is ready for the public should any be so diligent in their endeavor for a secure Internet experience. Hiding in the Open: "Stealth"; 'Phoenix' Style Again, I strongly suggest, no matter what software program each may be comfortable with, complacency can "leave a mark." So "Tor," and "Jon/Do", help augment your Internet presence/camouflage, and make any and all that might try to track the user more difficult. It is infinitely harder to hit something that cannot be seen in the prime... If you really 'need' to use Google, or in any other browser; 1) Abines' 'Do Not Track Me', http://www.abine.com/ 2) And 'Ghostery', http://www.ghostery.com/ found here, does more than help "cover you as you go in," on any and all known browsers--they have a 'plug-in' for everyone on their home site--no matter which browser each uses or is ultimately comfortable using.
  • 34. 3) 'AVG Do Not Track' though very good, disables itself (very different than the Abine version) if you are in "InPrivate," mode in Internet Explorer, or "Incognito" mode in Google. 4) Within Googles 'Settings', the 'plug-in' 'Disconnect', an extension which stops major 'third' parties and search engines from tracking the webpages you go to and any searches you do, should absolutely be installed. And on a side note; Google keeps any and all search attempts you might make--forever--and worse, every "Tweet" has been archived at the [U.S.] Library of Congress eternally as well.
  • 35. Get Additional Help Thank you for taking the time to read my report and watch the videos. Questions or comments? I'm always happy to help. You can contact me as follows: Facebook – http://www.facebook.com/jingerjarrett Military Veterans Worldwide: Vets Serving Vets. Jobs, Benefits and More. - This is my baby. We're here to serve veterans. Tons of content and resources, as well as personalized help at the individual level to help you get what you need. We're volunteers, and this is a labor of love. Started out under a different name. Now we serve veterans worldwide. https://www.facebook.com/groups/usmilitaryveteransdrea mjobs/ My Support Desk – http://jingerjarrett.com/support/ - I'm always happy to help by asking any questions you have.
  • 36. About the Author Jinger Jarrett is a former US Army soldier (1982 - 1986). She served with the 535th Signal Company in both Grafenwoehr and Nuremberg West Germany from 1984 – 1986 as a 32F, Fixed Ciphony Repair. Her secondary MOS was 71L, Administrative Specialist. From 1991 – 1998, she served in the Michigan Army National Guard, 1460th Transportation Company, Midland, Michigan as a 71L. She transferred to MTC at Camp Grayling where she completed the 46Q, Print Military Journalist course and then worked in the Public Affairs Office. With the help of the GI Bill, she earned a Bachelors of Applied Arts with majors in both Journalism and English Language as Literature. Since 2001 she has owned an online business. She teaches one person businesses how to start a business online and then market online for free. Her book, ”Hour of Power: When Jesus, Zen and Quantum Physics meet the US Army” is available on Amazon, as well as all major online digital bookstores and is designed to help beginners to develop the right mindset for succeeding in online business through the use of Quantum Physics and the laws of the universe. Website: http://jingerjarrett.com/ Amazon: http://www.amazon.com/author/jingerjarrett