the veterans' guide to protecting your privacy and staying safe online

36
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online JINGER JARRETT

Upload: jinger-jarrett

Post on 14-Jan-2015

1.294 views

Category:

Self Improvement


0 download

DESCRIPTION

This free course developed specifically for veterans shows you how to protect your privacy, prevent getting hacked and what tools you need to stay safe. (Many of the tools are free.) It contains a combination of written tutorials and videos to show you how to get your tasks completed quickly and secure your computer and Facebook profile. Also contains a 30 minute video that shows you how to access your benefits and military records. Proceeds of the software go to Gallant Few.

TRANSCRIPT

Page 1: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

The Veterans'

Guide

to Protecting Your

Privacy

and Staying Safe

Online

JINGER JARRETT

Page 2: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

Copyright

2013, Jinger Jarrett, All rights reserved.

Apart from any fair dealing for the purposes of research or private

study, or criticism or review, as permitted under the Copyright,

Designs and Patents Act 1988, this publication may only be

reproduced, stored or transmitted, in any form or by any means,

with the prior permission in writing of the author. Inquiries

concerning reproduction outside those terms should be sent to the

author.

The use of registered names, trademarks etc. in this publication

does not imply, even in the absence of a specific statement, that

such names are exempt from the relevant laws and regulations

and therefore free for general use.

The publisher makes no representation, express or implied, with

regard to the accuracy of the information contained in this book

and cannot accept any legal responsibility or liability for any

errors or omissions that may be made.

Author Website: http://jingerjarrett.com/

Page 3: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

Dedication

This book is dedicated to my daughters: Ashley, Danielle and

Alexandra. They are the most important people in my life and

have done more for me than anyone. You have no idea how much

I appreciate it. You are the main reason I am still here.

Gallant Few

http://gallantfew.org

Proceeds from the sale of the software with affiliate

programs that are listed in this report will be donated to help

the work and mission of this organization. (Please feel free to

distribute this as widely as possible in support of Gallant Few.

You may give it away but please do not sell it.)

Page 4: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

INTRODUCTION

If all that cloak and dagger stuff some veterans wanted to

engage in online worked, I wouldn't have the ability to tell your

life's story in 15 minutes. The problem with lying or trying to

mask the details of your life without a really good cover story is

that eventually it catches up with you and destroys your

reputation, you get exposed, and everyone knows who you really

are, or you end up compromised and hacked. If you're a veteran

who owns a business, you don't want to risk having your business

compromised, your reputation ruined and all your money stolen

because you didn't protect yourself.

There are real ways to protect your privacy online, reduce

your chances of getting hacked and keep your information safe.

I've been on the Internet since 1995, and I was a computer tech in

the Army back in the 80s. I've learned a few things along the way,

and I want to share those things with you so you stay safe and

don't get ripped off, scammed or have your privacy compromised.

There five lessons plus the lesson on navigating the Veterans'

Affairs system to help you get your benefits. Part of the course is

Page 5: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

in text to present the resources you need for your computer. The

rest is presented in video to show you how to get the job done

quickly and make yourself secure.

Use this information for good. It is meant to protect you and

keep you safe. This is my gift to the Veterans' community. I didn't

serve in combat, and I was never combat arms. However, I can

help protect you now if you are willing to listen. Thank you for

your service. No one left behind. Not on the battlefield. Not in

life.

Sincerely,

Jinger Jarretthttp://jingerjarrett.com/

Page 6: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

Lesson 1 - Secure Your Computer

Starting right now let's secure your perimeter online and

offline as far as protecting yourself against intruders on your

computer and the internet. Although some of this information will

seem basic to some of you, to others it will really open your eyes

to the threats online. Use this material to your benefit and stay

safe.

One of the most important lessons I ever learned when I was

in the Army was "hide in the open." We went to the field once

when I was in Germany. The rest of the time we were working on

mission, which was handling the communications for all the bases

where we had detachments. Running communications, both

secure and unsecure. I was a crypto tech. I worked on encryption

devices like red phones.

When we went to the field, we had a refresher class on

camouflage training. Standing 20 feet in front of us was a soldier

no one saw. Why? Because he painted his face and camouflaged

his gear so well he blended right in.

Page 7: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

The lesson is that if you blend right in, people don't generally

mess with your stuff. The most vulnerable are those who act like

they have something to hide. People will mess with you. I have

been hacked twice since I came online back in the mid 90s: once

on my Google account by someone in the Phillipines and once on

my web hosting at Hostgator. Both were in the last 2 years.

(Someone installed 100 websites on my account. Once I found

out about it, I changed hosting.)

Yep, I'm loud and I'm proud. I make a lot of noise because I'm

a marketer, and you don't make any money if you don't market.

Doesn't mean I have my stuff hanging out there for anyone to see.

The first step here is to secure your computer. The easiest way

for hackers to get into your computer is if you have Remote

Desktop enabled. Disable Remote Desktop by going to Start

(bottom left corner), Control Panel, and look for RemoteApp and

Desktop Communications or something similar and disable any

connections you have.

Next, make sure your operating system is up to date. This is

an easy one. Set automatic updates and keep it up to date. Hackers

Page 8: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

exploit these security holes, and if your software is up to date, this

is the easiest way to be protected. This is also on the control panel

screen. Windows Update. Click on it and go to change settings

and set your system to automatically update.

Three is to make sure you have a good anti virus and firewall

on your system. Get rid of the stuff that comes with your system

because there is plenty of free stuff online that works. I use to use

Avast! and it caught a trojan on Facebook for me. I changed to

AVG because Phoenix said it was better at protecting your

computer. It is very good and will protect you online and offline. I

also use Windows Firewall. It is available through the control

panel. Open control panel and then open Windows Firewall. Turn

it on.

Install Malware Bytes or something similar and use it to scan

for viruses, adware, etc. This program is free. It is good for

finding that stuff that is slowing down your computer.

Next, you want to clean up your computer. Temporary files

clog your computer, corrupt, and cause problems. For this I use

Slim Cleaner, and I clean and defrag my computer with it about

Page 9: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

once a week. You may not use your computer that much. Do it at

least once a month.

Make sure all the software on your system is up to date

because this is also another way hackers exploit your system.

Install a different browser than Internet Explorer. I use Google

Chrome. It's fast, lightweight and it's backed by a multi billion

dollar company run by a computer geek who loves to make tools.

Firefox is also good. (Make sure you read the advice from

Phoenix as he disagrees with me on this issue. Whatever you

choose, it is important to me you get the protction you need.)

Back up your data. If your computer crashes, you don't want

to lose your valuable stuff. I use Live Drive. It is a simple to use

program. Cost you about $8 a month. There's others. I like Live

Drive because it's so easy to use, and they make multiple backups

of your stuff so you can find stuff from up to 30 days ago.

Finally, create a separate admin account. This is an account

you will use to install software or work on your computer if

anything goes bad. Go to the Control Panel and click on Users.

Create a new user called anything but Admin. Name it something

Page 10: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

that is not easy to guess. Use a secure password. Write it down if

you have to. Then go to whatever user you are using and remove

the admin privileges and add a password.

One word about passwords here: Semper Fi, Sua Sponte or

God are not good passwords. Never use words or identifying

information like birthdays. Never. When we start talking about

protecting yourself online, I'll show you how to handle

passwords.

That is all for today. Tomorrow we start working on the

internet.

Homework Assignment

1. Turn off Remote Desktop.

2. Update your Windows.

3. Install antivirus and firewall. http://avg.com

4. Install Malware Bytes or something similar and run a full

scan. http://www.malwarebytes.org/

4. Clean up your computer. http://slimcleaner.com/

5. Update your software.

6. Change your browser. http://www.google.com/chrome/?

Page 11: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

7. Set up a separate admin account.

Here is a security checklist to help you. It provides further

instructions and tutorials. If you get stuck on any step, ask. Don't

minimize this step because each day we will build on this. When

we're finished, we'll have you as secure as you can possibly be.

All the tools included here are free.

http://www.selectrealsecurity.com/security-checklist

Page 12: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

Lesson 2: Usernames, Passwords, Email and

Shopping Online

Your next step is to examine your usernames, passwords,

email and online shopping habits to see if there is a better way to

make yourself secure.

The equipment I worked on in the Army encrypted the data

before sending it across Arpanet. It is a 128 bit random cipher,

and it has never been broken by the enemy. It was compromised

on the USS Pueblo, 1968. Never broken though. I mention this

because this is the minimum strength encryption on your

browsers.

Usually when someone is compromised online, that person

has inadvertently downloaded a program that records keystrokes

on the computer. Downloads come from either your email or a

site you have visited, so make sure your browser and antivirus are

always up to date so this stuff doesn't get missed. You can look

up hacking statistics in the search engines. I won't go into big

details here. Knowing why it's done helps you protect yourself

against it.

Page 13: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

http://www.websitedefender.com/web-security/web-

hacking-facts/

Hacking may be done by someone who knows you. That's

why it's so important to secure your information in a way that you

are not compromised on a personal level. Easy passwords are also

a problem. The longer and the more random a password, the

longer it takes to crack.

When you download something in your email, make sure you

run your antivirus. It's why I use AVG. It tells me if an

attachment is infected before I download. Also, if you receive

"official" emails, run your cursor over the links in the email to

make sure they are legitimate. Not long ago I received an email

from Yahoo telling me they were shutting down my account. Not

so. In official emails, like Pay Pal, they know your name.

The importance of usernames is in protecting your identity

and privacy. If this is your concern, then make sure you don't use

a username that connects you to who you are. I've done

background checks on people to find out if I was being scammed,

and usernames are a great way to track people down. All you

Page 14: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

have to do is drop the person's username into Google and follow

the trail. Since I own a business and am branding, using my name

helps others find me.

Same thing with email. Never post your email on a website.

This is a great way for others to find out stuff about you and those

sites get spidered. Your email ends up on a list, and you get tons

of spam.

Don't give your email to people you don't want to have it. It's

a good idea to have at least 2 email addresses, one public and one

private. For a public email, I usually use Gmail. With billions of

dollars behind the company and a techno geek running the show,

it works pretty well. My private email, which I pay for, is at

Yahoo.

Passwords are one of the easiest ways to get compromised.

Sua Sponte, Semper Fi, God, password and any identifying

information related to who you are is the first thing people use to

try and hack into your accounts. More than one vindictive

girlfriend or boyfriend has used this information to do deadly

deeds, so make sure you use passwords that are random and

Page 15: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

secure. Add an extra layer of security to protect yourself by

password protecting your desktop, and if you use the tools I'm

about to recommend, have a master password.

Nothing is hack proof. Everything from the Marine Corps to

the IRS has been successfully hacked. It doesn't mean you can't

protect yourself effectively and slow them down to the point they

leave you alone.

If you are banking, shopping, or doing any type of activity

online that has to do with money, use 17 digit random passwords

for those accounts. Anything you want to really protect, use 17

digit random passwords. When you pay for your purchase, make

sure it shows https:// in the browser address bar. This means that

it is secure and the site has a valid security certificate.

Limit your information. I use Pay Pal to shop online a lot,

especially with my business, and it helps me to control where my

financial information is and where it is stored. (It is also owned

by Ebay, another billion dollar company, and they take

compromises in security seriously.)

The fewer places you have that information available, the

Page 16: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

better. Control your important information. You can also buy

American Express, Master Card, and Visa gift cards, as well as

use a prepaid debit card online instead of your regular cards to

protect yourself. This gives you an additional layer of security,

especially with prepaid debits because you can buy and recharge

those at a CVS or other store that sells prepaid debit.

Now if you're like me, I'm too lazy to remember all those 17

digit passwords, so I use tools to help me keep track, and these

have an added layer of security for you by allowing you to use a

master password. This means before the password is entered into

the form, you have to enter the master password into the software

first. Two tools you can use, and both have free and very low cost

versions and are available on multiple platforms are:

http://roboform.com

http://lastpass.com

I use Roboform because I can load it onto a flash drive and

then take it with me. Helpful when you are on public computers

and need your passwords.

One caveat here: don't put your shopping information like

Page 17: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

addresses, phone numbers, credit card information or anything

like that into the software. Enter that manually on sites as you go.

Avoid having that information available on your computer unless

you absolutely have to.

Some additional tips here:

1. To protect your surfing habits, set your browser to clear the

history and files when you close it. Look under Settings to do

this.

2. If you have sensitive files on your computer you want to

make unrecoverable, then use Slim Cleaner to shred them.

Periodically wipe the white space on your drive too.

3. If you need to send secure email, use secure email tools or

email accounts that actually use encryption to encrypt your

information before it is sent out.

You can get many of these tools for free, and all these tools

will keep prying eyes out. Here's a good one that's been around

for years. (Make sure you read the terms and conditions on this

stuff so you understand what you are getting and what they can

legally do.)

Page 18: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

http://www.hushmail.com/

4. Want to surf anonymously? Many of your browsers

allow you to switch to safe browsing or secure

browsing. (In Google Chrome it's incognito. Use the

box in the top right corner of your browser to access

this feature.) You can also look at websites online

without having it show up in your history.

http://hidemyass.com

Just pop the URL in and visit the site.

In the next lesson I talk about Google, and then we'll move

onto Facebook. Since so much hacking goes on with Web 2.0

sites, it's a good idea to know how to protect yourself here.

Google also has some great tools like email, Google Voice,

Google Drive and others you can use for free.

Homework Assignment

1. Download one of the tool bars and set it up on your

computer. Use it to generate your passwords. Make sure you add

a Master Password.

2. Update any passwords you need to update to secure your

Page 19: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

accounts.

3. Remember: information control. The fewer sites where you

have sensitive information, the less opportunity for compromise.

Page 20: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

Lesson 3 - How to Use Google to Secure Your

Privacy

Today's lesson is in video. This is so I can show you all the

cool tools Google has to offer to help you protect yourself online.

In order to access this lesson, you will need to use the private

link. I don't want everything I know to be public knowledge.

Access the link here:

https://www.youtube.com/watch?v=Gov7PtBsMQ8

I used BB Flashback Express to make the video. It is free.

http://www.bbsoftware.co.uk/BBFlashBack_FreePlayer.aspx

Homework

1. Sign up for a Google Account. It is free.

https://accounts.google.com/SignUp

2. Once you have signed up and verified your account, then

go to the Google search and search for Google Products. This

allows you to access all the Google products and set up the

measures I suggested in the video. I have included the link here.

Page 21: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

However, Google often changes them without updating, so if you

can't find this page, then it has been moved.

http://www.google.com/about/products/

Final Note: When you set up your security questions, don't

use things that are easy to guess. Make it something you

remember. For example, Mother's maiden name: none or some

other random answer that only makes sense to you. You can also

use a backup email if you forget your password.

Page 22: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

Lesson 4 - Protecting Yourself Against

Identity Thieves, Stalkers, and Keeping

Yourself Safe

This video shows you three different places to use to help you

identify where your information is available online and then

shows you how to erase this information to protect yourself.

Sites Used

http://mylife.com

http://spokeo.com

http://google.com/

Homework

Sign up for a free account with My Life. Use this site to help

you purge the internet of records you don't want others to have. If

you have not signed up for a Google account and are using this to

help you secure your identity, then make sure you do so.

If you plan to use the dating section of My Life, make sure

you read the online dating safety tips first.

https://www.youtube.com/watch?v=oh_x1X3YU-o

Page 23: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

Lesson 5 - Protecting Yourself on Facebook

Facebook is one of the top sites on the internet. It's also one of

the most dangerous if you don't understand how to protect

yourself. Hackers, viruses, and other stuff can be a landmine.

This video shows you how to protect yourself on Facebook.

https://www.youtube.com/watch?v=VBnnQYTe8Ls

Page 24: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

Lesson 6 – Google Maps: Protecting Your

Physical Location

I know where you live. I know what your house looks like.

Not really. If I wanted to find out though, then this is the tool I

would use because it uses satellite technology, along with using a

private company called Tele Atlas. The information is quite

comprehensive, and as you can see in the video, reveals a lot

more information than you think. That's why, if privacy and

security is that important to you, make sure you only use your

address as needed to do things online and always keep it secure.

One suggestion I would make is to get a post office box. Have

all your mail sent there. Now it may not work when you are using

government agencies. It will help you cover your tracks with

everything else.

https://www.youtube.com/watch?v=LYQQ7bXsBGg

Page 25: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

Lesson 7 – Navigating the Ebenefits System

Benefits are an important part of a veterans' life.

Understanding how to get your records, find benefit information,

see what benefits are available to you is crucial to your success in

collecting those benefits. Here is how you access the Ebenefits

system, access your military records and check to see if you have

any state benefits available to you.

https://www.youtube.com/watch?v=9T8mrdY4oMc

Page 26: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

Bonus: Additional Tips to Help You Stay

Secure

I contacted a fellow veteran who is also a security consultant

and asked him for his best advice. Here it is.

If you would like to contact the Phoenix, this visit his site:

http://warmastersapprentice.com/

1) Touching the keyboard, can give away your 'position' so a

keyscrambler is an absolute, "encrypting" every single key that is

touched, so you and those that "need to know" will get your

message, and those that should not, yet still try are going to have

one heck of challenge breaking into an "A and B conversation," to

C their way into your data. If on a budget, a free to quite pricey

version can be found here. http://www.qfxsoftware.com/

You may argue that I.E.. is lacking in many aspects, but I

have taught a legion of beginners to so-called experts and even

alleged elites--where the holes are that can be filled--with all of

the many of 'booby-traps', alarms of a sort, and downright 'nuclear

weapons' should anyone dare to even gaze at [their] servers, or

Page 27: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

any one workstation that any [lazy/apathetic] user might take a

seat in front of. [Civilians] can never be trusted to be completely

diligent as you or I my Mistress. None. I have had to have a

"Plan Bravo to Zippo" to compensate for each that I have had to

protect from bodily harm to economic ruin. Including, having

their own mammals that worked with them, alongside them--

stealing from them--innovative ideas that could help our wounded

to those wounded in spirit.

I cannot stress the importance of having encryption within the

hardware that only a finite few would or should, have a need to

know about. Please, consider my words...

2) As far as privacy is concerned, "Big Data" is or "Big

Brother" has been alive and well, as you wrote [correctly], since

the mid-1950's. And it was 'given up', "the Arpanet," or "Ape-

Net," as it was known in my time "in the machine" (my military

service) and in a certain circle prior to that, in the prime simply

because it can never be fully secured, and hence the worst

decision was made: handing it over to public sector mammals in a

Page 28: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

municipality near you and I.

It was "all downhill from there."

To [semi-] protect each that uses this tool, like 'the Flame that

can provide warmth and comfort'--and kill you--each, as you also

stated correctly, must never fully rely on anyone else, as even the

postal service 'sells' each of our data without our consent, and oft

times without our knowledge.

Hence physical 'junk mail' appearing in our mail-box at the

end of our driveway's. Or 'Spam' in our most secure e-mail

accounts. We are betrayed every nanosecond, every single day.

So to "cover" of tracks, or obscure the trail behind us (how

copy?), I would and have provided the following [options] to

captains of industry, to those with children they want to protect

while on any child-oriented site, a [serious] set of or multiple

layers of [armor]. Most can be found here.

http://www.cnet.com/

Besides

1) "Cookienator": Automatically removes malicious 'cookies'

that report your usage, or 'track' how, where, and what your

Page 29: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

viewing (each "page"), and any and all "Third Party" or 'uninvited

guests' that want to walk in on your [computer] system, no matter

how big or small.

2) IObits' http://www.iobit.com/ "Advanced SystemCare"

(version 6.3 is the current), and the "IObit Malware Fighter": are

titans that few will attempt to penetrate if they try to set a "bot" of

some sort to a "Trojan" program through a provider into the

systems connected to it. 'We' got burned last year via COX, as

well as Yahoo, MSN, and Google, by some heavy hitters in

Europe last year, and though they got busted by a collaboration of

"folks with stinking badges," the 'bots' they had sent out prior to

their arrests were "timed' and retrieved user data which was sent

to another part, a separate server or servers, at another position in

another part or region of our planet.

A note regarding Advanced SystemCare: In settings, the user

must take some time, and go into the setting of the software under

"Ignore List," then remove the plethora of cookies 'they' believe

most "go to" most often. One has to look for the 'Browser

Cookies' tab, then remove what is seen from the list on the right

Page 30: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

(Cookies to keep), to the left (Cookies to Delete), so any trace,

anything that is overt to sublime is safely removed. Each has a

scanning and defrag utility embedded that can be set up easily.

And IObit has a separate 'Defrag' software package as well--that

anyone--that takes I.T. security an 1/8th as seriously as 'our'

cadre, and I mean you and I alone, should definitely have in their

'armory'. And each can turn off the computer they are installed

on--"Off."

3) "AVG Anti-Virus Free Edition 2013," is some really

hardcore, "high-speed, low-drag" [Sierra]. If you use it, I pray

you will use it wisely and prudently. You can hurt somebody

with [that thing] and "its all funny until some loses an eye."

All are, in a way, part of a "fire and forget" 'alarm system',

wholly attached to an electronic arsenal...

4) "CCleaner": http://www.piriform.com/ccleaner (that is

not a typographical error) by these [friendlies], is quite good for

removing any 'junk files, including anything that is intention set

by the Google browser by any that chose to use it, and any logs,

or any other forensic data, that could and would be used to "sell

Page 31: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

you," or persecute you, by any hacker of any skill level. There is

an 'enhancement tool'--aptly known as CCleaner Enhancer for a

'military' cleaning and removal of underlying 'junk' programs on

any system reach out for and take up space on anyone's system.

In the 'Settings' tab, under 'Options', you should set the option for

"Secure file deletion (Slower)" which makes a 35 pass--'Very

Secure Overwrite'--so "bad-guys cannot even find what you have

done nor where you have done it.

5) "Glary Utilities": http://www.glarysoft.com/ found here,

does much of the same as CCleaner, but there are a myriad of

'definitions' out there, none exactly the same, so it is prudent to--

in this case--"kill them all"--in a 'crossfire' of a sort. If one utility

does not, or cannot do the job completely, another Bravo-Foxtrot-

Gulf from another position probably will...

I absolutely do believe in "overkill," but I believe you already

knew that about your apprentice long ago...

6) "Spybot - Search & Destroy" http://www.safer-

networking.org/ (I just love their name), found here along with a

serious review, should and can, be set to "go green" as soon as the

Page 32: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

user turns on their system, to just prior to connecting to the 'Net,

which, in turn--SHOULD BE BEFORE THE USER CONNECTS

THEIR ETHERNET CORD TO THEIR MODEM. It is designed

to "cover the user" as "they go in," no matter which browser each

uses, and hence, the inherent liabilities of any and all browsers--

including--Googles, which are legion (more in a minute about that

version of 'Chrome'). And after disconnecting from the 'Net, a

built-in "Search & Destroy" utility (you know me my dear Sister;

"back up, back up, back up." Did I, or can I say "back up" or

"crossfire" enough? They bring an ill-advised attack, my tripwire

(think a "Claymore Mine" attached to an I.C.B.M.) goes "BOOM"

and then some, incinerating anything and everything, that sets it

off.

7) "Malwarbytes 'Anti-Malware' software" is a very good

tool, but I 'update it no less than 3 to 7 times if I have a system

attached to the 'Net, as a new version of attack is always a threat,

and hence it is prudent to carry "rounds for any and all new

occasions" not known before "we go outside the perimeter." So

even if a 'pop-up' stating that a new definition is not shown, if you

Page 33: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

[click] on the tab "Update," then the 'button' "Check for Updates,"

8 out of 10 times, a slightly new version and hence definition

from a wholly new threat is ready for the public should any be so

diligent in their endeavor for a secure Internet experience.

Hiding in the Open: "Stealth"; 'Phoenix' Style

Again, I strongly suggest, no matter what software program

each may be comfortable with, complacency can "leave a mark."

So "Tor," and "Jon/Do", help augment your Internet

presence/camouflage, and make any and all that might try to track

the user more difficult. It is infinitely harder to hit something that

cannot be seen in the prime...

If you really 'need' to use Google, or in any other browser;

1) Abines' 'Do Not Track Me', http://www.abine.com/

2) And 'Ghostery', http://www.ghostery.com/ found here,

does more than help "cover you as you go in," on any and all

known browsers--they have a 'plug-in' for everyone on their home

site--no matter which browser each uses or is ultimately

comfortable using.

Page 34: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

3) 'AVG Do Not Track' though very good, disables itself

(very different than the Abine version) if you are in "InPrivate,"

mode in Internet Explorer, or "Incognito" mode in Google.

4) Within Googles 'Settings', the 'plug-in' 'Disconnect', an

extension which stops major 'third' parties and search engines

from tracking the webpages you go to and any searches you do,

should absolutely be installed. And on a side note; Google keeps

any and all search attempts you might make--forever--and worse,

every "Tweet" has been archived at the [U.S.] Library of

Congress eternally as well.

Page 35: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

Get Additional Help

Thank you for taking the time to read my report and watch the

videos. Questions or comments? I'm always happy to help. You

can contact me as follows:

Facebook – http://www.facebook.com/jingerjarrett

Military Veterans Worldwide: Vets Serving Vets. Jobs,

Benefits and More. - This is my baby. We're here to serve

veterans. Tons of content and resources, as well as personalized

help at the individual level to help you get what you need. We're

volunteers, and this is a labor of love. Started out under a different

name. Now we serve veterans worldwide.

https://www.facebook.com/groups/usmilitaryveteransdrea

mjobs/

My Support Desk – http://jingerjarrett.com/support/ - I'm

always happy to help by asking any questions you have.

Page 36: The Veterans' Guide to Protecting Your Privacy and Staying Safe Online

About the Author

Jinger Jarrett is a former US Army soldier (1982 - 1986). She

served with the 535th Signal Company in both Grafenwoehr and

Nuremberg West Germany from 1984 – 1986 as a 32F, Fixed

Ciphony Repair. Her secondary MOS was 71L, Administrative

Specialist.

From 1991 – 1998, she served in the Michigan Army National

Guard, 1460th Transportation Company, Midland, Michigan as a

71L. She transferred to MTC at Camp Grayling where she

completed the 46Q, Print Military Journalist course and then

worked in the Public Affairs Office. With the help of the GI Bill,

she earned a Bachelors of Applied Arts with majors in both

Journalism and English Language as Literature.

Since 2001 she has owned an online business. She teaches one

person businesses how to start a business online and then market

online for free. Her book, ”Hour of Power: When Jesus, Zen and

Quantum Physics meet the US Army” is available on Amazon, as

well as all major online digital bookstores and is designed to help

beginners to develop the right mindset for succeeding in online

business through the use of Quantum Physics and the laws of the

universe.

Website: http://jingerjarrett.com/

Amazon: http://www.amazon.com/author/jingerjarrett