Monthly Archives: February 2011

Tech Thoughts Daily Net News – February 24, 2011

Avast wants you playing in its sandbox – Avast takes the worry out of blocking suspicious programs from harming your system with a new AutoSandboxing feature in its latest major-point upgrade, exclusive to today.

50 Free Apps for Your Android Smartphone – We love apps and we love them even more when they’re free. Sift through this crop of 50 Android apps to find something useful, fun and — oh yeah – free.

Create a shortcut icon to quickly enable and disable the Windows 7 firewall – Jack Wallen shows you how to add desktop icons so that you can quickly enable and disable the Windows 7 firewall.

Tech Thoughts Daily Tech News 2

Lifehacker: Secure Erase Methods Probably Won’t Work on Your Solid-State Drive – Researchers at UC San Diego found that the normal methods we use to securely wipe magnetic drives aren’t as useful on solid-state drives. After testing twelve SSDs, they found that only four were securely erased with whole-drive erasure methods. Trying to securely wipe a single file was even less successful, and more often than not a good portion of the file was recoverable.

Memory Scraping Malware Goes After Encrypted Private Information – What’s “pervasive memory scraping” and why is it considered by SANS Institute security researchers to be among the most dangerous attack techniques likely to be used in coming the coming year?

Army of Fake Social Media Friends to Promote Propaganda – Does a code of ethics still exist in Intelligence firms? Does it disappear behind closed doors, dirty deeds done in the dark and used against the American people who are supposed to be free to express themselves?

Facebook Privacy: 10 Must-Know Security Settings – Facebook’s seemingly endless tweaks to privacy and security settings leave many people wondering: How secure is my Facebook account? We’ve rounded up the 10 most important settings for you to check.

PayPal phishing campaign hits inboxes – PayPal users should be on the lookout for phishing e-mails with “Please confirm your identity” in the subject line supposedly coming from the service.

Company News:

iolo technologies Awarded Patent for its ActiveCare® Technology – The newly patented ActiveCare technology works transparently when a computer is idle and intelligently tunes the machine for peak performance without slowing it down, consuming vital foreground resources, or interrupting users with indiscriminately scheduled tasks or messages.

A significant leap forward in proactive technology, ActiveCare uses a sophisticated method to sense when the computer is on but not being used and performs a battery of background system analyses that can then trigger specific associated optimization, maintenance or repair actions in real time to target and preemptively correct even slight degradations in performance or stability. If the computer user initiates any other tasks during that time, ActiveCare silently terminates any active processes and full control is returned to the user

Apple’s iPad 2: The waiting game ahead of a potential sales boom – With Apple’s iPad 2 event reportedly set for March, analysts are scurrying to predict how many tablets the company can sell.

Laptop battery life: The new battleground for PC makers – If you’ve dreamed of laptop batteries pushing 30 hours of power it’s been a good two days for you. Both HP and Lenovo have stepped up their games on battery life.

FTC Investigating Apple, Google In-App Purchases – The Federal Trade Commission is looking “closely” at the issue of in-app purchases, particularly those that are not transparent about how they charge consumers for their activity.

Off Topic (Sort of):

Secret CIA spy gadgets go public (photos) – Thought James Bond had cool tech toys? Get a load of some of the gizmos being shown off by the CIA for the first time.

First robot marathon planned – So far, five robots have been entered in the event, which is expected to last for four days next week. Organizer Vstone Co. said Wednesday the race will demonstrate the machines’ durability and maneuverability. (submitted by Michael F.)

Nintendo 3DS Hands-On: Does It Live Up to the Hype? – Spend some quality time with Nintendo’s glasses-free 3D bid to reenergize the portable gaming market and see for yourself if it lives up to the hype.

Does Gates funding of media taint objectivity? – According to the Seattle Times report, BMGF donates millions every year to media groups like ABC, The Guardian, The New York Times, PBS, and even The Seattle Times. BMGF also spends millions of dollars training journalists in how to properly advocate for foundation interests, and craft media messages in such a way as to further the foundation’s agendas. So rather than presenting news, many BMGF-funded journalists now present carefully-crafted BMFG talking points to viewers and readers. (submitted by Dar)

Today’s Quote:

The one function TV news performs very well is that when there is no news we give it to you with the same emphasis as if there were.”

–   David Brinkley

Today’s Free Downloads:

Avast Free Antivirus 6.0 – Make no mistake, Avast 6 adds features both big and small. Some that had previously only been available to paid upgrade users are now free for all versions, and newer features have been seamlessly added to the interface experience. If you’re familiar with Avast 5, upgrading to Avast 6 won’t be that big of a leap.

Glary Utilities – This powerful application offers extensive utilities to improve your system’s performance and protect your privacy. Glary Utilities’ well-organized interface allows users to easily choose from several tools. It cleans unwanted junk files and removes invalid and broken shortcuts, freeing up valuable disk space.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

Comments Off on Tech Thoughts Daily Net News – February 24, 2011

Filed under Internet Security Alerts, Tech Net News

A Lesson In Malware Removal Using Kaspersky Rescue Disk

This past Sunday, I posted an article on the benefits of regular scanning with a “live CD” – Stay Malware Free (Hopefully!) – Scan With A “Live CD” Regularly. Which, reminded me of an excellent article (previously posted here), by my good buddy and fellow blogger, Mark Schneider, on working with Kaspersky Rescue Disk to eradicate malware.

There are some great pointers here, and I encourage you to re-read this terrific article. It’s well worth a re-read.


image You find your computer getting slower and slower to boot, and when it finally does boot it’s so slow everything runs at a crawl. So you try running the antivirus you have and just get a message that says the definitions are out of date and you can’t connect to the update server.

Or you may find an annoying pop-up coming up every time you boot telling you PC Antivirus has found 70,278 infections and for $49.99 they will remove them for you. Well my friend, you are hosed! Your machine is so badly infected that you have to try desperate measures.

At this point you can try pulling your hard drive out of the machine and putting it in another mounting it as a slave, and using your other machine to try to clean it.

Another way to get this thing up and running is to try some kind of bootable rescue disk to clean it. Bootable rescue disks are bootable CD’s/DVD’s that contain small operating systems, with some preinstalled tools contained for repairing your computer.

When you turn on your computer hit F10 or F12, select your CD/DVD drive and your computer boots into an operating system contained on that CD. There are a lot of great rescue disks out there, the problem is most are very complicated, and some take forever to boot.

I found one great exception to this though. Kaspersky Labs, creator of the very capable Kaspersky Antivirus line of products has built a great free bootable rescue CD that is simple to use.


Unlike many other bootable rescue disks it has one purpose, to clean your system. To create a Kaspersky Rescue Disk, download the ISO image from this link , then burn the image to a CD.

Depending on what operating system you are using you may need to download a CD burning program if you don’t already have one. If you are running Windows 7 it has a built in, burning program that’s simple to use and works great. If you are running XP or Vista, I like Image Burn, or CD BurnerXP – both do a great job of burning .ISO images, and are free.

Once you have your rescue CD built, start your infected machine pushing F12/F10 to get it to the boot selection screen. Boot to the CD Rom drive as I stated earlier and relax, although faster than most rescue disks it’s hardly fast.

Follow the prompts and when it boots into the Kaspersky Rescue system you first need to update the virus definitions. Once updated do a scan, and go read the newspaper or get some coffee, it takes a while.

Once it completes the scan go ahead and let it remove or quarantine all the files it has found. I’ve never had it delete anything that caused the machine it was fixing not to boot. But of course before you do anything like this, BACK UP YOUR DATA!!!!! But you already did that so proceed.

Do the scan, remove the junk and log off Kaspersky. Just turning off your computer with the power button won’t hurt anything when you are running a rescue CD.

The reason rescue CD’s are so effective is, you’re not trying to disinfect a computer with an infected OS. When you boot to the hard drive of an infected machine, you’re playing on the bad guy’s home turf. They control the machine and in many cases they’ve hidden the infected files so your antivirus can’t see them.

There are other rescue disks out there and many are very complicated and take a very long time. The Kaspersky Rescue Disk is the fastest and easiest I’ve found to clean an infected machine enough to allow me to boot back into Windows and complete the process by adding my favorite automated antimalware tools to keep the system clean going forward.

Note: Kaspersky Rescue Disk 10 can be run from a USB device.

This is a guest post by Mark Schneider of the Techwalker Blog, who brings a background as a high level techie, to the blogging world.

Why not pay a visit to Mark’s site today.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.


Filed under Anti-Malware Tools, Antivirus Applications, downloads, Free Anti-malware Software, Freeware, Guest Writers, Kaspersky, Linux, Malware Removal, Portable Applications, Scareware Removal Tips, Software, USB, Virus Repair Tools, Windows Tips and Tools

Tech Thoughts Daily Net News – February 23, 2011

20 Tech Habits to Improve Your Life – Technology is supposed to make life easier, but it doesn’t seem that way when you’re struggling to wrangle 289 new e-mail messages, dealing with a hard-drive crash, or suddenly realizing that you left an important file on the office computer. Thankfully, plenty of tools can help. We’ll tell you which ones are worth trying, and we’ll also suggest some practices that you can incorporate into your workday to use tech tools more effectively and efficiently.

Must-Have Tools and Tricks – Learn how to get a disposable e-mail address, stop Windows 7 from automatically resizing windows, and recover data from a dead laptop.

Tech Thoughts Daily Tech News 2

“Free Southwest Airlines tickets” Facebook scam – But what makes this scam different and quite likely more effective than your typical Facebook scam is that the installed rogue application doesn’t propagate by posting the luring messages on the Walls of the victims. Instead, it posts it as a comment on a friend’s link, photo or status update – making it look more genuine and, thus, the claim more believable.

A Toolbar You’ll Use – We’re not generally fans of browser toolbars, but Microsoft’s latest iteration of the Bing Bar offers quick access to frequently sought information, without taking you off the Web page you’re on. With a fast enough internet connection, you may be perfectly well served by a few well chosen browser bookmark buttons. Find out if Bing Bar 7.0 is right for you in our full review.

419 Scammers Taking Advantage of Egypt Revolution – Scammers regularly target current events as catalysts for their online attacks… what’s the latest tactic? Using the Egyptian revolution as a hook in scam emails, 419 or advance-fee fraud scammers – who typically promise large amounts of money, but demand upfront fees first – have recently employed a tactic that takes advantage of the resignation of Egypt’s long-standing president, Hosni Mubarak. identified a German-language 419 scam from “the former Egyptian president’s lawyer”, claiming to need help in retrieving $2.5m of the president’s funds from a frozen Belgian bank account

Your Smartphone: The Next Big Security Headache – One of Android strengths is its openness. Just about anyone can write an app and distribute it without having to go through a sometimes lengthy review process. But as is the case on the PC, this sort of openness makes it possible for malware writers to infiltrate the smartphone. Security companies seem to think Android is the next big malware target, thanks to this openness, and the fact that it runs on so many devices.

Best Online Tools For Entrepreneurs, Monetizing Your SMB Blog, and More – Best online tools for entrepreneurs, blog monetization, solo entrepreneurship, and utilizing video to marketing your company.

Company News:


Motorola Xoom Is the Perfect iPad Competitor – As the slew of different tablets hits store shelves, there will likely only be one device that will be a top competitor to the iPad in the minds of consumers: the Motorola Xoom. The device, which will be available Feb. 24, is expected to deliver an outstanding combination of hardware and software that could dull the shine of the iPad for some buyers.

Amazon S3 Offers Complete Website Hosting – The Amazon Simple Storage Service (S3) now allows complete Web hosting, but is it better and cheaper than standard hosting providers?

BlackBerry Bold Touch Leaked Into the Wild – (News for BlackBerrys) has published leaked photos of what has been dubbed the BlackBerry Bold Touch. The leaked device seems to borrow its shape from the original BlackBerry Bold 9000 smartphone rather than the current BlackBerry Bold 9700. Unlike the BlackBerry Torch 9800, which uses a slide-out keyboard, the BlackBerry Bold Touch is a candybar smartphone.

Amazon adds streaming TV, movies to Prime: Could just be the beginning – Amazon added unlimited streaming of movies and TV shows to its Prime subscription plan. While the move is billed as Amazon vs. Netflix the move really just highlights what’s possible with the Prime model.

Off Topic (Sort of):


Maximum PC Challenge: We BBQ a Fireproof Hard Drive – IoSafe claims that its SoloPro external drive can withstand temperatures of up to 1550 degrees Fahrenheit for up to half an hour, and last for three days in ten feet of water, all without harming the data on its 1TB internal drive. We’ll just see about that… took our not-at-all-suspicious selves over to a nearby marina, lit some coals, threw some dogs on the grill, and got ready to test IoSafe’s claims about the SoloPro 1TB USB 3.0 external storage device. Here’s what happened. (submitted by Dar)

Dumbest Tech Marketing Stunts Ever – Two Dell employees last week put the maxim “There’s no such thing as bad publicity” to the test after a hostage-themed marketing stunt focused on the Dell Streak tablet went about as badly as you’d expect.

What “Do Not Track” Is and Why It’s Important – What’s so bad about ad tracking on the web, a.k.a. behavioral targeting? Nothing, if you don’t mind being a living stereotype. No, seriously—that’s what much of the fuss over “Do Not Track” browser options and opt-out options is about. Ad companies watch what you do online, and they make bold assumptions about you. How you feel about that is up to you.

Presidential wheels (photos) – In honor of Presidents’ Day, we’ve rounded up a collection of interesting Presidential State Cars of years past.

Today’s Quote:


In the modern world the stupid are cocksure while the intelligent are full of doubt.”

Bertrand Russell (From his essay “The Triumph of Stupidity”)

Today’s Free Downloads:


STOIK Imagic – STOIK Imagic is a large, feature-packed photo album, organizer, manager, and editor. It’s also a retouching tool, a calendar maker, a media cataloger, a video editor, and a drawing tool. In short, it’s a full-featured graphics suite with an emphasis on digital photographs. At 80MB, it’s a big download, but since it’s compressed, it’s a fast one, too, and setup is virtually automatic, including scanning your system for images. Anything else? You bet: it’s free.

Big Free Clock – Big Free Clock is great for churches or places needing to display the current time in full screen mode.The digits and message colors can be changed.Totally free meaning you can use it anywhere without paying. Use 12 hour or 24 hour time displays.The digit sizes are auto adjusted to maximally fit the screen.The background images can change to a new picture on a regular basis.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

Comments Off on Tech Thoughts Daily Net News – February 23, 2011

Filed under Internet Security Alerts, Tech Net News

Free BufferZone Pro – Maybe The Best Surfing Virtualization Application At Any Price

Back in December, regular reader John W, pointed me to a free license giveaway for BufferZone, a virtualization application which creates an isolated environment called the Virtual Zone, while you surf the Internet.

Based on John’s recommendation, I wrote an informational only article, since I had not had an opportunity to test the application. I’ve spent some time in the interim testing this application, and there’s just one word to describe it – brilliant, exceptional, splendid, superb.

OK, that’s more than one word – but I’m more than just a little enthusiastic about this program. Best of all, this application is now free – as in FREE.

This is not 1985 when the only thing you had to worry about was the crud that might be on the floppy disks you exchanged with your friends. Today, your Browser is the conduit into your computer – that’s the route by which the majority of malware spreads, and intrusion attempts take place.

A case in point:

While surfing the Net, a user mistakenly accepts an invitation to install a scareware application but realizes, after the fact, that this is a scam. Operating in a “real” environment, the damage, unfortunately, would already have been done.

Operating in a “virtual” environment with BufferZone active, system changes attempted by this parasite would simply not occur.

So, controlling malware intrusion, while surfing the Net, through the use of a ‘”virtual” environment rather than operating in a “real” environment, makes sense given the escalating level of cyber criminal activity on the Internet.

From the developer’s site:

BufferZone Pro keeps you surfing, downloading, e-banking, sharing, chatting, and e-mailing to your heart’s content – basically, using the Internet as it should be used. The Virtual Zone gives you total freedom, peace and security on the Web. With BufferZone Pro, you can do absolutely anything on the Internet threat free.

With BufferZone, all programs or files that enter your computer through downloading, browsing, or uploading with external media devices, are redirected to a Virtual Zone (C:\Virtual). And, since any intrusion attempt occurs within this virtual environment, there’s nothing in that summary that I can disagree with. BufferZone’s Virtual Zone does protect a PC from all forms of known, or unknown, attacks originating from the Internet, or external devices.

It does so in a non intrusive way, and after initial setup, requires a minimum of user intervention – perfect for the average user. Installation is hassle free – it’s just a matter of  following the on-screen instructions.


BufferZone sits in the Taskbar and can be fully controlled from there.


Once the application is installed, and after a re-boot, you will be taken to the developer’s site (this is a one time occurrence), for a point by point introduction to Buffer Zone. The following screen captures (taken from the developer’s site), provide a clear explanation.

Clicking on any screen shot will expand it to the original.








In the last few months we’ve looked at operating system virtualization – Shadow Defender, Returnil Virtual System, Wondershare Time Freeze, and a number of other similar applications. As well as alternatives to OS virtualization – specific application virtualization running in a sandbox. For straight out ease of use while surfing the Internet though, BufferZone has become my favorite.

If you’re unsure as to whether you should operate in “virtual mode” while surfing the Net, then take this free security test at the developer’s site.

On my “unprotected” test machine, the following is the result of the simulated Trojan attack. The “stolen” files were on a non-system partition so the Trojan doesn’t restrict itself to just the (C:) drive.


Actually, I forgot to turn off ThreatFire, which picked up the attack in progress. This shows the benefit of a layered security approach.

System Requirements: Windows XP, Vista, Win 7 (32-bit).

Download at: the developer’s site (

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.


Filed under Anti-Malware Tools, cybercrime, Don't Get Hacked, downloads, Free Security Programs, Freeware, Interconnectivity, Internet Safety Tools, Online Banking, Online Safety, Safe Surfing, Software, System File Protection, System Security, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Tech Thoughts Daily Net News – February 22, 2011

The 10 Best Ways to &*$% Up Your Computer – We expend bunches of keystrokes detailing how to recover from disaster, everything from sweeping spyware from your system to how to get your data back from the digital graveyard, but equally important is how to avoid potentially catastrophic scenarios in the first place. As the saying goes, an ounce of prevention is worth a pound of cure, or in in the world of PCs, hours of frustration.

Google Chrome’s New Beta: A Hands-On Tour – The latest beta for the Google Chrome browser is mostly about speed, thanks to a new JavaScript engine and an early taste of GPU-accelerated video. But Google has also introduced a few new features to make the user experience more pleasurable, including password sync and a revamped options menu. Let’s take a closer look:

Windows 7 Service Pack 1 Available Today – The wait is over, folks. If you’re not a TechNet subscriber and/or wanted no part of playing around with a non-final release of Service Pack 1 for Windows 7, then today’s your day. Microsoft today made good on its promise to deliver SP1 to the general public on February 22, though there’s a few things you should know before you go out and grab it.

Tech Thoughts Daily Tech News 2

New type of financial malware hijacks online banking sessions – A new type of financial malware has the ability to hijack customers’ online banking sessions in real time using their session ID tokens. OddJob, which is the name Trusteer gave to this Trojan, keeps sessions open after customers think they have “logged off”, enabling criminals to extract money and commit fraud unnoticed.

FBI: We’re not demanding encryption back doors – FBI’s top lawyer tells Congress the bureau is not calling for restrictions on encryption without back doors for police, an apparent retreat from its position last fall.

Cricket World Cup starts, scammers follow – The Cricket World Cup started on Saturday, and both the International Cricket Council and various security experts are issuing warnings to fans regarding likely cyber scams that will be following this popular event.

Over-Rating the Social Networks – Any John C. Dvorak column that features the word “cripes” is bound to be entertaining, and this latest one does not disappoint. Dvorak uses his 30 years of media experience to dismantle the influence of social networks. I think he has a point. Or does he?

Protect and Defend: 32 Ways to Secure Your Digital Life – For every freedom and convenience we enjoy in our digital lives, there are countless cyber do-badders looking for ways to exploit them. Fight back with these 32 ways to protect your digital life!

Company News:


Google Social Search Spreads to Fight Facebook – Google Feb. 17 said it will begin mixing its Social Search results throughout results pages based on their relevance, an effort to raise the profile of a feature that hasn’t drawn much attention.

Apple’s Subscription Policy is a Poison Apple – Apple’s new 30% cut of third-party subscriptions is a rotten deal whether trust-busters find it monopolistic or not. Surprise, surprise: Apple’s new approach to subscription services on the iPhone and iPad has attracted the attention of U.S. antitrust enforcers and European regulators.

Avast Antivirus 6.0 Combats Trojans With Virtualization – Czech security company Avast Software is adding virtualized security to the forthcoming version of its paid antivirus software.

IPhone Workers Still Sick After Chemical Poisoning – Guo Ruiqiang says he still feels sick more than a year after he suffered chemical poisoning while working on an iPhone production line. Guo was one of 137 workers U.S. tech giant Apple said was exposed to n-hexane, a chemical cleaning agent that was used at one of its supplier’s factories in Suzhou, China. The case was addressed in Apple’s most recent progress report on its suppliers, with the company saying that “all affected workers have been treated successfully.”

Off Topic (Sort of):


Can Anyone Afford an IBM Watson Supercomputer? (Yes) – After showcasing Watson’s ability to ingest Jeopardy questions and spit out near real-time answers, IBM is now preparing the supercomputer for a full-time gig as a data analytics engine for the medical community.

Cyber-Criminals’ Constantly Evolving Tactics Challenge Law Enforcement – A panel of cyber-security experts talked about the changing security landscape and how multinational collaboration is helping bring down some of these criminal syndicates. Despite the constantly changing security landscape with evolving threats and new tactics, there are several key victories in the fight against cyber-crime, experts said.

QR Code – Tracking service, News, Videos, Forum, Focus groups and more – The first and only all in one dedicated QR code website on the net. Find out everything you need to know about QR codes. (submitted by Dar)

Footwear, Fashion Driving RFID Growth – The radio frequency identification systems “allow apparel retailers to get a better handle on inventory, [thereby] reducing costs and preventing out-of-stock situations that result in loss of sales,” said ABI analyst Bill Arnold in a statement.

Today’s Quote:


What we think, or what we know, or what we believe is, in the end, of little consequence. The only consequence is what we do.”

–    John Ruskin

Today’s Free Downloads:


GameSave Manager – GameSave Manager enables you to easily backup and restore your game saves. The program directly supports nearly 500 popular PC games, which can be backed up without having to manually configure the software.It features include built-in Update Checker,backup validation, DropBox Support, Dynamic Restoring, Transfer gamesaves, and backup upon change.

Ad-Aware Free Internet Security 9.0 – The bottom line: One of the first applications built to find and remove malware and spyware, Ad-Aware’s reputation is well-justified. The latest version continues the publisher’s tradition of adroitly addressing user concerns, yet some annoyances remain.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

Comments Off on Tech Thoughts Daily Net News – February 22, 2011

Filed under Internet Security Alerts, Tech Net News

Five Firefox Disposable Email Address Add-ons – Share An Email Address Safely

imageMost of us are familiar with this old line – “Free online registration is required – and oh yeah, give us your email address so that we can send you the activation code.” It’s almost inevitable that solicitations for additional products, or services, will follow – at a minimum.

Even on this site, if you want to leave a comment you must provide an email address. I do this in an effort to control comment spam. This past Saturday, for example, I had to deal with almost 600 spam comments – sheesh!

Fortunately, the only person who can see the actual email address on a WordPress Blog, is the Blog owner. This precaution effectively shuts out email harvesters. Still, I recognize that a certain amount of trust is necessary that I won’t sell, or profit, from a commenter’s email address.

My good buddy Paul Lubic, over at Paul’s Home Computing Blog, addresses this issue head on by appending “I don’t share your email address with anyone…no one; I hate spam too”, to every post. I know Paul, so I can vouch for the accuracy of this statement – he hates spam.

If you do too (and why wouldn’t you), and you’re a Firefox users, there’s an abundance of add-ons which can help to protect your Online privacy, reduce Spam, and still allow you to comment, register for newsletters, join forums, and so on – all anonymously.

Each application description has been taken directly from the developer’s Mozilla page.

Less Spam, please

You want to register, leave a comment or just have a disposable email address at hand ? But you want to be able to retrieve mail from time to time and to use always the same address for the same web site ?

This is the solution. Less Spam, please create a (partially) random email address for you, always the same for a given web site. It relies on services (without registration) such as YopMail, MailCatch, Humaility or Mailinator.

Create free disposable email addresses and paste them directly in forms. This helps to protect you from spam mails and could be useful when subscribing to forums or newsletters… The email addresses can be deleted at any time! This plugin uses the free DEA service.


Create a temporary e-mailadress for 12 hours. Perfect when signing up on websites or forums and dont want to give away your personal e-mailadress.
All mails will be forward to your personal e-mailadress, after 12 hours the temporary e-mailadress will no longer work.

Spam Control

Spam control gives you easy-to-use control over who you give your email address to, and easy access to a number of spam fighting tools that help keep your inbox spam-free.

Spam Control adds a toolbar (which you can disable if you like) and a pop-up menu to Firefox. Whenever an input field has focus, you can use one of the buttons to automatically type an email address into the field, saving you having to type it or remember it.


As an anti-spam solution tempomail allows you to create a temporary email address redirecting each message to your mailbox for a given period of time. When this period of time expires, you will not receive any spam from the web sites on which you gave your temporary email address. Tempomail is not commercial and your email address will be stored in our logs only for legal archiving.

To create a temporary email address, just right click on a text field and select “tempomail” in the context menu. Then you’ll be asked for your real email address to which messages will be redirected during the time you selected. The temporary email address also appears in the text field as shown in the previews.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.


Filed under Browser add-ons, downloads, Email, Firefox Add-ons, Freeware, Interconnectivity, Internet Safety Tools, Privacy, Software, spam, Windows Tips and Tools

Tech Thoughts Daily Net News – February 21, 2011

Online Bargains: How to Use Groupon and Its Competitors – Group-deal and flash-sale sites such as Groupon, LivingSocial, and Rue La La promise restaurant meals, brand-name goods, and great services at deep discounts. Here’s how to use these sites to your advantage.

iCopy – When you’re setting up a home office, chances are your budget doesn’t include springing for a photocopier. But it may include a scanner and a printer. If so, an open source utility called iCopy can help you get the copy machine you’ve always wanted.

New types of cookies raise online privacy concerns – The advertising industry has led the drive for new, persistent and powerful cookies, with privacy-invasive features for marketing practices and profiling. The EU cyber security Agency ENISA advocates that both the user browser and the origin server must assist informed consent, and that users should be able to easily manage their cookies.

Tech Thoughts Daily Tech News 2

Black Hat SEO, J.C. Penney, and the New York Times – Link-buying is a Black Hat, i.e. unethical, SEO (Search Engine Optimization) strategy becoming increasingly popular with big businesses.

The Top 5 Reasons to Buy a Tablet – Apple iPad, Samsung Galaxy Tab, Motorola Xoom–tablet PCs are flooding the market. But does anybody need one? We give you five reasons why a tablet is a useful tool.

Hackers Hit Canadian Government Sites – Malicious hackers who may be based in China fooled Canadian tech staff into providing access to government computers. In what the CBC described as an “executive spear-phishing” attempt, hackers used bogus e-mails to pass themselves off as senior executives to IT staff at the two federal departments and request passwords, while other staff received e-mails with virus-laden attachments.

Five Simple Ways To Get More Out of Google Apps – Hear from CIO Jeremy Lawrence, a Google Apps early adopter, on how Google Apps has positively affected his company, his future plans with it, and his top 5 tips to get the most out of it.

Company News:


Microsoft Claims Internet Explorer 9 RC Hits 2 Million Downloads – Microsoft is claiming its Internet Explorer 9 Release Candidate has hit 2 million downloads, roughly a week after the company first made the near-final version of its next browser version available to users.

Microsoft’s Bing Bar Includes Facebook, Controversial Feedback Feature – Microsoft’s updated Bing Bar includes some new features, including Facebook integration, as well as the optional feedback feature that sparked trouble with Google.

Off Topic (Sort of):


RollingStone: Why Isn’t Wall Street in Jail? – Nobody goes to jail. This is the mantra of the financial-crisis era, one that saw virtually every major bank and financial company on Wall Street embroiled in obscene criminal scandals that impoverished millions and collectively destroyed hundreds of billions, in fact, trillions of dollars of the world’s wealth — and nobody went to jail. Nobody, that is, except Bernie Madoff, a flamboyant and pathological celebrity con artist, whose victims happened to be other rich and famous people. (submitted by Dar)

Do Your Gadget Lights Harm Your Health? – Analysis: Those LED lights are more than annoying; evidence indicates they might be downright dangerous.

If Babies Can’t Learn Through Videos, Can Students? – Surprise, babies learn better through direct human contact. This is not good news for companies that produce video and computer- learning software for the diaper set. Software Analyst Jill Duffy wonders if this fact could also be true for older, in- school learners. Some interesting thoughts and video after the click.

Economies of Scale – Robert Barrows is optimistic about his line of video-screen-enhanced tombstones. Why? Because he thinks the numbers fall in his favor. “When I went to Google and searched for ‘How many people die in the United States everyday?’ there was a figure (I think it was according to the National Association of Funeral Directors) of about 5300 deaths per day, just in the United States. If just one tenth of one percent of the people who died wanted to have a video tombstone, that could result in sales of about five video tombstones per day.” (submitted by Dar)

Today’s Quote:


Those are my principles, and if you don’t like them… well, I have others.”

–   Groucho Marx

Today’s Free Downloads:


Stalled Printer Repair – Sometimes print jobs get stuck in the queue, and it’s not always obvious why. It could be the result of a driver issue, it could be because you’re using a Wi-Fi connection to the printer, and so forth. Even more vexing, Windows won’t let you delete a stuck print job, which blocks subsequent items from printing. Usually the only solution is a reboot, and no one should have to endure that kind of a hassle just to print a document.

Camfrog Video Chat – If you’re sick of hopping from one chatware program to another, looking for the perfect mix of video, audio, and text socializing, CamFrog might be what you’re looking for.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.


Filed under Internet Security Alerts, Tech Net News