Mar 24

How do individuals avoid NSA global network monitoring?

The massive surveillance data center built by NSA in Utah desert can screen and analyze most global network traffic from location, audio and video files, emails, social network and other digital documents. Of course, the organization that’s able to track our digital trail is not only NSA, at this privacy streaking era, all kinds of government agencies and commercial companies can master our words, conducts all the time. As a ordinary netizen, is there a reliable self-protective method?

Earlier this week, “Washington Post” has given five pieces of personal information security advice for escaping from NSA surveillance, including using Tor to surf the Internet, using Silent Circle to call. In fact, the Internet personal privacy problems are not limited to the NSA surveillance, in the past several years, the Chinese Internet companies user accounts massive disclosure and the threats to personal privacy and finance from Android phones’ malicious apps make customer privacy self-protective measures imperative.

At the age of anti-virus software is all free and invalid, everyone should understand the skills about personal privacy protection.

1. Use Firefox encryption plugin Tor to anonymously browse

To use Tor for anonymous browsing can prevent website browsing data from intercepted, so all kinds of insatiable Internet companies do not know what kind of ads should be pushed to you, NSA will also don’t know whom you are communication with. The whistleblower Snowden of NSA was photographed using Tor on the Internet.

Tor is a free Firefox anonymous browsing plugin, which’s able to encrypt network traffic data and can be used with Firefox browser on PC, Mac and Linux platforms. And encryption is at the expense of some of the browser’s speed.

It is noteworthy that Tor is not foolproof, for example in 2011 the hackers attacked Dutch certification authority NigiNotar, and created a lot of Facebook, Google, Skype and Tor fake digital certificates, the purpose was to monitor the Iranian Internet users. Similarly, according to Arstechnica reports, papers of USENIX Conference, the researchers also found that there are loopholes in Tor, which can be used to identify Bittorrent user’s identity.

2.  Use OTR app to encrypt chat

Snowden used a type of unknown OTR chat app when accepting the interview with the Guardian, this application can encrypt chat data, many free client support OTR, including Cryptocat and Adium of Mac OSX and IM+ for Android smart phone and iPhone.

3.  Use Silent Circle to encrypt voice and email, etc.

Silent Circle is a US native brand new personal communication encryption service, Silen Circle company announced that its four services would cut price while the NSA monitoring action burst, and these services include mobile phone voice encryption, text messaging encryption, VoIP voice and video call encryption and email encryption. This company claimed through an independent audit it ensured the services provided have no back door.

It is noteworthy that both the communicating parties must be users of Silent Circle if using Silent Circle encryption service. For those high-end business users who worry about information leakage, Silent Circle’s encryption service is very attractive.

4. Android mobile phone users use Redphone to encrypt calls and SMS

Android users are lucky, WhisperSystems company’s open-source software Redphone and TextSecure can provide security call and SMS encryption function. Similarly, both communicating parties must install Redphone clients. Thereinto TextSecure is used to encrypt text messages.

Redphone and TextSecure currently both have passed third-party audit to ensure that there is no back door.

5. Use PGP to encrypt data

PGP and the open source GPG that’s similar to PGP can be used to encrypt data and e-mail, these two software programs need a little bit knowledge to use, Snowden even had to make a teaching video for the Guardian reporter Greenwald.

6. Turn off phone, remove the battery

This approach sounds a bit radical, but this behavior when you don’t use mobile phone can prevent phone leaking your location information to mobile base station nearby. ACLU chief scientist Christopher Soghoian told the “Washington Post”: “laws of physics tell us that you cannot hide your location information to mobile operators.”

7. Stop using Windows and Mac OS operating systems

I believe that changing operating systems is a difficult decision, but considering that Microsoft has officially acknowledged having submitted global users data to NSA, the backdoor of operating system has become a real and serious problem. If you want to escape from “Matrix” and acquire free network user identity, you need to consider various versions of Linux including Ubuntu.

For ordinary computer users, information security including communication information and information placed in computer should be both considered. You need to try methods above to improve your information of communication security level, and for the information in computer, you can use third party tool file encryption program to set password to your folders.

May 27

How Much Do You Know About BYOD?

According to a new study of Cisco system inc., the so-called BYOD (Bring Your Own Device) policy saves cost for enterprise, while, at the same time, it increases the burden of employees.

Cisco’s report indicated, for the company that have high requirement of BYOD, they can save $1300 per year on each users. For users, they will take more money out of their own pocket.

This survey launched in six countries for 2,415 users reveals that after adopting the policy of BYOD, the average spending of per person on equipment is $965, and the data package fee of $ 734 will be paid per year.

The survey displays, employees bring their own device is happier than before, and perform a significant progress in efficiency. In American, staffs BYOD will shorten their working time of 81minutes per week, more than 70 hours a year.

However, this policy is not applicable for all countries, BYOD will produce negative impacts, for example, it will increase the difficulty of management and distract employees so as to reduce the working efficiency.

As for specific products, 81% BYOD staffs said they use the intelligence gathering, 56% said they would carry their tablet, 37% staffs carried laptop.

The report shows, the number of BYOD staffs is expected to increase to 406 million by 2016. At that time, this kind of employees in China will reach to 166 million, 106 million in U.S.A, and 76 million in India. At present, American has the largest number of BYOD staffs in the world.

We should be alert, the expansion of this policy will put our laptop and tablet into totally open environment, that’s to say, the private data and information stored in the device may be visited by others. If you don’t want your private information accessed by unauthorized person, you’d better take security measures to protect them, for example, you can password protect the folders and files on your computer.


With the help of folder protector, the data and information in your computer will be under encryption, so you can protect your private and confidential data from invasion and being stolen as well as enjoy your working time with your own devices.

May 20

Lenovo Want to Be Flourished in Table PC Market

In the morning on May 20(Beijing time), Liu Jun, senior vice-president of Lenovo group, president of Lenovo business group, discloses the development strategy of business of Lenovo smart phone, tablet computer and smart TV. Liu Jun said, Lenovo will be flourished in the areas of the tablet computer, and have confidence to fulfill the goals of the 100 million Lenovo brand terminal shipments.

Liu Jun, said the market of tablet computer will be splendid instead of being dominated by any one product. He further revealed that Lenovo will not only launch products covering high, middle, low price level, but also launch a new type of tablet computer in the second half of this year.

In the Lenovo internal staff meeting held in April this year, Liu Jun, as the president of Lenovo business group, came up with a rather challenging performance target: 100 million shipments of the Lenovo brand terminal this year. This number is twice that of last year.

As for this performance target, Liu Jun admitted is very challenging, but it is very possible. He said there are about forty million sets of one hundred million devices are PCs, and as PC products have deformed evolutionally, Lenovo will further expand the market share.

Market research firm Canalys published the intelligent terminal market of the first quarter of 2013, with quarterly 15.3 million shipments; Lenovo is ranked third in the world, next to Samsung and Apple. Liu Jun didn’t want to comment on this number, but emphasized the company’s shipments in the first quarter conforms to the plans.

Just like the radio displaces the newspaper, the TV displaces the radio; the computer tends to gradually displace the TV. People around the world prone to use the computer for entertainment, working and life. So people in industry of PC producing are nowadays trying to optimize computer so that it will be more convenient for people and more useful for life. Therefore, PC will be not only a tool to communication, work, entertainment, etc., it will penetrate into the whole society and life of human beings. We will open ourselves to the world through PC, and let others in the world know more about not only you yourself but also the environment around you, your relatives and friends and every detail of you. When you enjoy the world PC bring about for you, you should be aware of the potential threats the open world bring back to you.

As most people will store their private and confidential information in their PC and always they lack the awareness of data security for they think PC is safe enough. In fact, data and information will easily be lost and stolen when they are stored in computer without any protection. In order to prevent data from hackers and malware, you should apply a type of file encryption software to encrypt your files/folders so that they will not be breached by unauthorized access even though someone else enter your PC. Locking files will be helpful for you to avoid financial and reputational loss caused by data leakage

Jan 18

Phishing and Virus Attack are the Main Root of Private Information Losing

According to the report of a certain anti-virus service provider, in the year of 2012 their “cloud security” system has intercepted more than 11 million new virus samples, which experienced an increase of 28.1% comparing to the previous year. Among these viruses, there are 8.86 million Trojan viruses which amount to 75.06% of the total number and they are the biggest virus type in the research. People now have to attach more importance in USB encryption and file encryption when they are using a computer that is connected to the network.

It is also from the report that hackers are making use of banding malicious programs to software which are released by legal companies to spread viruses and breach private information from PC users or from the database system of a company. Meanwhile, using phishing methods to defraud people’s confidential details of bank account or private information is not rare on the Internet at all, or even become the major attack on website.

If you analyze the fraud incidences happen on Internet in 2012, you can draw the conclusion that phishing on the Internet gradually abandon the traditional attacking and spreading means which refer to relying on ads and text links, while it tempts ordinary users with low price bait, and limit them on the platform of network then persuade people to make transaction offline.  These phishing nets are aim to get people’s personal information like ID number, phone number or even the address.

As the occurrence of large number of affairs of leakage of private information, there are two main ways to defraud personal identical information: APT attack and phishing on Internet. If possible people can use folder locker or other files encryption applications to guard their confidential files with private information on their computer. While, when people surfing some of the major sites, they are required to submit some necessary identical information to use some extended services. Therefore, the server that store such information are easily become the target of the hackers or cyber criminals.

With the constant changes of the globalized international economy pattern, information battle between countries are escalating as well, however, the internal structure of information security construction is the main competing, companies and enterprises now value USB copy protection very much as well as the internal data security. Among the data security which damage people’s information online, virus attack is the major cause, and some of the worm viruses hazards people’s data security with extremely fast propagation speed once a computer is infected your files in it may be damaged soon.  

Referring to the report we know that, in the recent years, hackers concern more about confidential and classified documents. Therefore, computer users need to be more cautious, and take necessary measures to password protect folders or lock dir on the files to prevent data breach and data leakage. For some confidential business files, the supervisors can turn to some professional security solution to protect their internal files and e-mails or event the whole network.

Dec 21

Should Google Encrypt Users’ E-mail for Information Security?

It has long been a dispute issue that users are crying for protecting private information contained in the e-mail, while the Google seemed reluctant to do so for some reason. E-mail is an important way of data transmission and communication for the fast-paced modern world, and with the development of e-commerce people from different field incline to send vital e-version of contract and other document via e-mails. Now people gradually realize the importance of data security in their e-mails and require Google ensure security of their private data in e-mail by encrypting them.

Comparing to the increasing need for USB encryption and folder encryption, e-mail encryption should arouse people attention and attach equal importance to some extent. Some people think that if Google value users’ using experience and respect their privacy, it is responsible to encrypt users’ e-mail.

As all we know, Google’s Gmail service which is one of the most widely used e-mail services is adopted by people who have the need to change information and news among working groups and family members and relatives. What’s more, Gmail has a entering interface where you can login easily and the Gmail account is also the passport which provide universal identity verification to other Google services and relevant account. So that if Google do not encrypt users’ e-mail there is a great possibility of data breach and data losing.

Another reason that Google are reluctant to get your e-mail locked is if they encrypt the e-mail they will lose large amount of income from advertisement send you by Google with the contextual content from the e-mail. On the other side if you are an enterprise user you may have some of the real classified data in e-mail, if Google do not encrypt them you are facing the possibility of losing the data and information.

Actually, Google should exert more efforts in protection privacy and confidential data in e-mail. Similar to folder encryption for protecting files and folders on Yoruba computer data in e-mail needs protection. Encryption can be a particularly attracting feature for Google’s paying enterprise users with information that is not only a matter of privacy but also of great value. More or less, it’s necessary to see whether offering strong encryption might now be a beneficial action to the company’s bottom line.

Google can use this to take a real stand against efforts by law enforcement to build wiretapping into e-mail. Those efforts have been going on for a long time, and Google has fought against them in the past and now continuously. The call of encrypting e-mail for the users seems to be attached more and more importance in protecting their privacy and sensitive data. Comparing to lock file with program by user themselves Google has the responsibility to secure users’ data and content.


Dec 18

Mini PC: Entering the Age of Miniature

Nowadays people are pursuing the smaller and smarter features in all most all portable devices, and on some aspects, their need are successfully satisfied while the others are not. They use smart phones with a thinner frame and smaller size (or larger screen) and computers in more light and small appearance. Actually, now smart phones are used as computers as they has the function which allow people to surf the net with the phone. Now to meet the requirement of people who want to access the Internet via HDTV: mini PC, with miniature volume which has the shape and size of a USB drive disk and use mobile platform for data exchange.

These kind of pint-size PCs are amazingly tiny, incredibly inexpensive, and eminently customizable and avoid the power-hungry x86 processors found in desktop and laptop PCs in favor of mobile CPUs and GPUs, but each relies on an external monitor or HDTV—connected via HDMI—to display its user interface and other video output. Among them some mini PCs are extremely tiny and can be connected to the display with USB port.

There are various of mini PCs in the market and some of you may interest in this tiny and versatile computer, here is a brief introduction of an outstanding mini PC for example.

Although this kind of PC is cheap and affordable for most people, but you need to do some preparation to render them completely functional, don’t worry this would not takes much money and time and it is within the range of bearable things.

One of the outstanding mini PCs is MK802 II which is Android based computer manufactured by Chinese company. It has the size and appearance very much like a USB drive disk, and with a 1GB RAM and 4GB storage and A10 Cortex-A8 CPU. About the operating system, it is equipped with Android 4.0.

The release of such PC with mini size gives us a hope that someday in the future we may have the chance to access maybe USB sized computer with full function and features the same with computers we use today. We cannot deny that there are still some limitations in the using of mini PCs today, while this is the tendency and direction for the development of future computer.  

When you are enjoying the convenience brought by the newest technology you should not neglect issues related to data security in computers. Folder encryption methods are wildly used in today’s “normal” PCs, we hope in the future the similar theory can be applied to protect data security in the mini PCs.

One thing for sure is that, mini PCs are resemble the ordinary USB drive disks, and technical workers may get inspiration from the way to lock USB drives and secure people’s sensitive data in mini PC.  

Dec 13

Android-based YotaPhone Features Dual-screen

Now with the development of the technology on smart phone field people can enjoy the newest and interesting experience from newly releases smart phones. After we witness the release and take-off of new generation of Windows phone, iPhone and Android phone we may not have much surprise to see a new snart phone.

Russia’s Yota Device has turned the idea of equipping the phone with two screens into reality and let slip of some details about the phone on their release schedule: the Android-based phone with both front LCD and rear E Ink screens.

Yota Device announced that featuring two screens on a phone allows the smart phone users receive messages and phone calls in any time without pressing on the power button and then sliding to unlock the screen. Customers can view news, SNS, agenda or other things on E Ink displayed conveniently. Even the E Ink is lighted all the day it will not consume much of the electricity in the battery of the smart phone because this kind of display are low power consuming products. And the two screens also function separately, which means the LCD screen is an ordinary smart phone screen while the E Ink on rear is more or less a display.

As far as specs, the LCD portion of the device is rated at 720p resolution and measures in at 4.3 inches. The E Ink screen matches the size of the “front” display and is rated at 200dpi. Both are constructed with Gorilla Glass for extra toughness. Internally, the phone will rock a 1.5GHz dual-core Snapdragon S4, 2GB RAM, and 32GB of storage. The LTE-enabled YotaPhone also sports a 12MP camera with complimentary HD front-facing camera.

YotaPhone is good attempt for the development of smart phone, while at least it make us to  expect new user experience from it as we’ve use the phone again and again. However no matter how the phone’s appearance changed its storage device will not change rapidly and greatly. Phones are using memory card and other USB storage devices to expand the storage of them. So you’d better notice that when you keep secret files or data in these devices you need to lock usb or memory card and ensure data security in the phone.  

Right now the YotaPhone is pegged for a tentative Q3 2013 release in Russia, with a potential for European and US release as well. By the time Q3 rolls around, however, we doubt two screens will be enough to keep the handset afloat given its decidedly mid-range spec sheet.

When you are cheering about the birth of new telecommunication devices you also need to pay attention to memory card protection and related USB encryption issue. Only in this way can you live a secure and joyful life on the go.  


Oct 15

Protect Your Confidential Data in a Shared Network and LAN

The development of technology in the information filed brings unprecedented convenience and benefit to people’s life, while at the same time they have to bear the fact that this ever growing field also give them a great threat: the security of their files and data, especially those documents of great value and confidential information. A shared network or LAN is a good way to share and transfer data in a company or family, but few of the internet users have aware the possible threat of data losing or leakage from an outside cyber criminal.

Is it really necessary to take some precautions to guard the file security as most of the net users are merely ordinary and plain as we can imagine. Actually, the real situation is far beyond the imagination of most people, and the consequence of data losing or being stolen puts them in a very dangerous and unfavorable situation. Leaving network open and unprotected is an unwise action and will bring a lot of trouble and danger.

Sharing files on a network or LAN save people much time and increase their working efficiency, but on the other hand they vulnerable as well. Ever since the occurrence of Internet there are possibilities of being attacked by virus and guys with bad purpose.

There is never a quick and permanent solution to stop this danger or attack from happening. However there left much we can to prevent the possible tragic story from turning into reality, and take measures to protect all valuable data before it is too late.

As far as I know password protecting shared folders and files in a network is a reliable and remarkable way to fight against security uncertainties and stop unauthorized users filching and spreading your trade secret. One thing you admissible keep in mind is that open and unprotected networks is just like the open wifi in a public place and anyone within the range can get connected and use it. The theory of lock up files in a network seems to be complex and complicated but we can put this aside and just set out to find a strong and reliable software help us realize the protection of data.

You may feel at a loss when there are so many similar data security programs in the Internet at your choice. Using security software focus on shared network let you control and manage almost all kinds of access permission of files in the network. In fact, you don’t have to be intimidated at the beginning because all you need to do is really simple and easy: choose one that fits you the most. Here are some tips may do some help in the process of selecting.

  1. You’d better choose security software with a trial program first. As you are not familiar with the function of the software you can run the trial version and then judging whether it is good enough from your own using experience.
  2. Not the strongest one fit you better. All you need is the most proper and reliable one, other function may slow down the speed of encryption or bring other unnecessary trouble to you.
  3. If you are a user who is not so good at computer operation you can select one that is easy to handle.

So, ensuring your online and shared data and intellectual property safe and secure is not a big deal for you to worry about. Whit the help of useful and robust security software your valuable files are away from illegal eavesdropping and plagiarism.

Sep 29

Secure Copy Protection for your Files in a USB Drive

It might bring you a lot of headache when you want to control and distribute access permissions of files on a USB flash drive to different users, what’s more if you also like to supervise the number of uses and set an expiry date for a specific user, which would be another complex issue about restricting access permissions. Here Kakasoft can help you out of this annoying situation by offering you a program named USB Copy Protection which is designed to protect all your intelligence property.

USB Copy Protection uses advanced encryption techniques to control and limit any outside access to files in a USB flash drive or any other portable mobile storage devices. Once the program is installed in a USB drive it prevents your files being copied, deleted, moved away or saved as to the local disk or another removable disk effectively and efficiently. Any unauthorized user can only open and view the files, yet don’t have the right to modify any of them. While only the administrator has the full access permissions of the files and data.

Another highlighted feature of USB Copy Protection is that it supports a wide range of main media formats, namely doc, xls, ppt, pdf, txt, flash, exe, CAD, psd, jpeg, gif, png and other video, audio, image formats. You will find this program is also an extremely easy-to-use software so you need to do is to transfer your files into the USB disk and run the program than you can secure your data in a USB and manage the access permission as the administrator.

Sep 18

How to use Kakasoft Advanced Folder Encryption

With Advanced Folder Encryption you can achieve the goal of protecting your folders and data easily even if you are totally unfamiliar with it. Here are some simple steps you need to follow:

Step 1: Preparations before encryption.

Before you really set about to lock your folder and files with the help of Advanced Folder Encryption, you can download Advaned Folder Encryption here, and then run the file to finish the installation.

Step 2: How to lock folders?

As soon as you have installed the file, there comes a main window, you can drag the folders or files you want to lock to the empty window, then you will find you’ve locked these files successfully with a special locked mark on the icon.


Another way to achieve quick encryption is: firstly find the folders or files you want to lock, and then Right-Click the folder and choose “Encrypt” option. So the encryption is realized. Please remember to select this function in the “Settings”, about the detailed information please refer to: Something about settings.


Step 3: Set a password for the locked folder and choose a suitable security level according to your own need.

When you drag a folder or file to the main window there appears a window named “encryption” for you to input your personal password and re-enter the password. You can also choose the   security level you like as the default security level is “Normal”.

About the models of the locked folders or files you have 2 choices:

Local: it means the folder or file can be seen in your local disk and it is anti- deleted and copy protected, so the decryption can realized when u open it.

Hidden: the encrypted folder or file will be hidden in the local disk and you can decrypt it only in the main window of the Advanced Folder Encryption


Other functions of Advanced Folder Encryption.

  1. Shredding files, folders and drives you want to delete securely. Effectively preventing the possibility of data leaking and theft.

Here are several simple steps to help you shred the unwanted or useless files or folders:

Click the “Shred file” button on the main window, and click the “Add files” or “Add folder” button to select the file or folder you want to shred.

After the selection, just click the “Start”, the files or folders are shredded.

  1. Hiding and locking local hard drive disk.

Open the main window of Advanced Folder Encryption, you can find the “Protect drive” icon in the middle top of it.

Click it and then select the local hard disk you want to encrypt. When finish selecting just click “OK”.

Then you can find the hard disk you selected is hidden, you can also unlock it in the main window of Advanced Folder Encryption.

More info at: