Welcome!


Welcome!! My name is Paul Lappen. I am in my early 60s, single, and live in Connecticut USA. This blog will consist of book reviews, written by me, on a wide variety of subjects. I specialize, as much as possible, in small press and self-published books, to give them whatever tiny bit of publicity help that I can. Other than that, I am willing to review nearly any genre, except poetry, romance, elementary-school children's books and (really bloody) horror.

I have another 800 reviews at my archive blog: http://www.deadtreesreviewarchive.blogspot.com (please visit).

I post my reviews to:

booklore.co.uk
midwestbookreview.com
Amazon and B&N (of course)
Librarything.com
Goodreads.com
Books-a-million.com
Reviewcentre.com
Pinterest.com
and on Twitter

I am always looking for more places to post my reviews.

Sunday, March 18, 2018

The Art of Invisibility

The Art of Invisibility, Kevin Mitnick, Little, Brown and Co., 2017

In this age of government and corporate online surveillance, being anonymous while online is becoming more and more important. This book, from "the most famous computer hacker in the world" (according to Publishers Weekly) gives some pointers.

In this day and age, anyone who still uses "password" or "12345" for their computer password should be ashamed of themselves. Change that password to a long and random string of letters and numbers, like twenty or twenty-five characters long. Write it down, or use a password management program, and frequently change it.

If you are on a public wifi connection, like at the local library or coffee shop, do not do any online banking or e-commerce. It is very easy for a hacker to get your information, or send you to a site that looks legitimate but is not legitimate. If you are using anyone's computer, other than your own, it is a very good idea to delete the browser history, and reboot or shut off the computer before you leave it.

Did you know that many printers, including work printers, have a hard drive that records everything that was printed? Save the printing of personal items, like medical test results or your credit report, until you get home. You can be sure that your boss is keeping a close eye on your internet usage, even during your lunch hour.

For anyone traveling to the US, even American citizens returning from overseas, border authorities have the right to seize your laptop or cellphone, and keep it for as long as they want, searching through files. It is possible to use "strong" encryption on any personal files, store those files securely in the cloud, then wipe, not just delete (there is a difference) those files from your computer, and re-download them later.

Parts of this book may be too technical for the average reader. The rest of the book may be considered common knowledge, but it certainly bears repeating. It is very much recommended.   

No comments:

Post a Comment