Showing posts with label FREE. Show all posts
Showing posts with label FREE. Show all posts

Sunday, August 14, 2011

Staying Safe Abroad - The Blog, Edward L. Lee II

In 2008, I gave all my clients a free copy of Edward L. Lee's book: Staying Safe Abroad: Traveling, Working & Living in a Post-9/11 World Yes, it was that good!

The feedback I received spanned from: "Thank you so much..." to one security director saying, "I am buying copies for all our key executives who travel."


If you travel, or know someone who does, buy the book and get FREE updates by following Staying Safe Abroad - The Blog.

"What makes Ed Lee the big expert?"
Ed Lee retired from the US State Department in April 2006, after a career as a special agent, Regional Security Officer, director of training, chief investigator of the Cyprus Missing Persons Program, director of security of the U.S. Agency for International Development and as a senior advisor in the Office of Anti-Terrorism Assistance.


Most of his work now is devoted to educating global companies and governmental entities in how to be successful and keep their people safe abroad.

His career also includes 15 years as an international security consultant; for ten years he served as the security advisor to the Inter-American Development Bank. Additionally, Ed served six years in the Marines before joining the US State Department as a special agent.

"Why the plug?"
I hear you say.
Just a film noir PI's cliche, "Dead clients don't pay."

Saturday, August 6, 2011

Child ID - A Must-Have App from the FBI

You're shopping at the mall with your children when one of them suddenly disappears. A quick search of the nearby area is unsuccessful. What do you do?

Now there's a free new tool from the FBI that can help.  

Child ID app—the first mobile application created by the FBI—provides a convenient place to electronically store photos and vital information about your children so that it’s literally right at hand if you need it. You can show the pictures and provide physical identifiers such as height and weight to security or police officers on the spot. Using a special tab on the app, you can also quickly and easily e-mail the information to authorities with a few clicks.

The app also includes tips on keeping children safe as well as specific guidance on what to do in those first few crucial hours after a child goes missing. (more)

Thursday, July 21, 2011

Recover a Stolen Laptop with Free Tracking Software

via Rick Broida, PCWorld...
In the last month, two family members and one friend have had laptops stolen right out of their homes. Sadly, none of the systems were equipped with remote-monitoring software, meaning the chances of recovery are just about zero.

To me this serves as a wake-up call; I'm in the process of evaluating various laptop-recovery services to see which one I should deploy on my own machines.

Short-term, I'm equipping my primary, can't-live-without-it laptop with LockItTight. Like similar services, it relies on a small, hidden client program that performs location tracking, Webcam captures, file recovery, and even keylogging. Unlike similar services, LockItTight is free--for one PC, anyway.

After you sign up for and activate your account, you download and run the LockItTight client (which is compatible with Windows XP and later). And that's pretty much the last you see of it; you won't find any evidence of it in the system tray or Programs menu. (Neither will tech-savvy thieves, which is exactly the point.)

To tweak LockItTight's settings and/or find out what your laptop's been up to, you sign into your account via a Web browser. By default, the client will simply report the laptop's position (usually via Wi-Fi, which in my tests was accurate to about 500 meters), but you can also enable screen capture, Webcam capture, key logs, clipboard logs, remote file retrieval, and remote file deletion. (more)

Need something like this for your Mac? Try Adeona, also FREE.

From the Land of Paladin, Have Antidote, Will Travel

Google's search engine is now fighting against a strain of malware that secretly intercepts Web browser activity on Windows PCs. FREE

Infected users will see a big yellow box at the top of search results, directing them to a Google Web page that explains how to remove the malware. That page urges users to download or update their antivirus software, and also provides manual instructions for removing the malware from Windows computers. (To see if you're infected, run any search on Google.com and look for the yellow box.) (more)
Click to enlarge.

Friday, June 17, 2011

Free Poster - Maps Worldwide Radio Spectrum Allocations

Very few engineers can recite worldwide RF spectrum allocations from memory. For the rest of us, Tektronix’ color-coded poster maps out every ITU regional allocation in clear graphical form. It also explains the benefits of Live RF and frequency-domain triggering in radio-satellite communication and spectrum management applications. Download your free poster today! (more)

While you are at it, check out the Number One slot under their "Most frequently downloaded application notes." Hey, that's us! Also, free. (more)

You can read the complete Tektronix, June 2011, Test and Measurement News here.

Wednesday, June 8, 2011

PrivateEye Software - Automatic Screen Shield - Major Price Drop

When this product was first pitched to the government a few years back it was about $49.95. TODAY - $1.99!!! 
These guys are brilliant, on two counts. 
1. This is a really clever, innovative security solution that works. 
2. They are really trying to sell the enterprise solution of this software... by practically giving away free individual samples to seed the marketplace.
End result. Everyone wins.

BTW, I am not affiliated in any way with any of the products I discuss here. I paid for the original version of PrivateEye I tested. I just paid for the upgrade to test that version. 

I love showing off new software and gadgets to my clients. Just after "Hello" comes "What cool stuff did you bring to show me this time, Kevin?" 

Let's review... 

"How can I stop shoulder surfers from reading my computer screen? The polarized screen thing makes me look like a paranoid dork."

Kevin says... Funny you should ask. I recently purchased some computer screen security software for testing, PrivateEyes from Oculis Labs. It works eerily well. All you need is a computer screen with a video camera and Windows. 

During the simple setup, the software learns who you are by looking at your face. From that point on, the screen automatically blurs unless you are looking directly at it. Turn to answer a phone call, or talk to someone nearby – BLURRR goes the screen. 

"What if someone sneaks up behind me?" I hear you say. No problem. When it sees an extra set of eyes – BLURRR.

Pro: The BLURRR effect changes quickly.
Con: Doesn't work as well in a high contrast environment.
The upgrade seems to have fixed this. Still testing.

PrivateEyes would also make an awesome IT guy gag. "I don't know. Your computer screen looks sharp and clear to me. Maybe you should get your eyes checked."

FREE 30-day trial, or just buy it for $1.99

Sunday, May 15, 2011

Free Tickets to International Spy Museum with Stay at Marriott's Nearby "Safe House"


The Washington Marriott at Metro Center is offering an exciting downtown Washington, DC hotel package which includes Spy Museum tickets and hotel accommodations. With International Spy Museum tickets, guest can indulge in conspiracy theories, spy traps, military intelligence and the fascinating world of espionage... (more)

Tuesday, May 3, 2011

360º Video Surveillance: Cool... on an iPhone 4, VERY COOL!

Watch the video first.
Use your mouse to move what you see to the left or right.


"The GoPano micro is a lens for the iPhone 4 to make 360º panoramic videos! Just snap the lens to your iPhone 4 and press record to make cool interactive 360º videos. Use it to record all the action of your favorite sport, record your next meeting in 360º or just as a fun toy for the summer.

The GoPano micro will record everything around you simultaneously. You can go back to the recorded video and choose to view any perspective, any angle at any point in time. The GoPano app allows you to upload your 360º video onto our web platform and share 360º videos with your friends. You can watch 360º videos uploaded by others in the app or on the web site. (the GoPano lens records everything simultaneously and not just the scene on the screen, you can pan & zoom in/out anywhere in your recorded video)."

Now, imagine the uses for this in the security field.
• Surveillance - Set it and forget it.
• Technical Surveillance (TS) - Comparison of room items and locations upon completion of installations.
• Technical Surveillance Countermeasures (TSCM) - Comparison of room items and locations upon re-inspection.
• Crime scene documentation.
• Event management documentation.

You get the idea and I am sure you can come up with more.

Problem... You can't buy a GoPano for your iPhone 4, yet. But you can help this project get off the ground for a $50. contribution and get one free once they are manufactured. (more)

Thursday, March 31, 2011

Security Tip - Free Program Protects USB Ports from Maleware Infections

Did you find a USB memory stick and are afraid to plug it in? (good)
Does your friend want to insert their (possibly infected) drive into your computer? 
Panda USB Vaccine may help...

There is an increasing amount of malware which, like the dangerous Conficker worm, spreads via removable devices and drives such as memory sticks, MP3 players, digital cameras, etc. To do this, these malicious codes modify the AutoRun file on these devices.

Panda USB Vaccine is a free antimalware solution designed to protect against this threat. It offers a double layer of preventive protection, allowing users to disable the AutoRun feature on computers as well as on USB drives and other devices:

Vaccine for computers: This is a ‘vaccine' for computers to prevent any AutoRun file from running, regardless of whether the device (memory stick, CD, etc.) is infected or not.

Vaccine for USB devices: This is a ‘vaccine' for removable USB devices, preventing the AutoRun file from becoming a source of infection. The tool disables this file so it cannot be read, modified or replaced by malicious code.

This is a very useful tool as there is no simple way of disabling the AutoRun feature in Windows. This provides users with a simple way of disabling this feature, offering a high degree of protection against infections from removable drives and devices.

You can download Panda USB Vaccine free here.

Thursday, March 3, 2011

Tips for a Malware-Free Smartphone (Android)

via PCworld.com...
The number of free Android apps that may be infected with malware this week has increased to more than 50.

• Research the publisher of the app. 
• Read online reviews.
• Check app permissions. If it asks for more than what it needs, skip it.
• Avoid directly installing Android Package files (APKs). 
• Put a malware and antivirus scanner on your phone. (Many of them are free.)
(more)

Tuesday, January 11, 2011

Learn holography at home in your spare time... and other geeky things

In a rut? 
Expand your mind. 
Take a college course on-line. 
(Some are free!)

This one really intrigues me...
MAS.450 is a laboratory course about holography and holographic imaging.

What is MIT OpenCourseWare? 
"MIT OpenCourseWare (OCW) is a web-based publication of virtually all MIT course content. OCW is open and available to the world and is a permanent MIT activity.

MIT OpenCourseWare is a free publication of MIT course materials that reflects almost all the undergraduate and graduate subjects taught at MIT." Nice, huh?

Realize, however...
• OCW is not an MIT education.
• OCW does not grant degrees or certificates.
• OCW does not provide access to MIT faculty.
• Materials may not reflect entire content of the course.
Still, what a deal!

Want to learn more?
The folks at onlinecollegecourses.com published this cool list yesterday... “100 Excellent Open Course Links for the Ultimate DIY Geek.”

Wednesday, December 22, 2010

Business Espionage: If you're not a client, you will remain bugged.

UK - From the top of the Gherkin building in London, Crispin Sturrock points out an anonymous-looking office block in the swirling snow below. “There’s a device in there,” says the chief executive of WhiteRock Defence Systems, an information security consultancy that helps companies protect themselves against spies. “They’re not clients of ours, but whenever we scan for transmissions in nearby buildings, we pick it up. It’s been there for ages, just streaming information out.” The building in question is bugged with an electronic device transmitting information about one of its tenants. In the era of WikiLeaks, it is tempting to view all leaks as news headlines. But in general, corporate leaks tend to be of interest only to a very small group of people – an organisation’s competitors or potential buyer. “The reasons people engage in competitive information gathering are usually financial gain and leverage,” says Mr Sturrock. (more) (free business espionage newsletter)

Tuesday, December 7, 2010

Spy Holiday Gifts & and a Free offer from me!

This year, I'm giving lock picks.
What's your cool spy gift going to be?

My friends at the International Spy Museum in Washington, DC have a few suggestions. My personal favorite is the Spy Gnome. Put him anywhere and your statement is made... "You don't know-m me!"

Here are some more of their suggestions...
Spy Video Trakr (free gift with purchase)

Of course, they have hundreds of other cool spy gifts to choose from. Hey, you're in the security business. What are you going to give? Socks?!?! Heck, no. You have a reputation to uphold.

Yes, they sell lock picks. But they are not half as cool as mine. :)

Hey, if your business card says "Security Director" or similar on it, and you want one of our complimentary stainless steel lock pick cards, just sign in here and let me know before December 24th.

P.S. - The International Spy Museum offers Free shipping on orders over $25. Use secret coupon code "fs25" at checkout.

Monday, November 29, 2010

Advances in Video Enhancement

There is nothing worse* than having to watch a crummy video recording, especially if you are sitting in a jury box.

Too dark, too light, out of focus, unstable are some of the many complaints that pop up whenever the important footage is brought forth as evidence. 

Fortunately, the situation is getting better. High definition cameras and better recording compression schemes are helping, but when it comes to pulling a rabbit out of the junk video hat, it's video processing to the rescue.

Take a look at this...
This is an example of enhancing clarity. Examples of focus, stability and darkness can be seen afterward, or here.

It is even possible to enhance and construct a composite photograph from several frames of video...
While most of this magic is used in legal proceedings and investigations, think of what it could do for your precious home movies!

Special thanks to Doug Carner, CPP/CHS-III of Forensic Protection, Van Nuys, CA for the loan of his video enhancements. Got a problem video? Give Doug a call. Evaluations are FREE.

* except being dragged to another Harry Potter flick. 

Thursday, November 18, 2010

Students: Enter for your chance to win an Interview with a Spy!

Ever wonder what a real spy does? Do they really drive a car like James Bond, have really cool gadgets, and make narrow escapes around every corner? Now’s your chance to find out!

The International Spy Museum announces a new student podcast in which student’s questions from across the nation will be accepted and possibly selected for this exclusive podcast interview with a real spy. (more)

Tuesday, August 3, 2010

Free CIA / Google App Tells Future

Google and the CIA are both investing in a company that monitors the web in real time.

The company is called Recorded Future, and it scours tens of thousands of websites, blogs and Twitter accounts to find the relationships between people, organizations, actions and incidents — both present and still-to-come. In a white paper, the company says its temporal analytics engine "goes beyond search" by "looking at the 'invisible links' between documents that talk about the same, or related, entities and events."

The idea is to figure out for each incident who was involved, where it happened and when it might go down. Recorded Future then plots that chatter, showing online "momentum" for any given event.

"The cool thing is, you can actually predict the curve, in many cases," says company CEO Christopher Ahlberg, a former Swedish Army Ranger with a PhD in computer science. (more

Want to see the future? Recorded Future will let you sign up for a free account ...but they already knew you would.

Sunday, July 25, 2010

Got a stick? You can spy!

According to Mugil all you need is a USB stick and a FREE program called “USBThief_Modified_by_NEO”. 

USB Thief is a simple program which makes your standard USB stick into a spying USB stick, if you plug it into someone’s PC, it will extract all the passwords from it.

This improved version also steals ALL of the following:
• Visited Links List
• Internet Explorer Cache List
• Internet Explorer Passwords List
• Instant Messengers Accounts List
• Installed Windows Updates List
• Mozilla Cache List
• Cookies List
• Mozilla History List
• Instant Messengers Accounts List
• Search Queries List
• Adapters Report
• Network Passwords List
• TCP/UDP Ports List
• Product Key List
• Protected Storage Passwords List
• PST Passwords List
• Startup Programs List
• Video Cache List

The question is, "Do you trust him?"
Feeling lucky?
His program is here.

As always... 
Why do I mention it?
So you will know what you are up against.
• Never let someone else stick you with their stick.
• Never stick yourself with a dirty stick.

Thursday, July 22, 2010

NSA Insights

Thursday, 5 August; 12 noon – 1 pm
Washington, DC

Book signing! 
In The Secret Sentry, Matthew M. Aid traces the growth of the National Security Agency from 1945 through critical moments in its history, including the Cold War and its ongoing involvement in Afghanistan and Iraq.

Aid, a visiting fellow at the National Security Archives, explores the agency’s connection to the intelligence failure that occurred when evidence that NSA officials called “ambiguous” was used as proof of Iraqi WMD capability. He also details the intense debate within the NSA over its growing role under the Bush administration to spy on U.S. citizens. Don’t miss this overview of the dramatic evolution of this far-reaching spy agency.

Free! No registration required!
Join the author for an informal chat and book signing.
Can't make it? Buy the book here!

Tuesday, July 20, 2010

Your Very Own "Ex" Files

What do you do when your 'ex' pops up in your Web browser like a nightmare jack-in-the-box?

Create an "Ex" file!
Ah, privacy and sanity restored.
Stalkers are disposed, one "Ex" at a time.
Reduced chance of post-break-up remorse.
It's easy. It's free. It's a no-brainer that zaps your old no-brainers to the bit bin of your Internet world window.

Friday, June 4, 2010

Run a shadow OS on your computer for super secrecy...

...if you're really serious about protecting your data, you can actually hide your entire operating system. Here's how to do it.

To accomplish this task, we'll be using TrueCrypt, our favorite free and open-source disk encryption software that runs on all platforms, supports hidden volumes, and can even encrypt your entire hard drive.


Once we've completed the setup, you'll have two Windows installations and two passwords. One password will activate a hidden Windows installation as your real operating system, and the other, a decoy install to throw intruders off the trail. (more)