Security / Data Integrity

  • Build a Web Proxy Server

    Build a Web Proxy Server - YouTube thumbnailContinue the Conversation at http://www.GeekBrainDump.com Today’s Topic: Web Proxy Servers allow you to to bypass web filters and be able to access content that you could not otherwise. It is also an easy way to protect your privacy from website data collection, but if you use a Public Web proxy you ...
  • AdBlock Plus to Block Ads on Webpages

    AdBlock Plus to Block Ads on Webpages - YouTube thumbnailContinue the Conversation at http://www.GeekBrainDump.com Today’s Topic: AdBlock Plus can be used to block advertisements from being displayed in your web browser. Beyond this basic functionality it also allows you to program very specific filters, and even simply block segments that you do not want to load. With these filters you are ...
  • Block Website Tracking with Ghostery

    Block Website Tracking with Ghostery - YouTube thumbnailContinue the Conversation at http://www.GeekBrainDump.com Today’s Topic: Ghosterly shows you all the tracking scripts that websites you visit target against you. You are able to individually block scripts and see which ones are running in real time. Ghosterly requires more manual interaction that other options, but as a geek it is nice ...
  • IP Blacklisting (Banning) Automatically in WordPress

    IP Blacklisting (Banning) Automatically in WordPress - YouTube thumbnailContinue the Conversation at http://www.GeekBrainDump.com Today’s Topic: WordPress has become a target for hackers in it’s own right and dealing with Brute Force Attacks can be a pain. By adding a plugin or script to automatically determine Brute Force Attacks and to then Blacklist the IP address is an easy way ...
  • Google Tracking with Android Devices

    Google Tracking with Android Devices - YouTube thumbnailToday’s Topic: Did you know that your Android phone or device may already be sending back your current location to Google’s servers? Android Devices and Google Apps are setup to send this information and it can be viewed through their website. This is something that if the NSA did it people ...
  • How to Opt Out of Google Targeted Ads

    How to Opt Out of Google Targeted Ads - YouTube thumbnailToday’s Topic: We talk about how to opt out of Google’s Interest Based Ads. Regardless of their intrusion on your privacy many times this type of targeted advertising is simply worthless and ironically shows you ads that you don’t care about within the contact you are using the web. Today’s Review: We ...
  • How to Delete Your Facebook Account

    How to Delete Your Facebook Account - YouTube thumbnailWe talk about how to permanently shut down your Facebook account for those people that cannot abide by face books unethical practices. I have spent thousands of dollars and countless hours building my Eli the Computer Guy Facebook Page and as a Content Business it will cause real monitory harm for ...
  • Technically Plausible Explanation for Lois Lerner Lost Emails

    Technically Plausible  Explanation for Lois Lerner Lost Emails - YouTube thumbnail“Never attribute to malice that which is adequately explained by stupidity” as they say. With the scandal at the IRS unfolding it seems stupefying to believe that Lois Lerner’s emails could have simply vanished. Sadly if the IRS deals with emails the way that too many organizations do then it ...
  • Real Time Backup of Your WordPress Site with VaultPress

    Real Time Backup of Your WordPress Site with VaultPress - YouTube thumbnailBackups are always a half forgotten mess in the IT world, and backups of WordPress sites are even worse. Most solutions require administrator actions that only sporadically actually happen. VaultPress from Automattic, the creators of Wordpress, gives you a Real Time, off site solution that is easy to setup, and ...
  • Internet Explorer Security Flaw – What Can You Do About It?

    Internet Explorer Security Flaw – What Can You Do About It? - YouTube thumbnailToday’s Topic: We talk about the latest flaw in Internet Explorer that compromises the security of versions 6-11 and what can be done to mitigate the risk. (Other than migrate to Linux) ********************* Tech Questions??? ******************** Spiceworks Community of IT professionals is the place to get your tech questions answered: http://goo.gl/75thj7 *************** Please ...
  • Heartbleed Bug in OpenSSL Proves You Shouldn’t Trust the Security of the Internet

    Heartbleed Bug in OpenSSL Proves You Shouldn’t Trust the Security of the Internet - YouTube thumbnailToday’s Topic: We discuss what the HeartBleed Bug is and why it proves nothing on the Internet is ever safe. ********************* Tech Questions??? ******************** Spiceworks Community of IT professionals is the place to get your tech questions answered: http://goo.gl/75thj7 *************** Please Visit our Sponsors!!! *************** TotalSem – A+, Net+, Security+ Books and Test ...
  • Secret Has an Odd Take on Edward Snowden’s Advice – Daily Blob – March 12, 2014

    Secret Has an Odd Take on Edward Snowden’s Advice – Daily Blob – March 12, 2014 - YouTube thumbnailToday’s Topic: After Edward Snowden’s talk at SXSW we talk about the odd correlation with the new Social App called Secret: http://goo.gl/JTaCiq Post on Secret’s Infrastructure: http://goo.gl/rY9sNe Today’s Review: We review the ErgoTech Triple Monitor Desk Stand: http://goo.gl/mm47ZG *************** Please Visit our Sponsors!!! *************** Altaro – Free HyperV Backup Software – http://goo.gl/K8SzFN B and B ...
  • Edward Snowden SXSW Speech Thoughts – Daily Blob – March 11, 2014

    Edward Snowden SXSW Speech Thoughts – Daily Blob – March 11, 2014 - YouTube thumbnailToday’s Topic: We talk about Edward Snowden’s appearance at SXSW on March 10th and discuss the lessons that can be taken away from it: http://goo.gl/AngJbL Today’s Review: Prong PocketPlug iPhone Case: http://goo.gl/Js7Hch *************** Please Visit our Sponsors!!! *************** Altaro – Free HyperV Backup Software – http://goo.gl/K8SzFN B and B Electronics – FREE White Paper ...
  • Hacking the Internet of Things – Daily Blob – Jan 23, 2014

    Hacking the Internet of Things – Daily Blob – Jan 23, 2014 - YouTube thumbnailToday’s Topic: We discuss the dangers of the Internet of Things and how devices as seemingly “dumb” as refrigerators will be turned into hacker attack vectors. Today’s Review: We review RavPower’s Luster Series Power Bank – A “pretty” SmartPhone Battery with built in Flashlight: http://goo.gl/TT6JiA *************** Please Visit our Sponsors!!! *************** TotalSem – ...
  • A Rough Lesson in the New York Times Rule… – Daily Blob – Nov 18, 2013

    A Rough Lesson in the New York Times Rule… – Daily Blob – Nov 18, 2013 - YouTube thumbnailFor Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
  • Authentic8 Silo to Share and Secure Web Apps

    Authentic8 Silo to Share and Secure Web Apps - YouTube thumbnailFor Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
  • Introduction to TOR

    Introduction to TOR - YouTube thumbnailFor Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
  • Personal VPN Services for Security Overview

    Personal VPN Services for Security Overview - YouTube thumbnailInfo Level: Beginner Presenter: Eli the Computer Guy Date Created: June 13, 2013 Length of Class: 25:35 Research Assistance: Tracks Security / Data Integrity Prerequisites None Purpose of Class This class teaches students why Personal VPN Services are important, and what to think about when buying them. Class Notes VPN’s have been used in corporations for 15 years, but regular ...
  • Hands On Review of OkayFreedom Personal VPN Service to Bypass Firewalls and Regional Restrictions

    Hands On Review of OkayFreedom Personal VPN Service to Bypass Firewalls and Regional Restrictions - YouTube thumbnailInfo Company: Steganos Software (http://www.steganos.com/us/) Product: OkayFreedom (https://www.okayfreedom.com/) Compensation to ETCG: NONE Date Created: June 5, 2013 Overview OkayFreedom is a freemium Personal VPN Service that allows you to bypass network restrictions and firewalls. The free version gives you up to 1 GB of traffic a month, and works very well. Overall the User Interface and ...
  • Episode #336: Introduction to Online Backup Services for Tech Professionals

    Episode #336: Introduction to Online Backup Services for Tech Professionals - YouTube thumbnailIn this episode Eli the Computer Guy talks about Online Backup solutions and what you should consider as a tech professional. Notes: Backup software will either backup all files into a single Archive file, or they will leave the file structure intact Most online backup software only backs up files. Generally they ...
  • Disposable Email for Hacking and Security

    Disposable Email for Hacking and Security - YouTube thumbnailDisposable Email for Hacking and Security
  • Removing Spyware and Malware from a Windows PC Using Spybot Search and Destroy

    Removing Spyware and Malware from a Windows PC Using Spybot Search and Destroy - YouTube thumbnailInfo Level: Beginner Presenter: Eli the Computer Guy Date Created: January 16, 2012 Length of Class: 43 Minutes Tracks Computer Security /Integrity Computer Repair Prerequisites Simple Windows PC Tune Up Cleaning an Infected Windows PC Purpose of Class This class teaches students how to remove spyware and malware from their Windows PC using Spybot Search and Destroy Chapters Introduction (00:00) First Steps (07:43) Spybot Search and ...
  • CloudFlare for Website Security and Management

    CloudFlare for Website Security and Management - YouTube thumbnailFor Class Notes and more go to: http://www.everymanit.com/2011/09/11/cloudflare-for-website-security-and-management/ Please give us a THUMBS UP if you like our videos!!! Donations are Appreciated!!! https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=XGA9BN4V37QY6
  • OpenDNS for Network Security

    OpenDNS for Network Security - YouTube thumbnailPlease give us a THUMBS UP if you like our videos!!!
  • VPN – Virtual Private Networking

    VPN – Virtual Private Networking - YouTube thumbnailPlease give us a THUMBS UP if you like our videos!!!
  • User Account Security Theory

    User Account Security Theory - YouTube thumbnailInfo Level: Beginner Presenter: Eli the Computer Guy Date Created: December 16, 2010 Length of Class: 44 Minutes Tracks Computer Security /Integrity Prerequisites None Purpose of Class This class discusses the concepts required to understand how to protect user accounts from hackers. Chapters Introduction (00:00) Username Security (04:16) Password Security (12:48) Session Security (23:30) Final Thoughts (34:56) Class Notes Username and Login Name The Username and Login Username do ...
  • Introduction to Backup Systems

    Introduction to Backup Systems - YouTube thumbnailInfo Level: Beginner Presenter: Eli the Computer Guy Course Length: 45 Minutes Tracks Security/ Data Integrity Prerequisites None Purpose of Class This class introduces you to the basic concepts of computer backups. Topics Covered Types of Backups Media Used for Backing Up Data Software Used to Backup Data Online Backup Technologies Advice for Maintaining Backup Procedures Class Notes Types of Backup Full — backup everything Incremental — backup everything ...
  • Computer Security Basics

    Computer Security Basics - YouTube thumbnailInfo: Level: Beginner Presenter: Eli the Computer Guy Length: 30 Minutes Tracks: Security / Data Integrity Prerequisites: None Purpose of Class: This class introduces you to the basic concepts of computer security. Topics Covered: Defining Hackers Updating Software Antivirus Software Antimalware Software Firewalls Site Advisors Internet Security Suites Web Browser Security Problems Class Notes: Defining Hacker There are many reasons why people hack. Some do it for fun, profit or ...
  • Introduction to Risk Assessment

    Introduction to Risk Assessment - YouTube thumbnailInfo Level: Beginner Presenter: Eli the Computer Guy Date Created: October 12, 2010 Length of Class: 57 Minutes Tracks Computer Security /Integrity Prerequisites None Purpose of Class This class teaches students the basic concepts behind Risk Assessments. Topics Covered Defining Risk, Threat and Vulnerability Types of Protections Mitigation Concepts Business Rational for Risk Assessment and Management Class Notes Introduction The better you know technology the better you will ...
  • Practical Risk Assessment and Mitigation

    Practical Risk Assessment and Mitigation - YouTube thumbnailInfo Level: Beginner Presenter: Eli the Computer Guy Date Created: October 13, 2010 Length of Class: 69 Minutes Tracks Computer Security /Integrity Prerequisites Introduction to Risk Assessment Purpose of Class This class teaches students how to conduct a Risk Assessment Topics Covered The Risk Assessment Process What to Look for in a Risk Assessment Class Notes Introduction Security is just good technology Risk is a business decision Assessment ...
  • Physical, Operational and Enviornmental Security

    Physical, Operational and Enviornmental Security - YouTube thumbnailInfo Level: Beginner Presenter: Eli the Computer Guy Date Created: October 15, 2010 Length of Class: 40 Minutes Tracks Computer Security /Integrity Prerequisites None Purpose of Class This class teaches students about the importance of Physical, Operational and Environmental Security. Topics Covered Physical Security Operational Security Environmental Security Class Notes Physical Security Infrastructure Systems should be kept in a Server Room IDF’s should be secured Server Cabinets make good ...


















Subscribe to me on YouTube