TrueCrypt, the final release, archive Yes . . . TrueCrypt is still safe to use. Google is generating a false-positive alert Recent attempts to download the TrueCrypt files here, using Chrome or Firefox (Mozilla uses Google's technology), have been generating false-positive malware infection warnings. How to Deploy HTTPS Correctly By Chris Palmer and Yan Zhu Originally published on 15 Nov 2010. Revised on 12 Dec 2013. Internet technologists have always known that HTTP is insecure, causing many risks to users. Because HTTP traffic is unencrypted, any data sent over HTTP can be read and modified by anyone who has access to the network.
Audit Programs, Guides, and Templates - AuditNet Name Guide to Using International Standards on Auditing in the Audits of Small- and Medium sized Entities Description This Implementation Guide was prepared by the Small and Medium Practices Committee of the International Federation of Accountants (IFAC). The committee represents the interests of professional accountants operating in small- and medium-sized practices and other professional accountants who provide services to small- and medium-sized entities. Standard (Non-IT) Audit Program Thunderbird & OpenPGP - secure email Once you have generated your GnuPG key pair and configured your email account to work with Enigmail, you can view and manage the properties of your key pair by following the steps below. Step 1. Click
DNS Security Collaborative Post - Eric Helgeson There was a ton of responses to my blog post about my ISP’s bad behavior with DNS and I wanted to consolidate the information here. This post is on github so you can click here to add or edit any info in this post, just a pull request away (just follow the same formatting). I’ll be adding more as I parse through all the comments. Basics of DNS What is DNS
How to delete Facebook from your life completely Deleting Facebook: more difficult than you might think. Photo: Mashable This post was originally published on Mashable. If you're seriously considering deleting your Facebook account, you're not alone. Start typing in the letters "dele" into Google and you'll see "delete Facebook account" as a top suggestion. Is Hiring a CPA Worth it? 5 Tips for Getting Your Money’s Worth Often when people find out I’m a tax accountant, I get asked, “How much does a CPA cost?” It’s like me asking “How much does a home cost?” We all understand that a 1,000 square-foot home in Kansas has a different cost than a 1,000 square-foot penthouse condo in New York City. The same concept applies to CPAs. The answer to both questions is the same: it depends.
How to use PGP encryption with Thunderbird In my last article, we have learnt that how to encrypt our Emails using Gnu Privacy Guard. Previously we used Microsoft Outlook as a desktop mail client and a GpgOL plugin to handle encryption decryption of our communication. Since Microsoft is a US-based company, that has to follow all the laws of that contingent. Should we trust Microsoft product to save our e-mail password and data? Tails amnesia, noun: forgetfulness; loss of long-term memory. incognito, adjective & adverb: (of a person) having one's true identity concealed. Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly.
The Truth Is Coming And It Cannot Be Stopped Shortly after Edward Snowden went public with his findings on the NSA’s surveillance program, he uttered some very powerful words: “All I can say right now is the US Government is not going to be able to cover this up by jailing or murdering me. Truth is coming, and it cannot be stopped.” Truth is coming, and it cannot be stopped. Exciting words for most of the general population, but troubling for a select few in Washington, New York, London and Brussels. 5 Forward-thinking Client Solutions for CPAs As with any service-oriented profession, it is considered a best practice for accountants to stay in touch with clients and provide solutions to their most pressing problems. CPAs can do this in a number of forward-thinking ways, even when their assistance doesn’t necessarily fall within the realm of services the firm provides. For example, last summer, my firm, Gelman, Rosenberg & Freedman staged a learning and networking event in partnership with the president of a not-for-profit industry group that was driving significant change within not-for-profit business operations. The area of change did not have anything to do with the audit or accounting services our professionals provide to hundreds of nonprofits annually. Rather, the purpose was to help not-for-profits face an emerging industry issue--one for which we had the right connections to allow for an informative and helpful session. 1) Cultivate relationships with other high-quality providers serving the industries your firm serves.
Sending encrypted emails using Thunderbird and PGP Use an email client, not webmail One way of enhancing the confidentiality of your email is to use an application to send and receive email, such as Thunderbird. One of the most important security factors when you send emails is the method you use to log into your email provider.