Everplex Media TechBlog

Welcome to the Everplex Media TechBlog. I hope you find something useful!
Feel free to comment or ask questions.
Why should you protect your personal data?

image


“But I’m not doing anything wrong or illegal”

is the usual response.

Of course you’re probably not emailing international criminals or plotting fatal revenge - that’s not the point.

The point is -


Emails:

Do you want anyone reading the personal thing you said about your personal life to your family, partner, or spouse?

Cloud Storage:

Do you want people knowing your full personal budgets, databases of clients, proprietary data like inventions, new business ideas, or marketing strategies; or maybe even having a photocopy of your ID or business licenses?

Photo Sites:

Do you really want people having thousands of pictures of you and all your family and friends, - even the most intimate ones?

Facebook:

Do you want random strangers knowing where you live, who your friends are, what expensive things you keep in your house, and where your children go to school?

image


You must realize that every piece of data you upload - pictures, emails, documents, everything, is stored on a physical server. A “Server” is just a glorified computer, and has hard drives just like your home PC or laptop. If someone steals or accesses that hard drive, they have all the data on that drive.

Now take this scenario:


A criminal organization or even just one person steals one of these servers, or hacks it and steals all the data. Now these criminals know everything about your life and it won’t be hard for them to find you or your family and wipe out bank accounts, steal identities, or even commit criminal acts under your name.

image


What happens to you? You become broke, destitute, maybe even killed; or you may end up fighting years of legal battles to prove you did not commit some crime; or you may have destroyed credit that can never fully recover for the rest of your life. Or perhaps you will be blackmailed, robbed, or even raped. After all they have your full address and phone number and can now attack you or even your children, posing as a relative or friend - and they have all the right answers because they know everything about your life, your cousin John, where you went on vacation last year - even what you had for breakfast today (Twitter).

This isn’t merely a possibility.


This happens now, every day, even right now it is happening to some person somewhere. This is an absolute certainty, and it could be you next. You must protect your privacy so that criminals do not have access to your personal life, finances, or business “trade secrets”. Forget about the NSA. Sure, you don’t want the government having this data either - but the most present and real threat is actual criminals.

image


Remember that even the biggest companies, like Yahoo, Sony, and yes, even Google have been successfully hacked and millions upon millions of user data has been compromised (in other words, physical people with obvious malicious intent - the hackers - somewhere have all the data they hacked and stole from the server - right now!)

People neglect to realize that NONE of the data you upload to the internet is safe from prying eyes. It’s not about “not doing anything illegal”. What it’s about is personal privacy and safety.

image


A Crazy But Possible Scenario


Now consider this more extreme and less likely but possible scenario: A new world war breaks out - keep in mind that just within the past century there has been not one, but two world wars. So before you think “it will never happen”, just remember that the last one was only a few decades ago. All it takes is one bad country (i.e. North Korea) doing something extreme and then it could be global war. In this hypothetical scenario, there comes a new law of government to imprison anyone of certain races, religions, ages, or walks of life. Could you imagine what the world would be like if Hitler was here today instead of just ~60 years ago (he died in 1945 at only age 56). It was so recent that if he had not died, Hitler could actually be alive today. Could you imagine if Hitler had the kind of access to personal data that we have today? All they have to do to find everyone is search the information those people freely uploaded to the internet - information on every single private detail of their lives.

image


Granted the last scenario is rather extreme, and is unlikely to happen. However is it worth the risk?

On the other hand, the first scenario is much more plausible and is a certain risk. Tens of thousands of hackers and criminals are working very hard every day trying to get access to your private data so they can use it with malicious intent. Right Now at this very moment.

image


In short, You should never, ever upload any personal data to the cloud if you don’t want anyone and their mom to read or see it. Anyone who says otherwise is ignorant… or has an agenda.

Hopefully now you realize the dangers of putting your personal data on the internet.

Living Off The Cloud


Email:

I use email, certainly, but currently there are limited options to keeping your data secure while maintaining usability. You could use Thunderbird with Enigmail which encrypts your mail.

The ideal method would be to use a domain email, such as @everplexmedia.com mail. You have to pay yearly for the domain name, but it’s inexpensive and you could choose whatever domain you like - if it’s available of course. Then it’s not too difficult to set up POP access and connect it to Thunderbird. This way the emails are only stored on your own PC and maybe the web server.

You could even consider hosting the domain from your own home, but this is not an easy task and you would have to keep your home email server running 24/7.

Another alternative is to use integrated NAS email software, such as Synology, which is an NAS which has integrated software to run a mail server from home, and it’s relatively easy to set up. This is probably the very most secure, as long as your own home is secure.

image


Cloud Storage:

I recommend to never use cloud storage such as Dropbox and Box, under any circumstances whatsoever. If you MUST use a cloud service, either set up your home PC for the cloud, or get a dedicated NAS such as Synology which has software to easily set up cloud storage.

Even better, if you have use your own NAS cloud server, then you have potentially unlimited data storage, faster download speeds (depending on your internet connection speed), and unlimited bandwidth - much better than paid services by the leading cloud storage providers.

But most importantly, since the data is stored at your own home, it is far far safer than with any cloud services - and unlike cloud services, it is never actually stored or saved on the internet.

Facebook:

Personally, I keep a Facebook open, but I have absolutely no data on there. I only use it to keep connected with friends and events. I never upload any pictures, and I maximized the privacy settings so that I can’t be tagged and am fully secure. You can google for ways to easily lock down your Facebook, but your data is there if you upload it. So I recommend to delete everything, as soon as possible.

Studies have shown that people who use Facebook for more than an hour per day, in fact leave less happy then when they logged on. This goes to show that Facebook is in fact not benefiting your social or emotional health, but in fact is a detriment to both.

I’ll briefly mention you should probably be physically spending time with your friends rather than just chatting or stalking on Facebook. Personally I believe Facebook and similar sites, whereas there are benefits, like staying in touch with distant relatives and old friends - is overall detrimental to society, as it causes people to spend less and less time with each other in person and more and more time with a false digital version of the person.

If you adopt this philosophy and spend more time with friends in person, it won’t be so hard to get rid of your Facebook.

Photo Sharing Sites:

It’s tempting to use free photo sites like Flickr, Picasa, or Photobucket to store all your family photos. However, I recommend against this, especially for photos you don’t want the entire world to see. The problem isn’t that the pictures are a secret. It’s that if criminals got ahold if these pictures and family photos, they can learn a surprising and shocking amount of things about you!

You could alternatively use your home PC or NAS to store your pictures; the Synology software also has a photos and videos feature.

image


In Conclusion:


Protect your privacy at all costs, and if at all possible never send or upload any personal or personally identifying information or data to the internet - and never use cloud services.

If at all possible, wipe out all personal data on Facebook, other social media sites, cloud storage like Dropbox and others, photo sharing sites, and anywhere else you uploaded your life to the internet.

Avoid Facebook and similar sites like the plague, and don’t use Dropbox or any other cloud services as much as possible. Remember there was a day before the internet, and everyone survived just fine.

I hope this knowledge and information helps you better keep yourself and your family safe and secure. Happy safe interneting!
Posted 10 years ago
Forget 3D - Everplex Media introduces 5-D Websites Through Quantum Computing And Virtual Reality

Quantum Websites

So you thought that it would be neat to literally bring your customers to you though your website? The time is here! Through cutting-edge quantum computing, Everplex Media has developed a new method of website development that extends beyond 3D or even 4D!

Now, with 5D websites developed through proprietary methods from Everplex Media, users have the option to use quantum teleportation and virtual reality, to transport customers right to your office or restaurant - right from their living room! Be sure to stay tuned for updates!

Posted 11 years ago
Password Tip: It’s easy to make long and complex passwords using acronyms.

You might be surprised but millions of people have very easy to guess passwords. Possibly including you. Using an acronym you can significantly increase your online security. My favorite method is to make a random string of letters and numbers and adding punctuation. Make sure to use an abstract phrase that only you would memorize. Let me give you some examples:

(Note: You should not use these as your password! Come up with your own for better security.)

Take for example this password: Kb1nfsT,a79p!

Insane, Right?!!! “But, I’ll never remember that!”, you might think.

Not so fast!
Now just memorize this sentence. Karen bought 1 new flat screen Tv, and 79 pencils!

Using the first letter of each word, keeping the numbers, capital letters, and punctuation, you now have a super-insane, super-secure password that No One will Ever guess!!

ENJOY!

(Note: I just made up this password for this blog post. You should not use it but make up your own for your own security.)

Posted 11 years ago
How to remove annoying Android popads in notification bar

First see if you have a folder in your android called “Joy”

If so, then here is the fix:
First, go to this site and search to see which of their games you have installed: letanginc.com

Once you find the game, you know what is causing it. (all their games they also install this adware on your android).

Now you can simply uninstall the game and now you no longer will get those annoying ads in your notification bar every time you connect to the internet.

Posted 11 years ago
PS3 Media Server is partially not compatible with Virtualbox - Here is how to fix the issue

If you try to start PS3 Media Server while Virtualbox Host-Only Network Adapter is enabled, PS3 Media Server will not work.

Fix this by:

1) Close PS3 Media Server (Exit)
2) Open “Network Connections” in Windows 7
3) Choose “Change Adapter Settings” link on the left side
4) Right-click “VirtualBox Host-Only Network”, and choose “Disable”. Keep the window open
5) Restart your PS3 (turn it off then turn it back on)
6) Start PS3 Media Server after PS3 is turned on and connected to the network.
7) You should now automatically be connected (you see the green check mark in PS3 Media Server)
8) Now go back to the “Change Adapter Settings” screen and re-enable “VirtualBox Host-Only Network”

You’ll have repeat this process every time if virtualbox network is enabled when you start the PS3 media server. Annoying, but at least now you know how to bypass this application incompatibility.

Posted 11 years ago
How To Use CSS “class” and CSS “id” properly

Many new designers don’t understand the difference between CSS class and id.

It’s quite simple, really.

id can only have a single instance.
class can have multiple instances.

For example:


<div id=“container-one”>

    <div class=“box”>
    </div>

    <div class=“box”>
    </div>

    <div class=“box”>
    </div>

</div>


<div id=“container-two”>

    <div class=“box2”>
    </div>

    <div class=“box2”>
    </div>

    <div class=“box2”>
    </div>

</div>

Posted 11 years ago

Posted 11 years ago
Skyrim Modding Tutorials


Skyrim Modding Tutorials: Skyrim Creation Kit




Official Skyrim Creation Kit Tutorial Series - Episode 1: Introduction to the Kit




Official Skyrim Creation Kit Tutorial Series - Episode 2: Basic Layout




Official Skyrim Creation Kit Tutorial Series - Episode 3: Basic Layout II




Official Skyrim Creation Kit Tutorial Series - Episode 4: Clutter




Official Skyrim Creation Kit Tutorial Series - Episode 5: Navmesh




Official Skyrim Creation Kit Tutorial Series - Episode 6: Basic Encounters




Official Skyrim Creation Kit Tutorial Series - Episode 7: Traps




Official Skyrim Creation Kit Tutorial Series - Episode 8: Optimization




Official Skyrim Creation Kit Tutorial Series - Episode 9: Lighting




Official Skyrim Creation Kit Tutorial Series - Episode 10: World Hookup







How to Create Unique Armors in Skyrim using the Skyrim Creation Kit




How to Make New Recipes and Items with the Creation Kit




Character rendering using the Skyrim Creation Kit




New Worlds & Landscaping using the Skyrim Creation Kit






Advanced Skyrim Modding Tutorials




Photoshop: How to Get Custom Textures into Skyrim
(not Creation Kit)




3D Modeling: How to Get Custom Weapons into Skyrim
(not Creation Kit)




3D Modeling: How to Model a Sword and Weapons for Games Part 1
(not Creation Kit)




3D Modeling: How to Model a Sword and Weapons for Games Part 2
(not Creation Kit)




3D Modeling: How to Model a Sword and Weapons for Games Part 3
(not Creation Kit)




3D Modeling: How to Model a Sword and Weapons for Games Part 4
(not Creation Kit)




3D Modeling: How to Model a Sword and Weapons for Games Part 5
(not Creation Kit)




3D Modeling: How to Get Custom Armor Into Skyrim Part 1
(not Creation Kit)




3D Modeling: How to Get Custom Armor Into Skyrim Part 2 - Weight Sliders!
(not Creation Kit)

Posted 11 years ago

Posted 11 years ago

Posted 11 years ago

Posted 12 years ago

Set the cache expiry date for your website in order to optimize website bandwidth and speed. This will be a factor in your website rating.

Put this text in your .htaccess file.

<FilesMatch “.(ico|jpg|jpeg|png|gif|js|swf)$”>
ExpiresDefault “access plus 1 month”
</FilesMatch>

Posted 12 years ago

Open Steam, go to View > Tools, and download the Skyrim Creation kit.

Skyrim Creation Kit

Posted 12 years ago
image

In short, the Obama Administration decidedly dismissed the bills, joining the country in dropping the ability to pass these bills which would cause severe limitations on our freedom of information and cause undue litigation among online businesses, and limit the freedom of technical innovation [1]



“The White House has responded to two petitions about legislative approaches to combat online piracy. In their response, Victoria Espinel, Intellectual Property Enforcement Coordinator at Office of Management and Budget, Aneesh Chopra, U.S. Chief Technology Officer, and Howard Schmidt, Special Assistant to the President and Cybersecurity Coordinator for National Security Staff stress that the important task of protecting intellectual property online must not threaten an open and innovative internet…” read more…
Posted 12 years ago
Have you added a Chrome Extension or Firefox Plugin or some other application that you thought might help you be able to get more out of your Gmail or Google account? I have.

For example, yesterday I installed Bento (now called Streak) because it sounded like it could be useful. However, when I connected it to my Gmail account, it asked for access to all of my Google information.

Further, minutes later I realized it was useless for my needs. There is “Labels” in gmail that does the same thing. I don’t even use Labels in Gmail. So I quickly uninstalled the extension. However, I realized that uninstalling did not revoke access, and that the application still had full access to my gmail account. This is BAD. Further, there is no quick option in your Google Account Settings to revoke access.

After some searching. I found a way to revoke access. It is surprisingly Not readily available. After the multi-billion dollar lawsuit google lost regarding privacy (via Google Buzz), you’d think Google would be on top of this. Nonetheless, here is the link to specifically revoke application access for applications that you have granted access to your google account:

https://www.google.com/accounts/IssuedAuthSubTokens

When I went there, I saw FIVE applications that had access to all my google account information and emails. 4 of those 5 I had removed and was not using. Needless to say, I revoked them all.

image
Posted 12 years ago
Connect on LinkedIn! Like us on Facebook! Follow us on Twitter!