<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									Is My Computer Protected? - Empire State Cannabis Forum				            </title>
            <link>https://empirestatecannabis.org/community/is-my-computer-protected/</link>
            <description>Empire State Cannabis Discussion Board</description>
            <language>en-US</language>
            <lastBuildDate>Fri, 24 Apr 2026 14:36:23 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>DNS over HTTPS will be rolling out over the coming weeks-Firefox</title>
                        <link>https://empirestatecannabis.org/community/is-my-computer-protected/dns-over-https-will-be-rolling-out-over-the-coming-weeks-firefox/</link>
                        <pubDate>Thu, 27 Feb 2020 20:26:13 +0000</pubDate>
                        <description><![CDATA[today, Mozilla will turn on by default DNS over HTTPS (DoH) for Firefox users in the US, the company has announced. DoH is a new standard that encrypts a part of your internet traffic that’s...]]></description>
                        <content:encoded><![CDATA[https://www.theverge.com/2020/2/25/21152335/mozilla-firefox-dns-over-https-web-privacy-security-encryption<br><br>Starting today, Mozilla will turn on by default DNS over HTTPS (DoH) for Firefox users in the US, the company has announced. DoH is a new standard that encrypts a part of your internet traffic that’s typically sent over an unencrypted plain text connection, and which could allow others to see what websites you’re visiting, even when your communication with the website itself is encrypted using HTTPS. Mozilla says it is the first browser to support the new standard by default, and will be rolling it out gradually over the coming weeks in order to address any unforeseen issues.<br><br>Whenever you type a website into your address bar, your browser needs to go through a process to convert it into an IP address using a DNS lookup. However, this traffic is normally not encrypted, meaning that it’s possible for others to see what websites you’re visiting. DoH is an attempt to encrypt this information to protect your privacy. Here’s a more in-depth explanation from Mozilla that explains it in detail.<br><br>Mozilla is motivated in part by ISPs who monitor customers’ web usage. US carriers like Verizon and AT&amp;T are building massive ad-tracking networks. DoH won&#039;t stop the data collection but it’ll likely make it more difficult.<br><br>THE TECHNOLOGY HAS FACED CRITICISM FROM LAWMAKERS<br>Although it’s much harder for others to see your DNS lookups with DoH enabled, the websites will still be visible to the DNS server your browser is connecting to. Thus, Mozilla says Firefox will offer a choice of two trusted DNS providers, Cloudflare and NextDNS, and that Cloudflare will be used as the default. Mozilla has outlined a set of privacy requirements that any DoH provider must abide by in order to be considered a trusted resolver.<br><br>Mozilla claims that DoH increases the privacy and security of users online, but the technology has faced fierce criticism from lawmakers and security experts who say that it hampers legitimate attempts by enterprise system administrators and lawmakers to block dangerous web content. Experts also claim the technology doesn’t provide the perfect privacy protection that its proponents claim. Only certain parts of the DNS lookup process are encrypted, and internet service providers will still be able to see which IP addresses their users are connecting to, they warn.<br><br>When it announced that it would be turning on DoH by default last year, Mozilla said that it would allow for opt-in parental controls and disable DoH if Firefox detects them. It also said that it would disable DoH by default in enterprise configurations.<br><br>This controversy means that today’s announcement only concerns US-based Firefox users. Mozilla told ZDNet last year that it wouldn’t be enabling DoH by default in the UK, where the technology has been criticized by the country’s GCHQ intelligence service, child advocacy groups, and ISPs. In an FAQ on its site Mozilla says its current focus is on enabling the feature in the US only. However, users outside the US will be able to manually turn the feature on by heading into Settings, General, and then scrolling down to Networking Settings.<br><br>While Firefox is the first browser to start turning on DoH by default, other browsers such as Chrome, Edge Chromium, and Brave have also started supporting the feature. However, in most cases you’ll have to dig through their settings in order to enable the feature. Here’s a guide from last year on how to do so.]]></content:encoded>
						                            <category domain="https://empirestatecannabis.org/community/is-my-computer-protected/">Is My Computer Protected?</category>                        <dc:creator>orthene</dc:creator>
                        <guid isPermaLink="true">https://empirestatecannabis.org/community/is-my-computer-protected/dns-over-https-will-be-rolling-out-over-the-coming-weeks-firefox/</guid>
                    </item>
				                    <item>
                        <title>Unsecure connection</title>
                        <link>https://empirestatecannabis.org/community/is-my-computer-protected/unsecure-connection/</link>
                        <pubDate>Sun, 16 Apr 2017 16:34:20 +0000</pubDate>
                        <description><![CDATA[When I sign into the forum I get a message that states my connection and password are not secure and can be compromised !! The &quot;padlock&quot;in the web address has a slash through it. A...]]></description>
                        <content:encoded><![CDATA[When I sign into the forum I get a message that states my connection and password are not secure and can be compromised !! The &quot;padlock&quot;in the web address has a slash through it. Any advice on what I should do??]]></content:encoded>
						                            <category domain="https://empirestatecannabis.org/community/is-my-computer-protected/">Is My Computer Protected?</category>                        <dc:creator>Subgenius</dc:creator>
                        <guid isPermaLink="true">https://empirestatecannabis.org/community/is-my-computer-protected/unsecure-connection/</guid>
                    </item>
				                    <item>
                        <title>Help/maybe some ranting too...well, definitely.</title>
                        <link>https://empirestatecannabis.org/community/is-my-computer-protected/help-maybe-some-ranting-too-well-definitely/</link>
                        <pubDate>Sat, 22 Oct 2016 00:21:57 +0000</pubDate>
                        <description><![CDATA[First the moral of the story: Be diligent about backing up your data. There&#039;s other lessons here too, because I/we all do dumb stuff sometimes. Level of dumb varies I find.The focus of my po...]]></description>
                        <content:encoded><![CDATA[First the moral of the story: Be diligent about backing up your data. There's other lessons here too, because I/we all do dumb stuff sometimes. Level of dumb varies I find.<br><br>The focus of my post is my MSI laptop.&nbsp; I was smart enough to purchase the extended warranty; the unit is used daily and I have already worn out two laptops that warranties completely replaced. Good going so far Jim! Just 2 months prior to the end of my warranty (the present time&nbsp; :sly:) the graphics fan starts to make a horrendous sound! Game play lag mimics the siren-like sound of the afflicted fan. Damn thing sounds like a vacuum cleaner when I play normally anyways because it has a second fan built in to stave off the high levels of heat. But now I am thinking I should turn it off to keep it from dying until I can do backup. First good idea in, well ...some good period of time where I neglected to back up data.&nbsp; <br><br>So with the idea that solid performance equals longevity, let's get this sigh of disappointment out of the way. Ugh! Ok , here comes the RMA email and instructions, which I obediently print out and read with earnest. Firstly (and bigly), only MSI is authorized to repair MSI computers.&nbsp; MSI is in CA and customer must pay for shipping. This bad boy weighs over 6 pounds and I have to insure it for $1200 because they assume no responsibility for transit damage.&nbsp; So okay 40 bucks to ship it in the specific packaging setup (per the freaking diagram they sent me?!). Just enough that I have to wait two more weeks to send it out. Turnaround upon receipt is 30 days; kudos to them for being straight up about it. And their tech staff spoke perfect English and couldn't have been more helpful.<br><br>The previous paragraph is probably mostly inconsecquential; just showing my mindset now.<br><br>The next problem: THE CURSED BACKUP<br><br>Due to moving and any other excuses I can't think of, I have not backed up 3 computers. Need to strip passwords off the laptop. My lovely, shiny 1TB Clickfree Automatic Backup now does not load. I can pull up the source file and run two application files in the folder. Run backup and Fix Clickfree backup. Both will open up and just hang (running them separately of course). Same results on two laptops and a desktop running Vista. A Google search leads me to many people asking the same question but getting no reply. Seems Clickfree has merged with a company called Kaboodles; they have a forum page wher questions like mine have landed.<br><br>I can open the drive and access the data files, but do not have a utility to put stuff where I want or back up before I need to send my laptop out. Any ideas? I know my choices are limited in relation to my time constraints.<br>]]></content:encoded>
						                            <category domain="https://empirestatecannabis.org/community/is-my-computer-protected/">Is My Computer Protected?</category>                        <dc:creator>orthene</dc:creator>
                        <guid isPermaLink="true">https://empirestatecannabis.org/community/is-my-computer-protected/help-maybe-some-ranting-too-well-definitely/</guid>
                    </item>
				                    <item>
                        <title>Computer Safety Help Needed</title>
                        <link>https://empirestatecannabis.org/community/is-my-computer-protected/computer-safety-help-needed/</link>
                        <pubDate>Sat, 20 Jun 2015 17:10:19 +0000</pubDate>
                        <description><![CDATA[Hey Xers! I need you to share your wisdom with me.&nbsp; I have purchased a HP laptop.&nbsp; It has 6g ram and 750 gigs of memory. I don&#039;t game and it should work perfect for my needs. I am ...]]></description>
                        <content:encoded><![CDATA[Hey Xers! I need you to share your wisdom with me.&nbsp; I have purchased a HP laptop.&nbsp; It has 6g ram and 750 gigs of memory. I don't game and it should work perfect for my needs. I am computer illiterate for the most part. I want to use search engines and such that are safe as possible.&nbsp; I would appreciate any recommendations you have as well as things to avoid.]]></content:encoded>
						                            <category domain="https://empirestatecannabis.org/community/is-my-computer-protected/">Is My Computer Protected?</category>                        <dc:creator>Simonsays</dc:creator>
                        <guid isPermaLink="true">https://empirestatecannabis.org/community/is-my-computer-protected/computer-safety-help-needed/</guid>
                    </item>
				                    <item>
                        <title>This is how our species ends...not with just a bang, but an O face...</title>
                        <link>https://empirestatecannabis.org/community/is-my-computer-protected/this-is-how-our-species-ends-not-with-just-a-bang-but-an-o-face/</link>
                        <pubDate>Fri, 16 Jan 2015 17:28:06 +0000</pubDate>
                        <description><![CDATA[I learned a new word today.Today&#039;s word is TELEDILDONICS.Can you say that boys and girls?TELEDILDONICS.&nbsp; Just let those implications sink in for a secondsoon as I enter the strip club, ...]]></description>
                        <content:encoded><![CDATA[I learned a new word today.<br><br>Today's word is TELEDILDONICS.<br><br>Can you say that boys and girls?<br><br>TELEDILDONICS.&nbsp; Just let those implications sink in for a second.<br><br><a class="go2wpf-bbcode" rel="nofollow" target="_blank" href="http://www.dailydot.com/technology/future-of-virtual-sex-kiiroo-fleshlight-oculus-porn/">http://www.dailydot.com/technology/future-of-virtual-sex-kiiroo-fleshlight-oculus-porn/</a><br><br><blockquote>As soon as I enter the strip club, I'm surrounded by dancing women and men sitting beside me, doling out bills for lap dances. Next, I'm transported into an orgy, where people are having sex all around me on a sun-dappled roof deck. I almost gasp when I turn my head to see a couple going at it, thrusting just a few inches away from my head.<br><br>I'm not witnessing this lurid scene IRL. I'm on an Oculus Rift VR headset at XBiz 360, a sex and technology conference in Los Angeles. The virtual sex show is the brainchild of RedLightCenter, a company that takes the idea of an X-rated virtual world and creates a full immersive experience for the user.</blockquote><br><br>Some thoughts:<br><br>-Is this what really happened to the dinosaurs?&nbsp; Straight to VR sex and...<i>kaput</i>?<br><br>-Wasn't sure where to post this...gaming? Sports? Science?&nbsp; Leading to...<br><br>-Is My Computer Protected?&nbsp; Any enterprising coders, here's your chance to get in on the ground floor of a brave new world.&nbsp; A truly groundbreaking opportunity!&nbsp; <br><br>-People will pay lots and lots of money to ensure their private hardware doesn't go...oh i dunno...hideously awry at an inopportune moment...<br><br><img class="go2wpf-bbcode" src="http://s2.quickmeme.com/img/09/09a186841732dc60bc87b5944636bc6c5f6929c5b917a9e53d950f4a3a370ba9.jpg" alt="">]]></content:encoded>
						                            <category domain="https://empirestatecannabis.org/community/is-my-computer-protected/">Is My Computer Protected?</category>                        <dc:creator>3V1L9371U5</dc:creator>
                        <guid isPermaLink="true">https://empirestatecannabis.org/community/is-my-computer-protected/this-is-how-our-species-ends-not-with-just-a-bang-but-an-o-face/</guid>
                    </item>
				                    <item>
                        <title>Leaked NSA Documents Reveal How To Hide From The NSA</title>
                        <link>https://empirestatecannabis.org/community/is-my-computer-protected/leaked-nsa-documents-reveal-how-to-hide-from-the-nsa/</link>
                        <pubDate>Thu, 01 Jan 2015 16:02:46 +0000</pubDate>
                        <description><![CDATA[If you want a truly anonymous life, then maybe it&#039;s time you learned about Tor, CSpace and ZRTP.These three technologies could help people hide their activities from the National Security Ag...]]></description>
                        <content:encoded><![CDATA[If you want a truly anonymous life, then maybe it's time you learned about Tor, CSpace and ZRTP.<br><br>These three technologies could help people hide their activities from the National Security Agency, according to NSA documents newly obtained from the archive of former contractor Edward Snowden by the German magazine Der Spiegel.<br><br>The combination of Tor, CSpace and ZRTP (plus another anonymizing technology for good measure) results in levels of protection that the NSA deems &quot;catastrophic&quot; -- meaning the organization has &quot;near-total loss/lack of insight to target communications,&quot; according to Der Spiegel.<br><br>&quot;Although the documents are around two years old, experts consider it unlikely the agency's digital spies have made much progress in cracking these technologies,&quot; Spiegel's staff wrote.<br><br>In comparison, accessing somebody's Facebook messages is considered a &quot;minor&quot; task for the agency. Similarly, virtual private networks (or VPNs), which are widely used by companies, are easily accessed by the NSA, according to Der Spiegel's report, as are so-called &quot;HTTPS&quot; connections.<br><br>So, what are these services and what do you actually have to do to use them?<br><br>Tor is basically a network that offers an easy way for people to mask their location when communicating online. Anyone can download Tor's web browser -- it's available on Mac, Windows, Linux, and smartphones. It's not foolproof: When using Tor, you're advised to sacrifice the convenience of browser plugins, torrent downloads, and websites that don't use &quot;HTTPS encryption&quot; if you truly want to stay off the grid.<br><br>And that's just if you want to mask your online habits -- messaging and phone calls require more steps still, meaning you also have to add CSpace and ZRTP if you want to hide those from the NSA, according to Der Spiegel.<br><br>CSpace is a program that lets people text chat and transfer files, while ZRTP is a form of encryption that protects mobile phone calls and texting -- it's used in apps like RedPhone and Signal.<br><br>If that all sounds a bit daunting, anonymous living may not be for you. There are plenty of ways to stay relatively private online. But true anonymity is harder to achieve, and so coveted that some people will pay $629 for a special phone that purports to keep a user's information more secure.<br><br>As noted, the Snowden documents are a couple of years old; it's possible the NSA has found ways around these tools by now. But for the privacy-conscious, they are certain to work better than a tinfoil hat.<br><br><br>http://www.msn.com/en-us/news/technology/leaked-nsa-documents-reveal-how-to-hide-from-the-nsa/ar-BBhoOkV]]></content:encoded>
						                            <category domain="https://empirestatecannabis.org/community/is-my-computer-protected/">Is My Computer Protected?</category>                        <dc:creator>orthene</dc:creator>
                        <guid isPermaLink="true">https://empirestatecannabis.org/community/is-my-computer-protected/leaked-nsa-documents-reveal-how-to-hide-from-the-nsa/</guid>
                    </item>
				                    <item>
                        <title>Verizon perma-cookie privacy issues</title>
                        <link>https://empirestatecannabis.org/community/is-my-computer-protected/verizon-perma-cookie-privacy-issues/</link>
                        <pubDate>Thu, 06 Nov 2014 19:06:56 +0000</pubDate>
                        <description><![CDATA[Wireless has been subtly altering the web traffic of its wireless customers for the past two years, inserting a string of about 50 letters, numbers, and characters into data flowing between ...]]></description>
                        <content:encoded><![CDATA[http://www.wired.com/2014/10/verizons-perma-cookie/<br><br><blockquote>Verizon Wireless has been subtly altering the web traffic of its wireless customers for the past two years, inserting a string of about 50 letters, numbers, and characters into data flowing between these customers and the websites they visit.<br><br>The companyâ€”one the countryâ€&#x2122;s largest wireless carriers, providing cell phone service for about 123 million subscribersâ€”calls this a Unique Identifier Header, or UIDH. Itâ€&#x2122;s a kind of short-term serial number that advertisers can use to identify you on the web, and itâ€&#x2122;s the lynchpin of the companyâ€&#x2122;s internet advertising program. But critics say that itâ€&#x2122;s also a reckless misuse of Verizonâ€&#x2122;s power as an internet service providerâ€”something that could be used as a trump card to obviate established privacy tools such as private browsing sessions or â€œdo not trackâ€ features.<br><br>Jacob Hoffman-Andrews, a technologist with the Electronic Frontier Foundation, wants Verizon to stop using the UIDH. â€œISPs are trusted connectors of users and they shouldnâ€&#x2122;t be modifying our traffic on its way to the Internet,â€ he says. He calls the UIDH a â€œperma-cookie,â€ because it can be read by any web server that you visit and used to build a profile of your internet habits.<br><br>&nbsp; &nbsp; I don't know how I missed this: Verizon is rewriting your HTTP requests to insert a permacookie? Terrible. http://t.co/MBDGZaLKNs<br><br>&nbsp; &nbsp; â€” Jacob H-A (@j4cob) October 22, 2014<br><br>According to Verizon spokeswoman Debra Lewis, thereâ€&#x2122;s no way to turn it off. She says that Verizon doesnâ€&#x2122;t use the UIDH to create customer profiles, and if you opt out of the companyâ€&#x2122;s Relevant Mobile Advertising program (you can do this by logging into your Verizon account here), then Verizon and its advertising partners wonâ€&#x2122;t be using it to create targeted ads. But thatâ€&#x2122;s beside the point, says Hoffman-Andrews. Because Verizon is broadcasting this unique identifier to every website, ad networks could start using it to build a profile of your web activity, even without your consent. </blockquote><br><br>You can check on your phone by going to this link with the wifi turned OFF: <a class="go2wpf-bbcode" rel="nofollow" target="_blank" href="http://lessonslearned.org/sniff">http://lessonslearned.org/sniff</a><br><br>Might be time to get those VPNs ready folks...]]></content:encoded>
						                            <category domain="https://empirestatecannabis.org/community/is-my-computer-protected/">Is My Computer Protected?</category>                        <dc:creator>spicer</dc:creator>
                        <guid isPermaLink="true">https://empirestatecannabis.org/community/is-my-computer-protected/verizon-perma-cookie-privacy-issues/</guid>
                    </item>
				                    <item>
                        <title>Should You Use Amazon Glacier?</title>
                        <link>https://empirestatecannabis.org/community/is-my-computer-protected/should-you-use-amazon-glacier/</link>
                        <pubDate>Thu, 30 Oct 2014 15:03:28 +0000</pubDate>
                        <description><![CDATA[While online storage services such as Carbonite, Mozy, and Apple&#039;s iCloud are popular; some people find that Amazon&#039;s Glacier storage service is right for them. However, it is not easy to fi...]]></description>
                        <content:encoded><![CDATA[While online storage services such as Carbonite, Mozy, and Apple's iCloud are popular; some people find that Amazon's Glacier storage service is right for them. However, it is not easy to figure out how to use Amazon's Glacier service, and this article shares what I learned. I am a judgment expert who writes often.<br><br>To use Glacier, you need an Amazon account. Amazon's Glacier web service will generate a set of keys consisting of your chosen username, an access key ID (e.g., 000000000000000000000), and a secret access key, (e.g.,000000000000000000000),(e.g.,111111111111111111111111111111111111111).<br><br>One needs these long Amazon credentials with Glacier, or any glacier software clients they use. The Glacier user name and passwords are not the same as one would use on any other Amazon features or services.<br><br>You can use the same Amazon Glacier credentials on several computers. Another Glacier feature is, you can send them a hard drive, and for a fee; they will archive it to Glacier, then send your hard drive back to you.<br><br>One drawback of the secret Amazon Glacier access keys, is that they are so long, they probably will not get written down. If your computer crashes and this password combination was on your computer and nowhere else, you may be stuck. Always print out your Amazon glacier keys and store the paper in a safe place, and/or on removable storage media. Perhaps even print an extra copy and mail it (or the USB storage device) to a relative or friend, and/or keep the paper or media offsite.<br><br>What is important to know about Amazon Glacier is that it is very different from other cloud storage services. It was created for archival storage, and using it for any other purpose may be a frustrating experience.<br><br>Glacier is designed for uploading new files. Retrieving files from storage, or even inspecting what files you have previously uploaded is a much trickier process, that requires waiting from 4 to 30 (or more) hours. It is impossible to download data from Glacier without at least 4 hours of prior notice.<br><br>Although there are several ways, and software programs to transfer files to or from Amazon Glacier, I have found (SAGU) SimpleGlacierUploader (http://simpleglacieruploader.brianmcmichael.com/<br>SimpleGlacierUploaderV0746.jar) to be one of the easiest to use. SAGU is a free Java-based software program. A wish-list item for SAGU is to add a start/pause function that remembers the state of the transfer(s); even if they stop and start after the computer was shut down and rebooted.<br><br>To run SAGU, one must install the free Java Development Kit (JDK) on their computer. Being a Java program, SAGU does not look like a regular software program, and by default, it writes logs and other files on your desktop. When quitting the program, most people can toss out the four files SAGU creates.<br><br>With Amazon Glacier (and all other Amazon web services) there are several regional data centers you can use. While Amazon may be free at first, eventually they charge reasonable rates for storage. The fees vary in each data center, and US West seems to be one of the cheapest. Remember which Amazon data center you use, because you will not be able to access your files if you pick the wrong data center.<br> <br>For best results, you should upload a few big files instead of multiple smaller ones. For example, if you want to use it for photo storage, start by creating a few archives with all the photos you want to store; one archive file for each year. This will work much better than uploading thousands of photos as-is.<br><br>Archived files you upload will be transferred to Glacier directly, however you will not immediately see the archives you upload to the folder in your private vault. This is because the uploads take some time to process by Amazon. If your upload to Glacier succeeds, it will appear in Glacier's archive listings in about a day.<br> <br>You cannot create subfolders on Glacier, so if you need to upload a directory structure, zip it up to an archive and upload that. If there are any unfinished uploads, after about a day, you will see them on Glacier; and sometimes be able to resume an upload from where it was interrupted.<br><br>Once your upload is complete, the file will be &quot;consumed&quot; and disappear from your folder; and reappear in about a day in the Glacier archives. You must export a log to see what files were successfully transferred. You can upload files up to 640 gigs big, as long as your subscription allows it.<br><br>The most common archival format is ZIP. Sometimes (especially when you have a bunch of old files) a large compression job on a folder full of files, will eventually give an error message or stop responding. If that happens, compress parts of the folder at a time, to create several smaller archives. Also, if the compression software crashes or reports an error, there is a good chance the compressed file will be corrupt, even if it is gigs big. <br><br>It is best to keep your zipped archives under 10 Gigs, so they will not take days to upload. While you are uploading to Amazon Glacier, on the Mac, when you are doing other things, clicking SAGU does not bring up the &quot;progress window&quot;.<br><br>So, if you use a simple Glacier program such as SAGU, you just compress your files into a big archive file, add that file to SAGU, and start your upload. An uploaded file will overwrite a previous upload having the same file name. <br><br>It is best to name your files with the folder name, the computer name, and the date, and keep deleting old backups from time to time; and keep only the most recent, because with Glacier you pay for total files sizes. Or, skip the dates and just overwrite the same named files.<br> <br>With simpler backup solutions, why bother with Glacier? One can never be too rich, too thin, or make too many backups. <br>]]></content:encoded>
						                            <category domain="https://empirestatecannabis.org/community/is-my-computer-protected/">Is My Computer Protected?</category>                        <dc:creator>jbmac</dc:creator>
                        <guid isPermaLink="true">https://empirestatecannabis.org/community/is-my-computer-protected/should-you-use-amazon-glacier/</guid>
                    </item>
				                    <item>
                        <title>Back up Google Play</title>
                        <link>https://empirestatecannabis.org/community/is-my-computer-protected/back-up-google-play/</link>
                        <pubDate>Sun, 26 Oct 2014 15:50:55 +0000</pubDate>
                        <description><![CDATA[On my business blog, last night I wrote too many articles too fast and Google blocked my access to their Plus one thing, saying I violated a policy of theirs. They thought I was a robot beca...]]></description>
                        <content:encoded><![CDATA[On my business blog, last night I wrote too many articles too fast and Google blocked my access to their Plus one thing, saying I violated a policy of theirs. They thought I was a robot because I was slightly baked and distributed articles too fast. Anyway I use Google play a LOT and it dawned on me one day they might lock me out - so every 2 weeks I will download my Google play music (7,000 songs) to my computer from now on....]]></content:encoded>
						                            <category domain="https://empirestatecannabis.org/community/is-my-computer-protected/">Is My Computer Protected?</category>                        <dc:creator>jbmac</dc:creator>
                        <guid isPermaLink="true">https://empirestatecannabis.org/community/is-my-computer-protected/back-up-google-play/</guid>
                    </item>
				                    <item>
                        <title>herdProtect: best free PC malware scanner and removal</title>
                        <link>https://empirestatecannabis.org/community/is-my-computer-protected/herdprotect-best-free-pc-malware-scanner-and-removal/</link>
                        <pubDate>Sun, 11 May 2014 17:27:22 +0000</pubDate>
                        <description><![CDATA[herdProtect is a new free anti-malware scanner and removal tool for Windows PCs that is better than Malwarebytes, SuperAntiSpyware or other options. Why? Not only is it faster but it utilize...]]></description>
                        <content:encoded><![CDATA[<b>herdProtect</b> is a new free anti-malware scanner and removal tool for Windows PCs that is better than Malwarebytes, SuperAntiSpyware or other options. Why? Not only is it faster but it utilizes all 68 industry anti-malware scanner engines (you can view the full list <a class="go2wpf-bbcode" rel="nofollow" target="_blank" href="http://www.herdprotect.com/engines.aspx">here</a>) to ensure the best detection rate. It is truly an innovative product that deserves your inspection. <br><br><img class="go2wpf-bbcode" src="http://i.imgur.com/MO32zZx.png" alt=""><br><br>The <b>herdProtect</b> scanning engine works by monitoring the active objects on a user's PC as well as the hundreds of autostart execution points. As new objects such as processes become active in the system, herdProtect will use a secured network tunnel to scan the object for malware against the engines of the top 68 anti-malware scanners. By scanning in the cloud all processor intensive activities are performed independent of the user's PC. Depending on the aggregate results of the scan, the user can then take the appropriate actions and keep their PC free from any known malware threats.<br><br>To install herdProtect on your PC just visit the <a class="go2wpf-bbcode" rel="nofollow" target="_blank" href="http://www.herdprotect.com/downloads.aspx">download page</a> and install the full or portable version. Once installed and started you will see this screen:<br><br><img class="go2wpf-bbcode" src="http://i.imgur.com/ZQI967S.png" alt=""><br><br>Make sure you click the question mark &quot;?&quot; in upper right corner to bring up the secondary menu and select these options:<br><br><img class="go2wpf-bbcode" src="http://i.imgur.com/yfHKzEd.png" alt=""><br><br>Click the scan button to start the initial scan. The first time you use herdprotect it will take about an hour to complete. Subsequent scans will be much faster and only take about 5 minutes. When complete you will be presented a report of results:<br><br><img class="go2wpf-bbcode" src="http://i.imgur.com/Sp1Mu2Q.png" alt=""><br><br>If you then click on each entry you will be presented with 'actions' and &quot;details' buttons for more information. Based on what you read in each details report you may decide to leave processes listed under 'Inconclusive' alone. You should however consider removing all processes listed under 'Adware/PUPs' though. <br><br><b>Conclusions</b><br><br><b><a class="go2wpf-bbcode" rel="nofollow" target="_blank" href="http://www.herdprotect.com/index.aspx">herdProtect</a></b> is a state of the art anti-malware scanner and removal tool. You will not find better. Combine <b>herdProtect</b> with an excellent firewall and antivirus program like <a class="go2wpf-bbcode" rel="nofollow" target="_blank" href="http://www.comodo.com/home/internet-security/free-internet-security.php">free Comodo Internet Security</a> for complete protection for your Windows PC.]]></content:encoded>
						                            <category domain="https://empirestatecannabis.org/community/is-my-computer-protected/">Is My Computer Protected?</category>                        <dc:creator>axa</dc:creator>
                        <guid isPermaLink="true">https://empirestatecannabis.org/community/is-my-computer-protected/herdprotect-best-free-pc-malware-scanner-and-removal/</guid>
                    </item>
							        </channel>
        </rss>
		