Categories
End User piracy surveillance & privacy

Golden Eye – not just another James Bond villain

You will no doubt remember the case of evil villain ACS Law where consumers were bullied into stumping up cash with the threat of being taken to court for online copyright infringement. Victims often had no idea of the legality of what ACS Law was doing or where the burden of proof lay and often found it easier to just pay up rather than fight their case in court.

The spectre of ACS Law has been released from its high security bottle, has morphed into a new disguise and is once more on the prowl for hapless victims. The name of this new ghoul is Golden Eye. Just hearing that name should make you shudder.

Golden Eye are trying, through the courts, to compel Telefonica UK  to release personal information about O2 customers so that they can spam them with speculative claims about copyright infringement and perhaps grab a  quick settlement fee. Golden Eye are not the copyright owners, but rather hold an ‘enforcement-only’ license with no specific mandate from the 12 other porn studios who they act for.

The Open Rights Group is trying to intervene on behalf of O2 customers. This isn’t about stopping copyright owners pursuing their legal rights although in my mind it is not easy to provide a high enough standard of evidence to prove guilt here. It’s about privacy. The case is currently at the appeal stage because the judge initially did not sanction the handing over of some of the data saying:

“that would be tantamount to the court sanctioning the sale of the intended Defendants’ privacy and data protection rights to the highest bidder. Accordingly, in my judgment, to make such an order would not proportionately and fairly balance the interests of the Other Claimants with the Intended Defendents’ interests.”

Golden Eye apparently takes around 75% of the revenues collected.

There is more detail on the ORG website. I guess the real point of this post is to encourage you you help ORG with their legal costs in pursuing this case by making a donation. In particular if you are an ISP it is in your interest to stop this kind of company coming along and worrying your customers on a speculative basis.

I have made a donation on behalf of Timico and encourage you to follow suit. There is a “donate”  button on the ORG site and I repeat the link here.

Categories
End User scams

Obnoxious PPI pests move into sms

I’ve had a few calls from pests lying to me that could recover mis-sold Payment Protection Insurance (PPI). I know they are lying because I have never taken this sort of insurance out.

Today I received a text message from 07879989478 saying:

“Records passed to us show you’re entitled to a refund approximately £2130 in compensation from mis-selling of PPI on your credit card or loan. Reply INFO or stop”

I wouldn’t dare risk replying and am going to see if I can find out who owns the number. It is almost certainly an anonymous PAYG job but I quite like the idea of an expose.

Lets see how I get on.

tata

Categories
Business online safety social networking

Parliament and Internet Conference – Privacy

portcullisThe Parliament and Internet conference wound its annual way to Westminster yesterday. The conference usually comes up with a nugget or two and made the BBC news site with a comment from Andy Smith, PSTSA1 Security Manager at the Cabinet Office that he wouldn’t recommend using your real name when registering with sites like Facebook.

Lord Merlin Errol also noted that he used to give his date of birth as April 1st 1900 but that drop down boxed rarely went that far back these days. I guess there are still one or two 112 year old people around though whether they would be interested in social networking is another  issue.  Privacy  on the Internet, or lack of it, is something I’m still trying to get my brain around.

This came to the front of mind again this morning as a Facebook message appeared in my timeline asking me to confirm my mobile phone number. I did so, particularly as a mobile number is one way of recovering a lost password. Didn’t feel particularly comfortable doing it though. I don’t trust Facebook though

Categories
End User security

Payment Protection Insurance – are you eligible for £7,500 compensation?

Just had a phone call from an Indian sounding gent called Harry Connor. Actually he wasn’t totally sure what his name was because when I asked him again at the end of the call he said it was Sean Connor (not sure how he spells Sean – could be Shaun or Shawn – sorry). Perhaps he flips between both names without thinking – kind of split personality.

He was calling me about my Payment Protection Insurance and said I was eligible for £7,500 compensation.  It was all above board because he said the Ministry of Justice was behind it.

I like to make sure I’m dealing with reputable folk when being asked about financial stuff so I asked for the name of his company (ukfinancial.com) and their phone number (020 881 907 01). He said they were headquartered in London but had an office in Manchester.

Unfortunately I must have mistyped both the name of the company and the phone number and now not only can I not ring him back but I can’t even track down his website.

Ah well – another opportunity to make a fast buck lost. Never mind. I dare say he or one of his colleagues will call back. They have already called about 6 times.

I realise that the Telephone Preference Service doesn’t work overseas but someone needs to come up with a solution for this problem.

Listen to the phone call by clicking on the image of the phone below:

Image in the video is courtesy of Wikipedia

Categories
Business online safety Regs

More Draft Comms Data Bill analysis & Gary McKinnon

blogspot broken link landing pageGary McKinnon has been in the news this week. Unless you have just surfaced for internet air you will remember that he is the guy with Aspergers who hacked into the Pentagon computer and who the marshalls Feds in US of A wanted to extradite so that they could extract revenge.

This post is not about Gary McKinnon or the rights and wrongs of his case. It is about the fact that he was able to hack into what must surely be one of the most secure computer systems in the world (wide web).

Next up is the breach of Google’s webmail service in December 2009.

Categories
broken gear End User

Apple iPhone faults

An apple - grown in my back garden at homeWe have an excellent team in our logistics1 department. Phillipa has efficiently found me a temporary HTC One S whilst my trusty Galaxy S3 is sent back for a new screen. This time it wasn’t a fault of Samsung – the last two times were faulty headset socket and a faulty connector that meant the phone wasn’t charging, or at least only intermittently.

This time the phone was accidentally dropped on a hard floor and unfortunately the display smashed. Ok s*&t happens. It’s gone off to the menders for a week or so and in the meantime I have a temporary HTC One S.  The One S is ok but smaller than the Galaxy S3 so I keep hitting the wrong keys. It’s also not quite as high a spec but hey, I only have it for a week or so.

Setting up the One S was very simple, as for all Android phones though I note that with Samsung all the apps I have previously downloaded are re-installed on a new phone whereas this hasn’t happened with HTC. This is probably a Samsung service that might well be replicated by HTC but I clearly haven’t signed up for it.

Anyway when I handed the S3 in to Phillipa in logistics1

Categories
Business Regs security

Now where did I leave that important information? #commsdatabill

You will of course recall my recent post on Big Data in which I related how many laptops are left in the back of taxis. 10,857.14 of them every year to be precise. Well I was wrong. Not only did I underestimate how many cabs there are in London but the average number of laptops left in them every year was wrong.

Today I was picked up by a driver who estimated he had found 8 laptops over the last 5 years (up from the previous 4 in 7) and that there were around 25,000 black cabs in London (up from 16,000).

This bumps up the averages. To  make it easy on myself if I assume only one a year that suggests that 25,000 laptops are left in London black cabs every year.

Now I know someone will pipe up and say that this is not very scientific and

Categories
broken gear End User phones

Galaxy S3 mended under warranty – faulty USB socket

Y’all will recall that I had to send my GalaxyS3 back because it wasn’t charging. Well I’ve got it back and they have mended it under warranty. The USB socket was faulty so all is now well. If it had been water damage I would have been cross.It wasn’t water damage.

That’s all…

Categories
broken gear End User phones

Samsung Galaxy S3 not charging problem

Samsung Galaxy S2 water damageShort news bulletin to inform you that this morning my Samsung Galaxy S3 is not charging. This follows on from the same problem I had with the Galaxy S2.

The diagnosis for the S2 was water damage despite my assertion signed affidavit that it has never been anywhere near water.

It looks as if I’m going to have to get the S3 sent away for repair/analysis. Not good. All I can say is if the same diagnosis comes back  as for the S2 I’m going to be hounding Samsung. It’s too much of a coincidence or at the very least poor reliability in the design. Note this is already my second Galaxy S3 – the first had a headset connector problem.

The header photo is the “water” damage on the old Galaxy S2. Stay tuned for updates on this hot news item.

PS to make it easy for those who are interested I’ve pasted links to all the other posts that talk aboutSamsung Galaxy S2 and S3 problems:

http://www.trefor.net/2012/09/07/samsung-galaxy-s3-factory-reset-phone-not-charging-battery/
http://www.trefor.net/2012/06/17/headset-socket-on-my-samsung-galaxy-s3-is-not-working-audio-problem/
http://www.trefor.net/2012/07/06/water-water-everywhere-mobile-phone-water-damage-samsung-galaxy-s2-s3/
http://www.trefor.net/2012/09/26/galaxy-s3-mended-under-warranty-faulty-usb-socket/

Categories
broken gear End User

Aargh it’s 30 degrees and the Eastcoast train aircon is broken!

the temperature in London today hit 30 (feels like 32 according to my phone) and the train aircon is broke!It’s the hottest day of the year so far. People are frying eggs on car bonnets and the homeless have left London for cooler climes – it’s too hot underneath the arches for a comfortable kip.

The suits are sweating buckets and wishing it was acceptable to turn up for work in shorts. The ladies are looking lovely in the summer sun.

Most people are complaining about the heat. Those that aren’t are taking the mickey out of friends  just packing for their annual holiday in Marbella or Benidorm  or Lanzarote or Torremolinos – you know  – places less warm than London.

School’s out. Urchins run wild in the radiatingly hot city streets, shrieking under plumes of water escaping from broken fire hydrants. Their parents, sapped of care, languish in the little shade afforded by the concrete tenements they call home. There is no breeze. There is no letup from the infernal heat.

In fact neither is there any air conditioning on this train – the 18.30 Eastcoast from Kings Cross to Edinburgh stopping briefly to let me off at Newark to get my connection to Lincoln. I’m on my second can of diet Coke and second bottle of sparkling water with ice!

This must be what it is like on the Chennai to Bangalore Express (dep 13.00 arr 14.45 daily). At least those in steerage can catch a little breeze sat on top of the carriage

Ah well.

Yes please love – another bottle of mineral water with plenty of ice. Thanks…

PS I realise there are no fire hydrants in London. These are images more typical of New York in summer. Also the choice of Indian train service was purely random. However they both made the cut for artistic effect. Final answer.

Categories
broken gear End User

Water water everywhere? Mobile phone water damage Samsung Galaxy S2 S3

Samsung Galaxy S2 water damageJust as I took ownership of my Samsung Galaxy S3 my S2 died on my. Good timing? The battery ran down over the weekend and it would not recharge.

I still needed the phone. I sent it off for repair. The repairers came back and said it had evidence of water damage. I can tell you that that phone has not come into contact with water. However you can see problems if you use the phone in a damp environment. I my case it is likely to have been listening to BBCRadio4 using the Tune In Radio app over the internet whilst having a shower. The phone has not been “in” the shower – just in the shower room.

This is somewhat unacceptable. Phones should not be this vulnerable. For now I don’t think there is anything to be done but designs need ruggedizing for the future. I’m going to see if I can fix it myself. Stay tuned but for the moment keep your phone out of the bathroom.

Categories
End User nuisance calls and messages

Telephone Preference Service

I’m getting a lot of traffic for the post on the Telephone Preference Service. It’s no surprise. If your house is anything like ours we get scam calls on a daily basis. Someone needs to do something about it.

We have varying strategies for dealing with the scammers in our house. These range from keeping them hanging on for 10 – 15 minutes to just swearing at them and telling them to “go away”.

I favour the latter but the choice is yours.

Categories
End User Regs security

your password here? oh dear! #LinkedIn

I note from the Daily Telegraph that LinkedIn has had 6.5 million passwords stolen and published on a Russian website. When did you last sort out your passwords> Have you got a password policy? Worth getting one I’d say.

This is a perfect example of why we shouldn’t let the government collect data about us. It is going to be lost or stolen or accidentally published. It’s a racing certainty. More here.

Categories
Business online safety

I could never be a politician – The Queen hath spoken

I could never be a politician. The Queen’s Speech today included a Lords Reform Bill, Draft Communications Data Bill, Banking Reform Bill, Energy Bill, Enterprise and Regulatory Reform Bill, Children and Families Bill, Pensions and Public Service Pensions Bill, Crime and Courts Bill, Croatia Accession Bill, Electoral Registration and Administration Bill, Defamation Bill, European Union (Approval of Treaty Amendment Decision) Bill, Groceries Code Adjudicator Bill, Justice and Security Bill,  Small Donations Bill together with Draft Draft Care and Support, Local Audit and Water Bills and Carry Over Bills on Civil Aviation, Financial Services,  Finance (No. 4), Local Government Finance and Trusts (Capital and Income).

I’ve listed them in one long string for effect. I guess I must be interested in the outcomes of some of them as they affect me – comms data for one. It has to take a very particular sort of person to want to become a politician. We pay politicians to sort this stuff out but do have to keep an eye on them because as we all know they can get a bit out of control.

The Communications Data Bill which caused such a lot of fuss a few weeks ago when it was leaked to the Sunday Times that it would include surveillance seems to not be getting any attention in the media today with things like Lords Reform hitting the headlines.

This must be remedied. We must rally the troops, man the battlements. In fact I think Shakespeare foresaw all this as you will see from this early version of another monarch’s speech:

Scene 1. France. Before Harfleur (Life of King Henry 5th)

Once more unto the breach, dear friends, once more;
Or close the web up with our English censorship.
In peace there’s nothing so becomes a man
As modest browsing in the privacy of his own home:

Categories
End User piracy

Alternative ways of bypassing the Virgin Media filter to access Pirate Bay – Google Translate

google translate can be used to bypass Virgin Media web filters to access Pirate BaySince publishing the original post on this subject that described how to access Pirate Bay using free proxy servers I’ve had a few people point out other ways. Some were left as comments on the post itself. Some came in by email.

The most innovative is where Google Translate service is used as a proxy server. Take a look at this link:

That page is the normal Pirate Bay running though the Google translate servers, translating any African on the page to English. Obviously there is only English on the page so it displays like normal.  Apparently, according to “umm hmm” from the TheSlyrateBay.com who fed me the info, this is not a preferred method as it can sometimes be slow and a bit clunky if the Google servers are experiencing high traffic (fwiw).

Many sites have been also set up as proxies to provide easy filter bypass to get to Pirate Bay – some have been pointed out in the comment stream of my earlier post – others will be easily findable online if you look – it won’t be hard.

Categories
End User online safety social networking

The Online Garden Shed – the answer to internet privacy issues

Google Opt out - the online garden shed?We all need our private space. This true in our virtual lives as much as in the touchy-feely-smelly real world that we once inhabited.  In those days man could retire to his shed if he felt the need for a bit of time to himself. He would only let you in if you were a pal.

There are no sheds online.  What do we do about privacy when using the internet? The fact that Google seems to know what I’ve been up to is a concern.  Do we all sign up with proxy services?  The proxy service provider will still know what you are up to.  Switching on “private browsing” seems a bit of a faff and all that does is prevent PC from storing usage data.

A reader (thanks HmmmUK) just Tweeted me a link to the Google Opt out page:

“Opt out of customised Google Display Network ads

Opt out if you prefer ads not to be based on interests and demographics. When you opt out, Google disables this cookie and no longer associates interest and demographic categories with your browser.”

I thought “great, the answer to the problem” and proceeded to that page to opt out. Then I paused

Categories
gadgets online safety piracy Regs

How to bypass the Virgin Media web filter to access Pirate Bay

How to bypass the Virgin Media web filter to access Pirate Bay

Before you start reading this post, and many thousands have, take a look at Broadbandrating – if you are looking to move ISP then the site will help you choose which one to go for.

Now the post:

Industry colleague Gary Hough left a comment on my blog post on Pirate Bay the other day. He has now written a guest post (tagged on to the end of this one) outlining how easy it is to bypass web filters to access “blocked” sites. I asked myself whether this was a responsible thing to publish. After all it flies in the face of the process of Law and Order and I am not in favour of promoting unlawful activity.

However the process described below is such common knowledge1 and there are so many sites out there providing proxy services used by millions of people that I feel that the story needs to be told in an environment/on a vehicle that promotes sensible discussion of the issue. We certainly need those in places of power to have the opportunity to read about and properly understand the problem.

The issue is not just Pirate Bay or any other site promoting the music downloads that have engendered such emotion within the Rights Holder industries. The issue is the fact that the same process can be used to bypass any web filter. This means that were we to enforce blocking of other types of website – pornography, for example, or sites promoting racial hatred or extreme political views the blocks would be ineffective.

Moreover in encouraging the move underground,

Categories
Business online safety Regs

EU cookie legislation – a look at some of the implementations

EU Cookie Directive 2009/136/ec of the European ParliamentUK Cookie legislation  (DIRECTIVE 2009/136/EC) became law on May 25th 2011. This is the one where websites are meant to give you the opportunity to opt out of visiting them if they are using cookies. Cookies can be very “invasive of privacy” though in varying degrees and some potentially not at all. The law, whilst being passed with good intentions has had some unintended consequences, notably affecting some cookie functionality that is useful and likely unintrusive.

I imagine that most of us with a website use Google Analytics. We all like to look at our traffic levels – well I do anyway. There has been some confusion as to exactly what is being required of website owners – rumours for example that sites only using Google Analytics cookies would not be made to comply as GA was “beneficial and not intrusive”.

You may or may not know that I am on the Information Commissioner’s Office Technology Reference Panel. This is an expert body of representatives from stakeholder groups in information and technology related industry sectors.

The ICO, which is the industry regulator, has given the UK a year to implement the cookie directive. This year is up at the end of this month and naturally there has been press comment and a flurry of businesses making adjustments to their websites in an attempt at compliance.

One year on exactly what will the ICO do re enforcing the law

Categories
End User piracy

Pirate Bay now, what next?

Pirate Bay to be blocked in the UKI’ve just been on the Pirate Bay website. It looks decidedly dodgy. Ads for pornography and flashing boxes inviting you to “fix it now”. Not been on it before. Thought I’d do so before the court order kicks in.

Today a court told the biggest consumer ISPs to block access for their customers to the Pirate Bay website. Most ISPs are not affected by the order but now most consumers in the UK wanting to access the “services” provided by Pirate Bay will have to do so using encrypted paths provided by proxy servers or by accessing a mirror of the Pirate Bay site.

There is a twitter account specifically set up to provide updates of where you can find mirrors. They don’t

Categories
End User online safety security

Should you worry about your own personal information security – yes – notes from Infosec2012

crimepack - toolkit for cybercrimeI spent a day at Infosec2012 this week. I could easily have spent another day there as I only met a fraction of the people that would have been good to talk to. It’s not often I say that about a trade show.

I stopped by the Sophos stand for a looksee.James Lyne of Sophos - top cybersecurity guy James Lyne, Director of Technology Strategy of Sophos does a magnificent talk on security. He prefaces the talk with a warning not to visit any of the websites he mentions yourself because of the certainty of picking up malware. I’d take his advice.

James picks up malware for a living!  On any given day the Sophos labs identify 185,000 new discrete pieces of malware. Yes you did read that right. One hundred and eighty five thousand different pieces of malicious code designed to try and penetrated your computing device with a view to stealing your cash, new every day.

This malware is computer generated and churned out in crimepack control panela wholesale manner. The whole game is run by organised crime and is big business. Customers get access to a control panel that they use to organise criminal “campaigns”. This control panel (screenshot inset – hacked by JL) gives them feedback on their successes – how many machines infected with what, for example. They can also use it to pick their “threat vector” ie what sort of virus/trojan/malware they want to use for their particular spamshot/offensive.

These platforms even have APIs so that crooks can build them into their own resources or add their own specific features!

The gangs involved collaborate. They collate data on anti-malware products produced by Sophos, McAfee et al and can tell in real time whether these companies can detect specific threats. In real time! They also collectively contribute to produce a blacklist of IP addresses used by security products manufacturers so that they block access to their online resources from these addresses.

Many people get caught out. Very many people. They must otherwise these guys would not be in business and I’m sure that most of us know someone who has lost cash or had their PC compromised.

What on earth can you do to protect yourselves in the face of such criminal activity? Sometimes there is nothing you can do as many devices have known vulnerabilities. I saw James Lyne tap into an iPad using a fake hotspot and steal some data. He used a known iPad vulnerability. I switched off the WiFi on my own iPad and even considered wiping all those hotspot credentials stored on my pad that make it easy for me to log on the next time I visit!

It does make sense to make sure that all your software is patched up to date, especially applications such as Adobe. It might sound obvious too but don’t click on a link you aren’t sure of. It doesn’t seem to matter whether you use Microsoft, Apple or Linux. Use sensible password policies. It also makes sense, if you can, to have one separate PC that you only use for banking or ordering stuff online.

I left the show with my head buzzing and thinking I didn’t stand a chance in the big bad world of the interweb. I certainly will be reviewing our home cyber security defences. Stay safe now.

PS you should take a look at Sophos, a British company turning over £600m with 2,000 staff! Not bad.

 

Categories
Business ofcom piracy Regs surveillance & privacy

Ofcom update on Digital Economy Act implementation timescales – slipped to Q1 2014 #DEAct

It seems a long time ago now, the passing of the Digital Economy Act. It’s easy to remember how long because it was rushed through just before the last general election and I’m sure that global historical events such as the re-emergence of a Liberal government (only joking) are amongst the list of dates you remember exactly what you were doing when “it” happened.

The assassination of JFK and 9/11 are the other two that spring to mind although others may well have other memorable dates – outbreak of WW2 etc. Note I don’t actually remember the JFK assassination, I was too young, but it is always one of the ones quoted.

Ofcom has updated ISPA and have said that the code of practice still has to go through various stages:

Categories
Business security

Infosec Europe – the stuff you really need to know

waiting travelers at London Kings Cross StationEn route to Earls Court yesterday for the Infosec show the Echoworx shoeshine stall at Infosec EuropeI had a bit of time on my hands whilst waiting for a work colleague’s train to turn up so I took the header photo with my Samsung Galaxy S2. It’s interesting to see how people naturally spaced themselves out so that there was an equal gap between them and the people in different directions  around them.

I’m going to write two posts on the visit to Infosec. This one covers all the essential things you need to know. The second will take a little more serious look at some of the learningsDennis Webster of Pangea with Trefor Davies and add some thoughts.

The essential information is presented here in pictorial format. The first inset photo is the shoeshine stand at the Echoworx booth. I say booth but all it really was was a space with a popup and two shoeshine chairs, one of which I sat at – I like to look after my shoes me (Timberland – none of this Hush Puppy stuff). The downside is that for 5 minutes as a captive audience I had to sit through a sales pitch for Echoworx. It’s fair enough. I got my shoes done and they got their message across. Bloomin’ hard work for the sales guy though – twelve 5 minute elevator pitches every hour. Wow.

The shoeshine guy was really interesting. Turns out he is a Seamus McDonagh, former cruiserweight boxer who was once a contender and was matched with

Categories
Business online safety Regs security

Government surveillance in a free society?

Time was when MI5 (or whatever they are called) wanted to listen in on your conversation they sent someone round to the local telephone exchange with some wires and a couple of bulldog clips.

The breadth of things that could be monitored was actually fairly large. I remember once, many years ago, being shown satellite photographs of the lake at the Chernobyl nuclear plant in the days running up the announcement that there was a problem with the reactor. The thermal imagery of the lake showed it warming up substantially over a few days. The information showing that there was a problem was being collected by our “security forces”.

The fact is whilst the data was there nobody saw it as it was buried in so much other information, photos etc, that you had to specifically been looking for it to see that something was wrong. The amount of personal information that they could gather about you was fairly limited and the number of people they could do this to was not huge. It was not a scalable system.

Nowadays the game has changed.

Categories
End User scams

Consumer Advice Bureau – Asian branch

Just took a call from a mobile number on my mobile. It was an Indian sounding lady representing the Consumer Advice Bureau. She wasn’t trying to take money off me or sell me anything or any scam like that which is a nice change. So many of these cold calls are from dodgy sources.

Anyway she was calling to advise me that I could save 70% on any payments I made on unsecured loans thanks to new government legislation. Yay.

Categories
Business online safety piracy Regs

Government plans to track emails and websites visited – my take

The fuss in the media today regarding the government’s plan to make Internet Service Providers capture personal communications data is nothing new. It was brought up under the last Labour government as the “Intercept Modernisation Programme” and received heavy criticism from the Tory party in opposition.

Now with the responsibility of government the conservatives seem to have seen things differently and the word is that the forthcoming Queen’s speech will contain measures to enable the collection of personal information that includes who you have telephoned and emailed or have received emails from and which websites you have visited. The details of what is being sent in the emails isn’t being asked for at this time.

Apart from the obvious privacy issues

Categories
End User spam

I wish there was a global unsubscribe button

It’s that time on a Friday afternoon when a young man’s mind strays off the subject of work and onto lighter matters.  Spring has arrived. Benevolent lovely spring that prises open daffodils and encourages birds to raise their bright eyed heads to the sky in full voice. Girls smile and bring gladness to the heart.

In my email inbox a message arrives.

Dear Trefor,

I am following up on my email from last week that you might have missed first time around. I wanted to invite you to come along to our ‘Kofax Customer Connect Event’, with keynote speaker Derek Miers, Principal Analyst, Forrester Research on WEDNESDAY 18TH & THURSDAY 19TH APRIL 2012 at Westminster, London, UK.

Attend this event to learn how your organization can benefit from Capture Enabled BPM initiatives and take part in our interactive and lively speed workshops, where you drive the agenda.

If you don’t want to miss out, but can’t get the budget for travel approved Register for our Capture Enabled BPM Launch event as an online participant and guarantee your place on this first of a kind event.

Kind Regards,

Jenny

Dear Jenny

Where on earth do you guys get your mailing lists from. I almost certainly did not reply to your email from last week for a number of reasons.

  1. It was unsolicited and one of many similar mails I get every day that I by and large treat as spam and ignore.
  2. I have never heard of Kofax
  3. I have no idea what Capture Enabled BPM is (though I do now because in the interest of scientific research I have scrolled far enough down the email trail – and it is of absolutely no interest)

All the best

Tref

PS I wish there was a list of databases that have my email address on it so that I could systematically unsubscribe from them all instead of having to do it individually. I’ve stopped leaving my business card at exhibitions because of all the unwanted mail it seems to generate.

Note I’ve left the original links from the email in in case any blog reader wants to go –  looks like there’s a free dinner – I bet Kofax is a generous company. There is no info at all on timings other than the date – it’s at your own risk:)

Right back to birds, gladness and, oh, my presentation preparation for our customer event. Have a good weekend 🙂

 

Categories
Apps End User online safety

Pipe dreams and privacy – is your private life a thing of the past? or no Google doodle for privacy muddle

Today is all about privacy. No Google doodle to go with it because Google is at the centre of the debate with its harmonisation of privacy rules across all of its services.

The European commissioner of justice, Viviane Reding says there are “doubts” over what Google has done. I’m not going to go into detail on the ins and outs – read about that in the Guardian. Commissioner Reding though in my experience is someone worth listening to so she is expressing concern there is likely to be something in it.

It is worth thinking about privacy for a moment because in our modern age it is a hugely complex subject.

If I do a search for “Trefor Davies” Google comes up with

Categories
End User nuisance calls and messages Regs security

The Telephone Preference Service seems no longer to be effective

We used to get junk phone calls, I’m talking years ago now. Double glazing, that sort of thing. My favourite was from people trying to call “Service Washing Machines”. These weren’t trying to sell me anything. The company had misprinted an advertisment with our number instead of theirs so we would get their calls. It did get a bit tedious after a while though.

Once (and you might not like me for this) I was at home during the day showing a builder around to get a quote. The phone rang and I said “watch this”

Categories
End User online safety

Louis Vuitton sells handbags but follow that link at your peril

Louis Vuitton sells handbags. He also features very prominently in the comment spam caught by good old Akismet on this blog. I haven’t clicked on any of the links offered – domain names such as “limpidity” seem to  be selling Louis’ stuff online – soft and flexible handbags for soft and gullible people perhaps?

I took a straw poll in the office and the first person I asked, Director of Account Management Andrew North said his wife owned two Luis Vuitton handbags. Blimey, I’d better not tell Anne although Tesco carrier bags are more in her line:)

So then I Googled Louis Vuitton and found 199,000,000 results – blimey again, I searched for Trefor Davies and only got 408,000. Must be a lot of Trefor Davieses out there – it is a common name. I wonder how many of us there actually are? Not as many as there are Louis Vuittons perhaps – I imagine the fashionably types around town went through a phase of  naming their kids after him – the ultimate one upmanship. Pushed around no doubt in a LV pram and when small left on a sideboard at A-List parties to sleep in a matching handbag (are they called handbags these days?).

Imagine going to a posh nursery school just around the corner from Harrods and being one of several Louis Vuittons! In my day it was Dave or Andy or Llywelyn if you lived in Wales.

Anyway when I started this post I didn’t know where it would take me and I still don’t.  Perhaps something relating to Safer Internet Day 2012? It didn’t happen. You will have to Google it (30,900,000 results) or follow that link to find out more.

I wonder how many of the Google results for LV are actually spamming pages? I will probably never find out.

That’s all folks – back to writing the Timico ITSPA Awards entry.

Categories
Business online safety Regs security

Codes of practice and regulation of tinterweb – Home Affairs Committee report on radicalisation

When I was a kid my dad asked me what I wanted to be when I grew up. I of course said I wanted to be the CTO of a fast growing ISP with prospects 🙂 Dad was somewhat confused with this and told me not to be a silly boy because the internet hadn’t been invented yet and I should learn to be a doctor or a judge or pursue some similarly respectable form of employment.

Some days it feels as if dad will end up having his own way and I will end up as a judge. In the news this morning is yet another report suggesting that ISPs should put together a code of practice in respect of taking down websites that do something we aren’t supposed to like.

There is a lot of this going on. If it isn’t the movie and music industry rightsholders wanting us to block sites promoting copyright infringement it’s Nominet in cahoots with the police trying to suspend domains allegedly supporting criminal activity.  Today its a Home Affairs Committee reporting on radicalisation suggesting that ISPs need a voluntary code of practice that supports the  taking down of websites containing violent extremist material.

Glancing through the report the committee did cover the issues