Profile

Cover photo
Austin Williamson
AboutPostsPhotos+1's

Stream

Austin Williamson

Shared publicly  - 
 
My first major code project has gone stable! MobileFriendly is a plugin for Zetaboards. This is its story,
1

Austin Williamson

Shared publicly  - 
 
+Rolston Francis,
If you're looking for an app to manage Autostart on Android, this should work:

https://f-droid.org/repository/browse/?fdid=com.elsdoerfer.android.autostarts

Please make sure your phone is rooted before installing it. :-)
1

Austin Williamson

Shared publicly  - 
 
Privacy, Android Edition

Even if the only thing you have to hide is your cookie recipe, you should probably use encryption.

Here are a few things to get started.

Text messages: SMSSecure
https://play.google.com/store/apps/details?id=org.smssecure.smssecure

This only protects the contents of your message, not the metadata. So if you don't want your family/boss/government to know you're contacting a person, do not consider this private.

The encryption is top-notch, so it's secure for swapping messages with your besties. Installing it is easy, it gives spies a headache, and it allows you to password-protect all messages, so your messages are safe even if the phone is stolen.

IM: TextSecure
https://play.google.com/store/apps/details?id=org.smssecure.smssecure

Cross-platform, compatible with Signal for iOS.

TextSecure combines the security of SMSSecure with the anonymity of the internet. Pretty much nobody apart from you and your recipient know that you are talking to each other. And because it's encrypted, only you and your recipient can read the conversation.

Calling: RedPhone

Cross-platform, compatible with Signal for iOS.

Skype is compromised. Whatsapp is owned by Facebook. And rolling your own Voice over IP app is hard, which is why Moxie did it for you. RedPhone allows you and your contact to talk over data rather than the easily-tapped GSM network. It's free, secure, and works with iPhone users too.

Diary: Lifeograph

The classic desktop application has finally come to Android. Encrypted diaries right on your phone. What's not to like?
SMSSecure is an SMS/MMS application that allows you to protect your privacy...
1

Austin Williamson

Shared publicly  - 
 
*Program of The Day: Lifeograph*

Lifeograph is a free program for Linux and Windows. Remember diaries? Remember the horror of your siblings/parents/friend finding it? Well... now you don't have to worry about that.

Lifeograph is pretty well-done. And searchable. It also password-protects the file with military grade encryption.* Because most of us forget to lock the screen, it automatically signs out of your diary after five minutes of not using it.

The bad news: it only runs on computers. Sorry, mobile users.

http://lifeograph.sourceforge.net/

* Military grade is notoriously low. Lifeograph is way better.
1

Austin Williamson

Shared publicly  - 
 
No, UPS does not have a package for you

A story as old as email itself. Ever since humanity figured out how to pass notes from computer to computer, viruses and badware have been delivering themselves to unsuspecting users.

In 2001, the biggest example was Lovebug. In 2013, it was CryptoLocker. Today, it seems as if every badware writer is mailing their wares. 

Whether it's in the name of UPS, Fedex, a fax delivery, the delivery mechanism has barely changed. In the days of old, the badware came in ZIPs, DOCs, and PDFs. Now they mostly come in links, telling you to "click here to view your payment" or "click here to view details".

IT'S A TRAP!
So, what happens if you clicked on the link?

Fortunately, we don't need to dust off any tools and test. I asked a technician who had to deal with it.

1. First, it installs a dialer.
When you get to the page and realize you've been tricked, it's already started the process. While you're processing the fact that this isn't UPS, it starts to download a file silently in the background. Then, it starts it.

The file is typically stored in /Users/YOURUSER/AppData/Roaming/randomx/random.exe  - where random means a random string of seven letters.  

2. The dialer calls up a server.
The dialer calls up a friend on a server. It asks what files are available. It picks a few packages and starts downloading.

3. Then it plans the attack
It adds entries to Task Scheduler for a random time. At that random time, the fun will start - usually one file at a time. It may launch a swarm. It might launch only one. You've closed the website, but the badware train is starting down the tracks.

4. The fun begins
At the random time, it starts executing the files. The computer  grinds to a halt under the weight of the badware and friends. If you open Task Manager, you'll notice a bunch of randomly-named exectuables. By now, it's too late. Your files are probably already toast.

5. The last hurrah
It sets up one last trap, a ticking timebomb of sorts. If you reboot the machine, it executes.  At bootup, it launches (in my experience) another badware, one which encrypts all your data. If anything's connected to it as a drive, it encrypts that too.
 The version I dealt with was CryptoWall. After it's started encrypting, it pops up a page informing you that you lose. They have all your data. Do you want your data back? You'll have to pay them. 

To add insult to injury, it deletes System Restore points and Previous Folder Versions.

6. The worst part: virus scanners can't stop it.
Virus scanners can't protect you from the millions of new variants that are spawned every day.  The virus scanner can't stop you from clicking on that link. It can't stop that download. It certainly can't undo the damage the final exectuable did to you. 
The world of viruses moves way too quickly for  tools to protect you from this particular set of badwares.

How to protect yourself:
1. Don't open files you weren't expecting.
If you weren't expecting John from  Accounting to send you a package, don't open it. Better yet, contact the sender by phone. If you don't know the sender- don't open.

2. Don't click on links (without checking them)
Hover your mouse over links before clicking them. See where they lead - if it doesn't lead to the official site (google it!), don't click it. If you don't know if it's legitimate, don't click.

3. Don't open package notifications, faxes, "secure file links", etc
Don't open that link. Don't open that email. Just, please: don't, period. 
If you get an email like that, ask your IT team to look at it. IT teams are always busy, but we're more than happy to check something out for you. Better to check now, than to spend days or weeks cleaning up after a badware infection. Some businesses never recovered from infection.

4. If you got infected, react as if your identity were stolen
Pretend that somebody broke into your house and stole all your ID, your cards, everything. Start making calls. Change passwords - using a machine you know is safe. Go through everything you can think of.

5. Keep a list of everything you use (and only in paper form)
It's not a matter of if you will be infected, it is a matter of when. Make a list of all your accounts, the sites, the banks, etc. Don't write down the passwords, but keep track of what you would need to change if your ID was stolen today.

It might sound like work, a lot of work. Don't put it off, start now. Grab a bit of paper. A notebook, even. Write what comes to mind. Put it to the side for a few days. Look at it again, fill it out more. Repeat. 

You'll never stop needing to keep track. 

But when the infection does come, you'll be in a much better place to recover from it.
1

Austin Williamson

Shared publicly  - 
 
Why? Why? WHY? DEAR LORD, WHAT DID I DO TO DESERVE THIS?

The Conservatives are back at it again, even with creepy Toews out of the picture. What's their game? Oh, just forcing your ISP to spy on you - and then charge you!

Yep.

No, Mister Warkentin, this bill does not help against bullying.  We have existing laws in place to deal with bullying, regardless the form or medium it takes.

Anyways, just sharing this with you all.

Remember: "protecting the children" never protects them, and only serves as a way to strip you of your rights.

Stand up against this nonsense.
1

Austin Williamson

Shared publicly  - 
 
Latest TPP Leak: Same Old Copyright Maximalism Rot

“Well, shucks, Timmy. If you feel that way, I'll concede. You don't have to adopt the DMCA takedowns. But you do have to adopt the same copyright terms, DRM Protection, and ban all DRM-breaking tools.”

Life+70. Government mandated site-blocking of so-called “Pirate Sites”. Blocking of DRM-removal tools – the same tools that blind and hearing disabled use to convert their files – is still on the plate.

This is unnacceptable.

No new works will be written just because a corpse can collect royalties for another twenty years. In fact, even less new works will be written. The public domain is great: it allows beginning writers to play with and build on the worlds others have made.

If TPP had been signed last year, Narnia would still be under copyright.

Life+70 is unnacceptable. Life+50 is too.

My own position is basically that advanced by Macaulay in his 1841 speeches—a flat 42-year period of copyright (I’d simplify it and make that just forty years), with the provision that so long as the author is alive he or she retains copyright.
- Eric Flint

Don't Like TPP? Call Ed Fast, Minister of International Trade

Ed Fast is responsible for negotiating trade treaties. Unfortunately, TPP brings new restrictions and no new markets. For sake of consolidating treaties, Fast is about to sacrifice the rights of Canadians.

Call him now.


Parliament Hill Office
Phone Number: 613-995-0183
Fax Number: 613-996-9795
E-mail Address: ed.fast@parl.gc.ca

Abbotsford Constituency Office
Address:
205-2825 Clearbrook Road
Abbotsford, British Columbia
V2T 6S3
Phone Number: 604-557-7888
Fax Number: 604-557-9918
1

Austin Williamson

Shared publicly  - 
 
If I don't answer, it's because I'm Sleeping

After I wrecked my phone (and I liked it), I decided to try one last feature. It's called I'm Sleeping, and it is essentially a filter for your phone.

You set the times you don't want to be disturbed, set your starred contacts, and then apply. It's pretty easy, and for the past day I've been using it.

Unfortunately it also disables notifications... Or that's fortunate, if you're actually sleeping.

I set it to run for 24 hours.

I like it.

If I didn't answer your call, it's because I'm Sleeping.

Go get your copy today.


Previous Post: I wrecked my phone... and I liked it
https://plus.google.com/115121997306002500620/posts/QoRHCWyvmz5
Tired of being woken up by notifications or unwanted phone calls?"I'm sleep...
1

Austin Williamson

Shared publicly  - 
 
I Wrecked My Phone And I Liked It

I didn't mean to do it, it just happened. I was sitting there, bored, when I decided it was time to make some changes....
SnapLock is a simple and elegant screen locker for Android. Version 3.0’s n...
1

Austin Williamson

Shared publicly  - 
 
Lifeograph for Android
http://play.google.com/store/apps/details?id=net.sourceforge.lifeograph

So it turns out, it is on mobile, just not on iOS. Grab it today!
Safe, fast open source digital diary.It supports multiple diary files. Prov...
1

Austin Williamson

Shared publicly  - 
 
+Jude-Anna Pedrazzini

Jude-Anna,

I apologize.

I was mean, hateful, and thoroughly a jerk to you, for no good reason at all.

I want to apologize to you. I've lost my ability to contact you directly, so I'm placing this apology on Google+.

I apologize for the way I treated you. I know I can't take my words or actions back. But I hope, that if we should ever run into each other, write together (gosh! Can you imagine?), that you can forgive me.

I never thought I'd have regrets.

I was wrong. I have many.

I want to right the wrongs I've done, starting with the very first person I truly hurt. You.

I'm sorry.

- Austin 
1

Austin Williamson

Shared publicly  - 
 
Huh.
I just took the political party quiz and found that I side with Liberal. Who do you side with?
1
Story
Tagline
IT Apprentice
Links
Contributor to
Austin Williamson's +1's are the things they like, agree with, or want to recommend.
The Serval Mesh
market.android.com

Help us to make mobile phones go the extra mile during disasters by joining our indiegogo campaign; http://igg.me/at/speakfreely.Mobile phon

KitKat Clock
market.android.com

This is the official clock app from Android 4.4 Kit Kat. I have been able to port this app for backward compatibility upto Android 4.2 Jelly

LED Lampe Super-Brillante
market.android.com

Lampe de poche transforme instantanément votre dispositif de en une VERITABLE Lampe Torche. L'outil lumineux essentiel qui tire le meilleur

I Write Like Cory Doctorow
iwl.me

Code for your blog: <div style="padding:20px; <b>...</b>

CAPCOM:逆転裁判5 公式サイト
www.capcom.co.jp

逆転裁判5 弁護士 成歩堂龍一 ここに復活!!

DanielBR - development: CTorrent-DNH-PSP-DA-v1.5 - append version R2
danielbr-dev.blogspot.com

Changes: * patchs: - ctorrent-3.3.2-negative-ints.patch - ctorrent-CVE-2009-1759.patch links: CTorrent-DNH-PSP-DA-v1_5_r2.rar · CTorrent-DNH