Seeking Alpha

carawmorris'  Instablog

Send Message
Cara W Morris is the Marketing Manager at NewSoftwares Inc., a Beaverton based data protection and Information Security Company that provides and Secure USB and external storage media blocking software.
My company:
My blog:
Folder Lock
  • Why You Should Surf The Web Secretly

    The web can hear your screams:

    That's right folks; in space no one can hear your cries for help. However, when it comes to the web, a single murmur of yours can be tapped by various different spy agencies and raise red flags. Once that happens, these organizations will likely record all your activities on the internet. Web sites can already track your location through your IP addresses, get details on the type of device you may be using, and can install tracking cookies on your device, which can then track your movements on the internet or the web. In some countries where there are oppressive regimes, you are more likely to be tracked, compared to countries which give you the right to have freedom of expression and speech.

    Knowledge is the key:

    Before you jump right into securing your online privacy, you need to educate yourself on how to appropriately keep your privacy on the web. First, you need to understand how web proxies work. Proxies work by masking your identity, in a sense, changing your digital ID, tricking websites into thinking you're located in San Francisco, though, in reality you may physically located in Berlin, Germany. Although, the website won't be able to track your identity, the proxy service provider certainly knows who you are and your physical location. In fact, some proxy services will keep a database of all logged activities by users. Therefore, it's crucial that you choose the right proxy service provider. Though, some browser plug-ins can track your location by accessing your real IP address, despite the fact that you've used a proxy. Therefore, experts recommend that you don't have any plug-ins installed on your browser. If your existing browser is packed with plug-ins, then it's a good idea to use a different browser with no plug-ins installed. Flash plug-ins is notorious for storing private data which tend to reveal a whole lot of private information.

    Which Browser to choose?

    Experts recommend that Chrome or Firefox are the best choices for private surfing -- download one of these browsers and then change their settings to remove cookies every time you exit the browser. Chrome has a feature called "Incognito" which doesn't store cookies or browsing history. Surfing incognito along with an enabled proxy can certainly keep your identity hidden for the most part.

    Hate Desktop Based VPN?

    Desktop application based proxy software, also known as VPNs can be exasperating, especially when it comes to adverts. So what are other alternatives? Browser based proxies, such as gives you the same protection without the hassle of installing desktop based VPN software.

    What other precautions are necessary?

    While using public Wi-Fi, you may not aware of the fact that VPN software cannot stop an identity thief from accessing your physical hard-drive. If you have confidential data stored on your PC, make sure to password protect it with data security software such as Folder Lock Lite. Such software are capable of locking confidential data of all file formats, be it: videos, documents, bank statements, or private images. This software is capable of operating in stealth mode, which aids in fooling so called "shoulder surfers" who may be making a note of your log-in credentials.

    For more information please visit:

    Disclosure: I have no positions in any stocks mentioned, and no plans to initiate any positions within the next 72 hours. I wrote this article myself, and it expresses my own opinions. I am not receiving compensation for it. I have no business relationship with any company whose stock is mentioned in this article.

    Jan 23 4:35 AM | Link | Comment!
  • Dell Latitude E6430S, An Excellent Ultra Book Alternative

    These days' business laptops are becoming a thing of the past, and the reason behind their downfall is due to their declining value compared to a new class of laptops - The Ultra books. These Ultra books are called "Ultra books" for a reason, they are slim, flexible and weight next to nothing, what's more is that they have pretty much the same configurations compared to the conventional business laptop.

    As a result, they have gained massive popularity in a short-time frame. Nonetheless, ultra books are still in their infancy and sometimes lack basic features such as a CD/DVD player/burner. Therefore, for many, purchasing an ultra book may not be a practical solution. However, for those truly interested in ultra book like portability and flexibility without having to sacrifice living without basic features such as a CD/DVD player, there's a solution. The Dell Latitude E6430S is considered a true business laptop with ultra book like design.

    We'll discuss more about the design later, but first let's move on to the technical specification arena, the Latitude E6430S comes with several processor options, these include Intel Core i5-3360M (2.8GHz); Core i3 and i7 Options. The Latitude E6430S is quite similar to the E6530, though the E6430S is generally considered lighter, smaller and thus, more portable. Packed with 6GB of ram, its boasts enough storage capacity to handle a multitude of tasks, making it a favorite amongst multitasking, busy executives.

    Two display options are available on this model, a 14 inch and 15.6 inch screen. By default our test model came with an Intel HD Graphics 4000, though if you're work requires you to work with sophisticated graphics, then you can upgrade to Nvidia NVS 5200M graphics card. Storage capacity on this model doesn't disappoint either, integrated with a 750GB hard-drive; you'll never run out of storage space. However, if you don't need that much space, a hard-drive with lesser capacity is also an available option at a lesser price, of course.

    So finally, let's discuss the layout and design of the Latitude E6430S. The E6430S boasts a non-nonsense look, with a subtle design, giving it a classic business laptop look. Opening the lid, you get a sense of how sturdy the design is on the model. However, you may too easily confuse it with a different class of laptops designed for their ruggedness, so that they could be used outdoors and under hostile conditions - don't make that mistake, although its sturdy, it's not build to be used outdoors. Our tested model came in grey color giving it an understated but serious look.

    Moving on to the question of operating system, Dell has disappointed its customers by integrating it with Windows 7, despite the fact that Windows 8 now comes standard on all new laptops. Pre-installed data security software on this laptop is basic and substandard to say the least. Documents such as e-statements, company product schematics, customer lists are all hot data, usually under the radar of hackers and data thieves. Such documents should be fortified using third party data security software such as Folder Lock Lite.

    Weighing at a hefty 4.4 pounds, you truly get a sense that this is no ultra book. Typing on the keyboard feels natural, and the keyboards are adequately spaced apart, making any typing task, a less of a chore. What's more is that there's also an extended battery option on this model, though, it add additional pounds to its already bulky size and weight.

    For more information please visit:

    Disclosure: I have no positions in any stocks mentioned, and no plans to initiate any positions within the next 72 hours. I wrote this article myself, and it expresses my own opinions. I am not receiving compensation for it. I have no business relationship with any company whose stock is mentioned in this article.

    Jan 15 4:11 AM | Link | Comment!
  • Every Person Will Have At Least 5 Terabytes Of Data In The Year 2020

    According to the research findings of universe study, in the coming eight years, data is likely to increase drastically, by how much to be exact? Estimates produce a ball park number of around forty zettabytes, when you do the math; it comes out at around 5,200 gigabytes of data for every man, woman, and child on this planet.

    If you like most other intelligent beings on this planet have no idea how large forty zettabytes actually is? Then it's safe to say that you're no computer geek. Jokes aside, so let's get serious. 40 zettabytes when converted to gigabytes comes out to 40 trillion gigabytes of data, now those are some serious figures. To go further into details, this data will likely be 57 times larger than all the grains of sands on this globe. Experts predict that if such data is to grow at this level, data should be doubled every two years starting from the year 2020.

    If you are thinking: "If I am alive in 2020, I probably still won't be using that much data anyways". Yes, you are right. The fact of the matter is that most of your data will be produced by machines as servers dynamically exchange information from each other.

    According to experts, today only a tiny percentage of your data will be of any relevance; however, by 2020, 33% of your data will be relevant and will contain vital personal details about you.

    What classifies as data?

    As we are well aware that the cyber world is filled with data, so what is data? Data can be classified as your digital photographs, videos, your facebook pictures, YouTube videos, linked in profile, and even high-resolution HD-TV content broadcasted over a satellite and into your television screen. Moreover, your simple daily activities may involve some form of obtaining and exchanging data whether you know it or not. For example, conducting a simple transaction from your ATM machine involves the use of data.

    Just with data alone, a lot can be predicted about a person. Doctors can detect whether one is at an increased risk of cancer by analyzing a patient's medical records; in criminal investigations, faces can be linked through face detection technology and that person can then tracked through their social media profile; an e-criminal can hack through your computer and steal your credit card and social security numbers. The point is that too much data can be a good thing and a bad thing at the same time. The key lies in managing data by encrypting it and by managing personal data with data security software engineered to lock folders which contain critical personal information.

    Signs leading to intensified data usage:

    Think of it this way, for every terabyte that belongs to you, expect to own 14 times more by 2020. Most folks familiar with IT trends are well aware of this phenomenon. Servers around the world are expected to grow at least ten fold by 2020 as predicted by IT experts.

    For more information please visit:

    Disclosure: I have no positions in any stocks mentioned, and no plans to initiate any positions within the next 72 hours. I wrote this article myself, and it expresses my own opinions. I am not receiving compensation for it. I have no business relationship with any company whose stock is mentioned in this article.

    Dec 13 11:15 PM | Link | Comment!
Full index of posts »
Latest Followers

Latest Comments

Instablogs are Seeking Alpha's free blogging platform customized for finance, with instant set up and exposure to millions of readers interested in the financial markets. Publish your own instablog in minutes.