• The hacker who has spent the past several months breaking into the e-mail accounts of family, friends, and political allies of the Bush family has crossed party lines and illegally accessed the AOL account of a former senior White House adviser to President Bill Clinton. The intrusion into Sidney Blumenthal’s e-mail account apparently occurred this week, days after the hacker–who uses the alias “Guccifer”–defaced Colin Powell’s Facebook page and breached the former Secretary of State’s AOL account. The 64-year-old Blumenthal–who was unaware that he had been hacked by “Guccifer”–worked as an assistant and senior adviser to Clinton for about 3-1/2 years, ending in January 2001. He worked as a senior adviser to Hillary Clinton’s 2008 presidential campaign and has remained one of her closest confidants. Read Full Story
  • February 21, 2013

    Install and Setup Mutt Email Client on Ubuntu

    Command-line email client mutt has a well-deserved reputation as a powerhouse of an email client. It’s fast, flexible and, best of all, surprisingly easy to use.  In this guide we give you Step-By-Step instructions for setting up Mutt email client on Ubuntu using Gmail. 1. sudo apt-get install mutt 2. mkdir -p ~/.mutt/cache/headers mkdir ~/.mutt/cache/bodies touch ~/.mutt/certificates 3. Copy and paste configuration below into a new file, save it in your home directory, and rename it to .muttrc # A basic .muttrc for use with Gmail # Change the following six lines to match your Gmail account details set imap_user = “” set imap_pass = “PASSWORD” set smtp_url = “smtp://” set smtp_pass = “PASSWORD” set from = “” set realname = “YOUR NAME” # Change the following line to a different editor you prefer. set editor = “nano” # Basic config, you can leave this as is set folder = “imaps://” set spoolfile = “+INBOX” set imap_check_subscribed set hostname = set mail_check = 120 set timeout = 300 set imap_keepalive = 300 set postponed = “+[GMail]/Drafts” set record = “+[GMail]/Sent Mail” set header_cache=~/.mutt/cache/headers set message_cachedir=~/.mutt/cache/bodies set certificate_file=~/.mutt/certificates set move = no set include set sort = ‘threads’ set sort_aux = ‘reverse-last-date-received’ set auto_tag = yes ignore “Authentication-Results:” ignore “DomainKey-Signature:” ignore “DKIM-Signature:” hdr_order Date From To Cc alternative_order text/plain text/html * auto_view text/html bind editor <Tab> complete-query bind editor ^T complete bind editor <space> noop # Gmail-style keyboard shortcuts macro index,pager y “<enter-command>unset trashn <delete-message>” “Gmail archive message” macro index,pager d “<enter-command>set trash=”imaps://[GMail]/Bin”n <delete-message>” “Gmail delete message” macro index,pager gi “<change-folder>=INBOX<enter>” “Go to inbox” macro index,pager ga “<change-folder>=[Gmail]/All Mail<enter>” “Go to all mail” macro index,pager gs “<change-folder>=[Gmail]/Starred<enter>” “Go to starred messages” macro index,pager gd “<change-folder>=[Gmail]/Drafts<enter>” “Go to drafts” 4. Open up the ~/.muttrc file in your favorite text editor, add...
  • December 7, 2012

    Gmail Two-factor authentication

    When people talk about keeping their personal information safe like there “Banking”, they need to understand just keeping your “Banking Information” safe is not enough.  You e-mail is where all your banking information gets sent, so you need to keep that secure first. The most secure e-mail is one that uses Two-factor authentication I recommend is Google Gmail because it does what we want to do unlike Yahoo, AOL, exc.  Even if you just setup Gmail for your banking you will be better off.  So what is Two-factor authentication lets explain? Two-factor authentication is an approach to authentication which requires the presentation of two or more of the three authentication factors a knowledge factor “something the user knows” a possession factor “something the user has” a inherence factor “something the user is” Two-factor authentication is often confused with other forms of authentication. Two-factor authentication requires the use of two of the three authentication factors. The factors are identified in the standards and regulations for access to U.S. Federal Government systems. Two-factor authentication is commonly found in where evidence of identity is needed and a second form confirms the identity. Two-factor authentication seeks to decrease the probability that the requestor is presenting false evidence of its identity. The number of factors is important, as it implies a higher probability that the bearer of the identity evidence indeed holds that identity in another realm computer system vs real life. In reality, there are more variables to consider when establishing the relative assurance of truthfulness in an identity assertion than simply how many “factors” are used. One of the things I like about Gmail’s Two-factor authentication is the app that works on Android, iPhone and Blackberry.  Google Authenticator generates 2-step verification codes on your phone.  Enable 2-step verification to protect your account from...
  • July 31, 2012

    Netflix Lawsuit E-mail

    I have received a lot of e-mails regarding this e-mail people are confused as to if this is real or a spam scam.  I have verified that this is a real lawsuit again Netflix.  The lawsuit is regarding “Netflix unlawfully kept and disclosed information, including records on the movies and TV shows its customers viewed.” This e-mail lets you decide if you would like to opt in or out of the lawsuit. This is for users who are and were subscribers.  It has not been said how much money each customer will be paid but from what I have read on and from the e-mail itself “Netflix will pay out $9 million into a settlement fund. $2.25 million of that will go to attorneys’ fees, $30,000 to be split between the two named plaintiffs, and the rest going to charitable donations.“ A copy of the e-mail is listed below for those who did not get one or want to verify you received the same e-mail and information. If You Are a Current or Former Netflix Subscriber A Class Action Settlement Could Affect You Para una notificación en Español, llamar 1-866-898-5088 o visitar Our records show that you were a current or former Netflix subscriber as of July 5, 2012. We are emailing to tell you about a Settlement that may affect your legal rights. Please read this email carefully. Go to for more information. A Settlement has been reached in a class action lawsuit that claims Netflix unlawfully kept and disclosed information, including records on the movies and TV shows its customers viewed. Netflix denies that it has done anything wrong. What does the Settlement provide? Netflix has agreed to change its data retention practices so that it separates (known as “decoupling”) Entertainment Content Viewing History (that is, movies and TV shows that someone watched) from identification information for those subscribers who have not been aNetflix subscriber...
  • July 17, 2012

    Cloud Based E-mail Hosting Concerns

    A recent report by Gartner listed The Cloud saying you cant trust the cloud providers to protect your data. Those that know me are aware that I don’t trust cloud providers with all my data. I have expressed questions such as; What happens when the company goes under like megaupload? What happens when you dump the cloud provider? Do they erase your stored data or does it still exist some place? The part that keeps me up at night is who has access tot he data center? Who has root access to the servers where my data is stored? Can they be trusted? What kind of background checks are done on there employees? Security remains a top concern for companies looking to deploy a cloud strategy.  There is an interesting word cloud strategy well as most of you know companies like Microsoft and HP want to get away from internal storage. Companies like HP are pushing for cloud bases systems management to allow ease of out of band management. Microsoft wants to stop housing e-mail servers internally and allow Microsoft to host your e-mail at a discount rate.  This is a great way for Microsoft to cut there support cost and for you to save licensing.  Now most people look at 2 thinks money and down time.  What if we loose our network connection well we can risk it because of the money we are saving on not having an e-mail server.  But they never factor in the risk factor of someone reading there e-mail. What if someone should read your e-mail to the patine office? What if they read your trade secrete e-mails? Remember if your e-mail is hosted outside your company even internal e-mails can be read by the root password owner or the administrator. What about security breaches how...