Tucker wants to use a captive portal wifi hotspot, but is it secure? Some are poorly made and can leak your data, others can sell data or even input advertising into it. Is Opera a good one? Leo says it's not exactly a VPN, and by giving away the service, that costs money. So they have to be making money somehow. Also, it's not strictly a VPN, it's a proxy service. One thing that Leo recommends is the Tiny Hardware Firewall. It has a built-in webserver, dual wifi radios, and a built-in hardware firewall.
Microsoft will cease support for Windows 7 on January 14, 2020, so PC users should really upgrade to Windows 10 soon. The most important point will be the loss of security patches for the operating system, which will make it increasingly risky to take online. Eventually, browsers and other constantly-updating software will stop working comfortably with Windows 7 and might be frustrating to use. The same issues plagued users of Windows XP after its time was up. Although Windows 10 looks a bit different, you can configure the interface to more closely resemble what you liked about Windows 7.
Do not open email attachments, as they are one of the most common causes of innocent computer users getting infected with malicious malware. Email attachments are "the kiss of death." Ask the sender to place the attachment in Dropbox, etc. or other safer alternatives. Furthermore, Mac and Windows 10 users can open PDF files by themselves, so no need to download and install additional software like Adobe Reader. There are too many vulnerabilities these days regarding email attachments and outdated Adobe software.
Don wants to use a Yubikey to keep his computer safe online. Leo says that the Yubikey is serious two-factor authentication that enables users to generate a code to offer an extra level of security. It's a physical USB device that spits out a code with a one time password. Leo uses it for his email, Twitter, and a host of other sites online. He wishes his bank would support it. He keeps it on his keychain, using a Type C connector. But he can get a Type A adapter as well.
There's even an open source version called SOLOKEYS, which Leo says is every bit as good.
Jim ran GRC Shields Up scanner on his router and he discovered that port 443 was open, not stealth. Is he vulnerable? Leo says you have to have port 443 to run on the internet, but it should be in "stealth mode." You'll also want to find out what's using it. NetStat will help you determine that. Wireshark will also do that. His fan is also running a lot. Leo says that may mean your computer is getting hotter. Probably needs to have the dust cleaned out of it.
Veronica wants to know if her Chromebook works on a home network. Leo says if you have internet access, you will. Are they secure? Leo says absolutely. The thing is, a Chromebook uses ChromeOS, which uses a browser-based interface. This makes it far more secure. And if it does get infected you can simply use the "power wash" feature to start over. But it stores all your data in the cloud, which is far more secure than a hard drive on your laptop.
Frank's grandkids are coming over for Father's Day and he's worried that his internet is too slow. What does he need for on-demand streaming? Leo says that Netflix has a standard of 25MB down. But Leo says its best to have twice that.
Mike watches YouTube off his laptop and he keeps getting popups requiring him to log into his Google account to watch videos. What gives? Leo says that Google is starting to get restrictive on some content, and it may be that you have to log into YouTube in order to view sensitive or explicit videos. That doesn't mean anything other than topics that aren't advertiser-friendly. Leo also says it enables Google to collect data on you, so they can monetize it. Get ready, that's the future.
Gordon is in the hospital, and wants to know if their public wifi is safe or should he use a VPN? Leo says that if it's using a wide-open network, then anyone can log in. It's a shared, public network. There are some risks, but your banking is safe because it's encrypted. The one thing to worry about is a "man in the middle" attack. Hospitals with public wifis could give the hospital the ability to watch what you do. That's when a VPN can come in handy. It will encrypt all traffic, by burrowing an encrypted tunnel to the internet.
If you are scanning important, sensitive documents with your cell phone and sending those files over the internet, make sure to use an app from a reputable, reliable company. Do not use apps from relatively unknown developers, where images could potentially be intercepted. On Android phones, use Google Drive's scan option. On iPhone, open the Notes app and hit the + sign, then tap the "Scan Documents" option. Evernote Scannable is also a legitimate high-quality (free) scanning app.