Simple Help tutorial helps catch office thief

I got an email the other day from someone who used my How to use your PC and Webcam as a motion detecting and recording security camera tutorial to catch an office thief, complete with pictures. A few folks have left comments mentioning how they’ve used it to catch people doing things they shouldn’t be, but this is the first time someone has sent me pictures.

I thought someone was taking money out of a little change box I have on my desk, quite a lot of money, like $60 this month. So I finally set up a camera, with your help, at 5 pm last night (in the edited by Ross building in downtown Vancouver) and caught this at 7pm. So he’s been fired, by 9am this morning. Turns out he was taking change even from inside peoples drawers… Look at him going into the carpeted office with just a mop?!

So awesome.

click to enlarge
janitor getting closer
click to enlarge
janitor sees the change
click to enlarge
janitor about to steal
click to enlarge
janitor stealing
click to enlarge

How to scan your Mac for spyware, malware and tracking cookies

One of the benefits of being a Mac user is that generally you don’t have to worry about spyware, malware and viruses quite as much as a Windows user. In fact, until I ran across MacScan, I honestly didn’t even know there was a spyware scanner for OS X. Well it turns out there is – so I gave a run. The following tutorial will guide you through using MacScan to check your Mac for spyware, malware, tracking cookies etc. …

How to completely wipe all of the data from your hard drive

This tutorial will guide you in using Darik’s Boot and Nuke (“DBAN”) – to securely wipe (delete) all of the data from your hard drive. Why would you want to securely wipe all of the data on your drive? Perhaps you’re selling your computer, donating it to charity, or recycling it. Before you do so, consider this – even when you delete files, they’re not actually removed from your hard drive. Using data recovery tools, many files can be restored from the average hard drive. In fact, even after a hard drive has been formatted, data can be recovered from it. Using DBAN “prevents or thoroughly hinders all known techniques of hard disk forensic analysis”. …

How to surf the web anonymously using OS X

Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol.

This tutorial will guide you in installing, setting up and using Vidalia – a cross-platform interface for Tor, in OS X. Using Vidalia, you can start and stop Tor, view the status of Tor at a glance, and monitor Tor’s bandwidth usage. Vidalia includes Tor itself, and privoxy – which is a web proxy with advanced filtering capabilities. This might all sound a bit confusing, but it’s actually quite straight forward. …

Email Virus Warning: That Greeting Card isn't from Mom

From this Washington Post article:

Internet spammers launched a widespread attack on e-mail inboxes this month. But instead of trying to lure users into opening a corrupted attachment, they’re concealing a computer virus in a link to an online greeting card.

In most cases, the subject line informs recipients that they’ve received a greeting card or a postcard from a “friend,” “family member,” “worshipper,” “school-mate” or “neighbour.” When the e-mail is opened, there’s a link to a Web site that uploads a virus to the recipient’s computer.

I’ve received about 40 of them over the last week.