{"id":6037,"date":"2013-08-07T12:37:15","date_gmt":"2013-08-07T16:37:15","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=6037"},"modified":"2013-08-07T12:38:44","modified_gmt":"2013-08-07T16:38:44","slug":"gmails-extra-layer-of-security","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/gmails-extra-layer-of-security\/","title":{"rendered":"Gmail&#8217;s extra layer of security"},"content":{"rendered":"<p>After reading horror stories from Yahoo Mail users and reading about how Yahoo&#8217;s servers were hacked using simple Unix commands pasted into open (available to anyone) email sign-up forms and other Yahoo Web forms, and almost a half of a million users had their account passwords and user names posted on hacker sites for all to see, we did away with our Yahoo accounts (except the one we use for testing).<\/p>\n<p>And we&#8217;ve always been fans (much to some of our readers&#8217; chagrin) of Gmail. Today, we were happy to learn that Gmail really does watch their \u00a0subscribers&#8217; backs. And we now know this up close and personally.<\/p>\n<p>We have been testing a new cyber security tool, which uses VPN (Virtual Private Network) to conceal a user&#8217;s true IP address and allows them to browse the Web anonymously. And most of these kinds of \u00a0programs either slow our Internet connections to a crawl (because they use obscure proxies) or they are very difficult to use. The one we are testing (which will remain unnamed for now, until we&#8217;ve really had a chance to test the program more extensively) is exceptionally easy to use, and seems to work remarkably well.<\/p>\n<p>But anyway, it creates a VPN and then all your browsing (doesn&#8217;t matter which browser you use, it is not browser specific, nor is it a browser extension or add-on) is done privately &#8212; no one knows your IP address or real location, which I&#8217;m sure would appeal to some of you. The one thing you cannot do with the program running and turned on is send or receive email &#8212; because the company doesn&#8217;t want spammers to use it to spam people. But you can use Web mail services like Gmail if you add them to an exceptions list.<\/p>\n<p>I added Gmail to the exceptions list and logged into two of my Gmail accounts. And immediately (within 2 minutes) I received the following email from Gmail:<\/p>\n<p><em>&#8220;Hi \u00a0xxxxx,<\/em><\/p>\n<p><em>Someone recently tried to use an application to sign in to your Google Account &#x2d;&#120;x&#x78;&#x78;&#120;x&#x78;&#x78;&#120;x&#x40;&#x67;&#109;a&#x69;&#x6c;&#46;c&#x6f;&#x6d;. <\/em><\/p>\n<p><em>We prevented the sign-in attempt in case this was a hijacker trying to access your account. Please review the details of the sign-in attempt: <\/em><\/p>\n<table width=\"100%\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" align=\"left\">\n<tbody>\n<tr valign=\"middle\">\n<td width=\"13\"><em>\u00a0<\/em><\/td>\n<td><em>Wednesday, August 7, 2013 3:38:05 PM UTC <\/em><br \/>\n<em>IP Address: 37.221.173.229 <\/em><br \/>\n<em>Location: Romania<\/em><\/td>\n<\/tr>\n<tr>\n<td height=\"15\"><em>\u00a0<\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><em>If you do not recognize this sign-in attempt, someone else might be trying to access your account. You should sign in to your account and reset your password immediately. <\/em><\/p>\n<p><em>Reset password <\/em><\/p>\n<p><em>If this was you, and you are having trouble accessing your account, complete the troubleshooting steps listed at http:\/\/support.google.com\/mail?p=client_login <\/em><\/p>\n<p><em>Sincerely,<\/em><br \/>\n<em>The Google Accounts team &#8220;<\/em><\/p>\n<p>While many of you, judging by my writing and grammar, might think I&#8217;m from Romania, I&#8217;m really not. I&#8217;m from the U.S. of A. So when Gmail detected someone from another country trying to log in to my account, they blocked the log in and alerted me right away. Heaven knows a great many hackers live outside of the USA &#8212; many are in Eastern Europe. Had this been a log in attempt made by someone who was really in Romania, I&#8217;d have reset my password right away and prevented any damage.<\/p>\n<p>Today&#8217;s experience was a success on two fronts:<\/p>\n<p>1. The program I&#8217;m testing that creates a VPN and provides true anonymity on the Web, actually works well (so far)<\/p>\n<p>2. Gmail will alert me if someone attempts to log in to any of my Gmail accounts.<\/p>\n<p>Yay for Gmail. Great job!<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After reading horror stories from Yahoo Mail users and reading about how Yahoo&#8217;s servers were hacked using simple Unix commands pasted into open (available to anyone) email sign-up forms and other Yahoo Web forms, and almost a half of a million users had their account passwords and user names posted on hacker sites for all to see, we\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/gmails-extra-layer-of-security\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1462,1461,1656],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/6037"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=6037"}],"version-history":[{"count":3,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/6037\/revisions"}],"predecessor-version":[{"id":6043,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/6037\/revisions\/6043"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=6037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=6037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=6037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}