These items have been uploaded and published about the subject



Here is a famous picture of the Facebook CEO Mark Zuckerberg showing his Facebook likes here.

 Mark Zuckerberg

What happened is that when people blew up the picture where I put the arrow in what they found was this.

Mark Zuckerberg covering the camera and mic 

What he had done is put some tap over the camera and microphone of his laptop. Obviously despite having some of the best I am sure computer security professionals in the world, to check his computer he still feels he needs to do this too.

It is certainly the sign of the times as privacy has never been more under threat as it is now with computers and the internet. Although the Australian goverment with both sides approval has taken admirable action on private companies abusing people'e privacy, it certainly has expanded dramaticly the power of its own abuse of privacy again with both sides approval. 

Now if you're concerned what kind of data is collected by Microsoft in its latest Windows 10 at least there is something you can do to increase your privacy.

The problem is that Windows 10 requires to send information to Microsoft so that it can serve us better. Now where do we draw the line on what we are prepared to give will be different for everyone?

If you are concerned about this, I suggest that you download this free program and checkout the trade off between what you need and what information you are sending that you feel  goes too far. It is available here.







Thanks for this post.Need more content for pos software in legal privacy.

One problem is that no one is talking about is that many of my clients have clients that have residency in the countries covered by the General Data Protection Regulation. It is a bomb waiting to happen.

Add new comment

Restricted HTML

  • Allowed HTML tags: <a href hreflang> <em> <strong> <cite> <blockquote cite> <code> <ul type> <ol start type> <li> <dl> <dt> <dd> <h2 id> <h3 id> <h4 id> <h5 id> <h6 id>
  • Lines and paragraphs break automatically.
  • Web page addresses and email addresses turn into links automatically.
CAPTCHA This question is for testing whether or not you are a human visitor and to prevent automated spam submissions. Image CAPTCHA
Enter the characters shown in the image.

Today almost everyone is concerned about their personal privacy with good reason as all of us have heard horror stories about someone buying a used computer, and the new owners found on the computer tons of their information on the old computer and soon the old owner got into big trouble.

What people want to know is what steps do we take to prevent their loss of personal data on their hard drives which I think is a reasonable for them to ask us, and we want you to know that we, at POS Solutions take very seriously the privacy of our customers.

It is a good idea for people before passing on their computers to others to delete all their personal and business information first to be as safe as possible. The program, I would recommend is ccleaner which I spoke about earlier here. If you want something more secure, then I would recommend beachbit. If the FBI could not crack Hillary Clinton computer after she used it, I am sure it should be good enough for our purposes.

Still no matter how thorough such as a wiping program is, the only way to be really certain that a hard-drive's data is unrecoverable is to destroy the hard drive. Many people suggest throwing hard drives into fire or throwing chemicals at them neither of which I recommend as there are lots of dangerous chemicals in these hard drives and you do not want to be breathing in the fumes. As they are metal, you cannot use a microwave machine despite what some people say. Dropping them is not a good idea as some of them, I have seen survive. Hard drives are pretty tough, and made to take a lot of punishment.

So I recommend a brute force method too, like pound them with a nail and hammer or using what we use, a drill.

However, regardless of whether or not you do this, we will take steps to protect your private information. After we receive hard drives for disposal what we do is here.





Then we dispose of these hard drives.


It is your legal and social responsibility to keep a lot of information you have confidential and you can get into big trouble if you do not.
I have spoken about this problem before but a few days ago. One of our clients in the middle of processing the weekly payroll system suddenly had to go. While he was gone an employee looked up the pay sheets for the bank and noticed another employee was being paid considerably more than him and complained that his pay was less. Whatever you think of this; I think most of us would agree that an unnecessary problem occurred that should never have happened.

On a computer as anywhere else there is no magic method to stop the invasion of your privacy but there are some points you can do to reduce the problem. The problem in most point of sale retail environments in SMB businesses is that generally anyone in the organisation can get access to everything on your computer. I divide these people into four groups, government officials - who can come in with a court order; coworkers and computer support people - who have access because it's necessary for their work, family and hackers.

That is why we like VeraCrypt. It's free. Your information once it is set up is automatically encrypted before it is saved on the hard drive and only decrypted after it is loaded. The information cannot be read without the use of a correct password. I do warn you it does somewhat slow down processing.

So what we do is set up our users with an encrypted VeraCrypt system. Anything in this until they supply a correct password is unreadable. Once they put in a password, it acts as a normal drive with its own letter, accessible like any other drive but only on that computer so only that computer can read the information. So I downstairs on another computer in the network cannot read that information. When they finish and close VeraCrypt, the information becomes unreadable again to anyone without their password.

VeraCrypt can be set up so secure, few could break it.

It is free
Enjoy your privacy.
Note here is some information on the new key disclosure laws.

Everyone has the right to ask for all the personal information you hold about them. You, however, do not necessarily have to release this information, and if you do you may be able to charge for the work required to produce the information required. What the Australian government has done is created a flowchart to help you make these decisions.