Litigation Support Tip of the Night

November 4, 2019

If you need a utility to help detect which devices are on a wifi network avoid the free download Glasswire, and instead try MyLanViewer

I tested them both out tonight.  Glasswire was unable to detect iPhones and an iPad on my home wifi network and did not show the name of these devices and a laptop on the network - plus it simply has a very generic look.

MyLanViewer found and named the smartphones and tablet, as well as Google Home - but not Alexa for some reason.

October 1, 2019

If you’ve installed a VPN app on your phone and you want to confirm that it’s activated, google “What’s my IP address?” before turning on the app and then afterwards.  If the IP address doesn’t change then the VPN is not working.  

October 1, 2019

It’s fairly well known that a virtual private network should be used while you’re on public wifi. While wifi may be password protected, your internet traffic is not actually encrypted.

Common security algorithms like WEP and WPA2 can be easily hacked leaving you vulnerable to man in the middle attacks by a malicious third party on the wifi network that intercepts data.

A VPN app will create a secure link that automatically routs traffic through the VPN provider’s server and encrypts passwords, cookies and other data. Servers won’t be able to record your browsing history.

Internet Key Exchange version 2, IKEv2 is one of the faster VPN protocols and works on Windows, iOS and Android, but OpenVPN is more secure and performs better. Avoid PPTP, Point-to-Point Tunneling Protocol, which is less secure.

A good VPN should also allow you to hide your location and true IP address.  

March 14, 2019

Online HTML generators can create a table which can be added to a web site.   See Tables Generator.   In the Table menu you can select a number of columns and rows, and a graphic of a table will be created.    Data can be entered in the table directly.   

Click 'Generate' and the correct HTML code will be created.    This code can then be added to a web page as shown below.  

 HTML code is posted here, on the W3 Schools site which allows us to create a table with sortable columns.   The Tip of the Night for January 15, 2018, shows that it's possible to create a table that sorts on one column by clicking a button.  Click on the link, 'Try It Yourself' in the section entitled, "Sort Table by Clicking the Headers" to access HTML code that you can edit, and preview to create a table in which you can sort by each of the headings.   Edit the values between the td> markers with those you want to add to your table. 

The information in this table will be helpful when you're getting review binders ready for attorneys. 

Note that in order for the numbers in the second column to sort correctly I had to enter each page total with the same number of digits. 

The code can be easily edited to add additional columns.  

 Simply add another heading in the section with lines beginning '<th oneclick, but increase the sortTable value by one.  E.g., "<th onclick="sortTable(2)">City</th>". 

. . . and then add in additional <td> values below. 

February 10, 2019

It's well known that you can search for specific file types in Google by structuring a search in this form:

filetype: pdf

This search will only return pages to which PDF images have been post.ed  A search for: 

filetype:mbox -site:facebook.com

. .  . will exlcude hits for .mbox files on the Facebook site.     A search for: "filetype:mbox site:facebook.com", will only find.mbox files on the Facebook site. 

A search for:

ext: ppt

. . . will also only find files with the extension for PowerPoint, ppt.   .ext is a simple variation on the filetype search.

October 4, 2018

If you're looking for help responding to a cease and desist notice requesting the removal of information posted to the internet, consider consulting the Berkman Klein Center's Lumen site.   The Berkman Klein Center for Internet & Society is a project of Harvard Law School.   The Center collaborates with the Electronic Frontier Foundation, and the law schools of the University of San Francisco and UC Berkeley on the Lumen archive of cease and desist notices.    Lumen includes millions of notices. 

Many of the notices archived on the site are Digital Millennium Copyright Act complaints.   The DMCA criminalizes the use of technical services to circumvent copyrighted material.   Lumen also archives notices related to trademarks; patents; trade secrets; the EU Right to Be Forgotten; and requests from courts and law enforcement.   

The database indicates the date of each notice; the sender; the recipient; a description of the content; the urls for the protected content; and the urls of the offending content. 

Lumen can assist with the creation of DMCA counter notifications.   After an ISP takes down alleged infringing content, a counter notification may lead to the information being made available again after 14 days.     

Google voluntarily submits notices it receives to Lumen.   

February 24, 2018

wigle.net, the Wireless Geographic Logging Engine, collects data on wifi networks around the world.  One of the most interesting resources on this site, is a chart tracking the use of encryption for wifi networks.  The chart tracks different types of wifi encryption.   The red line on the chart tracks unencrypted wifi networks; the yellow networks for which the encryption status is unknown, and the green for which there is some kind of encryption.    As we can see from the chart it was only around November 2006 that the number of encrypted networks exceeded the number of encrypted networks.    The WEP, Wired Equivalent Privacy, protocol continued to be more widely used than the WPA protocol until July 2012 despite the fact that the Institute of Electrical and Electronics Engineers (IEEE) stated in 2004 that this protocol no longer met its security goals.   The WPA2 continues to be the most widely used encryption protocol. 

October 28, 2017

Another great tip by way of Roy Zur of Cybint.     View DNS Info, http://viewdns.info/  is a site on which you can conduct research into the background of internet domains.     Here's a run down of just four tools on the site.

The Domain / IP Whois tool will provide you with information about the registrant for a web site and its server.

The Reverse Whois Lookup tool lets you find out which sites are registered to a particular individual.

Find the geographic location of a specified IP address, with the IP Location Finder tool.

. . . and finally, use the Chinese Firewall Test to determine if a site is blocked in the People's Republic of China. 

Please reload

Please reload

Sean O'Shea has more than 15 years of experience in the litigation support field with major law firms in New York and San Francisco.   He is an ACEDS Certified eDiscovery Specialist and a Relativity Certified Administrator.

The views expressed in this blog are those of the owner and do not reflect the views or opinions of the owner’s employer.

 

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations as to the accuracy or completeness of any information on this site or found by following any link on this site. The owner will not be liable for any errors or omissions in this information nor for the availability of this information. The owner will not be liable for any losses, injuries, or damages from the display or use of this information.

 

This policy is subject to change at any time.