The Weather Network
 The MountainGnome FORUM
Where you can discuss everything OUTDOORS!
READERS TODAY
web counter
web counter



FRONTIER MUZZLELOADING
MUZZLELOADER LUBES
&
RUST INHIBITORS


Patch lube, case lubes, bullet lubes,
rust inhibitors.
All natural - No chemicals



Destructive Agenda
of
Humane Society of U.S.

OUTDOOR LIFE and PROTECT THE HARVEST

LIGHTING & SOUND KITS!

Make payments with PayPal - it's fast,
free and secure!


Find Great Deals at BedandBreakfast.com!

Great Polish Food

2018 RENDEZVOUS
Always check websites for date changes!
We will be adding events as they become available thru the year.

11th Annual Bledsoes Fort Colonial Fair
May. 04-06, Castalian Springs, TN

Camp Dubois Spring Rendezvous
May 5-6, Wood River, IL

Plainsmen Black Powder Club Rendezvous
May 19-21, Kindred, ND

Lancaster Restoration Rendezvous
May 24-28, Fort Lupton, CO

Paul Bunyan Plainsmen Rendezvous
May 25-28, Puyallup, WA

Fort Koshkonong Rendezvous
May 26-27, Fort Atkinson, WI

Fort Crevecoeur Spring Rendezvous
May 26-27, Creve Coeur, IL

Santa Fe Trail Rendezvous
June 10-16, Raton, NM

Prairie Villa Rendezvous
June 15-18, Prairie Du Chien, WI

Snowy Mountains Muzzleloaders Rendezvous
June 22-24, Lewistown, MT

Green River Rendezvous
July 12-15, Pinedale, WY

Rocky Mountain National Rendezvous
July 12-21, Creede, CO

Sierra Madre Muzzleloaders Mountain Man Rendezvous
July 20-22, Encampment, WY

Cache Valley Mountain Man Rendezvous
July 20-21, Wellsville, UT

Forts Folle Avoine Fur Trade Rendezvous
July 25-29, Danbury, WI

Mackinaw Rendezvous and Trade Fair
Aug. 02-05, Mackinaw City, MI

Smoking Waters Mountain Man Rendezvous
Aug. 03-12, West Yellowstone, MT

White Oak Society Rendezvous & History Festival
Aug. 03-05, Deer River, MN

Pike River Rendezvous
Aug. 04-05, Kenosha, WI

Cache le Plew Mountain Man Rendezvous
Aug. 05-12, Edgewood, NM

Grand Portage Rendezvous Days
Aug. 10-12, Grand Portage, MN

Lakes Country Mountaineers Black Powder Rendezvous
Aug. 17-19, Perham, MN

Hugh Glass Rendezvous
Aug.23-26, Shadehill, SD

Bear River Rendezvous
Aug. 24-26, Evanston, WY

Chippewa River Rendezvous
Aug. 25-26, Cornell, WI

Green River Mountain Men Rendezvous
Aug. 31-Sept. 03, Sequim, WA

Nebraska Muzzleloaders Rendezvous
Aug. 31-Sept. 03, Cairo, NE

Fort Bridger Rendezvous
Aug. 31-Sept. 03, Fort Bridger, WY

Grande Ronde Muzzleloaders Rendezvous
Sept. 01-03, La Grande, OR

Trapper Days Rendezvous
Sept. 6-9, Fort Lupton, CO

Evergreen Muzzleloaders Fall Harvest Rendezvous
Sept. 07-09, Olympia, WA

Fort Connah Fall Rendezvous
Sept. 08-09, St Ignatius, MT

Wapiti Historic Redezvous
Sept. 14-16, Nowthen, MN

Hunters Widows Rendezvous
Sept. 15-17, Fort Lupton, CO

Pawnee Free Trappers Fall Rendezvous
Sept. 21-23, McCook, NE

NRLHF Eastern Primitive Rendezvous
Sept. 21-29, Slippery Rock, PA

Rendez-vous at Ste Anne de Detroit
Sept. 22-23, Detroit, MI

Comanche Peak Muzzleloaders Fall Rendezvous
Oct. 04-07, Palastine, TX

Leslie Mountain Man Rendezvous
Oct. 12-13, Leslie, AR

CTAGA Fall Rendezvous
Oct.19-21, Benton, KS

Warsaw Pioneer Heritage Days
Oct.21-22, Warsaw, MO

Chief Black Dog's Trail Muzzleloader Club Fall Rendezvous
Oct.26-28, Oswego, KS

Spring Mountain Free Trappers Mountain Men Rendezvous
Oct.26-28, Blue Diamond, NV

Blue River Longrifles 1700-1890 Indoor Trade Show
Nov. 03-04, Greenfield, IN

Fort De Chartres Winter Rendezvous
Nov. 03-04, Prairie du Rocher, IL

Petit Jean Mountain Rendezvous
Nov. 23-25, Prairie du Rocher, IL






Free content by Fresh Content.net

Copyright©1999-2018
The MountainGnome
All rights reserved.
ISSN: 1529-6520

THE MOUNTAINGNOME - Updated Weekly

        "ΜΟΛΩΝ ΛΑΒΕ"


  WELCOME TO THE MOUNTAINGNOME  
PROUD SPONSORS OF THE NRA
NOTE: We reserve the right to reject content that we consider unacceptable to our site.
  • At the heart of liberalism really is a HATRED for God and a belief that government should replace God....Just Ask KATHY GRIFFIN!

FIREARMS & ACCESSORIES
U.S. STAMPS & SUPPLIES
USED BOOKS

BUYING:
Elk Buglers, Elk Teeth, Buffalo teeth, Bear Claws!

Please email muzzleloader48@yahoo.com with a price. NO REPRODUCTIONS!

MOUNTAINGNOME GUEST BOOK


The MountainGnome will be giving away one free pre-owned book weekly.
We will be picking one name from all readers who sign our guest book.
This weeks free book is THE SHACK - By Wm. Paul Young.
Free Guestbook
MountainGnome Guest Book

THE MOUNTAINGNOME FORUM!


NEW! The MountainGnome has installed a FORUM for all of our readers and visitors!
Discussions on everything OUTDOORS.
Modern Firearms, Muzzle Loaders, Modern & Traditional Hunting, Fishing, Bow Hunting, Camping.
You can bring a new topic, bring some useful information for all.
ENTER FORUM

THE MOUNTAINGNOME NEWS


  • The black family survived centuries of slavery and generations of Jim Crow, but it has disintegrated in the wake of the liberals' expansion of the welfare state.
Gun grabbers still push campus ban: Preventing rape is no reason to arm women
by Joe Saunders

Second Amendment supporters still have their work cut out for them in the Centennial State.

Gun-grabbers trying to get concealed weapons banned from Colorado campuses spout the party line when it comes to the current liberal obsession with college sexual assaults, but say arming women isn’t the solution.

They just don’t have any other realistic solutions to offer. “Addressing the prevalence and risk of campus sexual assault shouldn’t be tied into a concealed gun issue,” said Ken Toltz, founder of the ludicrously misnamed Safe Campus Colorado, told the Daily Camera in an interview published Sunday.

“It’s separate and politicizes something that we’re not doing enough about,” said Toltz, who claims his group has more than half the signatures it needs to get a campus ban on the ballot in November.

“The statistics are really worrisome about how prevalent sexual assault is on college campuses. We’re not doing enough, and handing out guns is not the solution.”

Rape survivor Amanda Collins thinks it might be a start.

Collins gave testimony last March that helped convince Colorado lawmakers to turn down a concealed weapons ban on campuses. Her words also helped spark last fall’s recall elections that drove two gun one gun-grabbing Democrat from office and force the resignation of a third.

“I think everyone would agree that more needs to be done to prevent sexual assaults, however campus carry isn’t trying to prevent sexual assaults,” Collins told the Daily Camera. “It’s about allowing women to be able to protect their bodies and preserve their lives if they find themselves in that situation, which they continually do.”

That’s the kind of clear thinking libs refuse to grasp. While arguing that college campuses have been turned into veritable rape factories, the White House last month made an election-year push to show off how much it worries about young, unmarried Democrat-voting women by putting out a 20-page report long on big words and Joe Biden, but short on reality.

Newly minted University of Colorado law school grad Katherine Whitney has no problem accepting reality.

“There are women in this state who have been raped on college campuses but have concealed carry permits and are still completing their degrees,” she told the Daily Camera. “It’s very important that they are able to attend a university where they’re permitted to carry on campus.”

How hard is that to understand?

Liberal Boulder City Council passes ‘assault weapons’ ban despite lawsuit threat

Cartels make $500 million a year from smuggling illegal immigrants across U.S. border

CNN’s Chris Cillizza under fire for posting image of Trump in crosshairs

NOTE:
The governor of Colorado, John Hickenlooper, a died in the wool liberal democrat, stated that since he legalized the sale of marijuana, the opioid use has gone down 6 percent, his statistics! Of course this is coming from another lying politician to cover his ass for the increase in drug usage, increase in crime, increase in traffic deaths, need I say more?!

Dear readers, the LEFT WING LIBERALS will be the destruction of this great nation! They do everything in their power to discredit and blame this great Country for the ills of the world!

THE MOUNTAINGNOME PRESENTS FACTS!!
Ebates Coupons and Cash Back

The MountainGnome

SPORTSMANS PARADISE



SERVICES by FRONTIERMUZZLELOADING:
PRICE DOES NOT INCLUDE RETURN UPS / USPS OR INSURANCE ON SHIPPING.

ACCURACY
Internal Lock Polishing: $45.xx. CVA/Traditions/Siler/L&R locks only. I will polish all moving/mating surfaces and lock plate for a smooth grit free feel. This speeds up lock time and makes it butter smooth.
Trigger Polishing: $20.xx. Work would include the internals of the lock, the double set triggers MUST be polished fora smooth crisp, grit free feel!
Accuracy Bedding: $60.xx. Needed just like a center fire, your wood stock muzzle loader is actually prone to the tang screw/s loosening due to the weaker wood actually pulling the metal parts up and into the wood under heavy recoil! Loose tang screws are a dead giveaway of this happening only after a few shots, killing your accuracy.
Wet Weather soaking your wood stock also is a common problem. "In order to do the job correctly you will have to send your complete muzzle loader so I can bed all parts as one for the best accuracy possible."
Coning the Muzzle: $35.xx. This procedure in present day is known as "coning”. It was known in the 19th century as a "relieved" muzzle and also as a "funneled" muzzle. Once the rifle has been “coned” it can be loaded rather easily without using the short starter.
FINISHES
Barrel Browning: $65.xx. I use nothing but the best to brown all muzzle loader barrels. It’s a slow process which generally takes 3 to 5 days to complete properly. This included sights, tang, screws, etc. If it deals with the barrel/attachment. It is included in the price.
Browning Accessories: Contact for price! Butt plate, trigger guard, nose cap, patch box, Etc. Just let me know what all you have and I will work on a price for you.
Stock Refinish: $125.xx. Have an old beauty of a muzzle loader but the stock is looking a little beat up? No problem! All finishes are hand rubbed from the low gloss, matte to high mirror gloss, I can do it in whatever finish you want. Walnut normally does NOT get stained unless the owner wants it reddish or almost black. Good walnut normally never needs staining.
Brush the Brass: $25.xx. To rid that beautiful rifle of yours and that ugly shiny cheap looking brass, I can also provide a Brushed look to your rifles furniture that will age nicely and cut that cheap shininess out! Stop scaring game with that mirror! It’s a hunting rifle, not a beauty pageant!

NOTE: For additional information on our services, please contact the following email address: FrontierMuzzleloading@yahoo.com
REGISTER with the folks at Frontier Muzzleloading and view the thousands of interesting articles!!
NOTE: This article and many other interesting articles can also be found at the BACKWOODSMAN MAGAZINE.

  • “Liberals always exempt themselves from the rules that they impose on others."

FRONTIER'S - CUSTOM UNDER HAMMER .45cal:
CLICK ABOVE LINK TO SEE MORE PICS!

Description:

NOTE: THIS IS A BLACK POWDER RIFLE - NO FFL REQUIRED!

Custom made .45cal Under Hammer Bench Rifle, Walnut stock, beautiful trigger and bore! Bore is pristine.

The action is custom made, so no name or makes on it.

Barrel, Converted 45-70 that is 30.5" long and 1 1/8" across the flats. 1:22 twist

Barrel Markings:
M2
45-70
1977
1:22


The rifle shoots lights out! 60-70 grains Pyrodex P, 460gr No excuse bullets are the only conical bullets I've shot so far but am now unable to handle recoil due to neck issues.

Rifle weighs just under 14lbs

A great looking, feeling and shooting rifle! I will never see another like it, but I have to start letting some rifles goes.

$400.00 SHIPPED

Comment From The MountainGnome: Folks, as you know the most important tool for the back woodsman/mountainman is his muzzleloader!


  • "Only a government that is afraid of its citizens tries to control them!"
HUNTING & SHOOTING NEWS
HUNTERS: AVOID NEW YORK, ILLINOIS, and CALIFORNIA!
The above states DO NOT recognize any other states concealed carry permits! Until they change their SOCIALIST/COMMUNIST agenda's, we at the MountainGnome ask you the hunter, fisherman, sportsman to spend your money elsewhere!

LITERATURE CORNER


TREASURES OF READING
Folks, here are some great books to read, while relaxing in the evening........

Buy Today...Great Reading!! Makers and Takers!
Why conservatives work harder, feel happier, have closer families, take fewer drugs, give more generously, value honesty more, are less materialistic and...

by Peter Schweizer (Author)

NEW YORK TIMES BESTSELLER

In Makers and Takers you will discover why:

* Seventy-one percent of conservatives say you have an obligation to care for a seriously injured spouse or parent versus less than half (46 percent) of liberals.

* Conservatives have a better work ethic and are much less likely to call in sick than their liberal counterparts.

* Liberals are 2½ times more likely to be resentful of others’ success and 50 percent more likely to be jealous of other people’s good luck.

* Liberals are 2 times more likely to say it is okay to cheat the government out of welfare money you don’t deserve.

* Conservatives are more likely than liberals to hug their children and “significantly more likely” to display positive nurturing emotions.

* Liberals are less trusting of family members and much less likely to stay in touch with their parents.

* Do you get satisfaction from putting someone else’s happiness ahead of your own? Fifty-five percent of conservatives said yes versus only 20 percent of liberals.

* Rush Limbaugh, Ronald Reagan, Bill O’Reilly and Dick Cheney have given large sums of money to people in need, while Ted Kennedy, Nancy Pelosi, Michael Moore, and Al Gore have not.

* Those who are “very liberal” are 3 times more likely than conservatives to throw things when they get angry.

The American left prides itself on being superior to conservatives: more generous, less materialistic, more tolerant, more intellectual, and more selfless. For years scholars have constructed—and the media has pushed—elaborate theories designed to demonstrate that conservatives suffer from a host of personality defects and character flaws. According to these supposedly unbiased studies, conservatives are mean-spirited, greedy, selfish malcontents with authoritarian tendencies. Far from the belief of a few cranks, prominent liberals from John Kenneth Galbraith to Hillary Clinton have succumbed to these prejudices. But what do the facts show?

Peter Schweizer has dug deep—through tax documents, scholarly data, primary opinion research surveys, and private records—and has discovered that these claims are a myth. Indeed, he shows that many of these claims actually apply more to liberals than conservatives. Much as he did in his bestseller Do as I Say (Not as I Do), he brings to light never-before-revealed facts that will upset conventional wisdom.

Conservatives such as Ronald Reagan and Robert Bork have long argued that liberal policies promote social decay. Schweizer, using the latest data and research, exposes how, in general:

* Liberals are more self-centered than conservatives.
* Conservatives are more generous and charitable than liberals.
* Liberals are more envious and less hardworking than conservatives.
* Conservatives value truth more than liberals, and are less prone to cheating and lying.
* Liberals are more angry than conservatives.
* Conservatives are actually more knowledgeable than liberals.
* Liberals are more dissatisfied and unhappy than conservatives.

Schweizer argues that the failure lies in modern liberal ideas, which foster a self-centered, “if it feels good do it” attitude that leads liberals to outsource their responsibilities to the government and focus instead on themselves and their own desires.

NOTE: Folks, every book I review on The MountainGnome, I have read and give my honest opinion. This book is excellent reading IMO)!

MODELERS KORNER

STARLING TECHNOLOGIES
Robby The Robot Life Force!!
Custom Built in the USA.
New! RC voice activation option now available. This option must be added to kit before shipping. Can not be added later by client.

Kits available for the Masudaya 16" & 24" Robby as well as the X-PLUS Robby.

Bring your POL810 1/12 scale Polar Lights Robby to Life with the Robby the Robot Life Force Plug-N-Play LED and Sound Effect Kit. The kit includes a High Quality sound board with 14 famous phrases synced to a flashing blue LED. Blinking lights are included for Blue "Weapons Neutralizers" as well as white LEDs for the "Analyzer Disk Beta" on robbies chest panel. Includes steady lit LEDs for various areas of Robby.

Just plug in some connectors, battery, and slide power switch on, no soldering required. This is as simple as a Lighting kit can be.

Install Circuit boards in the stand that is provided with your model or create a custom stand.

Photo etch kit from ParaGrafix will help to accurize your Robby. Click Here.
Robby model in video and Photos are not included in effect kit, they are for demonstration only.

DON'T SEE WHAT YOU NEED? WE CAN BUILD A CUSTOM KIT FOR YOUR PROJECT!


THE GREAT OUTDOORS


  • "To conquer a nation, first disarm its citizens." - Adolph Hitler
Carnival Cruise Lines:
Ocho Rios, Jamaica


When it comes to dream vacations, an Ocho Rios cruise has to be near the top of the list. Nestled in an emerald Jamaican landscape, Ocho Rios is this island nation’s prime cruise destination. Your cruise to Ocho Rios docks near some of the Caribbean’s most fabled resorts and the cascading waterfalls of Dunn’s River. Enjoy the best of Jamaica on your Carnival cruise to Ocho Rios, whether you’re riding through lush sugarcane fields or touring the waterfront home where a legendary English novelist penned his early secret agent thrillers. From the reggae rhythm to the action-packed activities at Dunn’s River Falls, an Ocho Rios, Jamaica, cruise has all the elements of a blockbuster film — one where you’re the star. Start planning your Caribbean cruise with a call at Ocho Rios today and get ready for your close-up.

SAFETY NOTE: Friends as with any vacation to the Caribbean, stay to high traffic areas! At night stay within your resort. Crime rates are high for robberies, assault and murder. However, just use common sense and you will have a fantastic time!!

Folks, if you have never taken a cruise, you are missing a great deal. Adventure, relaxing, educational and just plain enjoyable! There are many cruise lines, try them all! You'll be happy you did.

NOTE: We will no longer suggest Colorado, or any other state that legalized the sale of illegal drugs, as a hunting, skiing, vacation destination without warning you of the consequences!
Due to the legalization of drugs in the state: increases in crime, drug related shootings, increasing traffic deaths, increasing hit & run incidents, we feel your vacations are better spent elsewhere!!

MOUNTAINGNOME ~ NEWS




Online Privacy Guide: 9 Steps to Security in the Digital Age!
by WIZCASE

Introduction

It is no great secret that online security is becoming more important. In the digital age, more assets, funds and confidential data are stored online. And this trend will continue as the internet of things starts to develop. This means that it is important to keep up to date with the best security practices. It is not overly complex or difficult to keep your online profile safe and secure.

Aside from keeping sites secure, there is a general need to keep your general privacy safe from prying eyes. It is no longer a secret that many large companies keep track of data and sell it to government and corporate entities. It has become important to put protocols in place that kept your online activity safe. Even if you have nothing to hide, there is never a reason for somebody to monitor your data without consent. The recent Cambridge Analtyica affair is the latest in a long string of digital based privacy scandals. This online privacy guide will outline the steps you need to take to ensure online security.

By 2020, the average cost of a data breach will reach $150,000 and since 2013 there have been nearly 4 million records stolen from data breaches every single day. That is 44 per second. Cybercrime is projected to cost the world $6 trillion by 2021 according to firm CyberSecurity Ventures. This would be the greatest transfer of wealth in history.

It is no longer possible to ignore online security and privacy. The risks are too great, both from hackers as well as online companies with a history of a failure to protect customers as well as directly violating digital privacy laws. It is your job to keep up to date in an insecure digital era. Thankfully, it is quite easy to keep your web identity safe with a few simple practices, outlined below. The main considerations in terms of online security are privacy of internet activity, Two Factor Authentication and password maintenance.

1-VPN

VPN stands for Virtual Private Network. What is important to understand is that the internet is just a network of webpages. In order to connect to a webpage, you connect to a particular server. And when your machine makes this connection, it is vulnerable to a hack. When your computer is not connected to a network, it is offline, and thus invulnerable, for all intents and purposes. When data is stored online in a device not connected to the internet, it is known as “cold storage”. Data kept in online servers such as cloud storage is known as “hot storage” and is far more vulnerable to an attack. This is because online information is all kept on a network, called the internet. Hackers have access to this network, as does everybody.

But when you use a VPN, your computer goes to the VPN first, and through the VPN it connects to the server of the webpage. The VPN encrypts the connection, so even if the connection was intercepted by a hacker, they will not be able to read it. Your online privacy is improved. Additionally, your IP will be given a different address, so nobody can pinpoint your location. While the concepts can be a little tricky, VPN’s are very easy to use. You simply install the VPN and start it. It will then automatically encrypt all your internet activity, in the background. This is why it is one of the best ways to secure your online data. While there are free VPN’s it might be a better bet to simply purchase a good VPN with a yearly subscription. They can range from $30 to $50 and will do an excellent job.

There are now a number of VPN’s that have proven their worth over the years. These include HMA VPN, which has been in operation for 11 years and is part of the Avast family, a large security corporation. The VPN is fast and can be used on multiple platforms and devices. Express VPN and IP Vanish are other good alternatives. None of these companies keeps client logs. And they have multiple servers across the world for faster speeds. A VPN is by far the most secure way to ensure digital privacy on the web, where all activity is now monitored.

2-Two Factor Authentication

This is quite possibly the most effective and important feature you can enable. It is definitely worth taking the time to set this up and use it on all sites. It reduces your chances of getting hacked on any site down to nearly zero. 2 Factor Authentication (2FA) is so effective that the FBI even endorsed it in their National Cyber Security Awareness Month campaign. Though this campaign is over 3 years old, 2FA is still the best defense against cyber criminals and is the most effective way to protect all your online accounts.

What happens with Two Factor Authentication (2FA) is that when you log on to a site using a different computer or IP address, you will get either an email alert or a phone alert. You can only log in with the code given via email or phone alert. Using this “second” factor of authentication, hackers will need more data to hack into your sites. You can use email 2FA, and while this is very effective, it is not as efficient as Google Authenticator. The difference is that with email 2FA, you will access your email on the same computer and verify it from there. While it is more difficult, if hackers have access to your website credentials they could also have access to your email address. A compromised computer is a compromised computer, with all your info on it. A second device can add an extra layer of security.

With Google Authenticator, a number is generated on your phone via the app every 30 seconds or so. Hackers need your physical phone as well as your online username and password. This is very nearly impossible, and it is just not realistic for them to get this data with the added physical element. For all they know, you could have $.20 in your account. Once you tie your online information with a physical device, the chances of getting hacked are exponentially reduced. Google Authenticator can be downloaded from the Google Play Store and is available for both Android and IOS. Alternatively, you can get an SMS message. But this is not suitable for those who are not comfortable giving away their mobile number, and will not work for frequent travelers. If you are using email as a form of 2FA, then make sure to use 2FA on your email account also. If you get the option to enable 2FA on any online site, make sure to select it. It really is the difference between a secure account and an insecure account.

3-Password Managers

The number of online sites and platforms that people are using is increasing. And so are the number of usernames and passwords. A system of password management is more or less a necessity. You can use a dedicated password management service (sometimes called password vaults) to help with this issue. Many people can have over a hundred usernames and passwords for different sites, which could include financial accounts, exchanges, email services, social media and shopping sites, to name a few. And the fact is that most people use the same username and password on all sites. This is actually quite normal and natural. There is no way that people could remember 100 different usernames and 100 associated passwords.

There are advantages and disadvantages to password vaults. The obvious advantage is that all your passwords and usernames are stored securely, and you can easily access all your different sites. You can have a number of different and complicated passwords for each site, and because the sites are logged into automatically with encryption, a hacker will not pick up on your username and password. Different password managers come with different features. Some can log into the sites for you, others can let you know if you are using the same password on too many sites, and the best of them will give customers the ability to be used only on a single device or multiple devices. This means that the data will be stored on your local device(s) and not on their servers, where it could be hacked.

There is no doubt that passwords managers are easier to use and will make it very easy to log in to your favorite sites. They automatically generate a login and secure password for each site, which you can use to login quickly. Filling in multiple passwords and usernames can also be time consuming. On the other hand, password manager breaches have occurred, as they are a target for hackers. And if there is key logging software installed on your computer, then it is entirely possible that your password to your password manager is compromised. Yet again, 2FA is the only thing that can come to the rescue here, and not all password vaults have 2FA enabled.

Password managers are safer in many ways and more dangerous than others. Overall, the benefits do outweigh the risks, especially opposed to keeping a spreadsheet of passwords and usernames. The most common password is still “123456” followed by “password”, so a password manager is still very effective in comparison to regular security practices. It goes without saying that some password managers are far better than others. Good password managers include LastPass and 1Password, despite some security flaws. Most security experts do recommend password managers, in conjunction with 2FA and other practices.

4-Self Encryption

An alternative to a password manager is to self encrypt your password. This is a lot easier than most people think. You can keep a written or online sheet with passwords, as long as you encrypt them. So the password Alan Shearer 101 would be encrypted to AS_@101. You could use this password with some variants on different sites, such as AS_*102 for Alan Shearer 102. A simple, clever and extremely effective way to encrypt passwords. Even if the spreadsheet gets compromised, it is next to impossible to work out, as you have given the hacker some extra characters to contend with. Most sites only give 3 attempts before 2FA or a wait period is triggered, so brute force efforts will not work. There are an infinite number of ways to self encrypt passwords, which is why it is the best way to secure your password. You, and only you, can decipher it.

5-Email, Browsers and Search Engine Services

Changing the way you browse the internet and send messages can have an impact on the levels of internet privacy. You could use an alternative search engine such as DuckDuckGo instead of Google. These search engines do not collect data and encrypt connections where possible, and also work to prevent advertisers tracking which sites you look at. DDG is not as good as a VPN, as it does not hide IP addresses when you log into a site. But it definitely beats using Google. DDG also acts as an adblocker for irritating popups.

Instead of Gmail, you could use secure email services such as Protonmail, who are based in Switzerland. This email service is based on security and privacy, and all messages are encrypted. Switzerland is also a little friendlier to civil liberties so the chances of a court ordering them to hand over sensitive data is not as high. If you are using standard email services, then you can get add ons that will encrypt your emails.

As far as search engines go, the most secure one is Tor, which acts as a VPN. However, it can be slow. Good alternatives to Tor include Mozilla and Brave. While most web browsers have an incognito mode which you can use, it is quite ineffective. The connection is not secured, unlike the services provided by VPNs. It just means that your activity is not recorded on the device you are using. In fact, it is a useful feature for people using your device without permission.

6-Ad and Web Activity Blockers

Web activity trackers consist of various types of trackers that monitor you wherever you go on the web. These include social media trackers, traffic analytics from websites, widgets and general media trackers. All of these are designed to track your activity, usually for commercial purposes, and they make your computer slower. One thing you can do to get around this is to use a third part application like Ghostery. It is free and simple to use, blocking all web trackers.

Ads are different from trackers. They can come in a variety of forms. Many ads can get users to click on affiliate links to earn money. These include online streaming sites with “x” marks in random places which do not exit from the ad but take users to an affiliate site. These ads are often targeted and are linked with web activity trackers. Based on your previous activity, a personalized ad will show up on your screen. The best way around this is to install an ad blocker. These are free add ons for all browsers such as Adblock Plus and Unblock Origin.

7-Update Your Applications

Though it can be a pain, it is also a good idea to regularly update your applications. These updates are often in response to identified vulnerabilities in the system. Which means that if you fail to update your application, then it is likely more vulnerable to viruses. On top of this, older versions have been around longer, so most viruses are aimed towards these older editions. An example of this is that Windows computers have far more viruses in them than Mac or Linux. This is simply because most of the existing malware was built towards Windows machines, which have been around longer, and which are used by the majority of people. Another thing to remember is that some applications and devices are no longer supported. This means that they are not being updated with security patches so they are more vulnerable to hacks. Smartphones are a prime example where older versions do not get security updates.

8-Avoid Phishing Scams

When accessing sites you regularly use, be sure to bookmark then. What can happen is that sites are set up that mimic the official site very closely. When you key in your username and password, the fake site will have your information. This is known as a phishing scam. It is very common. Again, 2FA will eliminate this issue in many instances. You can also look at the green padlock on to the left of the URL bar and verify that the URL is correct. You could click on a link to www.gmaiil.com and so easily give away your username and password to gmail.com. Hackers may now have your 2FA email and a list of all the sites you are signed up to. If you use the same username and password across multiple platforms, this is very serious.

Phishing scams are the most common type of attack and they work very well on unsuspecting individuals. They are very easy to execute, and many people fall prey. There is no real software protection aside from common sense. Remember not to click on any links or open attachments from suspicious emails that you have not seen before. If they ask for passwords or sensitive data never give it to them.

9-Virus Protection

In order to protect your computer against viruses, the best thing to do is to take it to a specialist once a year. Viruses can be hard to detect. There is a lot of anti-virus software, however most of them are not up to speed. For example, the majority of computer viruses are designed with Norton Antivirus and Windows Defender in mind. Owning a Mac or using a Linux machine are safer than Windows due to less viruses targeted at these systems. IOS is a little better than Android when it comes to security. In the third quarter of 2016, 18 million new types of malware were detected by one security company. That’s 200,000 per day.

An emergency feature you can use with Windows machines is the system restore. You literally restore your whole machine to a previous date in time, exactly as it was on that date, with the virus removed. Of course, you need to make sure that all of your files are backed up. All applications that were installed and all files saved after the restore date will be removed. Online Privacy Guide: Conclusion

This online privacy guide has outlined the most important security steps to ensure digital privacy. The most important thing to do is to get a VPN, to enable 2FA on all sites and to use either a password manager or self encrypt your passwords. These are the most important things you can do to secure your digital footprint online. Because even if your computer is hacked, your accounts and data will not be compromised if you have 2FA, which requires an additional device. And your passwords will be encrypted. In other words, even if somebody is listening, hacks your data or installs a virus on your computer, you are most likely safe with 2FA and encryption. And even if you fall prey to a phishing scam and enter your username and password on a fake site, scammers can do nothing with the information without 2FA verification.

Of course, all the other steps do offer an additional layer of protection. In the digital world it is always better to have extra layers of security. The more protection and privacy you have, the better. It is always good to keep your data private and to eliminate ads and malware where possible. The less information these organizations have on civilians, the better.


Every week read about the latest developments in privacy software for the home, internet, e-mail..etc..Is the government sticking their noses to far into your private life? Find out more...

Software, Articles, Web Sites and Tips helping YOU protect your PRIVACY!!

BASICS OF CRYPTOGRAPHY - Download or view this manual.

The Ultimate Online Privacy Guide!
Introduction:

Edward Snowden’s NSA spying revelations highlighted just how much we have sacrificed to the gods of technology and convenience something we used to take for granted, and once considered a basic human right – our privacy.

It is not just the NSA. Governments the world over are racing to introduce legislation that allows to them to monitor and store every email, phone call and Instant Message, every web page visited, and every VoIP conversation made by every single one of their citizens.

The press have bandied parallels with George Orwell’s dystopian world ruled by an all-seeing Big Brother about a great deal. They are depressingly accurate.

Encryption provides a highly effective way to protect your internet behavior, communications, and data. The main problem with using encryption is that its use flags you up to organizations such as the NSA for closer scrutiny.

Details of the NSA’s data collection rules are here. What it boils down to is that the NSA examines data from US citizens, then discards it if it’s found to be uninteresting. Encrypted data, on the other hand, is stored indefinitely until the NSA can decrypt it.

The NSA can keep all data relating to non-US citizens indefinitely, but practicality suggests that encrypted data gets special attention.

If a lot more people start to use encryption, then encrypted data will stand out less, and surveillance organizations’ job of invading everyone’s privacy will be much harder. Remember – anonymity is not a crime!

PRIVACY TOOLS
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against global mass surveillance.

Privacy? I don't have anything to hide.
Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide." I always say the same thing to them. I get out a pen, I write down my email address. I say, "Here's my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I want to be able to just troll through what it is you're doing online, read what I want to read and publish whatever I find interesting. After all, if you're not a bad person, if you're doing nothing wrong, you should have nothing to hide." Not a single person has taken me up on that offer.
Glenn Greenwald in Why privacy matters - TED Talk

Global Mass Surveillance - The Fourteen Eyes
The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other’s citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third party countries can and do spy on each other.

NOTE: Visit the site to view some very interesting data on how private citizens are subject to mass surveillance in not only the U.S.A. but many other countries! CLICK HERE

NOTE: Folks, as of today, TOR is the best of the best for your PRIVATE internet browsing! No one has been able to equal this program!


CHUCK WAGON COOK


Folks....here you'll find delicious recipes for main dishes, deserts, "kool" drinks, wild game, and more ~ Updated in every new edition of The MountainGnome!

Have a special recipe you want to share?
Please e-mail us at recipes@mountaingnome.com

Turkey Meatballs
by By Woman's Day Kitchen
Using lean ground turkey instead of beef, veal, or pork cuts loads of fat and calories, but adding mushrooms, mustard, and other bold seasonings to the mixture makes these meatballs incredibly flavorful.

Ingredients:
  • 1 tbsp. olive oil
  • 1 medium onion
  • kosher salt
  • Pepper
  • 1/2 c. chopped fresh flat-leaf parsley
  • 8 oz. mushrooms
  • 2 clove garlic
  • 1 tbsp. Dijon mustard
  • 1/4 c. quick-cooking oats
  • 2 tsp. fresh thyme
  • 2 tbsp. grated Parmesan
  • 1 1/4 lb. ground turkey breast or extra-lean ground turkey
  • 2 c. low-sodium marinara sauce
  • Green salad
Directions:
  • Heat oven to 425 degrees F. Heat the oil in a medium skillet over medium heat. Add the onion, season with 1/4 teaspoon each salt and pepper, and cook, covered, stirring occasionally, until tender, 6 to 8 minutes; stir in the parsley.
  • Add the mushrooms and garlic and cook, stirring occasionally, until the mushrooms are tender and their liquid is nearly evaporated, 4 to 5 minutes.
  • Meanwhile, in a large bowl, whisk together the mustard, 2 tablespoons water, and 1/4 teaspoon each salt and pepper. Stir in the oats and thyme. Add the turkey, sprinkle with the Parmesan, and mix to combine.
  • Fold in the mushroom mixture. Form the mixture into 24 balls and place on a foil-lined baking sheet. Bake until cooked through, 12 to 15 minutes.
  • Warm the marinara sauce in a large skillet. Toss the meatballs in the sauce to coat. Serve with a salad, if desired.
For more great recipes come back soon!
  • "If you are free to be a liberal -- thank a man with a gun!"