<article>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#article09_11_29_1926209</id>
	<title>Network Security While Traveling?</title>
	<author>kdawson</author>
	<datestamp>1259485680000</datestamp>
	<htmltext>truesaer writes <i>"I'll be spending all of next year backpacking through South America. In the past I've used Internet cafes while away, but this time I plan to bring a netbook and rely primarily on Wi-Fi hotspots. I'll be facing the same issues and risks that business travelers in hotels and airports face, as well as those encountered by millions of other backpackers, gap-year travelers, and students. Since my trip is so long I'll have no choice but to access my banking, credit card, and investment accounts on public networks. I will not have a system at home to connect through. Other than an effective firewall, a patched system, and the use of SSL, what else should I do to protect my information?  Keep in mind that many places have very poor bandwidth and latency."</i></htmltext>
<tokenext>truesaer writes " I 'll be spending all of next year backpacking through South America .
In the past I 've used Internet cafes while away , but this time I plan to bring a netbook and rely primarily on Wi-Fi hotspots .
I 'll be facing the same issues and risks that business travelers in hotels and airports face , as well as those encountered by millions of other backpackers , gap-year travelers , and students .
Since my trip is so long I 'll have no choice but to access my banking , credit card , and investment accounts on public networks .
I will not have a system at home to connect through .
Other than an effective firewall , a patched system , and the use of SSL , what else should I do to protect my information ?
Keep in mind that many places have very poor bandwidth and latency .
"</tokentext>
<sentencetext>truesaer writes "I'll be spending all of next year backpacking through South America.
In the past I've used Internet cafes while away, but this time I plan to bring a netbook and rely primarily on Wi-Fi hotspots.
I'll be facing the same issues and risks that business travelers in hotels and airports face, as well as those encountered by millions of other backpackers, gap-year travelers, and students.
Since my trip is so long I'll have no choice but to access my banking, credit card, and investment accounts on public networks.
I will not have a system at home to connect through.
Other than an effective firewall, a patched system, and the use of SSL, what else should I do to protect my information?
Keep in mind that many places have very poor bandwidth and latency.
"</sentencetext>
</article>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268628</id>
	<title>Wrong worry.</title>
	<author>aussersterne</author>
	<datestamp>1259583420000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p>Data theft should be your last worry.</p><p>First worry: Physical item security (your wallet, your mobile phone, your netbook, your backpack)<br>Second worry: Self security (getting kidnapped for ransom/assaulted/mugged after being seen with all of above)</p><p>They are not gonna sit around trying to crack your SSL connection. They are gonna notice your netbook and mobile phone and the fact that you are staying at a hotel that offers WiFi to its guests and they are gonna come steal all your stuff or worse, you.</p><p>Stop thinking like a geek and start thinking like a traveler.</p></htmltext>
<tokenext>Data theft should be your last worry.First worry : Physical item security ( your wallet , your mobile phone , your netbook , your backpack ) Second worry : Self security ( getting kidnapped for ransom/assaulted/mugged after being seen with all of above ) They are not gon na sit around trying to crack your SSL connection .
They are gon na notice your netbook and mobile phone and the fact that you are staying at a hotel that offers WiFi to its guests and they are gon na come steal all your stuff or worse , you.Stop thinking like a geek and start thinking like a traveler .</tokentext>
<sentencetext>Data theft should be your last worry.First worry: Physical item security (your wallet, your mobile phone, your netbook, your backpack)Second worry: Self security (getting kidnapped for ransom/assaulted/mugged after being seen with all of above)They are not gonna sit around trying to crack your SSL connection.
They are gonna notice your netbook and mobile phone and the fact that you are staying at a hotel that offers WiFi to its guests and they are gonna come steal all your stuff or worse, you.Stop thinking like a geek and start thinking like a traveler.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30269404</id>
	<title>Re:are you sure you're asking the right question?</title>
	<author>jittles</author>
	<datestamp>1259592660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>You're going to Venezuela? What part? I was living there during the military coup on 04/11/02.  Want to bring me back a can of Nestle Chicha?</htmltext>
<tokenext>You 're going to Venezuela ?
What part ?
I was living there during the military coup on 04/11/02 .
Want to bring me back a can of Nestle Chicha ?</tokentext>
<sentencetext>You're going to Venezuela?
What part?
I was living there during the military coup on 04/11/02.
Want to bring me back a can of Nestle Chicha?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263964</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270384</id>
	<title>SSH/SOCKS solution</title>
	<author>Anonymous</author>
	<datestamp>1259599320000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Solved this problem years ago<nobr> <wbr></nobr>:) For this, I use SSH port forwarding.  I rent a colocated VPS instance (about $20/month) which runs Debian Linux, the Dante SOCKS daemon, and the current version of openssh.  I then SSH from whatever host I wish to have secure communications from, forwarding a port to the SOCKS proxy on the remote VPS server.  I then connect to the proxy server as localhost:forwarded\_port via the application (browser, IM client, etc), causing the application to direct it's traffic over the SSH port-forward tunnel to the remote SOCKS server, thus gaining the armor of a SSH tunnel.</p><p>Another option is openVPN, but openVPN doesn't play nice with many VPS solutions, and the SSH/SOCKS solution requires less configuration on both the client and server.  Clients running Linux will come with SSH installed, and PuTTY on windows nicely handles port forwarding.</p></htmltext>
<tokenext>Solved this problem years ago : ) For this , I use SSH port forwarding .
I rent a colocated VPS instance ( about $ 20/month ) which runs Debian Linux , the Dante SOCKS daemon , and the current version of openssh .
I then SSH from whatever host I wish to have secure communications from , forwarding a port to the SOCKS proxy on the remote VPS server .
I then connect to the proxy server as localhost : forwarded \ _port via the application ( browser , IM client , etc ) , causing the application to direct it 's traffic over the SSH port-forward tunnel to the remote SOCKS server , thus gaining the armor of a SSH tunnel.Another option is openVPN , but openVPN does n't play nice with many VPS solutions , and the SSH/SOCKS solution requires less configuration on both the client and server .
Clients running Linux will come with SSH installed , and PuTTY on windows nicely handles port forwarding .</tokentext>
<sentencetext>Solved this problem years ago :) For this, I use SSH port forwarding.
I rent a colocated VPS instance (about $20/month) which runs Debian Linux, the Dante SOCKS daemon, and the current version of openssh.
I then SSH from whatever host I wish to have secure communications from, forwarding a port to the SOCKS proxy on the remote VPS server.
I then connect to the proxy server as localhost:forwarded\_port via the application (browser, IM client, etc), causing the application to direct it's traffic over the SSH port-forward tunnel to the remote SOCKS server, thus gaining the armor of a SSH tunnel.Another option is openVPN, but openVPN doesn't play nice with many VPS solutions, and the SSH/SOCKS solution requires less configuration on both the client and server.
Clients running Linux will come with SSH installed, and PuTTY on windows nicely handles port forwarding.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264266</id>
	<title>Re:are you sure you're asking the right question?</title>
	<author>Anonymous</author>
	<datestamp>1259494140000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>why on earth you feel a need to access your investment account from the <b>depths of south america</b>, i'm not sure.</p></div><p>You must be american.<br>-Anonymous Coward</p></div>
	</htmltext>
<tokenext>why on earth you feel a need to access your investment account from the depths of south america , i 'm not sure.You must be american.-Anonymous Coward</tokentext>
<sentencetext>why on earth you feel a need to access your investment account from the depths of south america, i'm not sure.You must be american.-Anonymous Coward
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264068</id>
	<title>Some Advice</title>
	<author>Jahava</author>
	<datestamp>1259492460000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>4</modscore>
	<htmltext>Really, security is best done in layers. The tightest system will be burdensome to operate, so don't take every suggestion you see. Instead, evaluate some basic thoughts, such as:
<ul>
<li> <b>Where will my sensitive data be stored?</b> <p>Ideally, you want this to be a remote machine, either cloud or at home, with your Notebook acting as a gateway.</p></li><li> <b>What am I exposing to attackers?</b> <p>Be aware of potential vectors of attack (mostly wireless / network based, but don't forget physical access) and have a defense against them.</p></li><li> <b>How am I protecting my data?</b> <p>Ideally, everything (and, more practically, everything sensitive) will pass through some pipe that uses the strongest available encryption.</p></li></ul><p>
Here is a general set of guidelines that I use:
</p><ol>
<li> <b>Are you sure you can't have a computer at home? A cheap decade-old server with a constant internet connection? How about trusted family or friends?</b>
<p>As others here have mentioned, having pre-exchanged SSH keys and doing all of your sensitive browsing / business over an SSH-tunneled Proxy to a machine back home will do <i>wonders</i> to help with any inherent wi-fi (or untrustworthy ISP) issues.</p></li><li> <b>Protect In Advance</b>
<p>Get your system hardened <em>before</em> you start your journey. Make sure you're running the latest operating system versions with the latest security patches. Make sure you've configured your firewall and updated your antivirus software. Pick a secure software suite to use for your important actions. For any OS, shut down daemons and services that you're not going to need, as each is a potential point of attack.</p></li><li> <b>If you are worried about viruses on your machine, only let Virtual Machine snapshots connect to a network</b>
<p>Buy a USB-based wireless device (they're only $20 or so). Disable the wireless device on your Notebook's OS. Before you leave, build a <a href="http://www.virtualbox.org/" title="virtualbox.org">Virtual Machine</a> [virtualbox.org] running an OS of your choice (Linux works nicely). Install the OS from scratch, boot it, update it, and then open up a browser instance. Configure it so that the USB wireless device is forwarded directly to the VM, and install its drivers in the VM. Snapshot the Virtual Machine's state. When you're travelling, turn off your Notebook's wireless signal the entire time. If you want to use the Internet, plug in the USB wireless device, start your VM, and use the Internet through it. When you're done, shut down the VM and revert its state to the saved snapshot state that you made before you started your trip. This should help ensure that any viruses you are hit with only survive the duration of that single VM session.</p></li><li> <b>Encrypt your Hard Drive</b>
<p>The options vary based on your OS. Any standard encryption scheme will do - complete drive encryption, partition encryption, filesystem-based encryption, etc. The real goal here is to make sure that neither your private files nor your runtime-generated files (Internet history, cookies, etc.) are accessible.</p></li><li> <b>Store your Keys Externally</b>
<p>Buy some cheap USB stick to store your SSH and/or Hard Drive encryption keys separately, and carry it with you at all times. If you're truly paranoid, you can even encrypt its filesystem with a password-based key for extra protection.</p></li><li> <b>Don't Suspend / Hibernate your Machine</b>
<p>Fully power down your Notebook when you're not using it. If you Suspend / Hibernate, not only will memory-resident viruses etc. still be running when you resume, but decrypted information is accessible in-memory, should it be seized in this state.</p></li><li> <b>Don't Do Anything Stupid / Illegal</b>
<p>There are a lot of threats you can face in another country, but it's wisest to stay away from the government-level threats. Don't give them a reason to seize your laptop and you'll have mitigated many truly serious issues.</p></li></ol></htmltext>
<tokenext>Really , security is best done in layers .
The tightest system will be burdensome to operate , so do n't take every suggestion you see .
Instead , evaluate some basic thoughts , such as : Where will my sensitive data be stored ?
Ideally , you want this to be a remote machine , either cloud or at home , with your Notebook acting as a gateway .
What am I exposing to attackers ?
Be aware of potential vectors of attack ( mostly wireless / network based , but do n't forget physical access ) and have a defense against them .
How am I protecting my data ?
Ideally , everything ( and , more practically , everything sensitive ) will pass through some pipe that uses the strongest available encryption .
Here is a general set of guidelines that I use : Are you sure you ca n't have a computer at home ?
A cheap decade-old server with a constant internet connection ?
How about trusted family or friends ?
As others here have mentioned , having pre-exchanged SSH keys and doing all of your sensitive browsing / business over an SSH-tunneled Proxy to a machine back home will do wonders to help with any inherent wi-fi ( or untrustworthy ISP ) issues .
Protect In Advance Get your system hardened before you start your journey .
Make sure you 're running the latest operating system versions with the latest security patches .
Make sure you 've configured your firewall and updated your antivirus software .
Pick a secure software suite to use for your important actions .
For any OS , shut down daemons and services that you 're not going to need , as each is a potential point of attack .
If you are worried about viruses on your machine , only let Virtual Machine snapshots connect to a network Buy a USB-based wireless device ( they 're only $ 20 or so ) .
Disable the wireless device on your Notebook 's OS .
Before you leave , build a Virtual Machine [ virtualbox.org ] running an OS of your choice ( Linux works nicely ) .
Install the OS from scratch , boot it , update it , and then open up a browser instance .
Configure it so that the USB wireless device is forwarded directly to the VM , and install its drivers in the VM .
Snapshot the Virtual Machine 's state .
When you 're travelling , turn off your Notebook 's wireless signal the entire time .
If you want to use the Internet , plug in the USB wireless device , start your VM , and use the Internet through it .
When you 're done , shut down the VM and revert its state to the saved snapshot state that you made before you started your trip .
This should help ensure that any viruses you are hit with only survive the duration of that single VM session .
Encrypt your Hard Drive The options vary based on your OS .
Any standard encryption scheme will do - complete drive encryption , partition encryption , filesystem-based encryption , etc .
The real goal here is to make sure that neither your private files nor your runtime-generated files ( Internet history , cookies , etc .
) are accessible .
Store your Keys Externally Buy some cheap USB stick to store your SSH and/or Hard Drive encryption keys separately , and carry it with you at all times .
If you 're truly paranoid , you can even encrypt its filesystem with a password-based key for extra protection .
Do n't Suspend / Hibernate your Machine Fully power down your Notebook when you 're not using it .
If you Suspend / Hibernate , not only will memory-resident viruses etc .
still be running when you resume , but decrypted information is accessible in-memory , should it be seized in this state .
Do n't Do Anything Stupid / Illegal There are a lot of threats you can face in another country , but it 's wisest to stay away from the government-level threats .
Do n't give them a reason to seize your laptop and you 'll have mitigated many truly serious issues .</tokentext>
<sentencetext>Really, security is best done in layers.
The tightest system will be burdensome to operate, so don't take every suggestion you see.
Instead, evaluate some basic thoughts, such as:

 Where will my sensitive data be stored?
Ideally, you want this to be a remote machine, either cloud or at home, with your Notebook acting as a gateway.
What am I exposing to attackers?
Be aware of potential vectors of attack (mostly wireless / network based, but don't forget physical access) and have a defense against them.
How am I protecting my data?
Ideally, everything (and, more practically, everything sensitive) will pass through some pipe that uses the strongest available encryption.
Here is a general set of guidelines that I use:

 Are you sure you can't have a computer at home?
A cheap decade-old server with a constant internet connection?
How about trusted family or friends?
As others here have mentioned, having pre-exchanged SSH keys and doing all of your sensitive browsing / business over an SSH-tunneled Proxy to a machine back home will do wonders to help with any inherent wi-fi (or untrustworthy ISP) issues.
Protect In Advance
Get your system hardened before you start your journey.
Make sure you're running the latest operating system versions with the latest security patches.
Make sure you've configured your firewall and updated your antivirus software.
Pick a secure software suite to use for your important actions.
For any OS, shut down daemons and services that you're not going to need, as each is a potential point of attack.
If you are worried about viruses on your machine, only let Virtual Machine snapshots connect to a network
Buy a USB-based wireless device (they're only $20 or so).
Disable the wireless device on your Notebook's OS.
Before you leave, build a Virtual Machine [virtualbox.org] running an OS of your choice (Linux works nicely).
Install the OS from scratch, boot it, update it, and then open up a browser instance.
Configure it so that the USB wireless device is forwarded directly to the VM, and install its drivers in the VM.
Snapshot the Virtual Machine's state.
When you're travelling, turn off your Notebook's wireless signal the entire time.
If you want to use the Internet, plug in the USB wireless device, start your VM, and use the Internet through it.
When you're done, shut down the VM and revert its state to the saved snapshot state that you made before you started your trip.
This should help ensure that any viruses you are hit with only survive the duration of that single VM session.
Encrypt your Hard Drive
The options vary based on your OS.
Any standard encryption scheme will do - complete drive encryption, partition encryption, filesystem-based encryption, etc.
The real goal here is to make sure that neither your private files nor your runtime-generated files (Internet history, cookies, etc.
) are accessible.
Store your Keys Externally
Buy some cheap USB stick to store your SSH and/or Hard Drive encryption keys separately, and carry it with you at all times.
If you're truly paranoid, you can even encrypt its filesystem with a password-based key for extra protection.
Don't Suspend / Hibernate your Machine
Fully power down your Notebook when you're not using it.
If you Suspend / Hibernate, not only will memory-resident viruses etc.
still be running when you resume, but decrypted information is accessible in-memory, should it be seized in this state.
Don't Do Anything Stupid / Illegal
There are a lot of threats you can face in another country, but it's wisest to stay away from the government-level threats.
Don't give them a reason to seize your laptop and you'll have mitigated many truly serious issues.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263968</id>
	<title>This "eithier/or" advice is pretty silly</title>
	<author>IANAAC</author>
	<datestamp>1259491440000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext>Much like the rest of life, it's not simply a "do this, don't do that" thing.
<p>
I see nothing wrong with traveling with a netbook - they weigh next to nothing - or even better, something like a Nokia N800/N810.  There are plenty of down times where I can see wanting to check email, get in touch with family, whatever.
</p><p>
Having a piece of technology with you while traveling certainly doesn't prevent you from experiencing different cultures and peoples.</p></htmltext>
<tokenext>Much like the rest of life , it 's not simply a " do this , do n't do that " thing .
I see nothing wrong with traveling with a netbook - they weigh next to nothing - or even better , something like a Nokia N800/N810 .
There are plenty of down times where I can see wanting to check email , get in touch with family , whatever .
Having a piece of technology with you while traveling certainly does n't prevent you from experiencing different cultures and peoples .</tokentext>
<sentencetext>Much like the rest of life, it's not simply a "do this, don't do that" thing.
I see nothing wrong with traveling with a netbook - they weigh next to nothing - or even better, something like a Nokia N800/N810.
There are plenty of down times where I can see wanting to check email, get in touch with family, whatever.
Having a piece of technology with you while traveling certainly doesn't prevent you from experiencing different cultures and peoples.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264344</id>
	<title>Re:are you sure you're asking the right question?</title>
	<author>Anonymous</author>
	<datestamp>1259494740000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>In some cultures it's customary to relieve the rich foreigner of their valuables. Greet the opportunity to become a part of their culture with open arms and let go your western notion of possession. Give them the laptop before they have to ask for it.</p></htmltext>
<tokenext>In some cultures it 's customary to relieve the rich foreigner of their valuables .
Greet the opportunity to become a part of their culture with open arms and let go your western notion of possession .
Give them the laptop before they have to ask for it .</tokentext>
<sentencetext>In some cultures it's customary to relieve the rich foreigner of their valuables.
Greet the opportunity to become a part of their culture with open arms and let go your western notion of possession.
Give them the laptop before they have to ask for it.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264742</id>
	<title>Xerobank is a quick solution (but expensive)</title>
	<author>Anonymous</author>
	<datestamp>1259498400000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>If you can't set up your own VPN Xerobank operate one of the most secure VPN's in the world through openVPN and they give you everything you need to just install and connect to it (on Windows and Linux too I believe), the downside is you're going to have to pay (about $25 a month as I recall) to use it, go to Xerobank.com if you want to know more.</p></htmltext>
<tokenext>If you ca n't set up your own VPN Xerobank operate one of the most secure VPN 's in the world through openVPN and they give you everything you need to just install and connect to it ( on Windows and Linux too I believe ) , the downside is you 're going to have to pay ( about $ 25 a month as I recall ) to use it , go to Xerobank.com if you want to know more .</tokentext>
<sentencetext>If you can't set up your own VPN Xerobank operate one of the most secure VPN's in the world through openVPN and they give you everything you need to just install and connect to it (on Windows and Linux too I believe), the downside is you're going to have to pay (about $25 a month as I recall) to use it, go to Xerobank.com if you want to know more.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263964</id>
	<title>Re:are you sure you're asking the right question?</title>
	<author>Hadlock</author>
	<datestamp>1259491440000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>4</modscore>
	<htmltext><p>Going traveling for 5 weeks in south america as well. Just bought a netbook. Every single person I've talked to says "blog about it! we want to see your pictures!" -- the truth of the matter is that a netbook is pretty damn tiny and takes up little space (2800 cu in pack) and definitely qualifies as "personal gear". Might as well take it along. Makes backing up my digital pics easier, and makes it easier to check the news (you never know what's going to happen next in venezuela) and communicate with couch surfers. You don't NEED one, but it damn well makes things easier in a pinch.</p></htmltext>
<tokenext>Going traveling for 5 weeks in south america as well .
Just bought a netbook .
Every single person I 've talked to says " blog about it !
we want to see your pictures !
" -- the truth of the matter is that a netbook is pretty damn tiny and takes up little space ( 2800 cu in pack ) and definitely qualifies as " personal gear " .
Might as well take it along .
Makes backing up my digital pics easier , and makes it easier to check the news ( you never know what 's going to happen next in venezuela ) and communicate with couch surfers .
You do n't NEED one , but it damn well makes things easier in a pinch .</tokentext>
<sentencetext>Going traveling for 5 weeks in south america as well.
Just bought a netbook.
Every single person I've talked to says "blog about it!
we want to see your pictures!
" -- the truth of the matter is that a netbook is pretty damn tiny and takes up little space (2800 cu in pack) and definitely qualifies as "personal gear".
Might as well take it along.
Makes backing up my digital pics easier, and makes it easier to check the news (you never know what's going to happen next in venezuela) and communicate with couch surfers.
You don't NEED one, but it damn well makes things easier in a pinch.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30269530</id>
	<title>Re:are you sure you're asking the right question?</title>
	<author>Angostura</author>
	<datestamp>1259593680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Probably <b>not</b> what you want to do - but when I've been in a similar position to you, I've travelled using an iPod Touch. It's lightweight, discreet and not prone to the more common malware. It's fine for online banking and brief e-mails.</p><p>The only problem it doesn't solve is the photo storage one. I've never for it too difficult in the larger towns to find photoshops that will dump to DVD for you.</p><p>Anyway  have fun it sounds like a great trip.</p></htmltext>
<tokenext>Probably not what you want to do - but when I 've been in a similar position to you , I 've travelled using an iPod Touch .
It 's lightweight , discreet and not prone to the more common malware .
It 's fine for online banking and brief e-mails.The only problem it does n't solve is the photo storage one .
I 've never for it too difficult in the larger towns to find photoshops that will dump to DVD for you.Anyway have fun it sounds like a great trip .</tokentext>
<sentencetext>Probably not what you want to do - but when I've been in a similar position to you, I've travelled using an iPod Touch.
It's lightweight, discreet and not prone to the more common malware.
It's fine for online banking and brief e-mails.The only problem it doesn't solve is the photo storage one.
I've never for it too difficult in the larger towns to find photoshops that will dump to DVD for you.Anyway  have fun it sounds like a great trip.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265614</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264130</id>
	<title>Re:are you sure you're asking the right question?</title>
	<author>Anonymous</author>
	<datestamp>1259493060000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>Backpacking through south america doesn't mean OP is spending 5 months in the middle of the Amazon. Besides, how does internet access limit it? Oh, right, it doesn't. And phones aren't technology? Is this slashdot or some sort of faux-luddite assembly.</p></htmltext>
<tokenext>Backpacking through south america does n't mean OP is spending 5 months in the middle of the Amazon .
Besides , how does internet access limit it ?
Oh , right , it does n't .
And phones are n't technology ?
Is this slashdot or some sort of faux-luddite assembly .</tokentext>
<sentencetext>Backpacking through south america doesn't mean OP is spending 5 months in the middle of the Amazon.
Besides, how does internet access limit it?
Oh, right, it doesn't.
And phones aren't technology?
Is this slashdot or some sort of faux-luddite assembly.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264074</id>
	<title>Uhh... travel in remote areas?</title>
	<author>Anonymous</author>
	<datestamp>1259492520000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>So ditch the netbook, PDA, cellphone, etc.<br>There is thing called an airmail letter.. on thin blue paper.  gets there eventually (typically within a week).</p><p>Or, if you are SO addicted to the crackberry.. Buy a 2 1/2ton truck outfitted with a satellite earth station and diesel generator (diesel is easier to come by in remote areas), rent some single channel per carrier (SCPC) time on a geo transponder and maintain your connectivity in the style to which you are accustomed.</p><p>Part of the adventure of travel (as opposed to business travel) is being disconnected or randomly connected.</p></htmltext>
<tokenext>So ditch the netbook , PDA , cellphone , etc.There is thing called an airmail letter.. on thin blue paper .
gets there eventually ( typically within a week ) .Or , if you are SO addicted to the crackberry.. Buy a 2 1/2ton truck outfitted with a satellite earth station and diesel generator ( diesel is easier to come by in remote areas ) , rent some single channel per carrier ( SCPC ) time on a geo transponder and maintain your connectivity in the style to which you are accustomed.Part of the adventure of travel ( as opposed to business travel ) is being disconnected or randomly connected .</tokentext>
<sentencetext>So ditch the netbook, PDA, cellphone, etc.There is thing called an airmail letter.. on thin blue paper.
gets there eventually (typically within a week).Or, if you are SO addicted to the crackberry.. Buy a 2 1/2ton truck outfitted with a satellite earth station and diesel generator (diesel is easier to come by in remote areas), rent some single channel per carrier (SCPC) time on a geo transponder and maintain your connectivity in the style to which you are accustomed.Part of the adventure of travel (as opposed to business travel) is being disconnected or randomly connected.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265088</id>
	<title>Re:SSH &amp; SOCKS Proxy</title>
	<author>Anonymous</author>
	<datestamp>1259501760000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext>I find all this rather exotic advice a little silly.  The data security risks you will face in South America are in no way different than what you are exposed to surfing the web from your local coffee shop, or taking your netbook to work every day on the subway.
<p>
Your biggest security concerns while on travel should be more along the lines of getting your immunizations up to date and avoiding staying out after dark.</p></htmltext>
<tokenext>I find all this rather exotic advice a little silly .
The data security risks you will face in South America are in no way different than what you are exposed to surfing the web from your local coffee shop , or taking your netbook to work every day on the subway .
Your biggest security concerns while on travel should be more along the lines of getting your immunizations up to date and avoiding staying out after dark .</tokentext>
<sentencetext>I find all this rather exotic advice a little silly.
The data security risks you will face in South America are in no way different than what you are exposed to surfing the web from your local coffee shop, or taking your netbook to work every day on the subway.
Your biggest security concerns while on travel should be more along the lines of getting your immunizations up to date and avoiding staying out after dark.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263786</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265854</id>
	<title>Give power of attorney to a trusted person</title>
	<author>watergeus</author>
	<datestamp>1259509980000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>...and do your bank-business with this person via email or telephone.</p><p>And yes, you should keep notes of all the expenses you make with your credit-card and communicate this with your trusted person. A debit-card and ATM-machines work better, most of the times. (Mastercard or Visa). Use only ATM-machines in banks during office-hours.</p><p>If you want to be connected:<br>In most of the Latin countries you can get prepaid "Banda Hancha". Most of them work with a Huawei-modem.</p><p>"Keep in mind that many places have very poor bandwidth and latency."</p><p>I don't know what this has to do with security of your data.</p><p>It is also not my personal experience. (I live in rural South Chile). To get a new release of my OS takes 24 hours on broadband. If I go to the next village, I'm ready in an hour by hooking up my laptop to the Internet-Cafe infrastructure.</p><p>If you want to keep a blog, do it via <a href="http://www.posterous.com./" title="www.posterous.com" rel="nofollow">http://www.posterous.com./</a> [www.posterous.com] Blogging via email, perfect if you don't know when you will hook up to the Internet again. Of course you use an email-client.</p><p>Don't let them steal your netbook but realize it can happen.</p></htmltext>
<tokenext>...and do your bank-business with this person via email or telephone.And yes , you should keep notes of all the expenses you make with your credit-card and communicate this with your trusted person .
A debit-card and ATM-machines work better , most of the times .
( Mastercard or Visa ) .
Use only ATM-machines in banks during office-hours.If you want to be connected : In most of the Latin countries you can get prepaid " Banda Hancha " .
Most of them work with a Huawei-modem .
" Keep in mind that many places have very poor bandwidth and latency .
" I do n't know what this has to do with security of your data.It is also not my personal experience .
( I live in rural South Chile ) .
To get a new release of my OS takes 24 hours on broadband .
If I go to the next village , I 'm ready in an hour by hooking up my laptop to the Internet-Cafe infrastructure.If you want to keep a blog , do it via http : //www.posterous.com./ [ www.posterous.com ] Blogging via email , perfect if you do n't know when you will hook up to the Internet again .
Of course you use an email-client.Do n't let them steal your netbook but realize it can happen .</tokentext>
<sentencetext>...and do your bank-business with this person via email or telephone.And yes, you should keep notes of all the expenses you make with your credit-card and communicate this with your trusted person.
A debit-card and ATM-machines work better, most of the times.
(Mastercard or Visa).
Use only ATM-machines in banks during office-hours.If you want to be connected:In most of the Latin countries you can get prepaid "Banda Hancha".
Most of them work with a Huawei-modem.
"Keep in mind that many places have very poor bandwidth and latency.
"I don't know what this has to do with security of your data.It is also not my personal experience.
(I live in rural South Chile).
To get a new release of my OS takes 24 hours on broadband.
If I go to the next village, I'm ready in an hour by hooking up my laptop to the Internet-Cafe infrastructure.If you want to keep a blog, do it via http://www.posterous.com./ [www.posterous.com] Blogging via email, perfect if you don't know when you will hook up to the Internet again.
Of course you use an email-client.Don't let them steal your netbook but realize it can happen.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264866</id>
	<title>Something to check on</title>
	<author>MSesow</author>
	<datestamp>1259499540000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext>You should check to make sure that any encryption software you use or bring is legal in the areas you will be traveling in.  I know that the legal standards are different between, for example, the US and France (or it was last time I read about it).  I have no idea about specifics of different countries, but it is something that you should know before you set out.  And not just the laws, but also look into what to expect when you go through checkpoints - I have no idea if I am actually required to reveal an encrypted volume on my laptop when going through customs coming into the US.  And what do I do if the person checking says that they require all of my passwords?  (My only thought here would be to make a set of temporary passwords while going through, and then to change them all back after)
Sorry I do not have any helpful links.  I figure that the time I could spend looking would be a good bit more than the time spent by the person who knows what country to actually look at.
Hope it helps.</htmltext>
<tokenext>You should check to make sure that any encryption software you use or bring is legal in the areas you will be traveling in .
I know that the legal standards are different between , for example , the US and France ( or it was last time I read about it ) .
I have no idea about specifics of different countries , but it is something that you should know before you set out .
And not just the laws , but also look into what to expect when you go through checkpoints - I have no idea if I am actually required to reveal an encrypted volume on my laptop when going through customs coming into the US .
And what do I do if the person checking says that they require all of my passwords ?
( My only thought here would be to make a set of temporary passwords while going through , and then to change them all back after ) Sorry I do not have any helpful links .
I figure that the time I could spend looking would be a good bit more than the time spent by the person who knows what country to actually look at .
Hope it helps .</tokentext>
<sentencetext>You should check to make sure that any encryption software you use or bring is legal in the areas you will be traveling in.
I know that the legal standards are different between, for example, the US and France (or it was last time I read about it).
I have no idea about specifics of different countries, but it is something that you should know before you set out.
And not just the laws, but also look into what to expect when you go through checkpoints - I have no idea if I am actually required to reveal an encrypted volume on my laptop when going through customs coming into the US.
And what do I do if the person checking says that they require all of my passwords?
(My only thought here would be to make a set of temporary passwords while going through, and then to change them all back after)
Sorry I do not have any helpful links.
I figure that the time I could spend looking would be a good bit more than the time spent by the person who knows what country to actually look at.
Hope it helps.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265166</id>
	<title>Full Disk Encryption</title>
	<author>at.drinian</author>
	<datestamp>1259502720000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>It's quite easy to set up, using the Ubuntu alternate install cd.</htmltext>
<tokenext>It 's quite easy to set up , using the Ubuntu alternate install cd .</tokentext>
<sentencetext>It's quite easy to set up, using the Ubuntu alternate install cd.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265878</id>
	<title>Re:Encrypt your netbook, park data in the cloud</title>
	<author>bintech</author>
	<datestamp>1259510100000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>In a recent podcast from pauldotcom.com the security touched upon this subject a one of the more popular methods of now (amongst that group) seemed to be to use:
<br>
<br>
- Truecrypt (http://www.truecrypt.org/) to encrypt your data.<br>
- Keepass (http://keepass.info/download.html) for password management<br>
- Dropbox (https://www.dropbox.com/) to keep your data passwords secured in the cloud.<br>
<br>
Truecrypt and keepass both support strong algorithms for management of data and dropbox allows you to keep your info synch'd no matter where you are.<br>
<br>
And you can stay flexible with your OS of choice.<nobr> <wbr></nobr>;)</htmltext>
<tokenext>In a recent podcast from pauldotcom.com the security touched upon this subject a one of the more popular methods of now ( amongst that group ) seemed to be to use : - Truecrypt ( http : //www.truecrypt.org/ ) to encrypt your data .
- Keepass ( http : //keepass.info/download.html ) for password management - Dropbox ( https : //www.dropbox.com/ ) to keep your data passwords secured in the cloud .
Truecrypt and keepass both support strong algorithms for management of data and dropbox allows you to keep your info synch 'd no matter where you are .
And you can stay flexible with your OS of choice .
; )</tokentext>
<sentencetext>In a recent podcast from pauldotcom.com the security touched upon this subject a one of the more popular methods of now (amongst that group) seemed to be to use:


- Truecrypt (http://www.truecrypt.org/) to encrypt your data.
- Keepass (http://keepass.info/download.html) for password management
- Dropbox (https://www.dropbox.com/) to keep your data passwords secured in the cloud.
Truecrypt and keepass both support strong algorithms for management of data and dropbox allows you to keep your info synch'd no matter where you are.
And you can stay flexible with your OS of choice.
;)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263846</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268140</id>
	<title>Re:Evil is behind every corner</title>
	<author>Aceticon</author>
	<datestamp>1259576220000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>while I don't advocate writing your bank details in 10-foot high letters of fire on Macchu Picchu</p></div></blockquote><p>If he managed to write his bank details in 10-foot high letters of fire in Machu Picchu he would either be treated as god by the local Inca-descendants, throw to jail by the Peruvian authorities (for desecrating a World Heritage Site) or both. Having his bank account stolen would be the least of his problems.</p></div>
	</htmltext>
<tokenext>while I do n't advocate writing your bank details in 10-foot high letters of fire on Macchu PicchuIf he managed to write his bank details in 10-foot high letters of fire in Machu Picchu he would either be treated as god by the local Inca-descendants , throw to jail by the Peruvian authorities ( for desecrating a World Heritage Site ) or both .
Having his bank account stolen would be the least of his problems .</tokentext>
<sentencetext>while I don't advocate writing your bank details in 10-foot high letters of fire on Macchu PicchuIf he managed to write his bank details in 10-foot high letters of fire in Machu Picchu he would either be treated as god by the local Inca-descendants, throw to jail by the Peruvian authorities (for desecrating a World Heritage Site) or both.
Having his bank account stolen would be the least of his problems.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264094</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264108</id>
	<title>Anonymous Coward</title>
	<author>Anonymous</author>
	<datestamp>1259492760000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Use cash, it's South America.</p></htmltext>
<tokenext>Use cash , it 's South America .</tokentext>
<sentencetext>Use cash, it's South America.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264200</id>
	<title>Re:SSH &amp; SOCKS Proxy</title>
	<author>emj</author>
	<datestamp>1259493720000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>5</modscore>
	<htmltext>Remember to tunnel the DNS requests over the SSH connection as well, in firefox after setting up Socks5 proxy goto <em>about:config</em>. Change this to true:

<tt>network.proxy.socks\_remote\_dns</tt></htmltext>
<tokenext>Remember to tunnel the DNS requests over the SSH connection as well , in firefox after setting up Socks5 proxy goto about : config .
Change this to true : network.proxy.socks \ _remote \ _dns</tokentext>
<sentencetext>Remember to tunnel the DNS requests over the SSH connection as well, in firefox after setting up Socks5 proxy goto about:config.
Change this to true:

network.proxy.socks\_remote\_dns</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263786</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30269342</id>
	<title>Re:wrong question</title>
	<author>karlssberg</author>
	<datestamp>1259592300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>You are so right.  I'm a Brit living in Sao Paulo Brazil, and my I can tell you that South America can be a very dangerous place.  Being western tourist with a laptop and NOT being robbed/kidnapped after flashing it around at every wifi hotspot means that you've been a lucky SOB.  Only last week a coffee shop near here was held up at gunpoint and all the customers robbed of all their laptops.</htmltext>
<tokenext>You are so right .
I 'm a Brit living in Sao Paulo Brazil , and my I can tell you that South America can be a very dangerous place .
Being western tourist with a laptop and NOT being robbed/kidnapped after flashing it around at every wifi hotspot means that you 've been a lucky SOB .
Only last week a coffee shop near here was held up at gunpoint and all the customers robbed of all their laptops .</tokentext>
<sentencetext>You are so right.
I'm a Brit living in Sao Paulo Brazil, and my I can tell you that South America can be a very dangerous place.
Being western tourist with a laptop and NOT being robbed/kidnapped after flashing it around at every wifi hotspot means that you've been a lucky SOB.
Only last week a coffee shop near here was held up at gunpoint and all the customers robbed of all their laptops.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264680</id>
	<title>hotspotshield</title>
	<author>samsonites101</author>
	<datestamp>1259497680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I always use hotspot shield if I'm not using my server at home as a gateway.  Just search it on google, it's free unlike other VPN software.  The only thing I don't like about it is it doesn't run on linux.  So, the only free solution for linux is using your own server, but otherwise, just use hotspot shield</htmltext>
<tokenext>I always use hotspot shield if I 'm not using my server at home as a gateway .
Just search it on google , it 's free unlike other VPN software .
The only thing I do n't like about it is it does n't run on linux .
So , the only free solution for linux is using your own server , but otherwise , just use hotspot shield</tokentext>
<sentencetext>I always use hotspot shield if I'm not using my server at home as a gateway.
Just search it on google, it's free unlike other VPN software.
The only thing I don't like about it is it doesn't run on linux.
So, the only free solution for linux is using your own server, but otherwise, just use hotspot shield</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264718</id>
	<title>If you are in the UK</title>
	<author>Anonymous</author>
	<datestamp>1259498160000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>i use cahoot.com to do my banking, where i think it could come in handy is that when logging in to your account as well as username and secret answer type question, instead of typing your password, you manually select 2 specified letters from your password from a drop down list. Assuming you are going to be moving around a lot, and if you use a long password, the chances that anyone snooping would be able to pick up the required bit of your password is unlikely.</p></htmltext>
<tokenext>i use cahoot.com to do my banking , where i think it could come in handy is that when logging in to your account as well as username and secret answer type question , instead of typing your password , you manually select 2 specified letters from your password from a drop down list .
Assuming you are going to be moving around a lot , and if you use a long password , the chances that anyone snooping would be able to pick up the required bit of your password is unlikely .</tokentext>
<sentencetext>i use cahoot.com to do my banking, where i think it could come in handy is that when logging in to your account as well as username and secret answer type question, instead of typing your password, you manually select 2 specified letters from your password from a drop down list.
Assuming you are going to be moving around a lot, and if you use a long password, the chances that anyone snooping would be able to pick up the required bit of your password is unlikely.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270266</id>
	<title>portable satellite</title>
	<author>Anonymous</author>
	<datestamp>1259598540000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Get a portable satellite connection.  A little expensive at $500 up front and $50/month, but may be worth it if you really want the most secure connectivity.</p></htmltext>
<tokenext>Get a portable satellite connection .
A little expensive at $ 500 up front and $ 50/month , but may be worth it if you really want the most secure connectivity .</tokentext>
<sentencetext>Get a portable satellite connection.
A little expensive at $500 up front and $50/month, but may be worth it if you really want the most secure connectivity.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265610</id>
	<title>Re:Good starting point</title>
	<author>Anonymous</author>
	<datestamp>1259508300000</datestamp>
	<modclass>Redundant</modclass>
	<modscore>0</modscore>
	<htmltext><p><i>For an even slightly more robust machine, use Windows 7 Ultimate with BitLocker and a strong password for your logon. </i></p><p>I seem to remember speculation/rumor/unsubstantiated claims awhile back regarding bitlocker having a second way to unlock the data but only the public key was seen, no one knew specifically who had the private key. (govt/ms?)  Was this ever either put to rest or proven?</p></htmltext>
<tokenext>For an even slightly more robust machine , use Windows 7 Ultimate with BitLocker and a strong password for your logon .
I seem to remember speculation/rumor/unsubstantiated claims awhile back regarding bitlocker having a second way to unlock the data but only the public key was seen , no one knew specifically who had the private key .
( govt/ms ? ) Was this ever either put to rest or proven ?</tokentext>
<sentencetext>For an even slightly more robust machine, use Windows 7 Ultimate with BitLocker and a strong password for your logon.
I seem to remember speculation/rumor/unsubstantiated claims awhile back regarding bitlocker having a second way to unlock the data but only the public key was seen, no one knew specifically who had the private key.
(govt/ms?)  Was this ever either put to rest or proven?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263924</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30273106</id>
	<title>Re:dm-crypt</title>
	<author>JayAEU</author>
	<datestamp>1259612940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Yes, but there's also Truecrypt, which is available for all major platforms: <a href="http://www.truecrypt.org/downloads" title="truecrypt.org">http://www.truecrypt.org/downloads</a> [truecrypt.org]</p><p>It's really easy to set up, so nobody should leave their mobile computer unencrypted.</p></htmltext>
<tokenext>Yes , but there 's also Truecrypt , which is available for all major platforms : http : //www.truecrypt.org/downloads [ truecrypt.org ] It 's really easy to set up , so nobody should leave their mobile computer unencrypted .</tokentext>
<sentencetext>Yes, but there's also Truecrypt, which is available for all major platforms: http://www.truecrypt.org/downloads [truecrypt.org]It's really easy to set up, so nobody should leave their mobile computer unencrypted.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267610</id>
	<title>Re:wrong question</title>
	<author>Anonymous</author>
	<datestamp>1259612640000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>+1</p><p>Seriously. The OP is focusing on the wrong security issues. More likely than not your netbook is gonna get stolen, not hacked. Concentrate on encrypting the whole OS and storing personal data in the cloud.</p></htmltext>
<tokenext>+ 1Seriously .
The OP is focusing on the wrong security issues .
More likely than not your netbook is gon na get stolen , not hacked .
Concentrate on encrypting the whole OS and storing personal data in the cloud .</tokentext>
<sentencetext>+1Seriously.
The OP is focusing on the wrong security issues.
More likely than not your netbook is gonna get stolen, not hacked.
Concentrate on encrypting the whole OS and storing personal data in the cloud.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263912</id>
	<title>Re:are you sure you're asking the right question?</title>
	<author>kjart</author>
	<datestamp>1259490780000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>4</modscore>
	<htmltext><blockquote><div><p>the world won't end if you can't access slashdot and your email for a few months</p></div></blockquote><p>Check the time mentioned in the summary. I would normally agree with you, and don't typically even use internet cafes while gone for a few weeks. However, I can't imagine being totally unconnected to email for a whole year. Yes, I could do without Slashdot, but just checking the news back home and following up with friends and family would be mandatory.</p></div>
	</htmltext>
<tokenext>the world wo n't end if you ca n't access slashdot and your email for a few monthsCheck the time mentioned in the summary .
I would normally agree with you , and do n't typically even use internet cafes while gone for a few weeks .
However , I ca n't imagine being totally unconnected to email for a whole year .
Yes , I could do without Slashdot , but just checking the news back home and following up with friends and family would be mandatory .</tokentext>
<sentencetext>the world won't end if you can't access slashdot and your email for a few monthsCheck the time mentioned in the summary.
I would normally agree with you, and don't typically even use internet cafes while gone for a few weeks.
However, I can't imagine being totally unconnected to email for a whole year.
Yes, I could do without Slashdot, but just checking the news back home and following up with friends and family would be mandatory.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264690</id>
	<title>Select a Bank with decent Security</title>
	<author>markus\_baertschi</author>
	<datestamp>1259497860000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Make sure that your bank uses strong authentication (bejond userid/password) when you access your account. Any strong authentication mechanism (securid token , one-time token, etc.). All Swiss banks provide/require such a method.
</p><p>I don't know about todays but only some years ago most US banks used vanilla useid/password combinations. With those one can eavesdrop on the line (or just watching you at the internet cafe). That's not safe. If that still is the case with your bank I'd change.
</p><p>Most other things are either complicated and not practical or don't help safety much in real life.
</p><p> <i>Markus</i></p></htmltext>
<tokenext>Make sure that your bank uses strong authentication ( bejond userid/password ) when you access your account .
Any strong authentication mechanism ( securid token , one-time token , etc. ) .
All Swiss banks provide/require such a method .
I do n't know about todays but only some years ago most US banks used vanilla useid/password combinations .
With those one can eavesdrop on the line ( or just watching you at the internet cafe ) .
That 's not safe .
If that still is the case with your bank I 'd change .
Most other things are either complicated and not practical or do n't help safety much in real life .
Markus</tokentext>
<sentencetext>Make sure that your bank uses strong authentication (bejond userid/password) when you access your account.
Any strong authentication mechanism (securid token , one-time token, etc.).
All Swiss banks provide/require such a method.
I don't know about todays but only some years ago most US banks used vanilla useid/password combinations.
With those one can eavesdrop on the line (or just watching you at the internet cafe).
That's not safe.
If that still is the case with your bank I'd change.
Most other things are either complicated and not practical or don't help safety much in real life.
Markus</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263936</id>
	<title>Really</title>
	<author>copponex</author>
	<datestamp>1259490960000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>He should buy some decent fraud/identity theft insurance and just use a reasonably secured distro. All the anguish spent on perfect security is for naught anyway - if someone wants to rob you down there, they're more likely to beat you over the head or hold you hostage than hack into your computer.</p><p>Oblig. XKCD: <a href="http://xkcd.com/538/" title="xkcd.com">538</a> [xkcd.com]</p></htmltext>
<tokenext>He should buy some decent fraud/identity theft insurance and just use a reasonably secured distro .
All the anguish spent on perfect security is for naught anyway - if someone wants to rob you down there , they 're more likely to beat you over the head or hold you hostage than hack into your computer.Oblig .
XKCD : 538 [ xkcd.com ]</tokentext>
<sentencetext>He should buy some decent fraud/identity theft insurance and just use a reasonably secured distro.
All the anguish spent on perfect security is for naught anyway - if someone wants to rob you down there, they're more likely to beat you over the head or hold you hostage than hack into your computer.Oblig.
XKCD: 538 [xkcd.com]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264382</id>
	<title>Rely primarily on Wi-Fi hotspots?</title>
	<author>Anonymous</author>
	<datestamp>1259494980000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>You actually think there's wi-fi hotspots everywhere on the planet?<nobr> <wbr></nobr>/lol</p></htmltext>
<tokenext>You actually think there 's wi-fi hotspots everywhere on the planet ?
/lol</tokentext>
<sentencetext>You actually think there's wi-fi hotspots everywhere on the planet?
/lol</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265434</id>
	<title>Re:wrong question</title>
	<author>Anonymous</author>
	<datestamp>1259506500000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>"Dame los lentes"</p></htmltext>
<tokenext>" Dame los lentes "</tokentext>
<sentencetext>"Dame los lentes"</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264824</id>
	<title>KeePassX</title>
	<author>horza</author>
	<datestamp>1259499120000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>In addition to the above suggestions of a VPN and Truecrypt/Luks, keeping your passwords on a USB key using KeepPass/KeePassX is also a good idea.</p><p>Phillip.</p></htmltext>
<tokenext>In addition to the above suggestions of a VPN and Truecrypt/Luks , keeping your passwords on a USB key using KeepPass/KeePassX is also a good idea.Phillip .</tokentext>
<sentencetext>In addition to the above suggestions of a VPN and Truecrypt/Luks, keeping your passwords on a USB key using KeepPass/KeePassX is also a good idea.Phillip.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264180</id>
	<title>Re:dm-crypt</title>
	<author>grouchyDude</author>
	<datestamp>1259493540000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>Great idea if you don't do much.  If you have multiple banks or other equivalently-important accounts then it's very tricky.  If you use long secure non-algorithmic passwords and won't be able to visit the bank to re-init them, the keeping them recorded in encrypted form would be my choice.  That way if you can't recall them all, or briefly forget one, you can recover them so long as you remember at least the master password.</p></htmltext>
<tokenext>Great idea if you do n't do much .
If you have multiple banks or other equivalently-important accounts then it 's very tricky .
If you use long secure non-algorithmic passwords and wo n't be able to visit the bank to re-init them , the keeping them recorded in encrypted form would be my choice .
That way if you ca n't recall them all , or briefly forget one , you can recover them so long as you remember at least the master password .</tokentext>
<sentencetext>Great idea if you don't do much.
If you have multiple banks or other equivalently-important accounts then it's very tricky.
If you use long secure non-algorithmic passwords and won't be able to visit the bank to re-init them, the keeping them recorded in encrypted form would be my choice.
That way if you can't recall them all, or briefly forget one, you can recover them so long as you remember at least the master password.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263888</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267974</id>
	<title>Encrypt your data</title>
	<author>Anonymous</author>
	<datestamp>1259574240000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Besides Truecrypt (www.truecrypt.org) I also find Keepass (keepass.info) to be a very handy utility.</p></htmltext>
<tokenext>Besides Truecrypt ( www.truecrypt.org ) I also find Keepass ( keepass.info ) to be a very handy utility .</tokentext>
<sentencetext>Besides Truecrypt (www.truecrypt.org) I also find Keepass (keepass.info) to be a very handy utility.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263824</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264972</id>
	<title>Most of this stuff is overkill....</title>
	<author>kenblakely</author>
	<datestamp>1259500500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Jeez Louise - it's really not that hard.  Staying secure while travelling is really pretty simple:

1. Carry your own machine - an Apple if possible, if not, some flavor of Linux. If you're too cheap for an Apple and not savvy enuf for Linux, Windows is OK. If you use anyone else's hardware, assume it is keylogged and behave accordingly. Have a backup device like an iPod Touch.

2. Always enable SSL. When doing anything even remotely risky, ensure SSL is enabled and is being used

3. Ensure your OS / browser / firewall / virus scanner is updated. Virus-scan daily.

4. Ensure you are using a software firewall / virus scanner, and that they are enabled

5. Do not use Internet Explorer

6. Use TrueCrypt to create an encrypted volume in an unobtrusive place, named unobtrusively. Use this volume to store things you need to store that you don't wanna put on Google Docs. Why not use whole drive encryption? Because having your laptop siezed and imaged at borders is not unknown. If the investigators see that your drive is encrypted, they will attempt to force you to divulge the passphrase. In many cases, local laws make it illegal for you to refuse. A TrueCrypt volume of 50MB or so named HiDefPortraitSlideshow.ppt will prolly go unnoticed.

That's pretty much it. No VPN, no VLC, no virtual machine, no thumb-drive based Linux install, no LiveCD, blahblahblah. Doing just that stuff makes you a difficult target, and there are lots of easier targets out there....</htmltext>
<tokenext>Jeez Louise - it 's really not that hard .
Staying secure while travelling is really pretty simple : 1 .
Carry your own machine - an Apple if possible , if not , some flavor of Linux .
If you 're too cheap for an Apple and not savvy enuf for Linux , Windows is OK. If you use anyone else 's hardware , assume it is keylogged and behave accordingly .
Have a backup device like an iPod Touch .
2. Always enable SSL .
When doing anything even remotely risky , ensure SSL is enabled and is being used 3 .
Ensure your OS / browser / firewall / virus scanner is updated .
Virus-scan daily .
4. Ensure you are using a software firewall / virus scanner , and that they are enabled 5 .
Do not use Internet Explorer 6 .
Use TrueCrypt to create an encrypted volume in an unobtrusive place , named unobtrusively .
Use this volume to store things you need to store that you do n't wan na put on Google Docs .
Why not use whole drive encryption ?
Because having your laptop siezed and imaged at borders is not unknown .
If the investigators see that your drive is encrypted , they will attempt to force you to divulge the passphrase .
In many cases , local laws make it illegal for you to refuse .
A TrueCrypt volume of 50MB or so named HiDefPortraitSlideshow.ppt will prolly go unnoticed .
That 's pretty much it .
No VPN , no VLC , no virtual machine , no thumb-drive based Linux install , no LiveCD , blahblahblah .
Doing just that stuff makes you a difficult target , and there are lots of easier targets out there... .</tokentext>
<sentencetext>Jeez Louise - it's really not that hard.
Staying secure while travelling is really pretty simple:

1.
Carry your own machine - an Apple if possible, if not, some flavor of Linux.
If you're too cheap for an Apple and not savvy enuf for Linux, Windows is OK. If you use anyone else's hardware, assume it is keylogged and behave accordingly.
Have a backup device like an iPod Touch.
2. Always enable SSL.
When doing anything even remotely risky, ensure SSL is enabled and is being used

3.
Ensure your OS / browser / firewall / virus scanner is updated.
Virus-scan daily.
4. Ensure you are using a software firewall / virus scanner, and that they are enabled

5.
Do not use Internet Explorer

6.
Use TrueCrypt to create an encrypted volume in an unobtrusive place, named unobtrusively.
Use this volume to store things you need to store that you don't wanna put on Google Docs.
Why not use whole drive encryption?
Because having your laptop siezed and imaged at borders is not unknown.
If the investigators see that your drive is encrypted, they will attempt to force you to divulge the passphrase.
In many cases, local laws make it illegal for you to refuse.
A TrueCrypt volume of 50MB or so named HiDefPortraitSlideshow.ppt will prolly go unnoticed.
That's pretty much it.
No VPN, no VLC, no virtual machine, no thumb-drive based Linux install, no LiveCD, blahblahblah.
Doing just that stuff makes you a difficult target, and there are lots of easier targets out there....</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264892</id>
	<title>Re:SSH &amp; SOCKS Proxy</title>
	<author>Niten</author>
	<datestamp>1259499780000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>3</modscore>
	<htmltext><p>That's a good thought, but the problem is that tunneling TCP over TCP (such as HTTP over SSH) is subject to the <a href="http://sites.inka.de/~W1011/devel/tcp-tcp.html" title="sites.inka.de">TCP retransmission cascading effect, a.k.a. TCP-over-TCP meltdown</a> [sites.inka.de], which is particularly likely to be a problem for him given the kind of Internet connections he may be stuck with on his travels.</p><p>It would be better to tunnel over a protocol that does not attempt to ensure reliable transport, such as UDP or pure IPsec.  So I agree with you that he should find some inexpensive, reputable host to use as his endpoint, but I recommend that he use OpenVPN over UDP rather than SSH over TCP for his tunnel.  OpenVPN is easy to set up, penetrates NATs well, and will be compatible with pretty much any inexpensive VPS provider (but be sure to check with potential hosts' terms of services first to make sure they're OK with tunneling your personal web browsing traffic through their servers).</p></htmltext>
<tokenext>That 's a good thought , but the problem is that tunneling TCP over TCP ( such as HTTP over SSH ) is subject to the TCP retransmission cascading effect , a.k.a .
TCP-over-TCP meltdown [ sites.inka.de ] , which is particularly likely to be a problem for him given the kind of Internet connections he may be stuck with on his travels.It would be better to tunnel over a protocol that does not attempt to ensure reliable transport , such as UDP or pure IPsec .
So I agree with you that he should find some inexpensive , reputable host to use as his endpoint , but I recommend that he use OpenVPN over UDP rather than SSH over TCP for his tunnel .
OpenVPN is easy to set up , penetrates NATs well , and will be compatible with pretty much any inexpensive VPS provider ( but be sure to check with potential hosts ' terms of services first to make sure they 're OK with tunneling your personal web browsing traffic through their servers ) .</tokentext>
<sentencetext>That's a good thought, but the problem is that tunneling TCP over TCP (such as HTTP over SSH) is subject to the TCP retransmission cascading effect, a.k.a.
TCP-over-TCP meltdown [sites.inka.de], which is particularly likely to be a problem for him given the kind of Internet connections he may be stuck with on his travels.It would be better to tunnel over a protocol that does not attempt to ensure reliable transport, such as UDP or pure IPsec.
So I agree with you that he should find some inexpensive, reputable host to use as his endpoint, but I recommend that he use OpenVPN over UDP rather than SSH over TCP for his tunnel.
OpenVPN is easy to set up, penetrates NATs well, and will be compatible with pretty much any inexpensive VPS provider (but be sure to check with potential hosts' terms of services first to make sure they're OK with tunneling your personal web browsing traffic through their servers).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263786</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265138</id>
	<title>Re:hello world!</title>
	<author>Logic Worshipper</author>
	<datestamp>1259502300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>VNC is not secure.  You will need a VPN to secure it.  Any remote desktop would have the same security issues as any other service, but would compromise the remote computer as well as the site you're connecting to from it.</p></htmltext>
<tokenext>VNC is not secure .
You will need a VPN to secure it .
Any remote desktop would have the same security issues as any other service , but would compromise the remote computer as well as the site you 're connecting to from it .</tokentext>
<sentencetext>VNC is not secure.
You will need a VPN to secure it.
Any remote desktop would have the same security issues as any other service, but would compromise the remote computer as well as the site you're connecting to from it.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263778</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263786</id>
	<title>SSH &amp; SOCKS Proxy</title>
	<author>chazchaz101</author>
	<datestamp>1259489760000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>5</modscore>
	<htmltext>I would recommend purchasing a shell account from a reputable host that will allow you to tunnel your internet traffic over an SSH tunnel/SOCKS proxy. It's really easy to set up using Putty or OpenSSH.</htmltext>
<tokenext>I would recommend purchasing a shell account from a reputable host that will allow you to tunnel your internet traffic over an SSH tunnel/SOCKS proxy .
It 's really easy to set up using Putty or OpenSSH .</tokentext>
<sentencetext>I would recommend purchasing a shell account from a reputable host that will allow you to tunnel your internet traffic over an SSH tunnel/SOCKS proxy.
It's really easy to set up using Putty or OpenSSH.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266538</id>
	<title>Re:Good starting point</title>
	<author>Anonymous</author>
	<datestamp>1259515860000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I myself am a HUGE linux fanboi, but the suggestion to use linux in this topic is not really helpful. His conscern is not for getting viruses, he is going to be using the same internet. He is (or should be) worried about packet sniffers running on the public wifi (or just sniffing out of the air,) and there is no difference between the protocalls used on the Windows version of Firefox, and the linux version (or on epiphany, or whatever, even if they are Linux only in most cases.)</p><p>The only benefit you get from running Linux instead of Windows in this scenario, is that you can argue that Linux is not as at risk for some of the windows protocal targetted viruses, like in the case of an infected machine connecting to the same wifi network tries to start transmitting it to you. But this is no different from a wifi spot down the street, so it's still not relevent.</p></htmltext>
<tokenext>I myself am a HUGE linux fanboi , but the suggestion to use linux in this topic is not really helpful .
His conscern is not for getting viruses , he is going to be using the same internet .
He is ( or should be ) worried about packet sniffers running on the public wifi ( or just sniffing out of the air , ) and there is no difference between the protocalls used on the Windows version of Firefox , and the linux version ( or on epiphany , or whatever , even if they are Linux only in most cases .
) The only benefit you get from running Linux instead of Windows in this scenario , is that you can argue that Linux is not as at risk for some of the windows protocal targetted viruses , like in the case of an infected machine connecting to the same wifi network tries to start transmitting it to you .
But this is no different from a wifi spot down the street , so it 's still not relevent .</tokentext>
<sentencetext>I myself am a HUGE linux fanboi, but the suggestion to use linux in this topic is not really helpful.
His conscern is not for getting viruses, he is going to be using the same internet.
He is (or should be) worried about packet sniffers running on the public wifi (or just sniffing out of the air,) and there is no difference between the protocalls used on the Windows version of Firefox, and the linux version (or on epiphany, or whatever, even if they are Linux only in most cases.
)The only benefit you get from running Linux instead of Windows in this scenario, is that you can argue that Linux is not as at risk for some of the windows protocal targetted viruses, like in the case of an infected machine connecting to the same wifi network tries to start transmitting it to you.
But this is no different from a wifi spot down the street, so it's still not relevent.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263808</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268476</id>
	<title>Re:dm-crypt</title>
	<author>Anonymous</author>
	<datestamp>1259581380000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>Banking passwords should be memorized and never, ever, EVER written down or saved (and that includes firefox too).  So when (not if) someone steals his netbook, he won't have to worry about them having his passwords (even if encrypted).</p></div><p>I didn't think banking websites allowed you to save your credentials when logging in?</p></div>
	</htmltext>
<tokenext>Banking passwords should be memorized and never , ever , EVER written down or saved ( and that includes firefox too ) .
So when ( not if ) someone steals his netbook , he wo n't have to worry about them having his passwords ( even if encrypted ) .I did n't think banking websites allowed you to save your credentials when logging in ?</tokentext>
<sentencetext>Banking passwords should be memorized and never, ever, EVER written down or saved (and that includes firefox too).
So when (not if) someone steals his netbook, he won't have to worry about them having his passwords (even if encrypted).I didn't think banking websites allowed you to save your credentials when logging in?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263888</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264902</id>
	<title>Re:are you sure you're asking the right question?</title>
	<author>Anonymous</author>
	<datestamp>1259499840000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p><i>you're going travelling, to experience new cultures, people and ideas</i></p><p><i>put down the computer; the world won't end if you can't access slashdot and your email for a few months</i></p><p>And how does he keep all his friends updated on his Facebook?</p><p>I went on a cross country trip on a motorcycle. I posted on my blog at every stop along with a GPS coordinate.   It made my family and friends happier and they knew that if I did not post the next morning to contact the authorities along my path.</p><p>It's just a smart thing to do.  When I do backwood backpacking I email friends every 2 hours...  I use a <a href="http://www.gadgetvenue.com/spot-satellite-gps-emergency-beacon-07231020/" title="gadgetvenue.com">http://www.gadgetvenue.com/spot-satellite-gps-emergency-beacon-07231020/</a> [gadgetvenue.com]</p><p>SPOT personal location beacon. when I press OK it sends a nice email to family of my location and "I'm OK"  works great and needs no cellphone coverage.  I can press the help button when I break an ankle and know that someone knows I need help and my exact location.</p></htmltext>
<tokenext>you 're going travelling , to experience new cultures , people and ideasput down the computer ; the world wo n't end if you ca n't access slashdot and your email for a few monthsAnd how does he keep all his friends updated on his Facebook ? I went on a cross country trip on a motorcycle .
I posted on my blog at every stop along with a GPS coordinate .
It made my family and friends happier and they knew that if I did not post the next morning to contact the authorities along my path.It 's just a smart thing to do .
When I do backwood backpacking I email friends every 2 hours... I use a http : //www.gadgetvenue.com/spot-satellite-gps-emergency-beacon-07231020/ [ gadgetvenue.com ] SPOT personal location beacon .
when I press OK it sends a nice email to family of my location and " I 'm OK " works great and needs no cellphone coverage .
I can press the help button when I break an ankle and know that someone knows I need help and my exact location .</tokentext>
<sentencetext>you're going travelling, to experience new cultures, people and ideasput down the computer; the world won't end if you can't access slashdot and your email for a few monthsAnd how does he keep all his friends updated on his Facebook?I went on a cross country trip on a motorcycle.
I posted on my blog at every stop along with a GPS coordinate.
It made my family and friends happier and they knew that if I did not post the next morning to contact the authorities along my path.It's just a smart thing to do.
When I do backwood backpacking I email friends every 2 hours...  I use a http://www.gadgetvenue.com/spot-satellite-gps-emergency-beacon-07231020/ [gadgetvenue.com]SPOT personal location beacon.
when I press OK it sends a nice email to family of my location and "I'm OK"  works great and needs no cellphone coverage.
I can press the help button when I break an ankle and know that someone knows I need help and my exact location.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267158</id>
	<title>Re:OpenVPN</title>
	<author>obarthelemy</author>
	<datestamp>1259521020000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>It's frightening to see how many people dare to express opinions or formulate answers without really looking at what the question is.</p></htmltext>
<tokenext>It 's frightening to see how many people dare to express opinions or formulate answers without really looking at what the question is .</tokentext>
<sentencetext>It's frightening to see how many people dare to express opinions or formulate answers without really looking at what the question is.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263746</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263872</id>
	<title>Re:are you sure you're asking the right question?</title>
	<author>buchner.johannes</author>
	<datestamp>1259490480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>put down the computer; the world won't end if you can't access slashdot and your email for a few months</p></div><p>Maybe, but why take the risk? Just remember the docu 2012</p></div>
	</htmltext>
<tokenext>put down the computer ; the world wo n't end if you ca n't access slashdot and your email for a few monthsMaybe , but why take the risk ?
Just remember the docu 2012</tokentext>
<sentencetext>put down the computer; the world won't end if you can't access slashdot and your email for a few monthsMaybe, but why take the risk?
Just remember the docu 2012
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264922</id>
	<title>Get one of these...</title>
	<author>Lumpy</author>
	<datestamp>1259500020000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p><a href="http://www.gadgetvenue.com/spot-satellite-gps-emergency-beacon-07231020/" title="gadgetvenue.com">http://www.gadgetvenue.com/spot-satellite-gps-emergency-beacon-07231020/</a> [gadgetvenue.com]</p><p>Screw internet security..  I prefer to have a way to let someone know my ass is in a bind and I need help RIGHT NOW!..</p><p>I use mine to keep family happy on cross country motorcycle rides or when I go backwoods backpacking.   I press the "I'm ok" button at every break.</p></htmltext>
<tokenext>http : //www.gadgetvenue.com/spot-satellite-gps-emergency-beacon-07231020/ [ gadgetvenue.com ] Screw internet security.. I prefer to have a way to let someone know my ass is in a bind and I need help RIGHT NOW ! ..I use mine to keep family happy on cross country motorcycle rides or when I go backwoods backpacking .
I press the " I 'm ok " button at every break .</tokentext>
<sentencetext>http://www.gadgetvenue.com/spot-satellite-gps-emergency-beacon-07231020/ [gadgetvenue.com]Screw internet security..  I prefer to have a way to let someone know my ass is in a bind and I need help RIGHT NOW!..I use mine to keep family happy on cross country motorcycle rides or when I go backwoods backpacking.
I press the "I'm ok" button at every break.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270380</id>
	<title>Re:openvpn service</title>
	<author>Anonymous</author>
	<datestamp>1259599320000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>http://publicVPN.net is another one, pretty affordable PPTP or L2TP/IPSEC VPN connection ($6/month).  I use it on my iPod Touch when checking email at hotspots.</p></htmltext>
<tokenext>http : //publicVPN.net is another one , pretty affordable PPTP or L2TP/IPSEC VPN connection ( $ 6/month ) .
I use it on my iPod Touch when checking email at hotspots .</tokentext>
<sentencetext>http://publicVPN.net is another one, pretty affordable PPTP or L2TP/IPSEC VPN connection ($6/month).
I use it on my iPod Touch when checking email at hotspots.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263822</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270790</id>
	<title>Encryption Legal Issues</title>
	<author>internetsdave</author>
	<datestamp>1259601840000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext>I'm not a legal expert (nor have I read all the way down the comments), but just so OP is aware some countries place restrictions on what encryption can and cannot be used on computers within the country.  Wherever you go, if you are planning on using encryption of some form (which you should) be aware of the local laws.  Its pretty unlikely that the secret police are gonna haul you off to jail, but your computer may get confiscated if it is found to have illegal encryption on it.</htmltext>
<tokenext>I 'm not a legal expert ( nor have I read all the way down the comments ) , but just so OP is aware some countries place restrictions on what encryption can and can not be used on computers within the country .
Wherever you go , if you are planning on using encryption of some form ( which you should ) be aware of the local laws .
Its pretty unlikely that the secret police are gon na haul you off to jail , but your computer may get confiscated if it is found to have illegal encryption on it .</tokentext>
<sentencetext>I'm not a legal expert (nor have I read all the way down the comments), but just so OP is aware some countries place restrictions on what encryption can and cannot be used on computers within the country.
Wherever you go, if you are planning on using encryption of some form (which you should) be aware of the local laws.
Its pretty unlikely that the secret police are gonna haul you off to jail, but your computer may get confiscated if it is found to have illegal encryption on it.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264672</id>
	<title>Re:dm-crypt</title>
	<author>value\_added</author>
	<datestamp>1259497620000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>A bit overstated, no?</p><blockquote><div><p> <tt>openssl enc -aes256 -salt -a -e -in passwd.txt -out secrets<br>rm passwd.txt<br>mail -s "My Secret Passwords" myname@gmail.com &lt; secrets</tt></p></div> </blockquote><p>So not only can you have your passwords "written down", but you can have a a copy of them (conveniently base64 encoded) in your Gmail inbox available to you when travelling.  Assuming, of course, you've memorised the password to your Gmail account.<nobr> <wbr></nobr>;-)</p></div>
	</htmltext>
<tokenext>A bit overstated , no ?
openssl enc -aes256 -salt -a -e -in passwd.txt -out secretsrm passwd.txtmail -s " My Secret Passwords " myname @ gmail.com So not only can you have your passwords " written down " , but you can have a a copy of them ( conveniently base64 encoded ) in your Gmail inbox available to you when travelling .
Assuming , of course , you 've memorised the password to your Gmail account .
; - )</tokentext>
<sentencetext>A bit overstated, no?
openssl enc -aes256 -salt -a -e -in passwd.txt -out secretsrm passwd.txtmail -s "My Secret Passwords" myname@gmail.com  So not only can you have your passwords "written down", but you can have a a copy of them (conveniently base64 encoded) in your Gmail inbox available to you when travelling.
Assuming, of course, you've memorised the password to your Gmail account.
;-)
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263888</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264142</id>
	<title>Get a cheap shell account to use as a SSH tunnel.</title>
	<author>Anonymous</author>
	<datestamp>1259493300000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Spend $10 a month and get yourself a shell account that you can proxy traffic SSH through. Any reputable SSH client can do SOCKS5 or port forwarding through that shell account. I've used this method of accessing private bank accounts in some pretty crappy 3rd world countries such as Mexico, Philippines, etc.</p></htmltext>
<tokenext>Spend $ 10 a month and get yourself a shell account that you can proxy traffic SSH through .
Any reputable SSH client can do SOCKS5 or port forwarding through that shell account .
I 've used this method of accessing private bank accounts in some pretty crappy 3rd world countries such as Mexico , Philippines , etc .</tokentext>
<sentencetext>Spend $10 a month and get yourself a shell account that you can proxy traffic SSH through.
Any reputable SSH client can do SOCKS5 or port forwarding through that shell account.
I've used this method of accessing private bank accounts in some pretty crappy 3rd world countries such as Mexico, Philippines, etc.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264018</id>
	<title>Ten tips</title>
	<author>mlts</author>
	<datestamp>1259491920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>A few things that come to mind:</p><p>1:  Bring an external drive, install media, and images of your machine with the OS, drivers, and apps installed, so if you get a spyware infection, you can boot an OS CD or a CD with a recovery program, save off your documents, and roll back to that.</p><p>2:  Use Mozy, Carbonite, or some cloud backup program to have your critical documents stored safely, even on a spotty network connection.  Bonus points if you use a keyfile, and store the keyfile somewhere secure (perhaps as an attachment in a few email accounts).  This way, an intruder would need to have the keyfile as well as your username/password to restore from those services.</p><p>3:  Department of redundancy department.  Bring extra batteries, chargers, external hard disks, multiple copies of your OS on DVDS, an external DVD drive in case your primary one fails, and if budget permits, perhaps even a netbook just in case your main laptop fails.  Weight in carrying this stuff around may be a consideration, but if you can leave some stuff at the hotel, it would be good to do, as a dead charger with no way to replace it will put a crimp on your Internet-readiness.</p><p>4:  Backup nightly to a local drive.  I'd consider a copy of Acronis TrueImage or a similar product.</p><p>5:  Antivirus software doesn't catch everything.  My recommendation?  Do *all* your Web browsing in a virtual machine.  This way, if you get your VM infected, you can save files you desire to keep, then roll back to a previous uninfected state.  With Windows 7 Professional, Enterprise, and Ultimate, you can download XP Mode at no cost which can do this.  Alternatives are VirtualBox and VMWare Workstation.</p><p>6:  Encrypt your data.  If using Windows, TrueCrypt is licensed at no charge and can encrypt your system volume.  If you have a more advanced laptop with a TPM, Windows 7 Enterprise/Ultimate and BitLocker.  Most Linux distros support filesystem encryption as well.  And in OS X, FileVault is only a few mouse clicks away.</p><p>7:  Have multiple user accounts.  The account you use to show your laptop is OK at an airport is not the one you should use for your main stuff.</p><p>8:  Consider insurance that covers your equipment while abroad.</p><p>9:  Consider mailing your backup drives back to your place separately.  This way, if by some chance your laptop gets stolen or seized, you still have backups of your stuff on those drives, as well as Mozy.</p><p>10:  Consider a VPN service like StrongVPN, Anonymizer, Relakks, SwissVPN, or another reliable host.  This is not for downloading your warez via P2P, but making sure that your traffic stays private.</p><p>Of these tips, I consider using virtual machines the most important.  A VM infected can be easily cured by a snapshot rollback.  It is a lot harder to clean up a host OS.  Since you will be far from where you can find recovery media, having your host OS essentially be a hypervisor is a good bet.</p></htmltext>
<tokenext>A few things that come to mind : 1 : Bring an external drive , install media , and images of your machine with the OS , drivers , and apps installed , so if you get a spyware infection , you can boot an OS CD or a CD with a recovery program , save off your documents , and roll back to that.2 : Use Mozy , Carbonite , or some cloud backup program to have your critical documents stored safely , even on a spotty network connection .
Bonus points if you use a keyfile , and store the keyfile somewhere secure ( perhaps as an attachment in a few email accounts ) .
This way , an intruder would need to have the keyfile as well as your username/password to restore from those services.3 : Department of redundancy department .
Bring extra batteries , chargers , external hard disks , multiple copies of your OS on DVDS , an external DVD drive in case your primary one fails , and if budget permits , perhaps even a netbook just in case your main laptop fails .
Weight in carrying this stuff around may be a consideration , but if you can leave some stuff at the hotel , it would be good to do , as a dead charger with no way to replace it will put a crimp on your Internet-readiness.4 : Backup nightly to a local drive .
I 'd consider a copy of Acronis TrueImage or a similar product.5 : Antivirus software does n't catch everything .
My recommendation ?
Do * all * your Web browsing in a virtual machine .
This way , if you get your VM infected , you can save files you desire to keep , then roll back to a previous uninfected state .
With Windows 7 Professional , Enterprise , and Ultimate , you can download XP Mode at no cost which can do this .
Alternatives are VirtualBox and VMWare Workstation.6 : Encrypt your data .
If using Windows , TrueCrypt is licensed at no charge and can encrypt your system volume .
If you have a more advanced laptop with a TPM , Windows 7 Enterprise/Ultimate and BitLocker .
Most Linux distros support filesystem encryption as well .
And in OS X , FileVault is only a few mouse clicks away.7 : Have multiple user accounts .
The account you use to show your laptop is OK at an airport is not the one you should use for your main stuff.8 : Consider insurance that covers your equipment while abroad.9 : Consider mailing your backup drives back to your place separately .
This way , if by some chance your laptop gets stolen or seized , you still have backups of your stuff on those drives , as well as Mozy.10 : Consider a VPN service like StrongVPN , Anonymizer , Relakks , SwissVPN , or another reliable host .
This is not for downloading your warez via P2P , but making sure that your traffic stays private.Of these tips , I consider using virtual machines the most important .
A VM infected can be easily cured by a snapshot rollback .
It is a lot harder to clean up a host OS .
Since you will be far from where you can find recovery media , having your host OS essentially be a hypervisor is a good bet .</tokentext>
<sentencetext>A few things that come to mind:1:  Bring an external drive, install media, and images of your machine with the OS, drivers, and apps installed, so if you get a spyware infection, you can boot an OS CD or a CD with a recovery program, save off your documents, and roll back to that.2:  Use Mozy, Carbonite, or some cloud backup program to have your critical documents stored safely, even on a spotty network connection.
Bonus points if you use a keyfile, and store the keyfile somewhere secure (perhaps as an attachment in a few email accounts).
This way, an intruder would need to have the keyfile as well as your username/password to restore from those services.3:  Department of redundancy department.
Bring extra batteries, chargers, external hard disks, multiple copies of your OS on DVDS, an external DVD drive in case your primary one fails, and if budget permits, perhaps even a netbook just in case your main laptop fails.
Weight in carrying this stuff around may be a consideration, but if you can leave some stuff at the hotel, it would be good to do, as a dead charger with no way to replace it will put a crimp on your Internet-readiness.4:  Backup nightly to a local drive.
I'd consider a copy of Acronis TrueImage or a similar product.5:  Antivirus software doesn't catch everything.
My recommendation?
Do *all* your Web browsing in a virtual machine.
This way, if you get your VM infected, you can save files you desire to keep, then roll back to a previous uninfected state.
With Windows 7 Professional, Enterprise, and Ultimate, you can download XP Mode at no cost which can do this.
Alternatives are VirtualBox and VMWare Workstation.6:  Encrypt your data.
If using Windows, TrueCrypt is licensed at no charge and can encrypt your system volume.
If you have a more advanced laptop with a TPM, Windows 7 Enterprise/Ultimate and BitLocker.
Most Linux distros support filesystem encryption as well.
And in OS X, FileVault is only a few mouse clicks away.7:  Have multiple user accounts.
The account you use to show your laptop is OK at an airport is not the one you should use for your main stuff.8:  Consider insurance that covers your equipment while abroad.9:  Consider mailing your backup drives back to your place separately.
This way, if by some chance your laptop gets stolen or seized, you still have backups of your stuff on those drives, as well as Mozy.10:  Consider a VPN service like StrongVPN, Anonymizer, Relakks, SwissVPN, or another reliable host.
This is not for downloading your warez via P2P, but making sure that your traffic stays private.Of these tips, I consider using virtual machines the most important.
A VM infected can be easily cured by a snapshot rollback.
It is a lot harder to clean up a host OS.
Since you will be far from where you can find recovery media, having your host OS essentially be a hypervisor is a good bet.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264696</id>
	<title>Re:Keep it simple</title>
	<author>Anonymous</author>
	<datestamp>1259497860000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Simple is best.  When I travel, I use a livecd exclusively.  I then have a clean laptop where only the data I can afford to lose (or have stolen) goes to the hard-drive, thus I am only out the hardware cost when stolen.  Everything else of value stays at home.  Any data of value downloaded goes to a USB drive that stays on my person at all times.  The other suggestions of using a strong vpn to a trusted host for banking etc. will help keep the data in motion safer. I am starting to use special (temporary) travel email accounts that help reduce accidental exposure of sensitive information.</p></htmltext>
<tokenext>Simple is best .
When I travel , I use a livecd exclusively .
I then have a clean laptop where only the data I can afford to lose ( or have stolen ) goes to the hard-drive , thus I am only out the hardware cost when stolen .
Everything else of value stays at home .
Any data of value downloaded goes to a USB drive that stays on my person at all times .
The other suggestions of using a strong vpn to a trusted host for banking etc .
will help keep the data in motion safer .
I am starting to use special ( temporary ) travel email accounts that help reduce accidental exposure of sensitive information .</tokentext>
<sentencetext>Simple is best.
When I travel, I use a livecd exclusively.
I then have a clean laptop where only the data I can afford to lose (or have stolen) goes to the hard-drive, thus I am only out the hardware cost when stolen.
Everything else of value stays at home.
Any data of value downloaded goes to a USB drive that stays on my person at all times.
The other suggestions of using a strong vpn to a trusted host for banking etc.
will help keep the data in motion safer.
I am starting to use special (temporary) travel email accounts that help reduce accidental exposure of sensitive information.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264106</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268960</id>
	<title>Re:dm-crypt</title>
	<author>sfkaplan</author>
	<datestamp>1259588640000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>That's a nice ideal, but it's impractical.  What is my wife supposed to do if I get hit by a bus?  She would need access to some of those accounts, and she can't possibly be expected to remember my passwords without any written aids.  Storing them in some encrypted form that she can access preserves that information in a safe manner, <i>and</i> it allows me to use better, more diverse passwords.</htmltext>
<tokenext>That 's a nice ideal , but it 's impractical .
What is my wife supposed to do if I get hit by a bus ?
She would need access to some of those accounts , and she ca n't possibly be expected to remember my passwords without any written aids .
Storing them in some encrypted form that she can access preserves that information in a safe manner , and it allows me to use better , more diverse passwords .</tokentext>
<sentencetext>That's a nice ideal, but it's impractical.
What is my wife supposed to do if I get hit by a bus?
She would need access to some of those accounts, and she can't possibly be expected to remember my passwords without any written aids.
Storing them in some encrypted form that she can access preserves that information in a safe manner, and it allows me to use better, more diverse passwords.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263888</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264162</id>
	<title>Clean install WITHOUT encryption</title>
	<author>Anonymous</author>
	<datestamp>1259493420000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>Whenever I travel, I wipe my harddrive and put a clean install of Windows. This protects both against border protection and thieves. It's not that I have something highly confidential or illegal on there, I just don't want my data stolen by anyone. While encryption will protect you against thieves, you're likely to be in more trouble if border protection finds it and you're never going to be able to prove you have no hidden encrypted partitions on there. To make sure no sensitive usage data is left on the device, run everything in a sandbox and wipe the sandbox contents afterwards.</p><p>Whenever I use a network, I use a trusted VPN service.</p></htmltext>
<tokenext>Whenever I travel , I wipe my harddrive and put a clean install of Windows .
This protects both against border protection and thieves .
It 's not that I have something highly confidential or illegal on there , I just do n't want my data stolen by anyone .
While encryption will protect you against thieves , you 're likely to be in more trouble if border protection finds it and you 're never going to be able to prove you have no hidden encrypted partitions on there .
To make sure no sensitive usage data is left on the device , run everything in a sandbox and wipe the sandbox contents afterwards.Whenever I use a network , I use a trusted VPN service .</tokentext>
<sentencetext>Whenever I travel, I wipe my harddrive and put a clean install of Windows.
This protects both against border protection and thieves.
It's not that I have something highly confidential or illegal on there, I just don't want my data stolen by anyone.
While encryption will protect you against thieves, you're likely to be in more trouble if border protection finds it and you're never going to be able to prove you have no hidden encrypted partitions on there.
To make sure no sensitive usage data is left on the device, run everything in a sandbox and wipe the sandbox contents afterwards.Whenever I use a network, I use a trusted VPN service.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264094</id>
	<title>Evil is behind every corner</title>
	<author>Anonymous</author>
	<datestamp>1259492640000</datestamp>
	<modclass>Funny</modclass>
	<modscore>5</modscore>
	<htmltext>If someone is truly smart enough to crack your system and steal your bank account info
- when you are a fairly intelligent tech-savvy guy who uses SSL and won't just click the first open wifi network that pops up like 90\% of the population would -
what the heck are they doing in the jungles of South America where maybe 5 students with negative bank balances pass through every year?


"The same issues and risks that business travelers in hotels and airports face, as well as those encountered by millions of other backpackers, gap-year travelers, and students". Do you honestly think 99\% of them have a clue? And yet 99\% of them make it home perfectly fine. As someone with an above-average IT security knowledge, you will be fine.
Seriously, while I don't advocate writing your bank details in 10-foot high letters of fire on Macchu Picchu, the chances of anything happening are infinitesmal.


By the way, South America is awesome to backpack through. And not being tethered to the Interwebs is a good thing.</htmltext>
<tokenext>If someone is truly smart enough to crack your system and steal your bank account info - when you are a fairly intelligent tech-savvy guy who uses SSL and wo n't just click the first open wifi network that pops up like 90 \ % of the population would - what the heck are they doing in the jungles of South America where maybe 5 students with negative bank balances pass through every year ?
" The same issues and risks that business travelers in hotels and airports face , as well as those encountered by millions of other backpackers , gap-year travelers , and students " .
Do you honestly think 99 \ % of them have a clue ?
And yet 99 \ % of them make it home perfectly fine .
As someone with an above-average IT security knowledge , you will be fine .
Seriously , while I do n't advocate writing your bank details in 10-foot high letters of fire on Macchu Picchu , the chances of anything happening are infinitesmal .
By the way , South America is awesome to backpack through .
And not being tethered to the Interwebs is a good thing .</tokentext>
<sentencetext>If someone is truly smart enough to crack your system and steal your bank account info
- when you are a fairly intelligent tech-savvy guy who uses SSL and won't just click the first open wifi network that pops up like 90\% of the population would -
what the heck are they doing in the jungles of South America where maybe 5 students with negative bank balances pass through every year?
"The same issues and risks that business travelers in hotels and airports face, as well as those encountered by millions of other backpackers, gap-year travelers, and students".
Do you honestly think 99\% of them have a clue?
And yet 99\% of them make it home perfectly fine.
As someone with an above-average IT security knowledge, you will be fine.
Seriously, while I don't advocate writing your bank details in 10-foot high letters of fire on Macchu Picchu, the chances of anything happening are infinitesmal.
By the way, South America is awesome to backpack through.
And not being tethered to the Interwebs is a good thing.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266300</id>
	<title>Re:are you sure you're asking the right question?</title>
	<author>AK Marc</author>
	<datestamp>1259513340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><i>why on earth you feel a need to access your investment account from the depths of south america, i'm not sure.</i> <br> <br>So he can afford the next trip, obviously.</htmltext>
<tokenext>why on earth you feel a need to access your investment account from the depths of south america , i 'm not sure .
So he can afford the next trip , obviously .</tokentext>
<sentencetext>why on earth you feel a need to access your investment account from the depths of south america, i'm not sure.
So he can afford the next trip, obviously.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264118</id>
	<title>Re:are you sure you're asking the right question?</title>
	<author>cain</author>
	<datestamp>1259492880000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><blockquote><div><p>you're going travelling, to experience new cultures, people and ideas<br>put down the computer; the world won't end if you can't access slashdot and your email for a few months</p><p>why on earth you feel a need to access your investment account from the depths of south america, i'm not sure.</p></div></blockquote><p>Why on Earth you feel the need to tell a perfect stranger how to travel, I'm not sure. Why not just trust the guy and answer the question instead of responding in a smug condescending manner?</p><p>I'd suggest booting a security-oriented "live" linux distro from a CD/DVD/thumb drive when accessing untrusted networks. This means caches are gone when the power is turned off - no passwords/account numbers/etc floating around on the hard drive. If the distro boots with sane firewall settings, has ssh installed, etc, the poster should be fine.</p></div>
	</htmltext>
<tokenext>you 're going travelling , to experience new cultures , people and ideasput down the computer ; the world wo n't end if you ca n't access slashdot and your email for a few monthswhy on earth you feel a need to access your investment account from the depths of south america , i 'm not sure.Why on Earth you feel the need to tell a perfect stranger how to travel , I 'm not sure .
Why not just trust the guy and answer the question instead of responding in a smug condescending manner ? I 'd suggest booting a security-oriented " live " linux distro from a CD/DVD/thumb drive when accessing untrusted networks .
This means caches are gone when the power is turned off - no passwords/account numbers/etc floating around on the hard drive .
If the distro boots with sane firewall settings , has ssh installed , etc , the poster should be fine .</tokentext>
<sentencetext>you're going travelling, to experience new cultures, people and ideasput down the computer; the world won't end if you can't access slashdot and your email for a few monthswhy on earth you feel a need to access your investment account from the depths of south america, i'm not sure.Why on Earth you feel the need to tell a perfect stranger how to travel, I'm not sure.
Why not just trust the guy and answer the question instead of responding in a smug condescending manner?I'd suggest booting a security-oriented "live" linux distro from a CD/DVD/thumb drive when accessing untrusted networks.
This means caches are gone when the power is turned off - no passwords/account numbers/etc floating around on the hard drive.
If the distro boots with sane firewall settings, has ssh installed, etc, the poster should be fine.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270252</id>
	<title>Re:dm-crypt</title>
	<author>muckracer</author>
	<datestamp>1259598480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>&gt; Banking passwords should be memorized and never, ever, EVER written down or<br>&gt; saved (and that includes firefox too).</p><p>Sorry, won't work. In fact the only way I can use actually secure passwords<br>with high entropy is by writing them down. I might agree about the (not)<br>storing in Firefox bit but other than that I think, this is unhelpful advice.<br>We're not meant to remember 128-bit passwords. I rather keep them in<br>obfuscated written-down form in my wallet. If that gets lost or taken, I have<br>more immediate problems than my passwords.</p></htmltext>
<tokenext>&gt; Banking passwords should be memorized and never , ever , EVER written down or &gt; saved ( and that includes firefox too ) .Sorry , wo n't work .
In fact the only way I can use actually secure passwordswith high entropy is by writing them down .
I might agree about the ( not ) storing in Firefox bit but other than that I think , this is unhelpful advice.We 're not meant to remember 128-bit passwords .
I rather keep them inobfuscated written-down form in my wallet .
If that gets lost or taken , I havemore immediate problems than my passwords .</tokentext>
<sentencetext>&gt; Banking passwords should be memorized and never, ever, EVER written down or&gt; saved (and that includes firefox too).Sorry, won't work.
In fact the only way I can use actually secure passwordswith high entropy is by writing them down.
I might agree about the (not)storing in Firefox bit but other than that I think, this is unhelpful advice.We're not meant to remember 128-bit passwords.
I rather keep them inobfuscated written-down form in my wallet.
If that gets lost or taken, I havemore immediate problems than my passwords.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263888</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266040</id>
	<title>Forget all these technical solutions</title>
	<author>GlobalEcho</author>
	<datestamp>1259511240000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p>I have a simple suggestion that eliminates all the security risks you are worrying about:  write an expiring power of attorney for your mom (or other trusted friend or relative).  It will be cheaper and more reliable, and mom might even like to get the occasional phone call while you're backpacking across the continent.</p></htmltext>
<tokenext>I have a simple suggestion that eliminates all the security risks you are worrying about : write an expiring power of attorney for your mom ( or other trusted friend or relative ) .
It will be cheaper and more reliable , and mom might even like to get the occasional phone call while you 're backpacking across the continent .</tokentext>
<sentencetext>I have a simple suggestion that eliminates all the security risks you are worrying about:  write an expiring power of attorney for your mom (or other trusted friend or relative).
It will be cheaper and more reliable, and mom might even like to get the occasional phone call while you're backpacking across the continent.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267874</id>
	<title>Why make life hard ... use your family!</title>
	<author>MarkTina</author>
	<datestamp>1259572740000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>(This is of course assuming you have any family, friends or a FB and you trust them)</p><p>1)  Buy a pen and paper<br>2)  Write how much you have free on your credit card at the top.<br>3)  Every time you buy something subtract the amount from the amount left on your credit card<br>4)  Have you credit card statements go to your family member, trusted friend or FB<br>5)  Authorize with the bank your family member/friend/FB to handle payments of your credit card from your bank account<br>6)  If you need extra money<nobr> <wbr></nobr>.. phone your family member/friend/FB and have them transfer it</p><p>If you really want, you could always learn the PGP algorithm and apply it to the numbers written on your paper manually.</p><p>Now is that so hard ?</p></htmltext>
<tokenext>( This is of course assuming you have any family , friends or a FB and you trust them ) 1 ) Buy a pen and paper2 ) Write how much you have free on your credit card at the top.3 ) Every time you buy something subtract the amount from the amount left on your credit card4 ) Have you credit card statements go to your family member , trusted friend or FB5 ) Authorize with the bank your family member/friend/FB to handle payments of your credit card from your bank account6 ) If you need extra money .. phone your family member/friend/FB and have them transfer itIf you really want , you could always learn the PGP algorithm and apply it to the numbers written on your paper manually.Now is that so hard ?</tokentext>
<sentencetext>(This is of course assuming you have any family, friends or a FB and you trust them)1)  Buy a pen and paper2)  Write how much you have free on your credit card at the top.3)  Every time you buy something subtract the amount from the amount left on your credit card4)  Have you credit card statements go to your family member, trusted friend or FB5)  Authorize with the bank your family member/friend/FB to handle payments of your credit card from your bank account6)  If you need extra money .. phone your family member/friend/FB and have them transfer itIf you really want, you could always learn the PGP algorithm and apply it to the numbers written on your paper manually.Now is that so hard ?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263778</id>
	<title>hello world!</title>
	<author>Anonymous</author>
	<datestamp>1259489700000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I am just replying because I am the first one too see this post.<br>Use VNC?<nobr> <wbr></nobr>:)</p></htmltext>
<tokenext>I am just replying because I am the first one too see this post.Use VNC ?
: )</tokentext>
<sentencetext>I am just replying because I am the first one too see this post.Use VNC?
:)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30271548</id>
	<title>Re:are you sure you're asking the right question?</title>
	<author>hodet</author>
	<datestamp>1259605440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><i>"I'm quitting my job, selling everything I own, and I'll have nothing on my mind but the present."</i>
<p>
Good luck to you sir.  Ultimately, all the shit that you own ends up owning you and you seem like a person who wants to experience a different way.  Cheers.</p></htmltext>
<tokenext>" I 'm quitting my job , selling everything I own , and I 'll have nothing on my mind but the present .
" Good luck to you sir .
Ultimately , all the shit that you own ends up owning you and you seem like a person who wants to experience a different way .
Cheers .</tokentext>
<sentencetext>"I'm quitting my job, selling everything I own, and I'll have nothing on my mind but the present.
"

Good luck to you sir.
Ultimately, all the shit that you own ends up owning you and you seem like a person who wants to experience a different way.
Cheers.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265614</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267884</id>
	<title>Re:wrong question</title>
	<author>xtracto</author>
	<datestamp>1259572800000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Haha... I can imagine your situation and am sorry for you.</p><p>On a related note, I think the original poster will get very disappointed when he realizes that the amount of WiFi points in South America are not as many as in the USA.</p><p>Of course it depends on which parts of S.A. he is going but, in general people in here still use internet cafes.</p><p>On the bootable CD, it is not always possible. A lot of cafes (at least in Mexico) have the CPUs locked down, in a wooden box sometimes. This to avoid any type of vandalism.</p></htmltext>
<tokenext>Haha... I can imagine your situation and am sorry for you.On a related note , I think the original poster will get very disappointed when he realizes that the amount of WiFi points in South America are not as many as in the USA.Of course it depends on which parts of S.A. he is going but , in general people in here still use internet cafes.On the bootable CD , it is not always possible .
A lot of cafes ( at least in Mexico ) have the CPUs locked down , in a wooden box sometimes .
This to avoid any type of vandalism .</tokentext>
<sentencetext>Haha... I can imagine your situation and am sorry for you.On a related note, I think the original poster will get very disappointed when he realizes that the amount of WiFi points in South America are not as many as in the USA.Of course it depends on which parts of S.A. he is going but, in general people in here still use internet cafes.On the bootable CD, it is not always possible.
A lot of cafes (at least in Mexico) have the CPUs locked down, in a wooden box sometimes.
This to avoid any type of vandalism.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30272836</id>
	<title>Iodine</title>
	<author>PetiePooo</author>
	<datestamp>1259611680000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext>You need a home base.  A $50-60 OpenWRT box is enough if you don't have a spare PC laying around.
I'd suggest running the following servers:
<br>OpenSSH + Squid (or tinyproxy) - SSH:22 and basic HTTP proxying via an SSH tunnel
<br>OpenVPN - for an easier remote experience (both UDP:1194 and TCP:443)
<br>HttpTunnel - When only HTTP:80 requests are allowed from your AP
<br>iodine - When only DNS:53 requests are allowed (eg. captive portal)

<br> <br>I'd also suggest full disk encryption on your PC/Mac.</htmltext>
<tokenext>You need a home base .
A $ 50-60 OpenWRT box is enough if you do n't have a spare PC laying around .
I 'd suggest running the following servers : OpenSSH + Squid ( or tinyproxy ) - SSH : 22 and basic HTTP proxying via an SSH tunnel OpenVPN - for an easier remote experience ( both UDP : 1194 and TCP : 443 ) HttpTunnel - When only HTTP : 80 requests are allowed from your AP iodine - When only DNS : 53 requests are allowed ( eg .
captive portal ) I 'd also suggest full disk encryption on your PC/Mac .</tokentext>
<sentencetext>You need a home base.
A $50-60 OpenWRT box is enough if you don't have a spare PC laying around.
I'd suggest running the following servers:
OpenSSH + Squid (or tinyproxy) - SSH:22 and basic HTTP proxying via an SSH tunnel
OpenVPN - for an easier remote experience (both UDP:1194 and TCP:443)
HttpTunnel - When only HTTP:80 requests are allowed from your AP
iodine - When only DNS:53 requests are allowed (eg.
captive portal)

 I'd also suggest full disk encryption on your PC/Mac.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267362</id>
	<title>the internet is a public network</title>
	<author>Anonymous</author>
	<datestamp>1259522940000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>It's worrying that you think that thus far you haven't been accessing your banking over a public network.<br>The internet is a public network, anything you send over it can be inspected by third-parties, that's the whole point of TLS(SSL).</p><p>Disable all your unneeded network services, which is probably all of them and you'll be in exactly the same position as you were when you were at home.</p></htmltext>
<tokenext>It 's worrying that you think that thus far you have n't been accessing your banking over a public network.The internet is a public network , anything you send over it can be inspected by third-parties , that 's the whole point of TLS ( SSL ) .Disable all your unneeded network services , which is probably all of them and you 'll be in exactly the same position as you were when you were at home .</tokentext>
<sentencetext>It's worrying that you think that thus far you haven't been accessing your banking over a public network.The internet is a public network, anything you send over it can be inspected by third-parties, that's the whole point of TLS(SSL).Disable all your unneeded network services, which is probably all of them and you'll be in exactly the same position as you were when you were at home.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264244</id>
	<title>Advice</title>
	<author>Anonymous</author>
	<datestamp>1259494020000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>    1) DON'T, DON'T, DON'T use Windows!  These access points, anyone else connected to them is basically on the LAN with you, anything they have your Windows box could catch.  Let alone anything else you'd get via the browser etc.  Do you really want the hassle of getting viruses and spyware while you're on vacation?   A lot of people will worry about hardening the connection between them and the bank then run this swiss cheese of an OS.  I think key loggers and data-stealing trojans are FAR more of a problem than someone sniffing your connection.  I recommend Ubuntu but I guess you could use a Mac too.</p><p>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2) SSL, obviously.  Quite a few sites that are http by default do support https.  Pay attention to any odd warnings -- man-in-the-middle attacks are IMHO unlikely, but they will make firefox throw warnings.</p><p>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 3) I do like the recommendation of tunneling via VPN.  But, *shrug*, if it's not possible then don't.</p><p>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 4) Perhaps costly, but does one of the international data plans cover you?  VZW for instance has a crackberry data plan that has unlimited roaming in a bunch of countries.  Then you would not even have to look for wifi, and GSM or UMTS (or CDMA and EVDO) sniffing is much more likely than someone sniffing an unencrypted wifi link.</p></htmltext>
<tokenext>1 ) DO N'T , DO N'T , DO N'T use Windows !
These access points , anyone else connected to them is basically on the LAN with you , anything they have your Windows box could catch .
Let alone anything else you 'd get via the browser etc .
Do you really want the hassle of getting viruses and spyware while you 're on vacation ?
A lot of people will worry about hardening the connection between them and the bank then run this swiss cheese of an OS .
I think key loggers and data-stealing trojans are FAR more of a problem than someone sniffing your connection .
I recommend Ubuntu but I guess you could use a Mac too .
          2 ) SSL , obviously .
Quite a few sites that are http by default do support https .
Pay attention to any odd warnings -- man-in-the-middle attacks are IMHO unlikely , but they will make firefox throw warnings .
          3 ) I do like the recommendation of tunneling via VPN .
But , * shrug * , if it 's not possible then do n't .
          4 ) Perhaps costly , but does one of the international data plans cover you ?
VZW for instance has a crackberry data plan that has unlimited roaming in a bunch of countries .
Then you would not even have to look for wifi , and GSM or UMTS ( or CDMA and EVDO ) sniffing is much more likely than someone sniffing an unencrypted wifi link .</tokentext>
<sentencetext>    1) DON'T, DON'T, DON'T use Windows!
These access points, anyone else connected to them is basically on the LAN with you, anything they have your Windows box could catch.
Let alone anything else you'd get via the browser etc.
Do you really want the hassle of getting viruses and spyware while you're on vacation?
A lot of people will worry about hardening the connection between them and the bank then run this swiss cheese of an OS.
I think key loggers and data-stealing trojans are FAR more of a problem than someone sniffing your connection.
I recommend Ubuntu but I guess you could use a Mac too.
          2) SSL, obviously.
Quite a few sites that are http by default do support https.
Pay attention to any odd warnings -- man-in-the-middle attacks are IMHO unlikely, but they will make firefox throw warnings.
          3) I do like the recommendation of tunneling via VPN.
But, *shrug*, if it's not possible then don't.
          4) Perhaps costly, but does one of the international data plans cover you?
VZW for instance has a crackberry data plan that has unlimited roaming in a bunch of countries.
Then you would not even have to look for wifi, and GSM or UMTS (or CDMA and EVDO) sniffing is much more likely than someone sniffing an unencrypted wifi link.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266448</id>
	<title>Re:Evil is behind every corner</title>
	<author>Anonymous</author>
	<datestamp>1259515140000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>1</modscore>
	<htmltext><p>I've been living in South America (Argentina) for about 4 years and I can tell you that every time that I run my netbook in some cafe or McDonalds I can see plenty of rogue APs running Karma + metasploit doing nasty things (probably SSLStrip+ettercap too).</p><p>Just using SSL won't save you, even here.</p></htmltext>
<tokenext>I 've been living in South America ( Argentina ) for about 4 years and I can tell you that every time that I run my netbook in some cafe or McDonalds I can see plenty of rogue APs running Karma + metasploit doing nasty things ( probably SSLStrip + ettercap too ) .Just using SSL wo n't save you , even here .</tokentext>
<sentencetext>I've been living in South America (Argentina) for about 4 years and I can tell you that every time that I run my netbook in some cafe or McDonalds I can see plenty of rogue APs running Karma + metasploit doing nasty things (probably SSLStrip+ettercap too).Just using SSL won't save you, even here.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264094</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263850</id>
	<title>Phone banking?</title>
	<author>Anonymous</author>
	<datestamp>1259490360000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>1</modscore>
	<htmltext><p>My credit union still has a system for doing much of my banking over a phone line.   I'd rather take my bets on the security through the phone lines than the interwebs.</p></htmltext>
<tokenext>My credit union still has a system for doing much of my banking over a phone line .
I 'd rather take my bets on the security through the phone lines than the interwebs .</tokentext>
<sentencetext>My credit union still has a system for doing much of my banking over a phone line.
I'd rather take my bets on the security through the phone lines than the interwebs.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263808</id>
	<title>Good starting point</title>
	<author>Anonymous</author>
	<datestamp>1259489940000</datestamp>
	<modclass>Flamebait</modclass>
	<modscore>0</modscore>
	<htmltext>Use Linux.</htmltext>
<tokenext>Use Linux .</tokentext>
<sentencetext>Use Linux.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263888</id>
	<title>Re:dm-crypt</title>
	<author>iron-kurton</author>
	<datestamp>1259490600000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext>Banking passwords should be memorized and never, ever, EVER written down or saved (and that includes firefox too).  So when (not if) someone steals his netbook, he won't have to worry about them having his passwords (even if encrypted).</htmltext>
<tokenext>Banking passwords should be memorized and never , ever , EVER written down or saved ( and that includes firefox too ) .
So when ( not if ) someone steals his netbook , he wo n't have to worry about them having his passwords ( even if encrypted ) .</tokentext>
<sentencetext>Banking passwords should be memorized and never, ever, EVER written down or saved (and that includes firefox too).
So when (not if) someone steals his netbook, he won't have to worry about them having his passwords (even if encrypted).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30269088</id>
	<title>Why Tunnel?</title>
	<author>Attila the Bun</author>
	<datestamp>1259590080000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>
Lots of recommendations here for encrypted VPN tunnels.  But assuming the bank uses HTTPS, why would you need the extra layer of encryption?
</p><p>
I don't agree with those who say leave the netbook at home.  Using a live-CD to avoid keyloggers in internet cafes is not always possible.  Often the CD drive and USB ports are removed or defunct.  Come to think of it, the keyboards are often defunct too.  With wired or wireless connections increasingly available, a netbook can be very useful.  Just keep a copy of any important data on a memory card in your money-belt.</p></htmltext>
<tokenext>Lots of recommendations here for encrypted VPN tunnels .
But assuming the bank uses HTTPS , why would you need the extra layer of encryption ?
I do n't agree with those who say leave the netbook at home .
Using a live-CD to avoid keyloggers in internet cafes is not always possible .
Often the CD drive and USB ports are removed or defunct .
Come to think of it , the keyboards are often defunct too .
With wired or wireless connections increasingly available , a netbook can be very useful .
Just keep a copy of any important data on a memory card in your money-belt .</tokentext>
<sentencetext>
Lots of recommendations here for encrypted VPN tunnels.
But assuming the bank uses HTTPS, why would you need the extra layer of encryption?
I don't agree with those who say leave the netbook at home.
Using a live-CD to avoid keyloggers in internet cafes is not always possible.
Often the CD drive and USB ports are removed or defunct.
Come to think of it, the keyboards are often defunct too.
With wired or wireless connections increasingly available, a netbook can be very useful.
Just keep a copy of any important data on a memory card in your money-belt.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30271138</id>
	<title>IronKey</title>
	<author>trbarry</author>
	<datestamp>1259603520000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>I have my netbook using full system encryption with TrueCrypt, with KeyPass for a further level of safe password storage.  I also now have an OpenVPN server at home I can connect through.</p><p>However before I set up the OpenVPN server I used an IronKey flash drive for safer and more anonymous web browsing.  This is a flash drive with built in hardware AES encryption.  It comes with a modified version of Mozilla Firebird set up to use that encryption to go through a private TOR network gateway set up by the company.  A subscription is included free with the IronKey.  It slowed things down a bit but seemed to work.  <a href="http://www.ironkey.com/personal/" title="ironkey.com" rel="nofollow">http://www.ironkey.com/personal/</a> [ironkey.com].</p><p>- Tom</p></htmltext>
<tokenext>I have my netbook using full system encryption with TrueCrypt , with KeyPass for a further level of safe password storage .
I also now have an OpenVPN server at home I can connect through.However before I set up the OpenVPN server I used an IronKey flash drive for safer and more anonymous web browsing .
This is a flash drive with built in hardware AES encryption .
It comes with a modified version of Mozilla Firebird set up to use that encryption to go through a private TOR network gateway set up by the company .
A subscription is included free with the IronKey .
It slowed things down a bit but seemed to work .
http : //www.ironkey.com/personal/ [ ironkey.com ] .- Tom</tokentext>
<sentencetext>I have my netbook using full system encryption with TrueCrypt, with KeyPass for a further level of safe password storage.
I also now have an OpenVPN server at home I can connect through.However before I set up the OpenVPN server I used an IronKey flash drive for safer and more anonymous web browsing.
This is a flash drive with built in hardware AES encryption.
It comes with a modified version of Mozilla Firebird set up to use that encryption to go through a private TOR network gateway set up by the company.
A subscription is included free with the IronKey.
It slowed things down a bit but seemed to work.
http://www.ironkey.com/personal/ [ironkey.com].- Tom</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270190</id>
	<title>Use VMware images</title>
	<author>Anonymous</author>
	<datestamp>1259598120000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Remember that a single failure in your scheme could compromise your laptop for the rest of your trip.</p><p>I'd do all of the about, although, I would only access networks from a Windows VMware running on a fairly barebone Linux machine. Once you have everything setuped in the VM, make a copy and only use the copy. Should something happen (virus or something of the sort), rm it and make yourself another copy to work it.</p><p>Cheers and have fun on your trip,</p><p>Fish</p></htmltext>
<tokenext>Remember that a single failure in your scheme could compromise your laptop for the rest of your trip.I 'd do all of the about , although , I would only access networks from a Windows VMware running on a fairly barebone Linux machine .
Once you have everything setuped in the VM , make a copy and only use the copy .
Should something happen ( virus or something of the sort ) , rm it and make yourself another copy to work it.Cheers and have fun on your trip,Fish</tokentext>
<sentencetext>Remember that a single failure in your scheme could compromise your laptop for the rest of your trip.I'd do all of the about, although, I would only access networks from a Windows VMware running on a fairly barebone Linux machine.
Once you have everything setuped in the VM, make a copy and only use the copy.
Should something happen (virus or something of the sort), rm it and make yourself another copy to work it.Cheers and have fun on your trip,Fish</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263860</id>
	<title>Re:OpenVPN</title>
	<author>Cylix</author>
	<datestamp>1259490420000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>5</modscore>
	<htmltext><p>So it needs to be said regardless, but I feel VPN probably should have sufficed.</p><p>There are two solutions to this issue:</p><p>a) Do it Yourself!</p><p>In this scenario, the individual purchases a term contract with a hosting provider and proceeds to install a VPN solution. This is the most flexible plan available and can be achieved for roughly 10$ or less per month (plus domain costs).  The down side to such a solution is that if there is maintenance that must be performed there is really only one mechanic. (unless the mechanic has very good friends or if he is a heartless bastard with no relations to the external world then perhaps a fellow slashdoter will land the man a vpn solution. Never mind he is a freeloader... roaming from country side to country side... possibly infecting your server... and you were just trying to be a nice guy. shame on you)</p><p>b) Rent a VPN!</p><p>There are countless VPN solutions available for seemingly random values. I have little doubt that an equally cost effective solution can be found. This has the obvious advantage of not having to maintain the VPN solution. The obvious con when compared to solution "A" is that there is certainly no flexibility in this offering. You get what you get. With the economy falling into the virtual comode it is quite likely that any business you place your trust in will either lose all of your information or sale it on the black market. By the time you return you will likely be spammed, identity thieved and otherwise placed with the very best experiences the awful inky darkness that is the bad side of the humanity offers.</p><p>Invariably there will be suffering no matter what option you choose.</p><p>Regardless, ensure your netbook is protected and if you may wish to utilize a solution I myself rather enjoy. In rather horrible untrusted networks I rely on a lovely Fedora live distribution over usb flash. It doesn't offer much in the way of persistent storage, but for one time transactions it's quite useful.</p></htmltext>
<tokenext>So it needs to be said regardless , but I feel VPN probably should have sufficed.There are two solutions to this issue : a ) Do it Yourself ! In this scenario , the individual purchases a term contract with a hosting provider and proceeds to install a VPN solution .
This is the most flexible plan available and can be achieved for roughly 10 $ or less per month ( plus domain costs ) .
The down side to such a solution is that if there is maintenance that must be performed there is really only one mechanic .
( unless the mechanic has very good friends or if he is a heartless bastard with no relations to the external world then perhaps a fellow slashdoter will land the man a vpn solution .
Never mind he is a freeloader... roaming from country side to country side... possibly infecting your server... and you were just trying to be a nice guy .
shame on you ) b ) Rent a VPN ! There are countless VPN solutions available for seemingly random values .
I have little doubt that an equally cost effective solution can be found .
This has the obvious advantage of not having to maintain the VPN solution .
The obvious con when compared to solution " A " is that there is certainly no flexibility in this offering .
You get what you get .
With the economy falling into the virtual comode it is quite likely that any business you place your trust in will either lose all of your information or sale it on the black market .
By the time you return you will likely be spammed , identity thieved and otherwise placed with the very best experiences the awful inky darkness that is the bad side of the humanity offers.Invariably there will be suffering no matter what option you choose.Regardless , ensure your netbook is protected and if you may wish to utilize a solution I myself rather enjoy .
In rather horrible untrusted networks I rely on a lovely Fedora live distribution over usb flash .
It does n't offer much in the way of persistent storage , but for one time transactions it 's quite useful .</tokentext>
<sentencetext>So it needs to be said regardless, but I feel VPN probably should have sufficed.There are two solutions to this issue:a) Do it Yourself!In this scenario, the individual purchases a term contract with a hosting provider and proceeds to install a VPN solution.
This is the most flexible plan available and can be achieved for roughly 10$ or less per month (plus domain costs).
The down side to such a solution is that if there is maintenance that must be performed there is really only one mechanic.
(unless the mechanic has very good friends or if he is a heartless bastard with no relations to the external world then perhaps a fellow slashdoter will land the man a vpn solution.
Never mind he is a freeloader... roaming from country side to country side... possibly infecting your server... and you were just trying to be a nice guy.
shame on you)b) Rent a VPN!There are countless VPN solutions available for seemingly random values.
I have little doubt that an equally cost effective solution can be found.
This has the obvious advantage of not having to maintain the VPN solution.
The obvious con when compared to solution "A" is that there is certainly no flexibility in this offering.
You get what you get.
With the economy falling into the virtual comode it is quite likely that any business you place your trust in will either lose all of your information or sale it on the black market.
By the time you return you will likely be spammed, identity thieved and otherwise placed with the very best experiences the awful inky darkness that is the bad side of the humanity offers.Invariably there will be suffering no matter what option you choose.Regardless, ensure your netbook is protected and if you may wish to utilize a solution I myself rather enjoy.
In rather horrible untrusted networks I rely on a lovely Fedora live distribution over usb flash.
It doesn't offer much in the way of persistent storage, but for one time transactions it's quite useful.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263746</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264132</id>
	<title>How important are you, really?</title>
	<author>mblase</author>
	<datestamp>1259493060000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Unless you're being targetted specifically, basic security procedures are probably enough. Change your financial passwords regularly, maintain a secure wireless connection, and don't let your computer be handled by anybody else. Casual intercepts are going to meet the needs of most internet hackers, and if your data and passwords are going to take any amount of effort, they'll move on to someone else.</p><p>That said, I think that in much of South America you're more likely to have your hardware stolen or confiscated by corrupt officials because of its cash value than for the value of the passwords they might hold. Make sure you can access anything you NEED to access using public terminals if your netbook is useless. Make sure you know how to access them by phone, too.</p><p>However, if there's someone in your family you can trust to keep half an eye on that financial information back home, I would do so. Redirect all postal communication to them and tell them to open anything from this or that bank just in case there's an alert. Your bank can probably authorize said family member to make certain changes on your behalf, if you tell that bank ahead of time to do so.</p></htmltext>
<tokenext>Unless you 're being targetted specifically , basic security procedures are probably enough .
Change your financial passwords regularly , maintain a secure wireless connection , and do n't let your computer be handled by anybody else .
Casual intercepts are going to meet the needs of most internet hackers , and if your data and passwords are going to take any amount of effort , they 'll move on to someone else.That said , I think that in much of South America you 're more likely to have your hardware stolen or confiscated by corrupt officials because of its cash value than for the value of the passwords they might hold .
Make sure you can access anything you NEED to access using public terminals if your netbook is useless .
Make sure you know how to access them by phone , too.However , if there 's someone in your family you can trust to keep half an eye on that financial information back home , I would do so .
Redirect all postal communication to them and tell them to open anything from this or that bank just in case there 's an alert .
Your bank can probably authorize said family member to make certain changes on your behalf , if you tell that bank ahead of time to do so .</tokentext>
<sentencetext>Unless you're being targetted specifically, basic security procedures are probably enough.
Change your financial passwords regularly, maintain a secure wireless connection, and don't let your computer be handled by anybody else.
Casual intercepts are going to meet the needs of most internet hackers, and if your data and passwords are going to take any amount of effort, they'll move on to someone else.That said, I think that in much of South America you're more likely to have your hardware stolen or confiscated by corrupt officials because of its cash value than for the value of the passwords they might hold.
Make sure you can access anything you NEED to access using public terminals if your netbook is useless.
Make sure you know how to access them by phone, too.However, if there's someone in your family you can trust to keep half an eye on that financial information back home, I would do so.
Redirect all postal communication to them and tell them to open anything from this or that bank just in case there's an alert.
Your bank can probably authorize said family member to make certain changes on your behalf, if you tell that bank ahead of time to do so.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267014</id>
	<title>Is op retired?</title>
	<author>Anonymous</author>
	<datestamp>1259519760000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>"I'll be spending all of next year backpacking through South America." What the fuck?</p></htmltext>
<tokenext>" I 'll be spending all of next year backpacking through South America .
" What the fuck ?</tokentext>
<sentencetext>"I'll be spending all of next year backpacking through South America.
" What the fuck?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267324</id>
	<title>Re:SSH &amp; SOCKS Proxy</title>
	<author>warcow105</author>
	<datestamp>1259522640000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I tunnel all my personal web surfing back to my home computer.  Doesnt matter if I am at work, at a coffee shop, or in a hotel on vacation.  Never trust that your connection is safe, there are even risks with ones home connection, but for all intents an purposes, it is secure.</htmltext>
<tokenext>I tunnel all my personal web surfing back to my home computer .
Doesnt matter if I am at work , at a coffee shop , or in a hotel on vacation .
Never trust that your connection is safe , there are even risks with ones home connection , but for all intents an purposes , it is secure .</tokentext>
<sentencetext>I tunnel all my personal web surfing back to my home computer.
Doesnt matter if I am at work, at a coffee shop, or in a hotel on vacation.
Never trust that your connection is safe, there are even risks with ones home connection, but for all intents an purposes, it is secure.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265088</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265154</id>
	<title>Initial login thru browser - good luck</title>
	<author>Anonymous</author>
	<datestamp>1259502540000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>If you use VPN the biggest risk in on the login that usually happens thru browser. Hot spot owner can use holes in your browser: javascript, flash, etc. Not having updates for a year will not help either, figure out a way to sandbox it.</p></htmltext>
<tokenext>If you use VPN the biggest risk in on the login that usually happens thru browser .
Hot spot owner can use holes in your browser : javascript , flash , etc .
Not having updates for a year will not help either , figure out a way to sandbox it .</tokentext>
<sentencetext>If you use VPN the biggest risk in on the login that usually happens thru browser.
Hot spot owner can use holes in your browser: javascript, flash, etc.
Not having updates for a year will not help either, figure out a way to sandbox it.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263860</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792</id>
	<title>dm-crypt</title>
	<author>tetromino</author>
	<datestamp>1259489820000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext><p>All network security is for naught when someone can just steal your netbook and read all the passwords and form data that firefox helpfully remembers for you. You have to make sure that your firefox profile directory (as well as all other confidential data, like passwords and bank statement pdfs) is stored on an encrypted block device. On Linux, a loopback device encrypted with dm-crypt works well.</p></htmltext>
<tokenext>All network security is for naught when someone can just steal your netbook and read all the passwords and form data that firefox helpfully remembers for you .
You have to make sure that your firefox profile directory ( as well as all other confidential data , like passwords and bank statement pdfs ) is stored on an encrypted block device .
On Linux , a loopback device encrypted with dm-crypt works well .</tokentext>
<sentencetext>All network security is for naught when someone can just steal your netbook and read all the passwords and form data that firefox helpfully remembers for you.
You have to make sure that your firefox profile directory (as well as all other confidential data, like passwords and bank statement pdfs) is stored on an encrypted block device.
On Linux, a loopback device encrypted with dm-crypt works well.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267310</id>
	<title>Other Security Tips</title>
	<author>ChePibe</author>
	<datestamp>1259522460000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>I've lived (not backpacked, lived) in South America for about two and a half years - the slums on the outskirts of Buenos Aires for two years, a couple of months in Lima and three months in a nice spot in Santiago.</p><p>The IT issues have been covered well enough.  Here are a few additional ideas:</p><p>- Ditch the nice, expensive backpack and luggage.  Go to the Army surplus store and buy your luggage there.  Or something like <a href="http://www.amazon.com/Heavyweight-Classic-Messenger-Olive-9148/dp/B000KACJPY/ref=sr\_1\_2?ie=UTF8&amp;s=sporting-goods&amp;qid=1259560894&amp;sr=8-2" title="amazon.com">this</a> [amazon.com] for walking around and day to day use.  Avoid military emblems, but definitely go for that "beat to hell" look. Big expensive North Face bags draw the eyes of thieves. Dusty old rucksacks don't.  The same goes for looking like a walking, talking North Face commercial with your clothing.<br>- Learn the language.  Spanish and Portuguese are the obvious two.  Know the basics, and be sure you can ask directions.<br>- Check visa requirements for each country and register with the State Department to receive travel and security updates on each country.  These are immensely useful for avoiding difficult situations.<br>- Understand what the embassy can do for you.  If you get arrested, mugged, or run into most problems overseas, the answer is "not much".<br>- Be VERY careful with taxis. "Express" kidnappings are quite common through most of South America - haggle for taxis and always, <i>always</i> use a service if you can, just to be on the safe side.  Most major shopping centers and many big commercial bus stops have their own services.  They cost about double what others charge, but it's worth it to avoid getting robbed.<br>- Ignore touts and always make your lodging arrangements in advance.<br>- Keep your eyes open and, if you can, travel in a group.</p><p>Have a lot of fun and do me a favor - walk down 9 de Julio while eating a good Havana alfajor<nobr> <wbr></nobr>;-)</p></htmltext>
<tokenext>I 've lived ( not backpacked , lived ) in South America for about two and a half years - the slums on the outskirts of Buenos Aires for two years , a couple of months in Lima and three months in a nice spot in Santiago.The IT issues have been covered well enough .
Here are a few additional ideas : - Ditch the nice , expensive backpack and luggage .
Go to the Army surplus store and buy your luggage there .
Or something like this [ amazon.com ] for walking around and day to day use .
Avoid military emblems , but definitely go for that " beat to hell " look .
Big expensive North Face bags draw the eyes of thieves .
Dusty old rucksacks do n't .
The same goes for looking like a walking , talking North Face commercial with your clothing.- Learn the language .
Spanish and Portuguese are the obvious two .
Know the basics , and be sure you can ask directions.- Check visa requirements for each country and register with the State Department to receive travel and security updates on each country .
These are immensely useful for avoiding difficult situations.- Understand what the embassy can do for you .
If you get arrested , mugged , or run into most problems overseas , the answer is " not much " .- Be VERY careful with taxis .
" Express " kidnappings are quite common through most of South America - haggle for taxis and always , always use a service if you can , just to be on the safe side .
Most major shopping centers and many big commercial bus stops have their own services .
They cost about double what others charge , but it 's worth it to avoid getting robbed.- Ignore touts and always make your lodging arrangements in advance.- Keep your eyes open and , if you can , travel in a group.Have a lot of fun and do me a favor - walk down 9 de Julio while eating a good Havana alfajor ; - )</tokentext>
<sentencetext>I've lived (not backpacked, lived) in South America for about two and a half years - the slums on the outskirts of Buenos Aires for two years, a couple of months in Lima and three months in a nice spot in Santiago.The IT issues have been covered well enough.
Here are a few additional ideas:- Ditch the nice, expensive backpack and luggage.
Go to the Army surplus store and buy your luggage there.
Or something like this [amazon.com] for walking around and day to day use.
Avoid military emblems, but definitely go for that "beat to hell" look.
Big expensive North Face bags draw the eyes of thieves.
Dusty old rucksacks don't.
The same goes for looking like a walking, talking North Face commercial with your clothing.- Learn the language.
Spanish and Portuguese are the obvious two.
Know the basics, and be sure you can ask directions.- Check visa requirements for each country and register with the State Department to receive travel and security updates on each country.
These are immensely useful for avoiding difficult situations.- Understand what the embassy can do for you.
If you get arrested, mugged, or run into most problems overseas, the answer is "not much".- Be VERY careful with taxis.
"Express" kidnappings are quite common through most of South America - haggle for taxis and always, always use a service if you can, just to be on the safe side.
Most major shopping centers and many big commercial bus stops have their own services.
They cost about double what others charge, but it's worth it to avoid getting robbed.- Ignore touts and always make your lodging arrangements in advance.- Keep your eyes open and, if you can, travel in a group.Have a lot of fun and do me a favor - walk down 9 de Julio while eating a good Havana alfajor ;-)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270334</id>
	<title>Re:dm-crypt</title>
	<author>muckracer</author>
	<datestamp>1259599020000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Not bad. In fact, there's a great plugin for vim, that uses openssl just like<br>that for creating a command-line password safe:<br><a href="http://www.vim.org/scripts/script.php?script\_id=2012" title="vim.org">http://www.vim.org/scripts/script.php?script\_id=2012</a> [vim.org]</p><p>However, your 2nd step is very questionable. You should instead use:</p><p>shred -vuz passwd.txt</p><p>Better yet, you do all this on a LUKS partition. (Then you might get away with a<br>simple rm.)</p></htmltext>
<tokenext>Not bad .
In fact , there 's a great plugin for vim , that uses openssl just likethat for creating a command-line password safe : http : //www.vim.org/scripts/script.php ? script \ _id = 2012 [ vim.org ] However , your 2nd step is very questionable .
You should instead use : shred -vuz passwd.txtBetter yet , you do all this on a LUKS partition .
( Then you might get away with asimple rm .
)</tokentext>
<sentencetext>Not bad.
In fact, there's a great plugin for vim, that uses openssl just likethat for creating a command-line password safe:http://www.vim.org/scripts/script.php?script\_id=2012 [vim.org]However, your 2nd step is very questionable.
You should instead use:shred -vuz passwd.txtBetter yet, you do all this on a LUKS partition.
(Then you might get away with asimple rm.
)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264672</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264028</id>
	<title>Any VPN provider will do</title>
	<author>fluch</author>
	<datestamp>1259492040000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext><p>I've tried SwissVPN (http://www.swissvpn.net/) and had good experiences (about 6$/month on a prepaid basis, no limits).</p></htmltext>
<tokenext>I 've tried SwissVPN ( http : //www.swissvpn.net/ ) and had good experiences ( about 6 $ /month on a prepaid basis , no limits ) .</tokentext>
<sentencetext>I've tried SwissVPN (http://www.swissvpn.net/) and had good experiences (about 6$/month on a prepaid basis, no limits).</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264014</id>
	<title>Run screaming away from Windows</title>
	<author>steveha</author>
	<datestamp>1259491860000</datestamp>
	<modclass>Flamebait</modclass>
	<modscore>-1</modscore>
	<htmltext><p>Install Linux on your netbook.  Do not trust Windows.</p><p>That's my top tip for you right there.</p><p>I also use NoScript because I don't trust Javascript.  The problem with Noscript is that so many web pages <em>require</em> Javascript to be enabled, so you need to use the Noscript control to permit Javascript.  The usual sequence is: Why is this page acting funny?  Why is the search feature broken?  Oh yeah, it probably requires Javascript; enable it, then wait for the page to reload.  So, Noscript is really a bit of a pain.  But I use it anyway because I don't trust Javascript.</p><p>On my netbook (an Acer Aspire One with a 10.1" screen, 512MB of RAM, 160GB hard drive) I'm using Ubuntu 9.10 and it works great.  The only issue I have noted is that if it goes into sleep mode it doesn't wake up; I need to power it down and then up.  One of the cool features of Ubuntu 9.10 is that you can have an encrypted home directory; that would be nice for your credit card numbers and other personal data.  I installed with this option and I have not noticed any slowdown in using the computer.</p><p>To install Linux, get a (cheap!) 1GB USB flash drive, and use <a href="http://unetbootin.sourceforge.net/" title="sourceforge.net" rel="nofollow">Unetbootin</a> [sourceforge.net] to make a bootable installer for your chosen Linux distro.  Ideally, you should use a flash drive with a physical write-protect switch; these are not common but do exist.  Then, after you have set up the netbook, pack that flash drive in your luggage; if you ever need to you can re-install Linux from scratch.  Or if your laptop is lost, stolen, or destroyed, you can get a new one and set it up again with Linux.  But you will know the Linux installer on that USB key is a trustable Linux, especially if you have it write-protected.</p><p>By the way, when you set up Linux, be sure to put your data files one a separate partition from everything else.  In other words, have two partitions: "/" (for everything but your data files) and "/home" (for your data files).  If you ever do need to re-install your whole OS (due to horrible crash, or somehow getting 0wned) it is really fast to just say "go ahead and wipe the whole / partition, but don't format<nobr> <wbr></nobr>/home".  You can completely re-install Linux in this way, losing no data, faster than you can run the Windows installer in "recovery" mode to try to fix a broken/0wned Windows install.</p><p>As others have suggested, you might want to keep your data "in the cloud", such as by using a webmail client.  The major advantage is that if your laptop is lost or stolen, your data is all still where you left it; you just need a new netbook/laptop.</p><p>I'm sure you will bring a digital camera.  A 160 GB hard disk can store a whole bunch of photos, and when you are in an area with good WiFi, you can backup your photos to the cloud somewhere.  In future years you will treasure those photos.  Looking over your photos you will say "Oh wow, I forgot all about that day; but this photo just reminded me!"  Unless you tirelessly record everything in a diary, the photos will be crucial to reminding you of your trip.  (And the netbook can record your diary, either by you typing it, or by you talking to the microphone.  A netbook is handy no matter how you look at it.)</p><p>If you ever use a computer in a cyber cafe, just assume that a keylogger is recording your password, credit card numbers, etc.  (It doesn't even need to be a software keylogger, it could be hardware!)  Bringing your own computer is a good move.  Using Linux to avoid your computer being 0wned is also good move.</p><p>steveha</p></htmltext>
<tokenext>Install Linux on your netbook .
Do not trust Windows.That 's my top tip for you right there.I also use NoScript because I do n't trust Javascript .
The problem with Noscript is that so many web pages require Javascript to be enabled , so you need to use the Noscript control to permit Javascript .
The usual sequence is : Why is this page acting funny ?
Why is the search feature broken ?
Oh yeah , it probably requires Javascript ; enable it , then wait for the page to reload .
So , Noscript is really a bit of a pain .
But I use it anyway because I do n't trust Javascript.On my netbook ( an Acer Aspire One with a 10.1 " screen , 512MB of RAM , 160GB hard drive ) I 'm using Ubuntu 9.10 and it works great .
The only issue I have noted is that if it goes into sleep mode it does n't wake up ; I need to power it down and then up .
One of the cool features of Ubuntu 9.10 is that you can have an encrypted home directory ; that would be nice for your credit card numbers and other personal data .
I installed with this option and I have not noticed any slowdown in using the computer.To install Linux , get a ( cheap !
) 1GB USB flash drive , and use Unetbootin [ sourceforge.net ] to make a bootable installer for your chosen Linux distro .
Ideally , you should use a flash drive with a physical write-protect switch ; these are not common but do exist .
Then , after you have set up the netbook , pack that flash drive in your luggage ; if you ever need to you can re-install Linux from scratch .
Or if your laptop is lost , stolen , or destroyed , you can get a new one and set it up again with Linux .
But you will know the Linux installer on that USB key is a trustable Linux , especially if you have it write-protected.By the way , when you set up Linux , be sure to put your data files one a separate partition from everything else .
In other words , have two partitions : " / " ( for everything but your data files ) and " /home " ( for your data files ) .
If you ever do need to re-install your whole OS ( due to horrible crash , or somehow getting 0wned ) it is really fast to just say " go ahead and wipe the whole / partition , but do n't format /home " .
You can completely re-install Linux in this way , losing no data , faster than you can run the Windows installer in " recovery " mode to try to fix a broken/0wned Windows install.As others have suggested , you might want to keep your data " in the cloud " , such as by using a webmail client .
The major advantage is that if your laptop is lost or stolen , your data is all still where you left it ; you just need a new netbook/laptop.I 'm sure you will bring a digital camera .
A 160 GB hard disk can store a whole bunch of photos , and when you are in an area with good WiFi , you can backup your photos to the cloud somewhere .
In future years you will treasure those photos .
Looking over your photos you will say " Oh wow , I forgot all about that day ; but this photo just reminded me !
" Unless you tirelessly record everything in a diary , the photos will be crucial to reminding you of your trip .
( And the netbook can record your diary , either by you typing it , or by you talking to the microphone .
A netbook is handy no matter how you look at it .
) If you ever use a computer in a cyber cafe , just assume that a keylogger is recording your password , credit card numbers , etc .
( It does n't even need to be a software keylogger , it could be hardware !
) Bringing your own computer is a good move .
Using Linux to avoid your computer being 0wned is also good move.steveha</tokentext>
<sentencetext>Install Linux on your netbook.
Do not trust Windows.That's my top tip for you right there.I also use NoScript because I don't trust Javascript.
The problem with Noscript is that so many web pages require Javascript to be enabled, so you need to use the Noscript control to permit Javascript.
The usual sequence is: Why is this page acting funny?
Why is the search feature broken?
Oh yeah, it probably requires Javascript; enable it, then wait for the page to reload.
So, Noscript is really a bit of a pain.
But I use it anyway because I don't trust Javascript.On my netbook (an Acer Aspire One with a 10.1" screen, 512MB of RAM, 160GB hard drive) I'm using Ubuntu 9.10 and it works great.
The only issue I have noted is that if it goes into sleep mode it doesn't wake up; I need to power it down and then up.
One of the cool features of Ubuntu 9.10 is that you can have an encrypted home directory; that would be nice for your credit card numbers and other personal data.
I installed with this option and I have not noticed any slowdown in using the computer.To install Linux, get a (cheap!
) 1GB USB flash drive, and use Unetbootin [sourceforge.net] to make a bootable installer for your chosen Linux distro.
Ideally, you should use a flash drive with a physical write-protect switch; these are not common but do exist.
Then, after you have set up the netbook, pack that flash drive in your luggage; if you ever need to you can re-install Linux from scratch.
Or if your laptop is lost, stolen, or destroyed, you can get a new one and set it up again with Linux.
But you will know the Linux installer on that USB key is a trustable Linux, especially if you have it write-protected.By the way, when you set up Linux, be sure to put your data files one a separate partition from everything else.
In other words, have two partitions: "/" (for everything but your data files) and "/home" (for your data files).
If you ever do need to re-install your whole OS (due to horrible crash, or somehow getting 0wned) it is really fast to just say "go ahead and wipe the whole / partition, but don't format /home".
You can completely re-install Linux in this way, losing no data, faster than you can run the Windows installer in "recovery" mode to try to fix a broken/0wned Windows install.As others have suggested, you might want to keep your data "in the cloud", such as by using a webmail client.
The major advantage is that if your laptop is lost or stolen, your data is all still where you left it; you just need a new netbook/laptop.I'm sure you will bring a digital camera.
A 160 GB hard disk can store a whole bunch of photos, and when you are in an area with good WiFi, you can backup your photos to the cloud somewhere.
In future years you will treasure those photos.
Looking over your photos you will say "Oh wow, I forgot all about that day; but this photo just reminded me!
"  Unless you tirelessly record everything in a diary, the photos will be crucial to reminding you of your trip.
(And the netbook can record your diary, either by you typing it, or by you talking to the microphone.
A netbook is handy no matter how you look at it.
)If you ever use a computer in a cyber cafe, just assume that a keylogger is recording your password, credit card numbers, etc.
(It doesn't even need to be a software keylogger, it could be hardware!
)  Bringing your own computer is a good move.
Using Linux to avoid your computer being 0wned is also good move.steveha</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263822</id>
	<title>openvpn service</title>
	<author>Anonymous</author>
	<datestamp>1259490060000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>4</modscore>
	<htmltext><p>You might want to use a service like<br>http://alwaysvpn.com<br>or<br>strongvpn</p></htmltext>
<tokenext>You might want to use a service likehttp : //alwaysvpn.comorstrongvpn</tokentext>
<sentencetext>You might want to use a service likehttp://alwaysvpn.comorstrongvpn</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267288</id>
	<title>Re:wrong question</title>
	<author>Anonymous</author>
	<datestamp>1259522280000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Guns. Lots and lots of guns.</p></htmltext>
<tokenext>Guns .
Lots and lots of guns .</tokentext>
<sentencetext>Guns.
Lots and lots of guns.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264038</id>
	<title>Cash and a machete</title>
	<author>zogger</author>
	<datestamp>1259492100000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>That's what I would carry..of course I am primeval hard core...</p><p>How about boot from a usb stick when you need to do banking, and keep that thing really buried in your pocket, so even if the notebook gets stolen, your important stuff is still on you.</p><p>How about banking from a cellphone instead, just using voice? Is that possible with your bank?</p></htmltext>
<tokenext>That 's what I would carry..of course I am primeval hard core...How about boot from a usb stick when you need to do banking , and keep that thing really buried in your pocket , so even if the notebook gets stolen , your important stuff is still on you.How about banking from a cellphone instead , just using voice ?
Is that possible with your bank ?</tokentext>
<sentencetext>That's what I would carry..of course I am primeval hard core...How about boot from a usb stick when you need to do banking, and keep that thing really buried in your pocket, so even if the notebook gets stolen, your important stuff is still on you.How about banking from a cellphone instead, just using voice?
Is that possible with your bank?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263846</id>
	<title>Encrypt your netbook, park data in the cloud</title>
	<author>iturbide</author>
	<datestamp>1259490240000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>Assume you will lose your netbook at some point: encrypt the entire thing using truecrypt or similar, and make sure you can access vital data from somewhere else: either use dropbox, or use google docs, or whatever.</p></htmltext>
<tokenext>Assume you will lose your netbook at some point : encrypt the entire thing using truecrypt or similar , and make sure you can access vital data from somewhere else : either use dropbox , or use google docs , or whatever .</tokentext>
<sentencetext>Assume you will lose your netbook at some point: encrypt the entire thing using truecrypt or similar, and make sure you can access vital data from somewhere else: either use dropbox, or use google docs, or whatever.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266246</id>
	<title>Most of the above</title>
	<author>Pirulo</author>
	<datestamp>1259512860000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><tt>apply even more while in the US wifi hot spots as well<br></tt></htmltext>
<tokenext>apply even more while in the US wifi hot spots as well</tokentext>
<sentencetext>apply even more while in the US wifi hot spots as well</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270980</id>
	<title>Try a free trial version of SecureConnect</title>
	<author>AdeleWard</author>
	<datestamp>1259602680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I enjoyed the idea of you backpacking and using wifi hotspots for so much. You can be secure at wifi hotspots. I've written about your question on my own blog posts where you can also get free trial software called SecureConnect that would protect you from hackers and doesn't have any adware etc on <a href="http://www.geid.co.uk/" title="geid.co.uk" rel="nofollow">http://www.geid.co.uk/</a> [geid.co.uk]</htmltext>
<tokenext>I enjoyed the idea of you backpacking and using wifi hotspots for so much .
You can be secure at wifi hotspots .
I 've written about your question on my own blog posts where you can also get free trial software called SecureConnect that would protect you from hackers and does n't have any adware etc on http : //www.geid.co.uk/ [ geid.co.uk ]</tokentext>
<sentencetext>I enjoyed the idea of you backpacking and using wifi hotspots for so much.
You can be secure at wifi hotspots.
I've written about your question on my own blog posts where you can also get free trial software called SecureConnect that would protect you from hackers and doesn't have any adware etc on http://www.geid.co.uk/ [geid.co.uk]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265172</id>
	<title>Re:Keep it simple</title>
	<author>Anarchduke</author>
	<datestamp>1259502780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>As I see it, one of the advantages of a VPN is the ability to pass through government enforced firewalls, such as "the Great Firewall of China".  It also allows you to bypass that same firewall to get non censored information.  Not sure if this applies the questioners particular circumstances, but if you are going to be in a country that monitors or censors internet traffic, a vpn will help you avoid difficulties with local authorities.</htmltext>
<tokenext>As I see it , one of the advantages of a VPN is the ability to pass through government enforced firewalls , such as " the Great Firewall of China " .
It also allows you to bypass that same firewall to get non censored information .
Not sure if this applies the questioners particular circumstances , but if you are going to be in a country that monitors or censors internet traffic , a vpn will help you avoid difficulties with local authorities .</tokentext>
<sentencetext>As I see it, one of the advantages of a VPN is the ability to pass through government enforced firewalls, such as "the Great Firewall of China".
It also allows you to bypass that same firewall to get non censored information.
Not sure if this applies the questioners particular circumstances, but if you are going to be in a country that monitors or censors internet traffic, a vpn will help you avoid difficulties with local authorities.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264746</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266232</id>
	<title>leave the netbook home - use smart phone</title>
	<author>Anonymous</author>
	<datestamp>1259512680000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>When I travel, I use a little touch screen phone with wifi.<br>Just using the usual banking ssl to the phone browser avoids most of the potential problems.<br>I carry one of the little dlink mini wifi ap's (dwl-g730ap)  which even comes in a cute travel case<br>which gives me access to wired networks like in the hotel rooms.</p><p>Saves a ton of complexity, is pretty good security and a lot easier to keep track of (phone in pocket<br>is much safer than netbook in bag!<br>happy travels!</p></htmltext>
<tokenext>When I travel , I use a little touch screen phone with wifi.Just using the usual banking ssl to the phone browser avoids most of the potential problems.I carry one of the little dlink mini wifi ap 's ( dwl-g730ap ) which even comes in a cute travel casewhich gives me access to wired networks like in the hotel rooms.Saves a ton of complexity , is pretty good security and a lot easier to keep track of ( phone in pocketis much safer than netbook in bag ! happy travels !</tokentext>
<sentencetext>When I travel, I use a little touch screen phone with wifi.Just using the usual banking ssl to the phone browser avoids most of the potential problems.I carry one of the little dlink mini wifi ap's (dwl-g730ap)  which even comes in a cute travel casewhich gives me access to wired networks like in the hotel rooms.Saves a ton of complexity, is pretty good security and a lot easier to keep track of (phone in pocketis much safer than netbook in bag!happy travels!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263842</id>
	<title>Re:hello world!</title>
	<author>tokul</author>
	<datestamp>1259490180000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><blockquote><div><p>Use VNC?<nobr> <wbr></nobr>:)</p></div>
</blockquote><p>
From summary - "Keep in mind that many places have very poor bandwidth and latency."
<br>
VNC and SSH are out of question.</p></div>
	</htmltext>
<tokenext>Use VNC ?
: ) From summary - " Keep in mind that many places have very poor bandwidth and latency .
" VNC and SSH are out of question .</tokentext>
<sentencetext>Use VNC?
:)

From summary - "Keep in mind that many places have very poor bandwidth and latency.
"

VNC and SSH are out of question.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263778</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265422</id>
	<title>Witopia</title>
	<author>Anonymous</author>
	<datestamp>1259506380000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p> <a href="http://www.witopia.net/" title="witopia.net" rel="nofollow">Witopia</a> [witopia.net] is what you need.

</p><p>$40/year.  Use it!

</p><p>You're welcome.</p></htmltext>
<tokenext>Witopia [ witopia.net ] is what you need .
$ 40/year. Use it !
You 're welcome .</tokentext>
<sentencetext> Witopia [witopia.net] is what you need.
$40/year.  Use it!
You're welcome.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265346</id>
	<title>IronKey</title>
	<author>medotsteve</author>
	<datestamp>1259505360000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext>IronKey is an encrypted USB drive--strong encryption (i.e. passes DoD standards).  The drive will allow you to store all of your personal data.  In addition the drive has a a Firefox Web browser installed, so you never have to run a hotels (etc..) software.  With the embeded browser you connect to the IronKey's Secure Sessions service.  The service acts like a proxy Web server and triple encrypts your surfing traffic.  The service also uses secure DNS services.

One of the coolest features is that it stores all of your passwords on the drive.  You never have to worry about keystroke logging because the IronKey

This product sounds like a wini-win for the global traveler, or even a modest business traveler.</htmltext>
<tokenext>IronKey is an encrypted USB drive--strong encryption ( i.e .
passes DoD standards ) .
The drive will allow you to store all of your personal data .
In addition the drive has a a Firefox Web browser installed , so you never have to run a hotels ( etc.. ) software .
With the embeded browser you connect to the IronKey 's Secure Sessions service .
The service acts like a proxy Web server and triple encrypts your surfing traffic .
The service also uses secure DNS services .
One of the coolest features is that it stores all of your passwords on the drive .
You never have to worry about keystroke logging because the IronKey This product sounds like a wini-win for the global traveler , or even a modest business traveler .</tokentext>
<sentencetext>IronKey is an encrypted USB drive--strong encryption (i.e.
passes DoD standards).
The drive will allow you to store all of your personal data.
In addition the drive has a a Firefox Web browser installed, so you never have to run a hotels (etc..) software.
With the embeded browser you connect to the IronKey's Secure Sessions service.
The service acts like a proxy Web server and triple encrypts your surfing traffic.
The service also uses secure DNS services.
One of the coolest features is that it stores all of your passwords on the drive.
You never have to worry about keystroke logging because the IronKey

This product sounds like a wini-win for the global traveler, or even a modest business traveler.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266252</id>
	<title>Why do you need access?</title>
	<author>CohibaVancouver</author>
	<datestamp>1259512980000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Many many years before the internet, people went backpacking for a year without any problems.  They dealt with their bank via phone or someone trusted back home.  Why do you need 'secure' access to these systems from far?</htmltext>
<tokenext>Many many years before the internet , people went backpacking for a year without any problems .
They dealt with their bank via phone or someone trusted back home .
Why do you need 'secure ' access to these systems from far ?</tokentext>
<sentencetext>Many many years before the internet, people went backpacking for a year without any problems.
They dealt with their bank via phone or someone trusted back home.
Why do you need 'secure' access to these systems from far?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265274</id>
	<title>Re:Keep it simple</title>
	<author>Anonymous</author>
	<datestamp>1259504280000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>As someone who has spent a few months backpacking, both with and without a laptop, I'd agree with what the parent poster said. Physical theft is likely to be the biggest problem. If you can avoid taking a laptop and us</p><p>SSL/HTTPS will keep your data secure, as long as you're careful to use it. To be doubly secure, follow the other posters advice and get a VPN of some sort. It's cheap.</p><p>As for physical security, most hostels have free internet, but shared rooms. Unless you lock everything up in a locker, there's a chance that your stuff will be stolen. It is tough locking your laptop up while also leaving it plugged in to charge, so get a cable lock for it and use it. Buy a large USB key (4gb+) and use that as a backup for your images or other things you don't want to lose, and keep it in your money pouch around your waste at all times, even while you're sleeping. One where the plug pulls into the case is likely to survive damage better. Make sure you backup your images every couple days, keeping a copy on your USB key and on your laptop. When your USB key is full, mail it home and start on a new one.</p></htmltext>
<tokenext>As someone who has spent a few months backpacking , both with and without a laptop , I 'd agree with what the parent poster said .
Physical theft is likely to be the biggest problem .
If you can avoid taking a laptop and usSSL/HTTPS will keep your data secure , as long as you 're careful to use it .
To be doubly secure , follow the other posters advice and get a VPN of some sort .
It 's cheap.As for physical security , most hostels have free internet , but shared rooms .
Unless you lock everything up in a locker , there 's a chance that your stuff will be stolen .
It is tough locking your laptop up while also leaving it plugged in to charge , so get a cable lock for it and use it .
Buy a large USB key ( 4gb + ) and use that as a backup for your images or other things you do n't want to lose , and keep it in your money pouch around your waste at all times , even while you 're sleeping .
One where the plug pulls into the case is likely to survive damage better .
Make sure you backup your images every couple days , keeping a copy on your USB key and on your laptop .
When your USB key is full , mail it home and start on a new one .</tokentext>
<sentencetext>As someone who has spent a few months backpacking, both with and without a laptop, I'd agree with what the parent poster said.
Physical theft is likely to be the biggest problem.
If you can avoid taking a laptop and usSSL/HTTPS will keep your data secure, as long as you're careful to use it.
To be doubly secure, follow the other posters advice and get a VPN of some sort.
It's cheap.As for physical security, most hostels have free internet, but shared rooms.
Unless you lock everything up in a locker, there's a chance that your stuff will be stolen.
It is tough locking your laptop up while also leaving it plugged in to charge, so get a cable lock for it and use it.
Buy a large USB key (4gb+) and use that as a backup for your images or other things you don't want to lose, and keep it in your money pouch around your waste at all times, even while you're sleeping.
One where the plug pulls into the case is likely to survive damage better.
Make sure you backup your images every couple days, keeping a copy on your USB key and on your laptop.
When your USB key is full, mail it home and start on a new one.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264106</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266152</id>
	<title>Re:dm-crypt</title>
	<author>Anonymous</author>
	<datestamp>1259512020000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Yes, remember that your credit card number is stored in Firefox, unless every website remembered to flag autocomplete off in that field.</p><p>https://bugzilla.mozilla.org/show\_bug.cgi?id=188285</p><p>For whatever ideological reason (e.g "it is the website's responsibility", "credit cards are no different than other information") they won't fix this.</p></htmltext>
<tokenext>Yes , remember that your credit card number is stored in Firefox , unless every website remembered to flag autocomplete off in that field.https : //bugzilla.mozilla.org/show \ _bug.cgi ? id = 188285For whatever ideological reason ( e.g " it is the website 's responsibility " , " credit cards are no different than other information " ) they wo n't fix this .</tokentext>
<sentencetext>Yes, remember that your credit card number is stored in Firefox, unless every website remembered to flag autocomplete off in that field.https://bugzilla.mozilla.org/show\_bug.cgi?id=188285For whatever ideological reason (e.g "it is the website's responsibility", "credit cards are no different than other information") they won't fix this.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264494</id>
	<title>wrong question</title>
	<author>Anonymous</author>
	<datestamp>1259496120000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>4</modscore>
	<htmltext>I've spent a month in Ecuador, and in my experience, the OP is focusing on the wrong problem. Backpacking in South America means being around a lot of people who make less money in a year than you make in a week. On this trip, I had a pair of prescription sunglasses and a pair of nice gore-tex hiking boots, and they constantly made me the focus of attention from people who wanted to know how much they cost, etc. One time coming down a trail in the Andes, I passed a kid who looked like he was about 12, chopping bananas with a machete. He said, "Dime los lentos," meaning "Give me the glasses." I just increased my hiking speed, and it turned out that he didn't hack me to death. So carrying a netbook in this social environment does bring up a whole bunch of issues about being victimized, but they aren't issues with having your PayPal password stolen, they're issues with getting mugged by someone who wants your computer, which is worth more than they make make in several months. My advice is not to bring the netbook. If you're worried about keyloggers in internet cafes, bring a bootable CD.</htmltext>
<tokenext>I 've spent a month in Ecuador , and in my experience , the OP is focusing on the wrong problem .
Backpacking in South America means being around a lot of people who make less money in a year than you make in a week .
On this trip , I had a pair of prescription sunglasses and a pair of nice gore-tex hiking boots , and they constantly made me the focus of attention from people who wanted to know how much they cost , etc .
One time coming down a trail in the Andes , I passed a kid who looked like he was about 12 , chopping bananas with a machete .
He said , " Dime los lentos , " meaning " Give me the glasses .
" I just increased my hiking speed , and it turned out that he did n't hack me to death .
So carrying a netbook in this social environment does bring up a whole bunch of issues about being victimized , but they are n't issues with having your PayPal password stolen , they 're issues with getting mugged by someone who wants your computer , which is worth more than they make make in several months .
My advice is not to bring the netbook .
If you 're worried about keyloggers in internet cafes , bring a bootable CD .</tokentext>
<sentencetext>I've spent a month in Ecuador, and in my experience, the OP is focusing on the wrong problem.
Backpacking in South America means being around a lot of people who make less money in a year than you make in a week.
On this trip, I had a pair of prescription sunglasses and a pair of nice gore-tex hiking boots, and they constantly made me the focus of attention from people who wanted to know how much they cost, etc.
One time coming down a trail in the Andes, I passed a kid who looked like he was about 12, chopping bananas with a machete.
He said, "Dime los lentos," meaning "Give me the glasses.
" I just increased my hiking speed, and it turned out that he didn't hack me to death.
So carrying a netbook in this social environment does bring up a whole bunch of issues about being victimized, but they aren't issues with having your PayPal password stolen, they're issues with getting mugged by someone who wants your computer, which is worth more than they make make in several months.
My advice is not to bring the netbook.
If you're worried about keyloggers in internet cafes, bring a bootable CD.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268478</id>
	<title>Re:are you sure you're asking the right question?</title>
	<author>pjt33</author>
	<datestamp>1259581380000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>Backing up your digital pics isn't that hard anyway. Any city will have loads of shops where you can get the contents of your SD card burned to CD while you wait. Get two copies and you can post one home (or to parents or a friend) as a precaution against physical loss.</p></htmltext>
<tokenext>Backing up your digital pics is n't that hard anyway .
Any city will have loads of shops where you can get the contents of your SD card burned to CD while you wait .
Get two copies and you can post one home ( or to parents or a friend ) as a precaution against physical loss .</tokentext>
<sentencetext>Backing up your digital pics isn't that hard anyway.
Any city will have loads of shops where you can get the contents of your SD card burned to CD while you wait.
Get two copies and you can post one home (or to parents or a friend) as a precaution against physical loss.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263964</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264516</id>
	<title>Sleep with your netbook!</title>
	<author>ElectricHaggis</author>
	<datestamp>1259496240000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Honestly, this isn't some weird geek porn fetish. If you're travelling in Hostels or even Hotels, sleep with your passport, cards &amp; your netbook. I've heard of people waking up to strangers in their room feeling under the pillow they're sleeping on, so it's best of tucked in with you. An added advantage if travelling alone and you get lonely, you could call it Mary and<nobr> <wbr></nobr>...</htmltext>
<tokenext>Honestly , this is n't some weird geek porn fetish .
If you 're travelling in Hostels or even Hotels , sleep with your passport , cards &amp; your netbook .
I 've heard of people waking up to strangers in their room feeling under the pillow they 're sleeping on , so it 's best of tucked in with you .
An added advantage if travelling alone and you get lonely , you could call it Mary and .. .</tokentext>
<sentencetext>Honestly, this isn't some weird geek porn fetish.
If you're travelling in Hostels or even Hotels, sleep with your passport, cards &amp; your netbook.
I've heard of people waking up to strangers in their room feeling under the pillow they're sleeping on, so it's best of tucked in with you.
An added advantage if travelling alone and you get lonely, you could call it Mary and ...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267894</id>
	<title>Fighting through the crud...</title>
	<author>Anonymous</author>
	<datestamp>1259572920000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>To help you fight your way through the crud and the sound suggestions I say; vpn, vpn, vpn.</p></htmltext>
<tokenext>To help you fight your way through the crud and the sound suggestions I say ; vpn , vpn , vpn .</tokentext>
<sentencetext>To help you fight your way through the crud and the sound suggestions I say; vpn, vpn, vpn.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264928</id>
	<title>Dreamhost + SSH</title>
	<author>horatio</author>
	<datestamp>1259500080000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext>You said you don't have anything at home to tunnel through.  Assuming that VPN really isn't a viable option, you can use ssh with a hosting provider like dreamhost (or a buddy's state-side server) to run a SOCKS proxy.  The downside is that whatever app you're running (afaik) needs to understand how to use a SOCKS proxy, which Firefox/Safari/IE all do, as well as several of the more well-known IM apps like GAIM.<br> <br>

from your local system: $ ssh -D1080 yourserver.dreamhost.com

(or use PuTTY if you're on windows, and set up a dynamic port forward)<br> <br>

If you're in OS X, use your system&gt;network settings to set up a global SOCKS proxy, which Safari will automagically use.  If you're in Windows, use Firefox's proxy settings (Tools &gt; Options &gt; Advanced &gt; Network &gt; Settings &gt; Manual Proxy Config)<br> <br>

your SOCKS host is localhost, and the port is 1080 (or whatever you pick when you're creating the tunnel).<br> <br>

There are a couple of tricks to this.  One is that you can't connect to anything as long as your settings specify to use a SOCKS proxy and the tunnel isn't open.  For the places that have the "welcome to our intarweb access" redirects, you'll want to disable the SOCKS proxy settings until you get through that finished.  Otherwise, you won't be able to open the tunnel, and it will appear as if you can't  connect to anything.  Firefox has a <a href="https://addons.mozilla.org/en-US/firefox/addon/1557" title="mozilla.org">QuickProxy</a> [mozilla.org] addon which makes this easier.<br> <br>

The second is that you can make sure that the proxy is active by a) visiting a "check my IP address" site to make sure it is showing up as your hosting provider or b) killing the tunnel and all web traffic should stop working.<br> <br>

<a href="http://sentineljones.livejournal.com/14147.html" title="livejournal.com">more info</a> [livejournal.com]</htmltext>
<tokenext>You said you do n't have anything at home to tunnel through .
Assuming that VPN really is n't a viable option , you can use ssh with a hosting provider like dreamhost ( or a buddy 's state-side server ) to run a SOCKS proxy .
The downside is that whatever app you 're running ( afaik ) needs to understand how to use a SOCKS proxy , which Firefox/Safari/IE all do , as well as several of the more well-known IM apps like GAIM .
from your local system : $ ssh -D1080 yourserver.dreamhost.com ( or use PuTTY if you 're on windows , and set up a dynamic port forward ) If you 're in OS X , use your system &gt; network settings to set up a global SOCKS proxy , which Safari will automagically use .
If you 're in Windows , use Firefox 's proxy settings ( Tools &gt; Options &gt; Advanced &gt; Network &gt; Settings &gt; Manual Proxy Config ) your SOCKS host is localhost , and the port is 1080 ( or whatever you pick when you 're creating the tunnel ) .
There are a couple of tricks to this .
One is that you ca n't connect to anything as long as your settings specify to use a SOCKS proxy and the tunnel is n't open .
For the places that have the " welcome to our intarweb access " redirects , you 'll want to disable the SOCKS proxy settings until you get through that finished .
Otherwise , you wo n't be able to open the tunnel , and it will appear as if you ca n't connect to anything .
Firefox has a QuickProxy [ mozilla.org ] addon which makes this easier .
The second is that you can make sure that the proxy is active by a ) visiting a " check my IP address " site to make sure it is showing up as your hosting provider or b ) killing the tunnel and all web traffic should stop working .
more info [ livejournal.com ]</tokentext>
<sentencetext>You said you don't have anything at home to tunnel through.
Assuming that VPN really isn't a viable option, you can use ssh with a hosting provider like dreamhost (or a buddy's state-side server) to run a SOCKS proxy.
The downside is that whatever app you're running (afaik) needs to understand how to use a SOCKS proxy, which Firefox/Safari/IE all do, as well as several of the more well-known IM apps like GAIM.
from your local system: $ ssh -D1080 yourserver.dreamhost.com

(or use PuTTY if you're on windows, and set up a dynamic port forward) 

If you're in OS X, use your system&gt;network settings to set up a global SOCKS proxy, which Safari will automagically use.
If you're in Windows, use Firefox's proxy settings (Tools &gt; Options &gt; Advanced &gt; Network &gt; Settings &gt; Manual Proxy Config) 

your SOCKS host is localhost, and the port is 1080 (or whatever you pick when you're creating the tunnel).
There are a couple of tricks to this.
One is that you can't connect to anything as long as your settings specify to use a SOCKS proxy and the tunnel isn't open.
For the places that have the "welcome to our intarweb access" redirects, you'll want to disable the SOCKS proxy settings until you get through that finished.
Otherwise, you won't be able to open the tunnel, and it will appear as if you can't  connect to anything.
Firefox has a QuickProxy [mozilla.org] addon which makes this easier.
The second is that you can make sure that the proxy is active by a) visiting a "check my IP address" site to make sure it is showing up as your hosting provider or b) killing the tunnel and all web traffic should stop working.
more info [livejournal.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264240</id>
	<title>It's not the network, it's the keystrokes!</title>
	<author>grouchyDude</author>
	<datestamp>1259493960000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I think SLL encryption as used by most serious places will be sufficient.  The Royal Bank of Canada had a bad certificate for their main investment site for a while, but barring such foolishness the SSL and attention to warnings will probably be fine in terms of the actual network traffic.  I think the biggest risk, however, is that there could be a key logger at a public site and these are easy to find and install, and a pain to circumvent unless you have control of some key parts of the process.</p></htmltext>
<tokenext>I think SLL encryption as used by most serious places will be sufficient .
The Royal Bank of Canada had a bad certificate for their main investment site for a while , but barring such foolishness the SSL and attention to warnings will probably be fine in terms of the actual network traffic .
I think the biggest risk , however , is that there could be a key logger at a public site and these are easy to find and install , and a pain to circumvent unless you have control of some key parts of the process .</tokentext>
<sentencetext>I think SLL encryption as used by most serious places will be sufficient.
The Royal Bank of Canada had a bad certificate for their main investment site for a while, but barring such foolishness the SSL and attention to warnings will probably be fine in terms of the actual network traffic.
I think the biggest risk, however, is that there could be a key logger at a public site and these are easy to find and install, and a pain to circumvent unless you have control of some key parts of the process.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268784</id>
	<title>ur security</title>
	<author>Anonymous</author>
	<datestamp>1259585700000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I guess that u need to be more concerned with your personal security than the security of your connections or the laptop itself...</p><p>In south america (I am from Brazil and know pretty much all the countries there) will be more plausible to steal you physically speaking then digitally / virtually speaking.</p><p>So take care!</p></htmltext>
<tokenext>I guess that u need to be more concerned with your personal security than the security of your connections or the laptop itself...In south america ( I am from Brazil and know pretty much all the countries there ) will be more plausible to steal you physically speaking then digitally / virtually speaking.So take care !</tokentext>
<sentencetext>I guess that u need to be more concerned with your personal security than the security of your connections or the laptop itself...In south america (I am from Brazil and know pretty much all the countries there) will be more plausible to steal you physically speaking then digitally / virtually speaking.So take care!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264208</id>
	<title>Re:are you sure you're asking the right question?</title>
	<author>vlm</author>
	<datestamp>1259493780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>you're going travelling, to experience new cultures, people and ideas</p></div><p>How would I do that without inet access?  Seriously?  I guess in the more 3rd world areas they still print out flyers and newspapers, and use paper maps, and don't use social networking sites, but in the more developed areas they'll think you're a visiting Amish.  Restaurant reviews, hotel reviews, tourist trap reviews, train/bus/plane schedules... And remember to bookmark webmd.com or whatever for Montezumas Revenge.</p></div>
	</htmltext>
<tokenext>you 're going travelling , to experience new cultures , people and ideasHow would I do that without inet access ?
Seriously ? I guess in the more 3rd world areas they still print out flyers and newspapers , and use paper maps , and do n't use social networking sites , but in the more developed areas they 'll think you 're a visiting Amish .
Restaurant reviews , hotel reviews , tourist trap reviews , train/bus/plane schedules... And remember to bookmark webmd.com or whatever for Montezumas Revenge .</tokentext>
<sentencetext>you're going travelling, to experience new cultures, people and ideasHow would I do that without inet access?
Seriously?  I guess in the more 3rd world areas they still print out flyers and newspapers, and use paper maps, and don't use social networking sites, but in the more developed areas they'll think you're a visiting Amish.
Restaurant reviews, hotel reviews, tourist trap reviews, train/bus/plane schedules... And remember to bookmark webmd.com or whatever for Montezumas Revenge.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264356</id>
	<title>Re:dm-crypt</title>
	<author>Anonymous</author>
	<datestamp>1259494860000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Well if you're stupid enough to allow Firefox to "remember" your passwords you deserve to have your information stolen.  Cripes people, use your brains.</p></htmltext>
<tokenext>Well if you 're stupid enough to allow Firefox to " remember " your passwords you deserve to have your information stolen .
Cripes people , use your brains .</tokentext>
<sentencetext>Well if you're stupid enough to allow Firefox to "remember" your passwords you deserve to have your information stolen.
Cripes people, use your brains.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264264</id>
	<title>Re:Tunnel the traffic</title>
	<author>Anonymous</author>
	<datestamp>1259494140000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Of course - if you *loose* your drive, you will have to spend many painful hours glueing all the bits back into the drive!</p></htmltext>
<tokenext>Of course - if you * loose * your drive , you will have to spend many painful hours glueing all the bits back into the drive !</tokentext>
<sentencetext>Of course - if you *loose* your drive, you will have to spend many painful hours glueing all the bits back into the drive!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263824</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265318</id>
	<title>The solution can be lowtech</title>
	<author>Anonymous</author>
	<datestamp>1259504940000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>How about opening a separate account just for online transactions?  And transfer money from your main account to that account only as needed, and do it only by phone.  That way if your online transaction account is compromised, your lost is limited.</p></htmltext>
<tokenext>How about opening a separate account just for online transactions ?
And transfer money from your main account to that account only as needed , and do it only by phone .
That way if your online transaction account is compromised , your lost is limited .</tokentext>
<sentencetext>How about opening a separate account just for online transactions?
And transfer money from your main account to that account only as needed, and do it only by phone.
That way if your online transaction account is compromised, your lost is limited.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264066</id>
	<title>don't bother</title>
	<author>spongman</author>
	<datestamp>1259492400000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>0</modscore>
	<htmltext><p>take your credit card, the phone number of someone who can wire you money in an emergency. set stop orders on your investment accounts. leave the rest at home.</p></htmltext>
<tokenext>take your credit card , the phone number of someone who can wire you money in an emergency .
set stop orders on your investment accounts .
leave the rest at home .</tokentext>
<sentencetext>take your credit card, the phone number of someone who can wire you money in an emergency.
set stop orders on your investment accounts.
leave the rest at home.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264342</id>
	<title>For homebanking, etc..</title>
	<author>nunoloureiro</author>
	<datestamp>1259494740000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext>

For homebanking and similar sites, in order to prevent man-in-the-middle attacks, make sure you bookmark the HTTPS URL, so the first hit on the bank's httpd is HTTPS and not HTTP. Also, add the address of your homebanking to<nobr> <wbr></nobr>/etc/hosts, so you don't really rely on DNS for that.</htmltext>
<tokenext>For homebanking and similar sites , in order to prevent man-in-the-middle attacks , make sure you bookmark the HTTPS URL , so the first hit on the bank 's httpd is HTTPS and not HTTP .
Also , add the address of your homebanking to /etc/hosts , so you do n't really rely on DNS for that .</tokentext>
<sentencetext>

For homebanking and similar sites, in order to prevent man-in-the-middle attacks, make sure you bookmark the HTTPS URL, so the first hit on the bank's httpd is HTTPS and not HTTP.
Also, add the address of your homebanking to /etc/hosts, so you don't really rely on DNS for that.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264270</id>
	<title>Re:SSH &amp; SOCKS Proxy</title>
	<author>Krneki</author>
	<datestamp>1259494140000</datestamp>
	<modclass>Troll</modclass>
	<modscore>1</modscore>
	<htmltext>This.<br><br>Or get a classic WRT54GL router with tomato. So you can connect to your home SSH server (SSH service running on tomato).<br>Also keep an eye on your firewall and remove all the exception you don't know what they are for, if you are running Windows. If you are on Linux you are safe of course.<br><br>If you use public Internet caffe, get Firefox portable on USB stick and configure it to use your SSH tunnel. You don't need any Admin privileges to make it work. Also very effective to bypass any firewall that might be setup (China).</htmltext>
<tokenext>This.Or get a classic WRT54GL router with tomato .
So you can connect to your home SSH server ( SSH service running on tomato ) .Also keep an eye on your firewall and remove all the exception you do n't know what they are for , if you are running Windows .
If you are on Linux you are safe of course.If you use public Internet caffe , get Firefox portable on USB stick and configure it to use your SSH tunnel .
You do n't need any Admin privileges to make it work .
Also very effective to bypass any firewall that might be setup ( China ) .</tokentext>
<sentencetext>This.Or get a classic WRT54GL router with tomato.
So you can connect to your home SSH server (SSH service running on tomato).Also keep an eye on your firewall and remove all the exception you don't know what they are for, if you are running Windows.
If you are on Linux you are safe of course.If you use public Internet caffe, get Firefox portable on USB stick and configure it to use your SSH tunnel.
You don't need any Admin privileges to make it work.
Also very effective to bypass any firewall that might be setup (China).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263786</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265140</id>
	<title>ironkey</title>
	<author>Anonymous</author>
	<datestamp>1259502300000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>you might also try IRONKEY -- an ultra encrypted USB key that comes w/ ability to connect via SSH through their servers.</p></htmltext>
<tokenext>you might also try IRONKEY -- an ultra encrypted USB key that comes w/ ability to connect via SSH through their servers .</tokentext>
<sentencetext>you might also try IRONKEY -- an ultra encrypted USB key that comes w/ ability to connect via SSH through their servers.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264590</id>
	<title>Opera mini and the gmail applet are useful as well</title>
	<author>kroyd</author>
	<datestamp>1259496900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>This is in addition to the earlier posts:</p><p>Make sure your phone is GSM and unlocked, and you can pick up a cheap "pay as you go" sim card in most countries. GPRS is slow, but with the Opera Mini browser (http://mobile.opera.com/next) and the Gmail applet (http://mail.google.com/mobile) it is quite cheap to stay connected, and often much more convenient than trying to find a wifi hotspot.</p><p>Post your new number on facebook or similar if people need to keep in touch with you..</p><p>If you don't speak the local language a local pone number is quite useful - imagine it is late and you're lost you can call the place you're planning to stay, and have them explain how to get there to the taxi driver. (That call would probably cost more than the stay if you used your US SIM card<nobr> <wbr></nobr>;)</p></htmltext>
<tokenext>This is in addition to the earlier posts : Make sure your phone is GSM and unlocked , and you can pick up a cheap " pay as you go " sim card in most countries .
GPRS is slow , but with the Opera Mini browser ( http : //mobile.opera.com/next ) and the Gmail applet ( http : //mail.google.com/mobile ) it is quite cheap to stay connected , and often much more convenient than trying to find a wifi hotspot.Post your new number on facebook or similar if people need to keep in touch with you..If you do n't speak the local language a local pone number is quite useful - imagine it is late and you 're lost you can call the place you 're planning to stay , and have them explain how to get there to the taxi driver .
( That call would probably cost more than the stay if you used your US SIM card ; )</tokentext>
<sentencetext>This is in addition to the earlier posts:Make sure your phone is GSM and unlocked, and you can pick up a cheap "pay as you go" sim card in most countries.
GPRS is slow, but with the Opera Mini browser (http://mobile.opera.com/next) and the Gmail applet (http://mail.google.com/mobile) it is quite cheap to stay connected, and often much more convenient than trying to find a wifi hotspot.Post your new number on facebook or similar if people need to keep in touch with you..If you don't speak the local language a local pone number is quite useful - imagine it is late and you're lost you can call the place you're planning to stay, and have them explain how to get there to the taxi driver.
(That call would probably cost more than the stay if you used your US SIM card ;)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266114</id>
	<title>Phone Banking</title>
	<author>deboli</author>
	<datestamp>1259511780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Bringing a netbook is great for blogs and photos and e-mail, etc but I would not do any banking over it. Get an account that offers phone banking and transfer money that way. IDD charges are not that high and your phone is more secure if you don't want to go to great length securing your computer.</p></htmltext>
<tokenext>Bringing a netbook is great for blogs and photos and e-mail , etc but I would not do any banking over it .
Get an account that offers phone banking and transfer money that way .
IDD charges are not that high and your phone is more secure if you do n't want to go to great length securing your computer .</tokentext>
<sentencetext>Bringing a netbook is great for blogs and photos and e-mail, etc but I would not do any banking over it.
Get an account that offers phone banking and transfer money that way.
IDD charges are not that high and your phone is more secure if you don't want to go to great length securing your computer.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268058</id>
	<title>Re:SSH &amp; SOCKS Proxy</title>
	<author>bemymonkey</author>
	<datestamp>1259575260000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Same here... the bog-standard Fritz!Box router I got from my ISP years ago has a VPN server built right into the server. I VPN in from whereever I'm surfing from (including shady public networks) before doing anything requiring the transfer of sensitive information...</p></htmltext>
<tokenext>Same here... the bog-standard Fritz ! Box router I got from my ISP years ago has a VPN server built right into the server .
I VPN in from whereever I 'm surfing from ( including shady public networks ) before doing anything requiring the transfer of sensitive information.. .</tokentext>
<sentencetext>Same here... the bog-standard Fritz!Box router I got from my ISP years ago has a VPN server built right into the server.
I VPN in from whereever I'm surfing from (including shady public networks) before doing anything requiring the transfer of sensitive information...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267324</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263746</id>
	<title>OpenVPN</title>
	<author>Anonymous</author>
	<datestamp>1259489460000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>0</modscore>
	<htmltext><p>Set up an OpenVPN system at home and remotely connect to it, giving you high quality (AES) over-the-air encryption, even on an open and unencrypted system.</p></htmltext>
<tokenext>Set up an OpenVPN system at home and remotely connect to it , giving you high quality ( AES ) over-the-air encryption , even on an open and unencrypted system .</tokentext>
<sentencetext>Set up an OpenVPN system at home and remotely connect to it, giving you high quality (AES) over-the-air encryption, even on an open and unencrypted system.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270576</id>
	<title>Re:For homebanking, etc..</title>
	<author>muckracer</author>
	<datestamp>1259600520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>&gt; make sure you bookmark the HTTPS URL, so the first hit on the bank's httpd<br>&gt; is HTTPS and not HTTP</p><p>I'd love to see a FF plugin, that checks for the availability of an HTTPS<br>version before bookmarking a site (and suggests accordingly). Always hate<br>having to try manually, though it's quite eye-opening to see, just how few<br>sites actually use it and even less, who implement SSL correctly.</p></htmltext>
<tokenext>&gt; make sure you bookmark the HTTPS URL , so the first hit on the bank 's httpd &gt; is HTTPS and not HTTPI 'd love to see a FF plugin , that checks for the availability of an HTTPSversion before bookmarking a site ( and suggests accordingly ) .
Always hatehaving to try manually , though it 's quite eye-opening to see , just how fewsites actually use it and even less , who implement SSL correctly .</tokentext>
<sentencetext>&gt; make sure you bookmark the HTTPS URL, so the first hit on the bank's httpd&gt; is HTTPS and not HTTPI'd love to see a FF plugin, that checks for the availability of an HTTPSversion before bookmarking a site (and suggests accordingly).
Always hatehaving to try manually, though it's quite eye-opening to see, just how fewsites actually use it and even less, who implement SSL correctly.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264342</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264106</id>
	<title>Keep it simple</title>
	<author>teadrop</author>
	<datestamp>1259492760000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>5</modscore>
	<htmltext>I just returned from my backpacking trip. So here are my tips...
If you are using your own laptop, an effective firewall, a patched system, and the use of SSL is all you need. Since you are posting on Slashdot, I assume you are capable of keeping your own laptop clean and secured.

In reality the risk of someone stealing your laptop is much higher than the risk of anyone breaking into your laptop, so...
1) Some sort of chains/locks on your backpack is much more important than a VPN.
2) Do not store any password, sensitive documents on your laptop. In case it will be stolen later..
3) Keep backup of important documents (e.g. scan copy of your travel insurance) in a gmail account...
4) Do not keep all your vacation photos in one laptop, copy it to CD/DVD/cheap USB devices and send it home every few months.
5) Bring a USB drive and backup everything on your harddrive (including your vacation photos), store the USB drive in a different location (e.g. inside your main backpack)

If you are really desperate and have to access your bank in an internet cafe, here's what you can do...
1) To make it harder for key loggers to steal your password, scramble your url/password using your mouse. e.g. if your password is ILovePizza, you can type IHatePizza, highlight the word "Hate" with your mouse, click delete and type "Love" instead. It's not 100\% secured, but it's better than nothing.
2) As soon as you reach a safe location, change your password.</htmltext>
<tokenext>I just returned from my backpacking trip .
So here are my tips.. . If you are using your own laptop , an effective firewall , a patched system , and the use of SSL is all you need .
Since you are posting on Slashdot , I assume you are capable of keeping your own laptop clean and secured .
In reality the risk of someone stealing your laptop is much higher than the risk of anyone breaking into your laptop , so.. . 1 ) Some sort of chains/locks on your backpack is much more important than a VPN .
2 ) Do not store any password , sensitive documents on your laptop .
In case it will be stolen later. . 3 ) Keep backup of important documents ( e.g .
scan copy of your travel insurance ) in a gmail account.. . 4 ) Do not keep all your vacation photos in one laptop , copy it to CD/DVD/cheap USB devices and send it home every few months .
5 ) Bring a USB drive and backup everything on your harddrive ( including your vacation photos ) , store the USB drive in a different location ( e.g .
inside your main backpack ) If you are really desperate and have to access your bank in an internet cafe , here 's what you can do.. . 1 ) To make it harder for key loggers to steal your password , scramble your url/password using your mouse .
e.g. if your password is ILovePizza , you can type IHatePizza , highlight the word " Hate " with your mouse , click delete and type " Love " instead .
It 's not 100 \ % secured , but it 's better than nothing .
2 ) As soon as you reach a safe location , change your password .</tokentext>
<sentencetext>I just returned from my backpacking trip.
So here are my tips...
If you are using your own laptop, an effective firewall, a patched system, and the use of SSL is all you need.
Since you are posting on Slashdot, I assume you are capable of keeping your own laptop clean and secured.
In reality the risk of someone stealing your laptop is much higher than the risk of anyone breaking into your laptop, so...
1) Some sort of chains/locks on your backpack is much more important than a VPN.
2) Do not store any password, sensitive documents on your laptop.
In case it will be stolen later..
3) Keep backup of important documents (e.g.
scan copy of your travel insurance) in a gmail account...
4) Do not keep all your vacation photos in one laptop, copy it to CD/DVD/cheap USB devices and send it home every few months.
5) Bring a USB drive and backup everything on your harddrive (including your vacation photos), store the USB drive in a different location (e.g.
inside your main backpack)

If you are really desperate and have to access your bank in an internet cafe, here's what you can do...
1) To make it harder for key loggers to steal your password, scramble your url/password using your mouse.
e.g. if your password is ILovePizza, you can type IHatePizza, highlight the word "Hate" with your mouse, click delete and type "Love" instead.
It's not 100\% secured, but it's better than nothing.
2) As soon as you reach a safe location, change your password.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266078</id>
	<title>Re:OpenVPN, Christmas sale, free shipping discoun</title>
	<author>coolforsale134</author>
	<datestamp>1259511540000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>-1</modscore>
	<htmltext><a href="http://www.coolforsale.com/" title="coolforsale.com" rel="nofollow">http://www.coolforsale.com/</a> [coolforsale.com]  Dear ladies and gentlemen Hello, In order to meet Christmas, Site launched Christmas spree, welcome new and old customers come to participate in the there are unexpected surprises, look forward to your arrival. Only this site have this treatmentOur goal is "Best quality, Best reputation , Best services". Your satisfaction is our main pursue. You can find the best products from us, meeting your different needs. Ladies and Gentlemen weicome to my coolforsale.com.Here,there are the most fashion products . Pass by but don't miss it.Select your favorite clothing! Welcome to come next time ! Thank you! <a href="http://www.coolforsale.com/productlist.asp?id=s76" title="coolforsale.com" rel="nofollow">http://www.coolforsale.com/productlist.asp?id=s76</a> [coolforsale.com]   (Tracksuit w) ugg boot,POLO hoody,Jacket, Air jordan(1-24)shoes $33 Nike shox(R4,NZ,OZ,TL1,TL2,TL3) $35 Handbags(Coach lv fendi d&amp;g) $35 Tshirts (Polo<nobr> <wbr></nobr>,ed hardy,lacoste) $16 free shipping Thanks!!! Advance wish you a merry Christmas.</htmltext>
<tokenext>http : //www.coolforsale.com/ [ coolforsale.com ] Dear ladies and gentlemen Hello , In order to meet Christmas , Site launched Christmas spree , welcome new and old customers come to participate in the there are unexpected surprises , look forward to your arrival .
Only this site have this treatmentOur goal is " Best quality , Best reputation , Best services " .
Your satisfaction is our main pursue .
You can find the best products from us , meeting your different needs .
Ladies and Gentlemen weicome to my coolforsale.com.Here,there are the most fashion products .
Pass by but do n't miss it.Select your favorite clothing !
Welcome to come next time !
Thank you !
http : //www.coolforsale.com/productlist.asp ? id = s76 [ coolforsale.com ] ( Tracksuit w ) ugg boot,POLO hoody,Jacket , Air jordan ( 1-24 ) shoes $ 33 Nike shox ( R4,NZ,OZ,TL1,TL2,TL3 ) $ 35 Handbags ( Coach lv fendi d&amp;g ) $ 35 Tshirts ( Polo ,ed hardy,lacoste ) $ 16 free shipping Thanks ! ! !
Advance wish you a merry Christmas .</tokentext>
<sentencetext>http://www.coolforsale.com/ [coolforsale.com]  Dear ladies and gentlemen Hello, In order to meet Christmas, Site launched Christmas spree, welcome new and old customers come to participate in the there are unexpected surprises, look forward to your arrival.
Only this site have this treatmentOur goal is "Best quality, Best reputation , Best services".
Your satisfaction is our main pursue.
You can find the best products from us, meeting your different needs.
Ladies and Gentlemen weicome to my coolforsale.com.Here,there are the most fashion products .
Pass by but don't miss it.Select your favorite clothing!
Welcome to come next time !
Thank you!
http://www.coolforsale.com/productlist.asp?id=s76 [coolforsale.com]   (Tracksuit w) ugg boot,POLO hoody,Jacket, Air jordan(1-24)shoes $33 Nike shox(R4,NZ,OZ,TL1,TL2,TL3) $35 Handbags(Coach lv fendi d&amp;g) $35 Tshirts (Polo ,ed hardy,lacoste) $16 free shipping Thanks!!!
Advance wish you a merry Christmas.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263860</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263924</id>
	<title>Re:Good starting point</title>
	<author>Anonymous</author>
	<datestamp>1259490840000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>Well that probably makes sense given that it is a low powered netbook and probably doesn't have a TPM.<br> <br>For an even slightly more robust machine, use Windows 7 Ultimate with BitLocker and a strong password for your logon. Disable sleep and use hibernate instead to fend off those "cold memory attacks" that can be done on any OS. Disable any firewire ports to prevent any peer-to-peer memory attacks. Don't allow boot without a BitLocker PIN.<br> <br>You then don't care about any of those "Firefox stored my password" stuff that others have mentioned workarounds for. Theft becomes just the inconvenience and money lost in having to replace your machine - the risk of any data disclosure is negligible if your PIN / password combo are solid. Leave the Windows 7 firewall in the default mode - it blocks all inbound. Keep firefox (and the rest of the system) as up to date as possible with the spotty connections you'll be able to get. Consider a firefox update as more important than some youtube video or whatever.</htmltext>
<tokenext>Well that probably makes sense given that it is a low powered netbook and probably does n't have a TPM .
For an even slightly more robust machine , use Windows 7 Ultimate with BitLocker and a strong password for your logon .
Disable sleep and use hibernate instead to fend off those " cold memory attacks " that can be done on any OS .
Disable any firewire ports to prevent any peer-to-peer memory attacks .
Do n't allow boot without a BitLocker PIN .
You then do n't care about any of those " Firefox stored my password " stuff that others have mentioned workarounds for .
Theft becomes just the inconvenience and money lost in having to replace your machine - the risk of any data disclosure is negligible if your PIN / password combo are solid .
Leave the Windows 7 firewall in the default mode - it blocks all inbound .
Keep firefox ( and the rest of the system ) as up to date as possible with the spotty connections you 'll be able to get .
Consider a firefox update as more important than some youtube video or whatever .</tokentext>
<sentencetext>Well that probably makes sense given that it is a low powered netbook and probably doesn't have a TPM.
For an even slightly more robust machine, use Windows 7 Ultimate with BitLocker and a strong password for your logon.
Disable sleep and use hibernate instead to fend off those "cold memory attacks" that can be done on any OS.
Disable any firewire ports to prevent any peer-to-peer memory attacks.
Don't allow boot without a BitLocker PIN.
You then don't care about any of those "Firefox stored my password" stuff that others have mentioned workarounds for.
Theft becomes just the inconvenience and money lost in having to replace your machine - the risk of any data disclosure is negligible if your PIN / password combo are solid.
Leave the Windows 7 firewall in the default mode - it blocks all inbound.
Keep firefox (and the rest of the system) as up to date as possible with the spotty connections you'll be able to get.
Consider a firefox update as more important than some youtube video or whatever.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263808</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263910</id>
	<title>Re:dm-crypt</title>
	<author>AnomalyConcept</author>
	<datestamp>1259490780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>On Windows, TrueCrypt system partition encryption works as well.</htmltext>
<tokenext>On Windows , TrueCrypt system partition encryption works as well .</tokentext>
<sentencetext>On Windows, TrueCrypt system partition encryption works as well.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270844</id>
	<title>I have worked with laptops for 15 years.</title>
	<author>jotaeleemeese</author>
	<datestamp>1259602080000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>No if for me (touch wood) so far.</p><p>It is rather quite specious to say everybody will have his laptop stolen at some point.</p></htmltext>
<tokenext>No if for me ( touch wood ) so far.It is rather quite specious to say everybody will have his laptop stolen at some point .</tokentext>
<sentencetext>No if for me (touch wood) so far.It is rather quite specious to say everybody will have his laptop stolen at some point.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263888</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264394</id>
	<title>What exactly are you doing?</title>
	<author>Anonymous</author>
	<datestamp>1259495160000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>...to warrant the opinion that you think your life is simultaneously important enough that you require internet whenever/wherever you want it, and that you want to be as far away from everyone for an entire year as possible?
<br> <br>
You can have one or the other, not both.
<br> <br>
This goal that you have is quite farfetched! Do you think you will actually have a cheap netbook and "rough it" for 52 weeks and not have it stolen, break or sold for room and board? You have no business doing whatever the hell you are planning to do in South America.
<br> <br>
I'm guessing you're American, white and come from an upper-middle class upbringing. You must obviously know Spanish and/or Portugese, which will come in handy after you get kidnapped and brought into the jungles of Columbia for ransom.
<br> <br>
If you really must blog or check your day-trader stock options, go get a satphone and some sort of data package.</htmltext>
<tokenext>...to warrant the opinion that you think your life is simultaneously important enough that you require internet whenever/wherever you want it , and that you want to be as far away from everyone for an entire year as possible ?
You can have one or the other , not both .
This goal that you have is quite farfetched !
Do you think you will actually have a cheap netbook and " rough it " for 52 weeks and not have it stolen , break or sold for room and board ?
You have no business doing whatever the hell you are planning to do in South America .
I 'm guessing you 're American , white and come from an upper-middle class upbringing .
You must obviously know Spanish and/or Portugese , which will come in handy after you get kidnapped and brought into the jungles of Columbia for ransom .
If you really must blog or check your day-trader stock options , go get a satphone and some sort of data package .</tokentext>
<sentencetext>...to warrant the opinion that you think your life is simultaneously important enough that you require internet whenever/wherever you want it, and that you want to be as far away from everyone for an entire year as possible?
You can have one or the other, not both.
This goal that you have is quite farfetched!
Do you think you will actually have a cheap netbook and "rough it" for 52 weeks and not have it stolen, break or sold for room and board?
You have no business doing whatever the hell you are planning to do in South America.
I'm guessing you're American, white and come from an upper-middle class upbringing.
You must obviously know Spanish and/or Portugese, which will come in handy after you get kidnapped and brought into the jungles of Columbia for ransom.
If you really must blog or check your day-trader stock options, go get a satphone and some sort of data package.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30275284</id>
	<title>Re:Good starting point</title>
	<author>MrKaos</author>
	<datestamp>1259578140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>Use Linux.</p></div></blockquote><p>
It's fascinating that these two words went from a +3 insightful to a -1 flamebait. It shows that the multitude of M$ fanbois out there (fighting the good fight against evil open source) fear the end is near for their beloved windows, how pathetic.</p><p>
This endorsement was cited simply because Linux is immune to the three main issues of security that are primarily vectors for fraud to occur, viruses, malware/spyware and privilege escalation which are all Windows issues. I didn't need to explain what, inevitably, would have been explained by someone else. You M$ fanbois complain when someone says 'M$' and if anything that is a positive endorsement of Linux appears you mod it down, I may as well have written 'M$ Windoze$ $ux - lol' as it would have been treated the same juvenile way. You are Mind$laves.</p></div>
	</htmltext>
<tokenext>Use Linux .
It 's fascinating that these two words went from a + 3 insightful to a -1 flamebait .
It shows that the multitude of M $ fanbois out there ( fighting the good fight against evil open source ) fear the end is near for their beloved windows , how pathetic .
This endorsement was cited simply because Linux is immune to the three main issues of security that are primarily vectors for fraud to occur , viruses , malware/spyware and privilege escalation which are all Windows issues .
I did n't need to explain what , inevitably , would have been explained by someone else .
You M $ fanbois complain when someone says 'M $ ' and if anything that is a positive endorsement of Linux appears you mod it down , I may as well have written 'M $ Windoze $ $ ux - lol ' as it would have been treated the same juvenile way .
You are Mind $ laves .</tokentext>
<sentencetext>Use Linux.
It's fascinating that these two words went from a +3 insightful to a -1 flamebait.
It shows that the multitude of M$ fanbois out there (fighting the good fight against evil open source) fear the end is near for their beloved windows, how pathetic.
This endorsement was cited simply because Linux is immune to the three main issues of security that are primarily vectors for fraud to occur, viruses, malware/spyware and privilege escalation which are all Windows issues.
I didn't need to explain what, inevitably, would have been explained by someone else.
You M$ fanbois complain when someone says 'M$' and if anything that is a positive endorsement of Linux appears you mod it down, I may as well have written 'M$ Windoze$ $ux - lol' as it would have been treated the same juvenile way.
You are Mind$laves.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263808</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264310</id>
	<title>Physical security is a bigger problem.</title>
	<author>beegle</author>
	<datestamp>1259494500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>First, don't forget physical security. Assume that someone WILL attempt to steal your netbook.  Keep it in sight or locked up.  Encrypt as much as you can (whole hard drive if at all possible).  Make backups, even if that's just "webmail and flickr/picasa", to keep data loss to a minimum.</p><p>That said, I'd keep it simple.  Get everything for your online banking set up before you go.  Take a look at the certificates.  Don't worry too much, but just know whether your bank's certificate has the name of your bank or the name of some parent company.  Really, you want to know if something changes later.</p><p>Seriously consider two browsers: one for "safe" targeted work (checking bank balance, for example) and one for "browsing".  Personally, I'd use Firefox for the safe stuff and Opera for everything else.  The Opera Turbo <a href="http://www.opera.com/browser/turbo/" title="opera.com">http://www.opera.com/browser/turbo/</a> [opera.com] feature is really nice for slow or flaky connections.</p></htmltext>
<tokenext>First , do n't forget physical security .
Assume that someone WILL attempt to steal your netbook .
Keep it in sight or locked up .
Encrypt as much as you can ( whole hard drive if at all possible ) .
Make backups , even if that 's just " webmail and flickr/picasa " , to keep data loss to a minimum.That said , I 'd keep it simple .
Get everything for your online banking set up before you go .
Take a look at the certificates .
Do n't worry too much , but just know whether your bank 's certificate has the name of your bank or the name of some parent company .
Really , you want to know if something changes later.Seriously consider two browsers : one for " safe " targeted work ( checking bank balance , for example ) and one for " browsing " .
Personally , I 'd use Firefox for the safe stuff and Opera for everything else .
The Opera Turbo http : //www.opera.com/browser/turbo/ [ opera.com ] feature is really nice for slow or flaky connections .</tokentext>
<sentencetext>First, don't forget physical security.
Assume that someone WILL attempt to steal your netbook.
Keep it in sight or locked up.
Encrypt as much as you can (whole hard drive if at all possible).
Make backups, even if that's just "webmail and flickr/picasa", to keep data loss to a minimum.That said, I'd keep it simple.
Get everything for your online banking set up before you go.
Take a look at the certificates.
Don't worry too much, but just know whether your bank's certificate has the name of your bank or the name of some parent company.
Really, you want to know if something changes later.Seriously consider two browsers: one for "safe" targeted work (checking bank balance, for example) and one for "browsing".
Personally, I'd use Firefox for the safe stuff and Opera for everything else.
The Opera Turbo http://www.opera.com/browser/turbo/ [opera.com] feature is really nice for slow or flaky connections.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264746</id>
	<title>Re:Keep it simple</title>
	<author>Anonymous</author>
	<datestamp>1259498460000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>this is the first post i've read that says that ssl is sufficient. i tend to agree and can't wrap my non-ITGuy brain around why everyone is recommending a vpn. Can someone please explain? Should I not be trusting my browser's ssl certificate checks?</p></htmltext>
<tokenext>this is the first post i 've read that says that ssl is sufficient .
i tend to agree and ca n't wrap my non-ITGuy brain around why everyone is recommending a vpn .
Can someone please explain ?
Should I not be trusting my browser 's ssl certificate checks ?</tokentext>
<sentencetext>this is the first post i've read that says that ssl is sufficient.
i tend to agree and can't wrap my non-ITGuy brain around why everyone is recommending a vpn.
Can someone please explain?
Should I not be trusting my browser's ssl certificate checks?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264106</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263958</id>
	<title>Re:OpenVPN</title>
	<author>RichardJenkins</author>
	<datestamp>1259491260000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Well he said he couldn't do that. I'd say your best bet is to:</p><p>
&nbsp; * Make sure you have disk level encryption on your laptop (Truecrypt works well for Windows)<br>
&nbsp; * Create a small set of secure sites/services ahead of time you know you can trust, and need to use. Only go to these sites.<br>
&nbsp; * Don't forget email is typically sent plaintext - account for that if you need to<br>
&nbsp; * Put a firewall in place to block outgoing connections to port 80 and 25 in case you forget you're only visiting secure sites<br>
&nbsp; * Set up a VM for general browsing if you think you'll need it.<br>
&nbsp; * Keep a disc image handy so you can reset your laptop to a good state in case anything happens.<br>
&nbsp; * Remember that the whole Internet is public. You should assume that all the data you're going to send can be intercepted and manipulated all the time. Once you're working off that assumption, travelling and using a laptop doesn't seem to daunting.<br>
&nbsp; * Don't blame me when you're stranded somewhere with all your accounts cleaned out.</p></htmltext>
<tokenext>Well he said he could n't do that .
I 'd say your best bet is to :   * Make sure you have disk level encryption on your laptop ( Truecrypt works well for Windows )   * Create a small set of secure sites/services ahead of time you know you can trust , and need to use .
Only go to these sites .
  * Do n't forget email is typically sent plaintext - account for that if you need to   * Put a firewall in place to block outgoing connections to port 80 and 25 in case you forget you 're only visiting secure sites   * Set up a VM for general browsing if you think you 'll need it .
  * Keep a disc image handy so you can reset your laptop to a good state in case anything happens .
  * Remember that the whole Internet is public .
You should assume that all the data you 're going to send can be intercepted and manipulated all the time .
Once you 're working off that assumption , travelling and using a laptop does n't seem to daunting .
  * Do n't blame me when you 're stranded somewhere with all your accounts cleaned out .</tokentext>
<sentencetext>Well he said he couldn't do that.
I'd say your best bet is to:
  * Make sure you have disk level encryption on your laptop (Truecrypt works well for Windows)
  * Create a small set of secure sites/services ahead of time you know you can trust, and need to use.
Only go to these sites.
  * Don't forget email is typically sent plaintext - account for that if you need to
  * Put a firewall in place to block outgoing connections to port 80 and 25 in case you forget you're only visiting secure sites
  * Set up a VM for general browsing if you think you'll need it.
  * Keep a disc image handy so you can reset your laptop to a good state in case anything happens.
  * Remember that the whole Internet is public.
You should assume that all the data you're going to send can be intercepted and manipulated all the time.
Once you're working off that assumption, travelling and using a laptop doesn't seem to daunting.
  * Don't blame me when you're stranded somewhere with all your accounts cleaned out.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263746</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264822</id>
	<title>Re:Some Advice</title>
	<author>Jon Abbott</author>
	<datestamp>1259499120000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Your post is one of the most clearly written, informative posts I have read in a long while.</p></htmltext>
<tokenext>Your post is one of the most clearly written , informative posts I have read in a long while .</tokentext>
<sentencetext>Your post is one of the most clearly written, informative posts I have read in a long while.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264068</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268388</id>
	<title>Re:Good starting point</title>
	<author>Anonymous</author>
	<datestamp>1259579640000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I'm almost certain any netbook will not have a TPM.  For that functionality, you will need to have a business class machine.  Without a TPM, BitLocker can only run off a USB flash drive.  If the machine doesn't have a TPM, I highly recommend another WDE utility such as TrueCrypt, PGP, WinMagic, or others.</p><p>If it does have a TPM, I highly recommend using BitLocker if the OS has it available.  Mainly because you can configure it just as the AC said, requiring a PIN, but you can also configure it to require a PIN, and USB flash drive.  The advantage of this is that if your laptop is stolen and you still have possession of the flash drive, the thieves will not be able to do anything with the data stored on it.</p><p>Also, in Windows 7, there is a setting with the firewall to disallow all inbound connections, no exceptions.  Make sure this is selected.</p></htmltext>
<tokenext>I 'm almost certain any netbook will not have a TPM .
For that functionality , you will need to have a business class machine .
Without a TPM , BitLocker can only run off a USB flash drive .
If the machine does n't have a TPM , I highly recommend another WDE utility such as TrueCrypt , PGP , WinMagic , or others.If it does have a TPM , I highly recommend using BitLocker if the OS has it available .
Mainly because you can configure it just as the AC said , requiring a PIN , but you can also configure it to require a PIN , and USB flash drive .
The advantage of this is that if your laptop is stolen and you still have possession of the flash drive , the thieves will not be able to do anything with the data stored on it.Also , in Windows 7 , there is a setting with the firewall to disallow all inbound connections , no exceptions .
Make sure this is selected .</tokentext>
<sentencetext>I'm almost certain any netbook will not have a TPM.
For that functionality, you will need to have a business class machine.
Without a TPM, BitLocker can only run off a USB flash drive.
If the machine doesn't have a TPM, I highly recommend another WDE utility such as TrueCrypt, PGP, WinMagic, or others.If it does have a TPM, I highly recommend using BitLocker if the OS has it available.
Mainly because you can configure it just as the AC said, requiring a PIN, but you can also configure it to require a PIN, and USB flash drive.
The advantage of this is that if your laptop is stolen and you still have possession of the flash drive, the thieves will not be able to do anything with the data stored on it.Also, in Windows 7, there is a setting with the firewall to disallow all inbound connections, no exceptions.
Make sure this is selected.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263924</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264110</id>
	<title>Slashdotters never leave home</title>
	<author>Anonymous</author>
	<datestamp>1259492760000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>"Since my trip is so long I'll have no choice but to access my banking, credit card, and investment accounts on public networks."</p><p>All the comments about not needing a computer to access financial information are ignorant. You can't use a credit card without paying the balance. At least at my bank, they don't offer automatic ways of transferring from savings to credit accounts. If they did, they would not be able to collect as many fees for overdraft protection. (Banks in the USA collected $38 billion last year in these kind of charges, not exactly chump change.)</p><p>Given the current unstable nature of the world economic system, is it a sane move to ignore your investments for a year? Only if you have you money in a piggy bank and live in your parents basement.</p><p>Like I said, lots of Slashdot readers never do any real travel, so they have no concept of actual adult responsibilities.</p></htmltext>
<tokenext>" Since my trip is so long I 'll have no choice but to access my banking , credit card , and investment accounts on public networks .
" All the comments about not needing a computer to access financial information are ignorant .
You ca n't use a credit card without paying the balance .
At least at my bank , they do n't offer automatic ways of transferring from savings to credit accounts .
If they did , they would not be able to collect as many fees for overdraft protection .
( Banks in the USA collected $ 38 billion last year in these kind of charges , not exactly chump change .
) Given the current unstable nature of the world economic system , is it a sane move to ignore your investments for a year ?
Only if you have you money in a piggy bank and live in your parents basement.Like I said , lots of Slashdot readers never do any real travel , so they have no concept of actual adult responsibilities .</tokentext>
<sentencetext>"Since my trip is so long I'll have no choice but to access my banking, credit card, and investment accounts on public networks.
"All the comments about not needing a computer to access financial information are ignorant.
You can't use a credit card without paying the balance.
At least at my bank, they don't offer automatic ways of transferring from savings to credit accounts.
If they did, they would not be able to collect as many fees for overdraft protection.
(Banks in the USA collected $38 billion last year in these kind of charges, not exactly chump change.
)Given the current unstable nature of the world economic system, is it a sane move to ignore your investments for a year?
Only if you have you money in a piggy bank and live in your parents basement.Like I said, lots of Slashdot readers never do any real travel, so they have no concept of actual adult responsibilities.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270696</id>
	<title>Re:dm-crypt</title>
	<author>ergean</author>
	<datestamp>1259601360000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I don't know how it is where you live, but in my country (Romania) there is no bank that lets you log in using normal passwords. You need tokens with a pin and a password + user name.</p></htmltext>
<tokenext>I do n't know how it is where you live , but in my country ( Romania ) there is no bank that lets you log in using normal passwords .
You need tokens with a pin and a password + user name .</tokentext>
<sentencetext>I don't know how it is where you live, but in my country (Romania) there is no bank that lets you log in using normal passwords.
You need tokens with a pin and a password + user name.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263888</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266038</id>
	<title>Use your netbook only when entirely necessary.</title>
	<author>Anonymous</author>
	<datestamp>1259511180000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Having taken a EeePc around Europe and asia i can recommend that padlocks and physical security is far more necessary than network security.</p><p>Although yes - you still need to be cautious. Some large hotel chains had a great setup for free WiFi etc - but some of the smaller ones just used an open wireless access point in the reception. So you have to use your judgement.</p><p>However - i assume you are going on holiday? just do all your banking email checking etc when you come across a secure network of some sort and then keep the bloody thing in your bag for the majority of the time.</p><p>Wherever you go, be discreet when you bring your laptop out - not only because of theft but because women will be unlikely to talk to you because you are a nerd who cares more about checking email than having fun and immersing oneself in a foreign culture.</p></htmltext>
<tokenext>Having taken a EeePc around Europe and asia i can recommend that padlocks and physical security is far more necessary than network security.Although yes - you still need to be cautious .
Some large hotel chains had a great setup for free WiFi etc - but some of the smaller ones just used an open wireless access point in the reception .
So you have to use your judgement.However - i assume you are going on holiday ?
just do all your banking email checking etc when you come across a secure network of some sort and then keep the bloody thing in your bag for the majority of the time.Wherever you go , be discreet when you bring your laptop out - not only because of theft but because women will be unlikely to talk to you because you are a nerd who cares more about checking email than having fun and immersing oneself in a foreign culture .</tokentext>
<sentencetext>Having taken a EeePc around Europe and asia i can recommend that padlocks and physical security is far more necessary than network security.Although yes - you still need to be cautious.
Some large hotel chains had a great setup for free WiFi etc - but some of the smaller ones just used an open wireless access point in the reception.
So you have to use your judgement.However - i assume you are going on holiday?
just do all your banking email checking etc when you come across a secure network of some sort and then keep the bloody thing in your bag for the majority of the time.Wherever you go, be discreet when you bring your laptop out - not only because of theft but because women will be unlikely to talk to you because you are a nerd who cares more about checking email than having fun and immersing oneself in a foreign culture.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30273596</id>
	<title>Re:SSH &amp; SOCKS Proxy</title>
	<author>Anonymous</author>
	<datestamp>1259614740000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>1</modscore>
	<htmltext><p>True, but UPD does not travel well over HTTP proxies, which you are likely to encounter as well. If you can go for linux, it's pretty easy to setup both though. Hint: setup a SSH server on port 443 (the SSL port) so that firewalls don't try and inspect the stream (since they expect it to be SSL, not SSH and you cannot do anything with the encrypted content anyways). My Dutch ISP did that - brilliant for creating secure connections from a company firewall (ooh, now I have to go anonymous, sorry).</p></htmltext>
<tokenext>True , but UPD does not travel well over HTTP proxies , which you are likely to encounter as well .
If you can go for linux , it 's pretty easy to setup both though .
Hint : setup a SSH server on port 443 ( the SSL port ) so that firewalls do n't try and inspect the stream ( since they expect it to be SSL , not SSH and you can not do anything with the encrypted content anyways ) .
My Dutch ISP did that - brilliant for creating secure connections from a company firewall ( ooh , now I have to go anonymous , sorry ) .</tokentext>
<sentencetext>True, but UPD does not travel well over HTTP proxies, which you are likely to encounter as well.
If you can go for linux, it's pretty easy to setup both though.
Hint: setup a SSH server on port 443 (the SSL port) so that firewalls don't try and inspect the stream (since they expect it to be SSL, not SSH and you cannot do anything with the encrypted content anyways).
My Dutch ISP did that - brilliant for creating secure connections from a company firewall (ooh, now I have to go anonymous, sorry).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264892</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264934</id>
	<title>Alternate source</title>
	<author>Anonymous</author>
	<datestamp>1259500080000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>If you go to the Lonely Planet forums you may be able to find some other solutions there. They have specific forums for travel-tech related issues and for long term travel. You may find a higher percentage of folks who have had your issue there. (Plus it is great for other travel type questions)</p><p>Have a great trip</p></htmltext>
<tokenext>If you go to the Lonely Planet forums you may be able to find some other solutions there .
They have specific forums for travel-tech related issues and for long term travel .
You may find a higher percentage of folks who have had your issue there .
( Plus it is great for other travel type questions ) Have a great trip</tokentext>
<sentencetext>If you go to the Lonely Planet forums you may be able to find some other solutions there.
They have specific forums for travel-tech related issues and for long term travel.
You may find a higher percentage of folks who have had your issue there.
(Plus it is great for other travel type questions)Have a great trip</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265868</id>
	<title>Re:dm-crypt</title>
	<author>nathan.fulton</author>
	<datestamp>1259509980000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>actually, if you're primarily using the netbook at locations with an electrical hookup (ie, if battery life is not as large an issue) then using WDE would probably be the best approach.
<br> <br>
Another solution would be to get a cheap VPS or shell hosting account and ssh -D 2020 host -X then run firefox from the shell acct. and treat the netbook like a thin(ner) client.</htmltext>
<tokenext>actually , if you 're primarily using the netbook at locations with an electrical hookup ( ie , if battery life is not as large an issue ) then using WDE would probably be the best approach .
Another solution would be to get a cheap VPS or shell hosting account and ssh -D 2020 host -X then run firefox from the shell acct .
and treat the netbook like a thin ( ner ) client .</tokentext>
<sentencetext>actually, if you're primarily using the netbook at locations with an electrical hookup (ie, if battery life is not as large an issue) then using WDE would probably be the best approach.
Another solution would be to get a cheap VPS or shell hosting account and ssh -D 2020 host -X then run firefox from the shell acct.
and treat the netbook like a thin(ner) client.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270154</id>
	<title>Re:wrong question</title>
	<author>DCheesi</author>
	<datestamp>1259597880000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Yep. From what I've heard, ISP field technicians in some parts of South America are afraid to carry anything that even resembles a laptop/PC, because it's likely to trigger a robbery or vehicle break-in. And these are locals on the job, not foreign tourists with no ties to the community.</htmltext>
<tokenext>Yep .
From what I 've heard , ISP field technicians in some parts of South America are afraid to carry anything that even resembles a laptop/PC , because it 's likely to trigger a robbery or vehicle break-in .
And these are locals on the job , not foreign tourists with no ties to the community .</tokentext>
<sentencetext>Yep.
From what I've heard, ISP field technicians in some parts of South America are afraid to carry anything that even resembles a laptop/PC, because it's likely to trigger a robbery or vehicle break-in.
And these are locals on the job, not foreign tourists with no ties to the community.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263814</id>
	<title>Why will you not have a system at home?</title>
	<author>jazzkat</author>
	<datestamp>1259490000000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext>I've been stuck in the ICU's of local hospitals for the past month in a similar circumstance.  I've been doing bills and banking from my system at home via FreeNX.</htmltext>
<tokenext>I 've been stuck in the ICU 's of local hospitals for the past month in a similar circumstance .
I 've been doing bills and banking from my system at home via FreeNX .</tokentext>
<sentencetext>I've been stuck in the ICU's of local hospitals for the past month in a similar circumstance.
I've been doing bills and banking from my system at home via FreeNX.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264546</id>
	<title>Re:SSH &amp; SOCKS Proxy</title>
	<author>z0idberg</author>
	<datestamp>1259496540000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>Second this option. Quite easy to setup, this guide spells it out:<br><a href="http://thinkhole.org/wp/2006/05/10/howto-secure-firefox-and-im-with-putty/" title="thinkhole.org">http://thinkhole.org/wp/2006/05/10/howto-secure-firefox-and-im-with-putty/</a> [thinkhole.org]</p></htmltext>
<tokenext>Second this option .
Quite easy to setup , this guide spells it out : http : //thinkhole.org/wp/2006/05/10/howto-secure-firefox-and-im-with-putty/ [ thinkhole.org ]</tokentext>
<sentencetext>Second this option.
Quite easy to setup, this guide spells it out:http://thinkhole.org/wp/2006/05/10/howto-secure-firefox-and-im-with-putty/ [thinkhole.org]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263786</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265614</id>
	<title>Re:are you sure you're asking the right question?</title>
	<author>truesaer</author>
	<datestamp>1259508360000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>In the past I've never brought a computer.  And I don't plan to be attached to my laptop.  It's a matter of being able to research destinations, book hostels, send email to family so they know I'm not dead, offload my photos from my digital camera to a larger storage device, etc.  Plus, consider that if accessing my bank account on my own netbook over wireless is risky, accessing the same account in some guy's internet cafe is much more dangerous - who knows what keyloggers and spyware could be running on that.</p><p>I've been to South America several times on short trips, so I know how to let go of home and just enjoy myself.  In fact that's why I'm going for a year this time...I'm quitting my job, selling everything I own, and I'll have nothing on my mind but the present.  For the first time since...middle school maybe?  I'm 29 now so I'm not sure what it's even going to be like to have no plans for the future!</p></htmltext>
<tokenext>In the past I 've never brought a computer .
And I do n't plan to be attached to my laptop .
It 's a matter of being able to research destinations , book hostels , send email to family so they know I 'm not dead , offload my photos from my digital camera to a larger storage device , etc .
Plus , consider that if accessing my bank account on my own netbook over wireless is risky , accessing the same account in some guy 's internet cafe is much more dangerous - who knows what keyloggers and spyware could be running on that.I 've been to South America several times on short trips , so I know how to let go of home and just enjoy myself .
In fact that 's why I 'm going for a year this time...I 'm quitting my job , selling everything I own , and I 'll have nothing on my mind but the present .
For the first time since...middle school maybe ?
I 'm 29 now so I 'm not sure what it 's even going to be like to have no plans for the future !</tokentext>
<sentencetext>In the past I've never brought a computer.
And I don't plan to be attached to my laptop.
It's a matter of being able to research destinations, book hostels, send email to family so they know I'm not dead, offload my photos from my digital camera to a larger storage device, etc.
Plus, consider that if accessing my bank account on my own netbook over wireless is risky, accessing the same account in some guy's internet cafe is much more dangerous - who knows what keyloggers and spyware could be running on that.I've been to South America several times on short trips, so I know how to let go of home and just enjoy myself.
In fact that's why I'm going for a year this time...I'm quitting my job, selling everything I own, and I'll have nothing on my mind but the present.
For the first time since...middle school maybe?
I'm 29 now so I'm not sure what it's even going to be like to have no plans for the future!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263824</id>
	<title>Tunnel the traffic</title>
	<author>Anonymous</author>
	<datestamp>1259490060000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>4</modscore>
	<htmltext>Set up a server at home or rent one where you can run OpenVPN and/or SSH and tunnel your traffic through it. OpenVPN supports LZO compression aswell, which might help a bit when you're low on bandwidth. I would also suggest that you encrypt the drive on your netbook with TrueCrypt or similar software in case you loose it.</htmltext>
<tokenext>Set up a server at home or rent one where you can run OpenVPN and/or SSH and tunnel your traffic through it .
OpenVPN supports LZO compression aswell , which might help a bit when you 're low on bandwidth .
I would also suggest that you encrypt the drive on your netbook with TrueCrypt or similar software in case you loose it .</tokentext>
<sentencetext>Set up a server at home or rent one where you can run OpenVPN and/or SSH and tunnel your traffic through it.
OpenVPN supports LZO compression aswell, which might help a bit when you're low on bandwidth.
I would also suggest that you encrypt the drive on your netbook with TrueCrypt or similar software in case you loose it.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265414</id>
	<title>Use hotspot shield. Its free and secure.</title>
	<author>circuitworx</author>
	<datestamp>1259506080000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>4</modscore>
	<htmltext><a href="http://www.hotspotshield.com/" title="hotspotshield.com" rel="nofollow">http://www.hotspotshield.com/</a> [hotspotshield.com] . I use them all the time when I am traveling. They have a nice free client on their site and if you do not want to install their client you can just configure a vpn link manually.</htmltext>
<tokenext>http : //www.hotspotshield.com/ [ hotspotshield.com ] .
I use them all the time when I am traveling .
They have a nice free client on their site and if you do not want to install their client you can just configure a vpn link manually .</tokentext>
<sentencetext>http://www.hotspotshield.com/ [hotspotshield.com] .
I use them all the time when I am traveling.
They have a nice free client on their site and if you do not want to install their client you can just configure a vpn link manually.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264164</id>
	<title>Re:SSH &amp; SOCKS Proxy</title>
	<author>Anonymous</author>
	<datestamp>1259493420000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Alternatively, Hamachi VPN on one of your clients/servers at home.</p></htmltext>
<tokenext>Alternatively , Hamachi VPN on one of your clients/servers at home .</tokentext>
<sentencetext>Alternatively, Hamachi VPN on one of your clients/servers at home.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263786</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820</id>
	<title>are you sure you're asking the right question?</title>
	<author>inzy</author>
	<datestamp>1259490000000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>1</modscore>
	<htmltext><p>you're going travelling, to experience new cultures, people and ideas</p><p>put down the computer; the world won't end if you can't access slashdot and your email for a few months</p><p>i'm sure there are many ways to get around not having internet access - use phone banking, get your bank to automatically pay off your c card, use internet cafes for email (if you really must), or use a phone to call people.</p><p>why on earth you feel a need to access your investment account from the depths of south america, i'm not sure.</p></htmltext>
<tokenext>you 're going travelling , to experience new cultures , people and ideasput down the computer ; the world wo n't end if you ca n't access slashdot and your email for a few monthsi 'm sure there are many ways to get around not having internet access - use phone banking , get your bank to automatically pay off your c card , use internet cafes for email ( if you really must ) , or use a phone to call people.why on earth you feel a need to access your investment account from the depths of south america , i 'm not sure .</tokentext>
<sentencetext>you're going travelling, to experience new cultures, people and ideasput down the computer; the world won't end if you can't access slashdot and your email for a few monthsi'm sure there are many ways to get around not having internet access - use phone banking, get your bank to automatically pay off your c card, use internet cafes for email (if you really must), or use a phone to call people.why on earth you feel a need to access your investment account from the depths of south america, i'm not sure.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30272156</id>
	<title>3G!</title>
	<author>kismet666</author>
	<datestamp>1259608200000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext>3G service is everywhere down here. I don't know where you will be, how many countries you'll visit, etc. If you're going to spend a significant amount of time in specific countries consider getting a pre-paid 3G USB modem when you're going to be in one for a while. In Argentina Claro (http://www.claro.com.ar) offers such a service, I pay about $50 per month for unlimited data, I'm not sure how economical the pre-paid options are. Telecom costs very widely between countries down here, Argentina tends to be one of the most expensive.

Some good countermeasures have been suggested: firewall, patches, antimalware are all critical. Its a hassle but if you're using public WiFi you should change passwords for your financial accounts frequently. You should encrypt your sensitive data, and backup to an external disk regularly, laptop theft is fairly common.</htmltext>
<tokenext>3G service is everywhere down here .
I do n't know where you will be , how many countries you 'll visit , etc .
If you 're going to spend a significant amount of time in specific countries consider getting a pre-paid 3G USB modem when you 're going to be in one for a while .
In Argentina Claro ( http : //www.claro.com.ar ) offers such a service , I pay about $ 50 per month for unlimited data , I 'm not sure how economical the pre-paid options are .
Telecom costs very widely between countries down here , Argentina tends to be one of the most expensive .
Some good countermeasures have been suggested : firewall , patches , antimalware are all critical .
Its a hassle but if you 're using public WiFi you should change passwords for your financial accounts frequently .
You should encrypt your sensitive data , and backup to an external disk regularly , laptop theft is fairly common .</tokentext>
<sentencetext>3G service is everywhere down here.
I don't know where you will be, how many countries you'll visit, etc.
If you're going to spend a significant amount of time in specific countries consider getting a pre-paid 3G USB modem when you're going to be in one for a while.
In Argentina Claro (http://www.claro.com.ar) offers such a service, I pay about $50 per month for unlimited data, I'm not sure how economical the pre-paid options are.
Telecom costs very widely between countries down here, Argentina tends to be one of the most expensive.
Some good countermeasures have been suggested: firewall, patches, antimalware are all critical.
Its a hassle but if you're using public WiFi you should change passwords for your financial accounts frequently.
You should encrypt your sensitive data, and backup to an external disk regularly, laptop theft is fairly common.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265108</id>
	<title>Re:Some Advice</title>
	<author>wkk2</author>
	<datestamp>1259502000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Open a tunnel with a version of Putty that can work with pc/sc smart cards.  Generate and keep your ssh private key on a card where it can't be extracted without physically messing with the card.  This will keep your key from being taken.  The draw back is you will need a keyboard with a smart card slot or a usb or pcmcia card reader.  I think general security would be improved if we had a law prohibiting the import of keyboards without smart card readers.  Banks and other would start using smart cards if they knew everybody had a reader.  A reader slot would probably be a good idea for cellphones too.  Today, I think the only phone with a reader is the Sectera Edge.  I guess I can dream but there are too many people that don't want good security.</p></htmltext>
<tokenext>Open a tunnel with a version of Putty that can work with pc/sc smart cards .
Generate and keep your ssh private key on a card where it ca n't be extracted without physically messing with the card .
This will keep your key from being taken .
The draw back is you will need a keyboard with a smart card slot or a usb or pcmcia card reader .
I think general security would be improved if we had a law prohibiting the import of keyboards without smart card readers .
Banks and other would start using smart cards if they knew everybody had a reader .
A reader slot would probably be a good idea for cellphones too .
Today , I think the only phone with a reader is the Sectera Edge .
I guess I can dream but there are too many people that do n't want good security .</tokentext>
<sentencetext>Open a tunnel with a version of Putty that can work with pc/sc smart cards.
Generate and keep your ssh private key on a card where it can't be extracted without physically messing with the card.
This will keep your key from being taken.
The draw back is you will need a keyboard with a smart card slot or a usb or pcmcia card reader.
I think general security would be improved if we had a law prohibiting the import of keyboards without smart card readers.
Banks and other would start using smart cards if they knew everybody had a reader.
A reader slot would probably be a good idea for cellphones too.
Today, I think the only phone with a reader is the Sectera Edge.
I guess I can dream but there are too many people that don't want good security.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264068</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265188</id>
	<title>Re:Some Advice</title>
	<author>Anonymous</author>
	<datestamp>1259503080000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use PGP WDE for work and when I suspend my machine, the big grey screen still asks for my password when resume, like it does when I reboot or cold boot. When I put it to sleep, though, it can wake back up without a drive encryption password being entered.</p><p>Also, what about booting to a 16GB or 32GB USB drive? Have no physical drive in the netbook (increased reliability) and keep the stick tucked away when it's not being used (physical security).</p></htmltext>
<tokenext>I use PGP WDE for work and when I suspend my machine , the big grey screen still asks for my password when resume , like it does when I reboot or cold boot .
When I put it to sleep , though , it can wake back up without a drive encryption password being entered.Also , what about booting to a 16GB or 32GB USB drive ?
Have no physical drive in the netbook ( increased reliability ) and keep the stick tucked away when it 's not being used ( physical security ) .</tokentext>
<sentencetext>I use PGP WDE for work and when I suspend my machine, the big grey screen still asks for my password when resume, like it does when I reboot or cold boot.
When I put it to sleep, though, it can wake back up without a drive encryption password being entered.Also, what about booting to a 16GB or 32GB USB drive?
Have no physical drive in the netbook (increased reliability) and keep the stick tucked away when it's not being used (physical security).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264068</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30269902</id>
	<title>Re:SSH &amp; SOCKS Proxy</title>
	<author>SCHecklerX</author>
	<datestamp>1259596380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>And if you don't want to remember to socksify all your apps, you can also tunnel PPP over ssh, and set your default route and DNS through the tunnel (remember to set a static route to your remote endpoint first!).  But nowadays, you can do that easier and more efficiently using openvpn.  PPP over ssh works a lot better than you would think something wrapped in tcp would.</p></htmltext>
<tokenext>And if you do n't want to remember to socksify all your apps , you can also tunnel PPP over ssh , and set your default route and DNS through the tunnel ( remember to set a static route to your remote endpoint first ! ) .
But nowadays , you can do that easier and more efficiently using openvpn .
PPP over ssh works a lot better than you would think something wrapped in tcp would .</tokentext>
<sentencetext>And if you don't want to remember to socksify all your apps, you can also tunnel PPP over ssh, and set your default route and DNS through the tunnel (remember to set a static route to your remote endpoint first!).
But nowadays, you can do that easier and more efficiently using openvpn.
PPP over ssh works a lot better than you would think something wrapped in tcp would.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263786</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265174</id>
	<title>keep it simple</title>
	<author>Anonymous</author>
	<datestamp>1259502840000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>If you have a loved one that won't run off with your money;<br>Have her check your banking and credit and notify you over cell/voip.<br>For all else;<br>If it's an access point is open..check to see if they have generic user/password on router and encrypt it real quick for few minutes of private time. when you're done change it back!</p></htmltext>
<tokenext>If you have a loved one that wo n't run off with your money ; Have her check your banking and credit and notify you over cell/voip.For all else ; If it 's an access point is open..check to see if they have generic user/password on router and encrypt it real quick for few minutes of private time .
when you 're done change it back !</tokentext>
<sentencetext>If you have a loved one that won't run off with your money;Have her check your banking and credit and notify you over cell/voip.For all else;If it's an access point is open..check to see if they have generic user/password on router and encrypt it real quick for few minutes of private time.
when you're done change it back!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264818</id>
	<title>Re:Slashdotters never leave home</title>
	<author>BluBrick</author>
	<datestamp>1259499120000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p><div class="quote"><p>Given the current unstable nature of the world economic system, is it a sane move to ignore your investments for a year?</p></div><p>No, it isn't.  But also taking into account the sporadic nature of connectivity while backpacking, it probably is a good idea to exit any stock holdings and leave your investment capital as cash in the bank for a year.  Sure, it's a lower interest rate, but you can rest easy in the knowledge that your capital won't decrease.</p></div>
	</htmltext>
<tokenext>Given the current unstable nature of the world economic system , is it a sane move to ignore your investments for a year ? No , it is n't .
But also taking into account the sporadic nature of connectivity while backpacking , it probably is a good idea to exit any stock holdings and leave your investment capital as cash in the bank for a year .
Sure , it 's a lower interest rate , but you can rest easy in the knowledge that your capital wo n't decrease .</tokentext>
<sentencetext>Given the current unstable nature of the world economic system, is it a sane move to ignore your investments for a year?No, it isn't.
But also taking into account the sporadic nature of connectivity while backpacking, it probably is a good idea to exit any stock holdings and leave your investment capital as cash in the bank for a year.
Sure, it's a lower interest rate, but you can rest easy in the knowledge that your capital won't decrease.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264110</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270586</id>
	<title>Security</title>
	<author>tehcyder</author>
	<datestamp>1259600580000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>If I was backpacking through much of South America, it would be my personal security I'd worry about more than anything to do with computers.</htmltext>
<tokenext>If I was backpacking through much of South America , it would be my personal security I 'd worry about more than anything to do with computers .</tokentext>
<sentencetext>If I was backpacking through much of South America, it would be my personal security I'd worry about more than anything to do with computers.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266220</id>
	<title>Protect yourself while traveling</title>
	<author>Mr.TT</author>
	<datestamp>1259512560000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>If you want absolute security while traveling, use ThreadThat.com.  Just launched November 1st, this free website provides the most convenient way to have threaded conversations via the Internet.  Every bit of text you enter and file you upload is encrypted while at rest on ThreadThat servers using AES256 encryption.  All communication is over SSL.  No contracts, nothing to download or install, nothing to pay.  Check it out at <a href="https://www.threadthat.com./" title="www.threadthat.com" rel="nofollow">https://www.threadthat.com./</a> [www.threadthat.com]</htmltext>
<tokenext>If you want absolute security while traveling , use ThreadThat.com .
Just launched November 1st , this free website provides the most convenient way to have threaded conversations via the Internet .
Every bit of text you enter and file you upload is encrypted while at rest on ThreadThat servers using AES256 encryption .
All communication is over SSL .
No contracts , nothing to download or install , nothing to pay .
Check it out at https : //www.threadthat.com./ [ www.threadthat.com ]</tokentext>
<sentencetext>If you want absolute security while traveling, use ThreadThat.com.
Just launched November 1st, this free website provides the most convenient way to have threaded conversations via the Internet.
Every bit of text you enter and file you upload is encrypted while at rest on ThreadThat servers using AES256 encryption.
All communication is over SSL.
No contracts, nothing to download or install, nothing to pay.
Check it out at https://www.threadthat.com./ [www.threadthat.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265198</id>
	<title>Long trips... It's more difficult</title>
	<author>Anonymous</author>
	<datestamp>1259503140000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>He'll be away for a long time and can't come home ever once in a while. What if there is a power outage or something and the computer needs to be rebooted? Can't be left home alone.</p><p>Next option is family but if there is anything more than rebooting, most parents probably don't know how to deal with it.</p><p>Only option for depending on a computer at "home" is to leave it to some computer literate friend. But even so there can be problems in troubleshooting why something doesn't work, trying to call the friend only to find out that he is totally wasted/high/visiting relatives somewhere/etc. when you need to use the computer... Those are unlikely to be constant problems and might be that they don't occur at all (if you are very lucky) but they are very existent risk. Enough that I wouldn't prefer such option.</p><p>And then there is of course the extra latency from routing your traffic one more step. Usually not a problem but I could imagine it could sometimes be.</p></htmltext>
<tokenext>He 'll be away for a long time and ca n't come home ever once in a while .
What if there is a power outage or something and the computer needs to be rebooted ?
Ca n't be left home alone.Next option is family but if there is anything more than rebooting , most parents probably do n't know how to deal with it.Only option for depending on a computer at " home " is to leave it to some computer literate friend .
But even so there can be problems in troubleshooting why something does n't work , trying to call the friend only to find out that he is totally wasted/high/visiting relatives somewhere/etc .
when you need to use the computer... Those are unlikely to be constant problems and might be that they do n't occur at all ( if you are very lucky ) but they are very existent risk .
Enough that I would n't prefer such option.And then there is of course the extra latency from routing your traffic one more step .
Usually not a problem but I could imagine it could sometimes be .</tokentext>
<sentencetext>He'll be away for a long time and can't come home ever once in a while.
What if there is a power outage or something and the computer needs to be rebooted?
Can't be left home alone.Next option is family but if there is anything more than rebooting, most parents probably don't know how to deal with it.Only option for depending on a computer at "home" is to leave it to some computer literate friend.
But even so there can be problems in troubleshooting why something doesn't work, trying to call the friend only to find out that he is totally wasted/high/visiting relatives somewhere/etc.
when you need to use the computer... Those are unlikely to be constant problems and might be that they don't occur at all (if you are very lucky) but they are very existent risk.
Enough that I wouldn't prefer such option.And then there is of course the extra latency from routing your traffic one more step.
Usually not a problem but I could imagine it could sometimes be.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263814</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265448</id>
	<title>Re:Tunnel the traffic</title>
	<author>bkk\_diesel</author>
	<datestamp>1259506740000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>If you loose your drive you shouldn't be surprised if it falls out.</p></htmltext>
<tokenext>If you loose your drive you should n't be surprised if it falls out .</tokentext>
<sentencetext>If you loose your drive you shouldn't be surprised if it falls out.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263824</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263752</id>
	<title>I have to say it:</title>
	<author>Anonymous</author>
	<datestamp>1259489520000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>make sure to use Linux.</p></htmltext>
<tokenext>make sure to use Linux .</tokentext>
<sentencetext>make sure to use Linux.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264402</id>
	<title>Live Linux CD/DVD</title>
	<author>Anonymous</author>
	<datestamp>1259495220000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>For many uses, consider using a Live CD or DVD such as the recent Knoppix 6.2 release. It will let you have web access, and greatly reduce any chance that you might pick up an infection on an untrusted network. Of course, you should still use more secure https connections when accessing an e-mail or banking site.
</p><p>
I would also remove anything that you don't feel that you need or will use on the trip from the laptop, and put any information that you really need to keep private on a small flash drive that you can connect only when you desire to, so as not to expose it during all connections.
</p><p>
If you are really feeling paranoid, you could also carry a Live CD  or DVD that gives you an Onion router connection.</p></htmltext>
<tokenext>For many uses , consider using a Live CD or DVD such as the recent Knoppix 6.2 release .
It will let you have web access , and greatly reduce any chance that you might pick up an infection on an untrusted network .
Of course , you should still use more secure https connections when accessing an e-mail or banking site .
I would also remove anything that you do n't feel that you need or will use on the trip from the laptop , and put any information that you really need to keep private on a small flash drive that you can connect only when you desire to , so as not to expose it during all connections .
If you are really feeling paranoid , you could also carry a Live CD or DVD that gives you an Onion router connection .</tokentext>
<sentencetext>For many uses, consider using a Live CD or DVD such as the recent Knoppix 6.2 release.
It will let you have web access, and greatly reduce any chance that you might pick up an infection on an untrusted network.
Of course, you should still use more secure https connections when accessing an e-mail or banking site.
I would also remove anything that you don't feel that you need or will use on the trip from the laptop, and put any information that you really need to keep private on a small flash drive that you can connect only when you desire to, so as not to expose it during all connections.
If you are really feeling paranoid, you could also carry a Live CD  or DVD that gives you an Onion router connection.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267194</id>
	<title>askingwrongquestions</title>
	<author>Anonymous</author>
	<datestamp>1259521320000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Your biggest concern its not if someone will steal your passwords and other sensitive data, at least not in South America, here you will be an easy target for kidnappers and similar crime rings, the best thing to do is try to avoid conflict areas, try to check the political status on each zone you visit beforehand also try to figure out about organized crime hotspots and routes, I dont know how it goes in other countries, but if you are traveling through Mexico, avoid states like Sinaloa, Oaxaca and Chihuahua at all costs, Cd. Juarez (in Chihuahua) is one of the most deadly cities in the whole world, Sinaloa is the HQ for Mexico's drug lords, and Oaxaca has the EZLN.</p><p>This is just an example specific to Mexico but it should also work in other smaller countries south from here.</p><p>To stay on topic, if you are worried about someone getting your sensitive data then you should be even more worried about the "friends" of the guys interested in your data since most of the guys able to do that kind of stuff work with groups who do much worse stuff than stealing your identity, like stealing your kidneys.</p><p>The best way to travel is to go to places with familiar faces, if you can stay with friends, great, if you are alone then go to medium profile hotels which you should also check out beforehand, dont have anything fancy with you, and if you do (like you say you have to) shouldnt it be better if you packed something much smaller which can be concealed easily? Also, has someone already pointed out earlier, dont do anything stupid, not only stay out of problems with the government stay out from lowclass areas, its sad but its usually a good indicator of crime levels.</p></htmltext>
<tokenext>Your biggest concern its not if someone will steal your passwords and other sensitive data , at least not in South America , here you will be an easy target for kidnappers and similar crime rings , the best thing to do is try to avoid conflict areas , try to check the political status on each zone you visit beforehand also try to figure out about organized crime hotspots and routes , I dont know how it goes in other countries , but if you are traveling through Mexico , avoid states like Sinaloa , Oaxaca and Chihuahua at all costs , Cd .
Juarez ( in Chihuahua ) is one of the most deadly cities in the whole world , Sinaloa is the HQ for Mexico 's drug lords , and Oaxaca has the EZLN.This is just an example specific to Mexico but it should also work in other smaller countries south from here.To stay on topic , if you are worried about someone getting your sensitive data then you should be even more worried about the " friends " of the guys interested in your data since most of the guys able to do that kind of stuff work with groups who do much worse stuff than stealing your identity , like stealing your kidneys.The best way to travel is to go to places with familiar faces , if you can stay with friends , great , if you are alone then go to medium profile hotels which you should also check out beforehand , dont have anything fancy with you , and if you do ( like you say you have to ) shouldnt it be better if you packed something much smaller which can be concealed easily ?
Also , has someone already pointed out earlier , dont do anything stupid , not only stay out of problems with the government stay out from lowclass areas , its sad but its usually a good indicator of crime levels .</tokentext>
<sentencetext>Your biggest concern its not if someone will steal your passwords and other sensitive data, at least not in South America, here you will be an easy target for kidnappers and similar crime rings, the best thing to do is try to avoid conflict areas, try to check the political status on each zone you visit beforehand also try to figure out about organized crime hotspots and routes, I dont know how it goes in other countries, but if you are traveling through Mexico, avoid states like Sinaloa, Oaxaca and Chihuahua at all costs, Cd.
Juarez (in Chihuahua) is one of the most deadly cities in the whole world, Sinaloa is the HQ for Mexico's drug lords, and Oaxaca has the EZLN.This is just an example specific to Mexico but it should also work in other smaller countries south from here.To stay on topic, if you are worried about someone getting your sensitive data then you should be even more worried about the "friends" of the guys interested in your data since most of the guys able to do that kind of stuff work with groups who do much worse stuff than stealing your identity, like stealing your kidneys.The best way to travel is to go to places with familiar faces, if you can stay with friends, great, if you are alone then go to medium profile hotels which you should also check out beforehand, dont have anything fancy with you, and if you do (like you say you have to) shouldnt it be better if you packed something much smaller which can be concealed easily?
Also, has someone already pointed out earlier, dont do anything stupid, not only stay out of problems with the government stay out from lowclass areas, its sad but its usually a good indicator of crime levels.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264412</id>
	<title>assume compromise &amp; set up separate accounts</title>
	<author>ffflala</author>
	<datestamp>1259495280000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Start with the assumption that any account you access while traveling will be compromised at some point -- anything that requiring a username/password or any other form of online authorization. Structure your accounts to minimize the loss suffered from any compromise.</p><p>Set up a separate email &amp; IM accounts. Get a credit card designed for travel. I'm not going to suggest brands, however certain cards have security policies that lend themselves well to the risks of travel and compromise.</p><p>For your online banking and investments, set up separate travel accounts. For banking, have a periodic automatic deposit from another non-travel account in an amount sufficient to cover your expenses for the period between transfers. If your account is compromised you will lose only the funds from that period. Structure your investment accounts similarly.</p><p>Do not access your non-travel accounts while traveling. To manage your non-travel accounts while you're away, set up limited access so that a trusted family member or accountant can make transactions on your behalf &amp; at your request if necessary. Develop some sort code/confirmation to include in any such communication to allow for the possibility that even this might be compromised -- for example a message isn't legit if you don't complain about/praise the food or the weather, or if you don't link to/attach a picture of you wearing something unique/making a certain gesture/face.</p></htmltext>
<tokenext>Start with the assumption that any account you access while traveling will be compromised at some point -- anything that requiring a username/password or any other form of online authorization .
Structure your accounts to minimize the loss suffered from any compromise.Set up a separate email &amp; IM accounts .
Get a credit card designed for travel .
I 'm not going to suggest brands , however certain cards have security policies that lend themselves well to the risks of travel and compromise.For your online banking and investments , set up separate travel accounts .
For banking , have a periodic automatic deposit from another non-travel account in an amount sufficient to cover your expenses for the period between transfers .
If your account is compromised you will lose only the funds from that period .
Structure your investment accounts similarly.Do not access your non-travel accounts while traveling .
To manage your non-travel accounts while you 're away , set up limited access so that a trusted family member or accountant can make transactions on your behalf &amp; at your request if necessary .
Develop some sort code/confirmation to include in any such communication to allow for the possibility that even this might be compromised -- for example a message is n't legit if you do n't complain about/praise the food or the weather , or if you do n't link to/attach a picture of you wearing something unique/making a certain gesture/face .</tokentext>
<sentencetext>Start with the assumption that any account you access while traveling will be compromised at some point -- anything that requiring a username/password or any other form of online authorization.
Structure your accounts to minimize the loss suffered from any compromise.Set up a separate email &amp; IM accounts.
Get a credit card designed for travel.
I'm not going to suggest brands, however certain cards have security policies that lend themselves well to the risks of travel and compromise.For your online banking and investments, set up separate travel accounts.
For banking, have a periodic automatic deposit from another non-travel account in an amount sufficient to cover your expenses for the period between transfers.
If your account is compromised you will lose only the funds from that period.
Structure your investment accounts similarly.Do not access your non-travel accounts while traveling.
To manage your non-travel accounts while you're away, set up limited access so that a trusted family member or accountant can make transactions on your behalf &amp; at your request if necessary.
Develop some sort code/confirmation to include in any such communication to allow for the possibility that even this might be compromised -- for example a message isn't legit if you don't complain about/praise the food or the weather, or if you don't link to/attach a picture of you wearing something unique/making a certain gesture/face.</sentencetext>
</comment>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_28</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264094
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266448
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30269342
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_44</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263872
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263746
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263860
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266078
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_63</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265868
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_59</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263808
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266538
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_29</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263808
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30275284
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_53</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263888
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264180
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_36</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264162
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264342
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270576
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_60</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263912
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_30</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263814
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265198
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_26</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263888
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270696
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263910
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_31</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30273106
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_58</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267884
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_61</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263786
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264892
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30273596
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_52</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264106
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265274
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263846
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265878
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_51</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263808
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263924
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265610
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_23</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263778
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265138
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263786
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264546
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_48</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263964
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30269404
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264106
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264696
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_42</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267610
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263824
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265448
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_20</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264208
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_50</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270154
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_64</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267288
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_45</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263786
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265088
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267324
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268058
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263746
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263860
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265154
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_21</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264106
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264746
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265172
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263888
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264672
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270334
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_35</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263808
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263924
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268388
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_40</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264266
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263936
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_65</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263888
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270252
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265614
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30269530
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_57</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264902
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_27</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263964
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268478
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_62</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265434
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_43</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263778
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263842
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_34</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266300
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266152
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264110
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264818
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_33</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263888
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268960
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_24</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263746
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267158
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264068
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265108
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_54</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263824
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264264
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263888
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270844
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_56</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264344
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_49</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270380
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_55</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265614
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30271548
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_25</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263968
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264118
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_39</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263786
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264270
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_32</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264068
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265188
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263786
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30269902
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_46</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264130
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263786
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264200
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_22</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263746
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263958
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_66</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264356
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_47</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264094
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268140
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_38</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264068
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264822
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_41</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263888
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268476
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263824
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267974
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_29_1926209_37</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263786
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264164
</commentlist>
</thread>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264972
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263786
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264270
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30269902
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265088
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267324
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268058
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264546
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264164
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264200
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264892
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30273596
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264110
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264818
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.20</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264014
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263846
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265878
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264028
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263792
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30273106
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263888
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270696
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270252
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264180
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270844
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268476
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268960
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264672
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270334
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266152
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264356
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265868
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263910
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264162
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263850
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263822
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270380
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266220
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265174
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264342
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270576
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264094
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266448
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268140
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264068
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265188
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264822
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265108
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264680
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265166
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.23</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265414
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265422
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.21</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263820
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263912
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263936
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264266
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265614
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30271548
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30269530
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263964
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30269404
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268478
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266300
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264902
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264344
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264130
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263968
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264208
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263872
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264118
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264106
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264746
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265172
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265274
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264696
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.24</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263752
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.27</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265346
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.22</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263814
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265198
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.25</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264402
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263808
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30275284
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263924
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265610
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30268388
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266538
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.28</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263746
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263958
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267158
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263860
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30266078
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265154
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264494
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267610
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265434
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267884
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30270154
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267288
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30269342
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.26</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263824
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30264264
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30267974
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265448
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_29_1926209.6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263778
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30265138
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_29_1926209.30263842
</commentlist>
</conversation>
