{"id":2479,"date":"2014-03-25T20:22:59","date_gmt":"2014-03-26T03:22:59","guid":{"rendered":"http:\/\/daviddilworth.com\/it\/?p=2479"},"modified":"2016-12-02T13:57:31","modified_gmt":"2016-12-02T21:57:31","slug":"cyberghost-5-requires-you-to-use-the-deadly-ms-explorer","status":"publish","type":"post","link":"https:\/\/daviddilworth.com\/it\/cyberghost-5-requires-you-to-use-the-deadly-ms-explorer\/","title":{"rendered":"CyberGhost 5 REQUIRES you to use the deadly MS Explorer !"},"content":{"rendered":"<p><strong>&#8220;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Virtual_private_network\">Virtual Private Networks<\/a>&#8221; (or VPNs) are software programs that <a href=\"http:\/\/www.thefreedictionary.com\/anonymizes\">anonymize <\/a>and encrypt your web travels so that criminals can&#8217;t see what you are doing, snag your passwords or pretend to be your shopping or banking site.\u00a0<\/strong><\/p>\n<p>One nice review persuaded me to try <span style=\"color: #ff0000;\"><strong>CyberGhost<\/strong><\/span>.<\/p>\n<p>Downloaded version 5 and installed it.<\/p>\n<p>Just as it finished installing I got this outrageous message &#8212;<\/p>\n<blockquote><p>&#8220;You&#8217;ll need at least <strong class=\"StrictlyAutoTagBold\">Microsoft Internet Explorer<\/strong> 8 to run Cyberghost 5 on your system !&#8221;<\/p><\/blockquote>\n<p>Then it quits and <em><strong>without my permission<\/strong><\/em> opens my browser to download <strong class=\"StrictlyAutoTagBold\">Microsoft Internet Explorer<\/strong> 8. <strong>YOW !<\/strong><\/p>\n<p>For the uninitiated,<\/p>\n<p><em>the <a href=\"http:\/\/kdvr.com\/2014\/04\/28\/this-is-why-you-should-stop-using-internet-explorer-right-now-2\/\">best and fastest way known to attract viruses, robots and spyware<\/a><\/em><\/p>\n<p>is to <a href=\"http:\/\/kdvr.com\/2014\/04\/28\/this-is-why-you-should-stop-using-internet-explorer-right-now-2\/\">keep Microsoft Internet Explorer on your Windows PC.<\/a><\/p>\n<blockquote><p>Here&#8217;s where even <strong>the German Government officially advised against using it: <a href=\"http:\/\/nakedsecurity.sophos.com\/2010\/01\/16\/german-government-internet-explorer\/ \">German Government: Don&#8217;t use Internet Explorer<\/a><\/strong><\/p><\/blockquote>\n<p><!--more-->I was not amused and uninstalled Cyberghost immediately.<\/p>\n<p>It gets worse.<\/p>\n<p>After uninstalling CyberGhost &#8220;completely&#8221; and rebooting, <strong>I found a Cyberghost Service still running on my computer !<\/strong><\/p>\n<p>Now if I was to suspect <strong>NSA was &#8220;collaborating&#8221; with or bullying a VPN<\/strong> to see what we are doing, that&#8217;s exactly how I would expect a bad <strong class=\"StrictlyAutoTagBold\">VPN<\/strong> to act.<\/p>\n<p>You can rest easy,<strong> I will NEVER again use or even test Cyberghost.<\/strong><\/p>\n<p>For those who wonder how I managed to run a Windows system without Internet Explorer, <a href=\"http:\/\/www.wikihow.com\/Uninstall-Internet-Explorer-Completely\">here is a &#8220;How to&#8221; get rid of Internet Explorer article<\/a>.<\/p>\n<p>If you value your computer data, let me urge you to <strong>seriously consider wholly getting rid of MicroSoft&#8217;s Internet Explorer.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Virtual Private Networks&#8221; (or VPNs) are software programs that anonymize and encrypt your web travels so that criminals can&#8217;t see what you are doing, snag your passwords or pretend to be your shopping or banking site.\u00a0 One nice review persuaded &hellip; <a href=\"https:\/\/daviddilworth.com\/it\/cyberghost-5-requires-you-to-use-the-deadly-ms-explorer\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[15,14],"tags":[83,28,27,56,29,30],"class_list":["post-2479","post","type-post","status-publish","format-standard","hentry","category-doing-evil","category-serious-bad","tag-cyberghost-service","tag-german-government-don","tag-microsoft-internet-explorer","tag-nsa","tag-requires","tag-vpn"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/daviddilworth.com\/it\/wp-json\/wp\/v2\/posts\/2479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/daviddilworth.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/daviddilworth.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/daviddilworth.com\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/daviddilworth.com\/it\/wp-json\/wp\/v2\/comments?post=2479"}],"version-history":[{"count":12,"href":"https:\/\/daviddilworth.com\/it\/wp-json\/wp\/v2\/posts\/2479\/revisions"}],"predecessor-version":[{"id":2798,"href":"https:\/\/daviddilworth.com\/it\/wp-json\/wp\/v2\/posts\/2479\/revisions\/2798"}],"wp:attachment":[{"href":"https:\/\/daviddilworth.com\/it\/wp-json\/wp\/v2\/media?parent=2479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/daviddilworth.com\/it\/wp-json\/wp\/v2\/categories?post=2479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/daviddilworth.com\/it\/wp-json\/wp\/v2\/tags?post=2479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}