Posted on Leave a comment

Thunderbird Email update – manual switch to latest version

There’s a major version step to the newest Thunderbird email client of mozilla.
This requires a manual upgrade, i.e. there is currently no in-program update path as shown in post Good habits, regular updates – Update Thunderbird.

Here are the steps for the manual upgrade:


Got to to download the latest version of Thunderbird.
At the time of this writing the latest version is v68.1.0.

If you want to install and replace your current version with the new one, make sure to get the same variant of the program as you’ve installed previously.
I.e. if you previously used the x86 version, download the 32-bit variant, if you used the msi variant, download the MSI 64-bit version.
On the main download page, Mozilla will do a best guess and offer the version best fitting to your system.

In case this is not the same variant you’ve previously used, you’ll end up with two versions of Thunderbird in parallel on your PC and you’ll need to run the setup for each email account afresh for the new version.
This, you can avoid by downloading and installing the same variant as used previously.
To find out what version you have currently running on your PC, click the Windows Button -> Settings -> Apps and scroll down to letter “M” to find Mozilla Thunderbird together with the version and variant information.
All available variants can be found at

This may of course also be an opportunity to move to a different variant, e.g. to better benefit from your 64-bit PC architecture – an option to consider.


As always, run your choice of antivirus check on the freshly downloaded file.
Then run the checksum calculation, either as a shell command in a terminal window or via the right-click context menu from the file explorer.

Compare the output with the information provided at




Find the correct checksum to match the file downloaded. It’s a lengthy text file, so take the time to find the correct line that corresponds with the variant chosen.


Double-click the downloaded file and follow the instructions.


After successful installation, the add-ons need to be updated as well.

Click on the 3 parallel lines icon on the upper right hand side to access the menu and find Add-ons, click on it and in the sub-menu click on Add-ons again.
This will open a new page inside Thunderbird with an overview of the used extensions.
Click on the gear icon on the upper right side and select Check for Updates from the menu. After a short while, a friendly green text will appear to inform you “Your add-ons have been updated.”


A short explanation on the shown and used add-ons.
Lightning – calendar with CalDAV interface
CardBook – contact management with CardDAV interface
Enigmail – OpenPGP encryption for emails


a quick check that Thunderbird is up-to-date via click on the 3 parallel lines menu icon on the upper right hand side, select the Help menu and click on About Thunderbird.

Posted on Leave a comment

Validate a downloaded file on Windows 10 with MD5

It is always recommended to ensure authenticity of an application file downloaded from the internet before installing.
Of course, we still also run our antivirus to scan any downloaded file as well.

There are different methods in use – here’s what to do if the download site provides a MD5 checksum file as reference.
Some websites simply display the MD5 checksum, others offer the MD5 file (a file often with .md5 extension) to download which we can open with e.g. Notepad.

First, we open a command shell by pressing the Windows-Key + X-Key at the same time and select Windows PowerShell from the menu.
Now, change to the directory where the downloaded file is stored with the cd command, e.g. cd Downloads.

Tip: using the TAB-Key will auto-complete and you don’t have to type the complete file name.

certutil -hashfile Name-of-Downloaded-File MD5
(see image above) and wait for your PC to calculate the MD5 checksum of the file.

Finally, compare the MD5 checksum calculated in your command shell with the one displayed on the website or in the file opened with NotePad.
If they’re identical, the file is unaltered, not corrupted and it’s ok to install (after having run a scan with the antivirus protection).

Should the numbers be different, the file is most likely not identical to the file intended to download and should not be installed.
It’s better to check the download process from origin of the file

  • https in use on the website?
  • Lock sign displayed and confirming the website is identifying itself correctly?
  • Download path correct and still with correct https/ssh?
  • Size of downloaded file same as information shown on download page?

to checksum

  • Correct checksum file / information used for comparison?

once again to make sure to not endanger your system.

Posted on Leave a comment

Document Synchronization with Syncthing

In context of setting up a new device, more on this in a separate post, several handy applications had to be re-installed and configured.

Sync your documents


Extract from Syncthing webpage: Syncthing is a continuous file synchronization program. It synchronizes files between two or more computers and replaces proprietary sync and cloud services with something open, trustworthy and decentralized. Your data is your data alone and you deserve to choose where it is stored, if it is shared with some third party and how it’s transmitted over the internet.

We like and support the open source concept. We especially like the focus on data privacy and security and being empowered to decide where our data resides.
Syncthing is a natural fit to keep our work in sync across various devices, i.e. a Linux powered Server, a workstation PC running on Linux, a portable 2-in-1 PC (aka convertible laptop/tablet computer) running Window 10, several Android based mobile phones and tablets.
It helps productivity tremendously when you can work on the way and then continue seamlessly in the office on a different device.
It also gives you peace of mind to know that your important documents are not only on one device but on several devices and therefore you’ll worry less about a sudden device failure or harddisk crash. It’s an extension to a good backup strategy, however, we’d not recommend to use it as a replacement for it.


Click on the correct file, and select Save File.
For our Windows 10 device – the example used here – download the 32-bit version labelled, not the amd one under the amd64 label by following the Download button from
Alternatively, choose the Native GUI implementation.
At the time of this writing, the latest version is 1.2.0 and is packaged as a zip file.

As always, first thing after downloading any application or file from the internet is a scan with the Antivirus protection, e.g. the Windows Defender, by right-click with the mouse on the freshly downloaded file. With result showing no thread, we feel more comfortable.

Quickly also download the sha256sum.txt.asc file from the download area and save it.

Validate the download

Now let’s ensure the file is indeed the correct one. From the Synthing security page we learn how to use the command line to import the GPG key or we can use the graphical to Kleopatra to search for the two mentioned keys via the Lookup on Server function. (We installed Kleopatra as part of the GPG4Win installation.)

With the keys now known to our GPG system, we can right-click on the previously downloaded checksum file and select the Verify function within the More GpgEX options menu and Kleopatra should inform us in a friendly green colour that the checksum file is genuine an offer an option to save the verified file (Save All button), a text file (with .txt file extension) which we then open.

The last step to validate, we have downloaded the correct and uncorrupted Syncthing zip file is to right-click on the downloaded file and select SHA-256 from the CRC-SHA menu and compare it with the checksum from the validated text file. (The CRC-SHA menu is part of the 7-zip tool, we installed earlier.) It may need some moving and adjusting to be able to see both at the same time.

It may look cumbersome to go through all those steps, just to ensure the authenticity of the downloaded application, however, we prefer safe over sorry before we allow a downloaded application to install on our PC and gain access to our files.


Now, finally, double-click the downloaded zip file and unpack it to a suitable location and double-click the syncthing.exe file to start the installation process.

Once completed, you can select which folders you intend to sync and you can introduce your other devices running syncthing to start synchronization.
You may want to consider what files you need on which device and e.g. not synchronise all your files with your mobile phone.
There’s also some caveats when trying to synchronize e.g. your photos taken on the mobile phone to your PC as not all Android versions allow access to an external MicroSD memory card that you may use to store your photos on.

Having our KeePass e-wallet containing all important passwords in sync across your devices is certainly a huge value-add.

The online documentation for Syncthing is quite comprehensive and recommended for finding further details on this very helpful tool.

Posted on Leave a comment

Awareness for online privacy and security – Email

Our contribution to help increase the awareness on privacy and security issues related to new technologies and communication tools:

Simplified summary:

Email = Postcard
Letter = encrypted email

More information may be found also at Mozilla, maker of Firefox, the web-browser that takes your privacy seriously and Thunderbird, our email application of choice.

Posted on 1 Comment

Update Thunderbird

Thunderbird is my preferred email client. Various email accounts can be included into Thunderbird, basically all IMAP standard following email providers, and it has some powerful extensions like Lightning for calendar, utilizing the open CalDAV standard, and CardBook for contact management with the open CardDAV standard.

Email is one of the key modern-times communication media, so important that for some companies you simply don’t exist if you don’t have an email address. Scary but true. So let’s make sure Thunderbird is up-to-date with all safety and security fixes and improvements so we’re not suddenly kicked out of existence by some malicious attacker and that we don’t contribute unwillingly, maybe even unknowingly, to the ever increasing spam issue.

Continue reading Update Thunderbird

Posted on 3 Comments

Update Firefox web browser

Not only does your mobile device require regular maintenance and update of some apps to get the latest enhancements and security relevant fixes, your PC, laptop or tablet computer does appreciate some care as well.

Browsing the internet is most likely part of your regular routine when using your computer. Thus, making sure your interface to the internet, your web browser, is safe to use and has all the security relevant improvements and fixes.

There’s certainly different web browsers around and everyone has their favourite. I’d always recommend Firefox from the Mozilla foundation due to their open source affinity and advocation for privacy.
If you’re not yet using Firefox, have a look at their webpage
(Click on the link will open in a new window or tab, depending on your browser settings.)

Here’s how to update your Firefox browser.

Continue reading Update Firefox web browser

Posted on Leave a comment

Email Encryption – Update GPG4Win

To encrypt emails, and maybe also files on the local harddisk, GPG (the GNU Privacy Guard) is the Open PGP tool of choice. And keeping applications up to date is safety relevant and important, especially for security related applications, so let’s cut the cake and get to it and let’s update GPG4win, the Windows variant, to the latest version.

Continue reading Email Encryption – Update GPG4Win

Posted on Leave a comment

Multi Factor Authentication (MFA) – secure your accounts

Here’s the 2nd part to the secure password considerations – MFA, multi-factor authentication.

Traditionally, the access to your online bank account looks like this:
you type your

, your

and in you are and ready to go about your business.

Account in the following is not limited to a bank account but can be the personalized access to any webpage, web-service, online-store or similar.

Now, if you’re like the majority of internet users that only use 5 different passwords for all their online activities, you could unconsciously create a domino effect that allows hackers to take control over several of your accounts after just cracking one password.

In comes MFA, multi-factor authentication.

Continue reading Multi Factor Authentication (MFA) – secure your accounts