Monday, September 27, 2010

Tech News World : Feds Seek Sweeping Power to Hunt Bad Guys on the Web

"Federal law-enforcement organizations are working to draw up legislation that would give them the ability to monitor communications carried out via Internet technologies like peer-to-peer messaging and encrypted email. Agencies would still need to obtain a warrant for any given operation, but such a law could make it easier to for them to plug into these channels once permission is granted." ~Richard Adhikari

http://www.technewsworld.com/story/Feds-Seek-Sweeping-Power-to-Hunt-Bad-Guys-on-the-Web-70913.html

This should raise even more alarms for the those conspiracy theorists. AH! Big Brother is watching and listening again. I better put on my tinfoil hat........   I am not one of the theorists but I do not think that for one moment they aren't doing this to everyone already. If you are, please do not be so naive. This is an attempt to make it legal for them anyway. Even if they are not, I do not want them to get this kind of power.

Top Tech News : Automated Feedback Loop Takes Out Facebook

"Facebook was forced to shut down for 2.5 hours after an automated error system created a persistent feedback loop. Facebook apologized to its more than 500 million users and turned off the automated system. Facebook's embarrassment came just days after a Twitter onMouseOver hack spewed pornography and spread worms through tweets." ~

http://www.toptechnews.com/story.xhtml?story_id=12100B4DHB8B

I was one of the people that was wondering if he had messed something up on his computer when facebook went down. I have mentioned that we need to exercise caution when we are on these sites. But do you really believe that it was only a automatic feedback loop that caused it to go down. My guess is, not so much.

Tuesday, September 21, 2010

BBC News : Seeing the big picture on content

"The 'high bandwidth copy protection' scheme has been in use since 2004 even though the possibility that someone would be able to reconstruct the master key by examining HDCP-capable devices was known even before any systems were commercially available." ~Bill Thompson

http://www.bbc.co.uk/news/technology-11380490

Again the more protection we create, the more it gets broken. As much as I love how fast machines are getting, I know that it also means protections cracking time is shortened. No protection is sure fire, that is why you whould use many layers. Your protection should be like Shrek or an onion, layered.

Top Tech News : Hackers Find New Ways To Assume Identities

"Although cyber scamming is nothing new, the way thieves use the data is constantly changing, and social media is a gateway to the latest scams. Identity theft experts fear that by sharing seemingly mundane personal details and preferences on social networking sites, people might be giving the bad guys clues about their security codes." ~

http://www.toptechnews.com/story.xhtml?story_id=111003KN0ZSO

This article is enlightening and a bit redundant to me. Let me explain why. To paraphrase "When you make something scam proof someone goes and makes a better scam." Like viruses, scams evolve as the ways to prevent them do. We must remain ever vigilant to keep ourselves safe.

Saturday, September 18, 2010

New York Times : The Way We Live Now - Achieving Techno-Literacy

"But the computer was only one tool of many. Technology helped us learn, but it was not the medium of learning. It was summoned when needed. Technology is strange that way. Education, at least in the K-12 range, is more about child rearing than knowledge acquisition. And since child rearing is primarily about forming character, instilling values and cultivating habits, it may be the last area to be directly augmented by technology."~ Kevin Kelly

http://www.nytimes.com/2010/09/19/magazine/19FOB-WWLN-Kelly-t.html?_r=1&ref=technology

We must always remember that our technology is a tool.

Friday, September 17, 2010

The Register : 1 in 10 Americans prefer colonoscopies to PC security

"The survey, sponsored by PCTools, also found that more than one in 10 Americans would rather get a colonoscopy that spend time cleaning up their computer." ~ Team Register

http://www.theregister.co.uk/2010/09/16/tools_survey/
Honestly I find this disturbing. But I do understand. My better half hates it when I do spring cleaning on her computer. She gets mad because it takes longer to get things done the first time she logs back onto whatever she needs to do. I find this also a bit enlightening, since that means that I may have more customers to my time.

Network World : Intel CISO:Biggest security threat is not understanding risk


"What is the most significant vulnerability that information security faces today and in the future? According to Malcolm Harkins, CISO of Intel, the biggest threat facing infosec is the misperception of risk." ~Joan Goodchild, CSO

http://www.networkworld.com/news/2010/091610-intel-cisobiggest-security-threat-is.html?hpg1=bn

Please remember even those people who are in the industry can make mistakes, after all we are still human. We sometimes overestimate how well our setup works and underestimate what the threat really is. This can work in reverse to. This is why people belong to groups with like minds, not the same, but similar. They can help each other better understand certain threats.

Tech News World : 10 Best IT Practices for Smartphone Security

"Treat all smartphones as uncontrolled endpoints. Smartphone users' identities can be stolen, hacked or inappropriately shared. Smartphones can get lost, stolen or borrowed. Device identification technology uses serial number information to allow organizations to associate a specific smartphone to a specific user. This provides a watermark for the device, and allows IT to remotely disable it and erase all sensitive data." ~Patrick Sweeney

http://www.technewsworld.com/story/10-Best-IT-Practices-for-Smartphone-Security-70826.html

How many of you have a smart phone? How many of you have them secured? In a few of my classes we have actually seen how secure they come out of the box, which is basically not at all. You have to enable your security in most cases. This is just some info on how you can be more secure.

Wednesday, September 15, 2010

Tech News World : Encryption vs. Tokenization: Under the Hood

"Most enterprise IT departments do not have the intimate knowledge needed to make good decisions about what to do with data. The wrong decision related to identifying sensitive data can cost a company millions in lost revenue and legal costs. Yet, the ability to secure data is the most important criterion companies have when deciding what their priorities are." ~Stuart Lisk

http://www.technewsworld.com/story/Encryption-vs-Tokenization-Under-the-Hood-70809.html

This was some new information to me and thought it would quench the thirst of some of the higher techies out there.

Network World : 802.11n Wi-Fi making huge impact 1 year after standard ratified

"Shipments of 802.11n access points have accelerated since the IEEE standard was formally approved one year ago. But what the numbers alone don't show is the new reality of Wi-Fi networks: they are fast becoming the preferred way to connect and stay connected in the enterprise." ~ John Cox

http://www.networkworld.com/news/2010/091310-80211n-anniversary.html?hpg1=bn

Just a bit on 802.11n wireless. For those of you that may not know this is the most recent standard for wireless. I had been waiting on this for a while.

Sunday, September 12, 2010

Better Video Quality

Some of you may have noted that the video quality has greatly improved. Until recently I was just using blogger to host them. Through a friend I found out that they actually turn out better when I host them on youtube then embed them onto the blog. There are more to come and I hope this improvement will bring more enjoyment and comments from everyone.

Tech News World : Smoking Out Attackers Hiding in Encrypted Data

"For an enterprise concerned about security, which most are, addressing the risks posed by threats hidden within encrypted SSL traffic is clearly not something that can be ignored. If SSL were being used for no purpose, then the problem could be solved by simply avoiding or preventing the use of SSL. However, the reality is that SSL is used to provide much-needed security for a wide range of network applications." ~David Wells

http://www.technewsworld.com/story/Smoking-Out-Attackers-Hiding-in-Encrypted-Data-70807.html

I do not have much to say here. I agree with his his ideas and would like to see them implemented in the future. I do have to state that why many may be good, at current speeds some of these implementations might slow our connections down.

BBC News : Sex movie worm spreads worldwide

"A booby-trapped e-mail that promises free sex movies is racking up victims around the world, warn security firms."

http://www.bbc.co.uk/news/technology-11258795

I'm not one to tell anyone what you should and should not do with your time. It is your time and if you are one that wants to look at explicit images more power to you. Just realize that you need to beware that many of those sites are ill-protected against malware. Not that the site is unprotected, just that it has no protection for you.

Top Tech News : 'Here You Have' Virus Exposes Security Holes

"The lesson to be learned from the "Here You have" virus is no surprise: Keep your anti-virus up-to-date and your wits about you. Like many other viruses, the "Here You have" virus still requires you to click on a link and run the malicious code, so if you think before you click then you have nothing to worry about."
~

http://www.toptechnews.com/story.xhtml?story_id=030002R9L4AC

Yet another hijack through email. Much like the "ILOVEYOU" or the "Melissa" worm, this one wreaked some havoc recently. "One other reason to keep an eye on what you open through your email.

Friday, September 10, 2010

Netsmartz

This site is run by the National Center for Missing & Exploited children. It has tools and games for teaching children-teens about how to be safe on the internet. It also has tools to help parents and law enforcement teach the youngsters as well. This seemed like a good place to start from, and being that all kids love to play (adults too), it would seem a good way to begin. Make learning to be safe online fun for the children and teens you care for.

http://www.netsmartz.org/index.aspx

Thursday, September 9, 2010

Child safety on the net

A thought had occurred to me, the only reason my kids are safe is because I don't have the computer plugged in. So I have decided that a good plan would to be to review the products that are built to keep your kids safe. Programs such as Net Nanny and K-9. I am going to look into and review to see how they measure up.

Kaspersky 2010 Review




http://usa.kaspersky.com/

I do highly recommend this program to PC users looking for a solid all in one product.

Top Tech News : Microsoft Gets Legal Might To Take Down Spam Botnets

"Microsoft is taking aim at botnets. A legal ruling has given Microsoft permanent ownership of 276 web domains once used by the Waledac cybergang to send instructions to hundreds of thousands of spam-spreading PCs. Microsoft now has a proven legal means to take aim at U.S.-registered domains shown to be conducting criminal activity." ~

http://www.toptechnews.com/story.xhtml?story_id=021000Q2NIAX

Well it was bound to happen. Microsoft actually doing something other than patching holes. I am a person who thinks you should go after your attackers, at least to stop them from happening. I know that this is a very sticky situation though. You have to first create the line at which you will not cross. Then you must know where the law stops helping you and actually goes after you. The shades of gray are many at this point. And unless you are a careful and mindful company you might fall to the other side of the law.

Wednesday, September 8, 2010

Spyware Blaster review




http://www.javacoolsoftware.com/spywareblaster.html

This one I was told about through a classmate. I used it a while ago when I was searching for new tech support programs. It was suggested mainly because it works with Adaware.

Spybot S&D review





http://www.safer-networking.org/en/index.html

 I have used this program for years. I trust this software quite a bit and it is freeware, only payment the creator receives is through donation.

Tech News World : Clam or Klam? Either Way, It's Easy Linux Protection

" Though you're probably less likely to find yourself riddled with malware if you're running Linux rather than Windows, that doesn't mean security software should be ignored entirely. ClamTK -- or KlamAV, depending on which environment you use -- gives your Linux PC an antimalware guard dog that goes beyond the old "security by obscurity" strategy." ~ Jack M. Germain

http://www.technewsworld.com/story/Clam-or-Klam-Either-Way-Its-Easy-Linux-Protection-70777.html

Honestly I do not run an anti-malware program on my Linux partition or any of my VMs, this is something I should probably look into. I do not run my Linux partition often so I will do it through the use of VM. I will do a video on the VM creation, most likely on a Ubuntu install, then I'll do a video on the install of the anti-malware solution. Always a good idea to look into these things, especially when I might end up helping someone with it in the future.

Tuesday, September 7, 2010

Network World : VMware's plan for the Apple iPad still taking shape

"VMware won't be the first vendor to bring virtual desktops to the Apple iPad, having been beaten to the punch by rival Citrix.
But with VMware's marketing and product development resources, it will surely be a potent force in the drive to turn the iPad into a device worthy of business customers. VMware still isn't saying exactly when its desktop virtualization software will be iPad-ready, but the company did show a preview of VMware View for the iPad on the keynote stage at last week's VMworld conference." ~ By Jon Brodkin

http://www.networkworld.com/news/2010/090710-vmware-ipad-plan.html?hpg1=bn

There seem to be more and more reasons for me to want an IPad. I want an IPhone too. I'll be posting some videos about my VMs later.

Saturday, September 4, 2010

Network World : How Did My Protected PC Get Infected?

"SUPERAntiSpyware found three Trojans on Bill Artman's PC. Bill asked the Windows forum how this could happen when his PC is protected.
There's no such thing as perfect protection. Even if you have the best firewall and antivirus software available, and keep it up to date, something might get through. But knowing how they'll get through can help you block them." ~ Lincoln Spector, PC World

http://www.networkworld.com/news/2010/081610-how-did-my-protected-pc.html?source=nww_rss

Don't let this discourage you from trying to protect yourself. You need to understand that new viruses and holes in software are being found or created everyday. Your software can protect you, sometimes it just takes a bit of time to do so. Much like contraceptives, no anti-malware/virus product is 100% effective.

Network World : Botnet takedown may yield valuable data

"Researchers are hoping to get a better insight on botnets after taking down part of Pushdo, one of the top five networks of hacked computers responsible for most of the world's spam." ~ Jeremy Kirk, IDG News Service

http://www.networkworld.com/news/2010/090210-botnet-takedown-may-yield-valuable.html?hpg1=bn

This is kinda a big deal. Taking down even part of a botnet is no easy task. On a fun side note here, some people call the controlled computers of a botnet Zombies.

New York Times : A Strong Password Isn’t the Strongest Security

" Some computer security experts are advancing the heretical thought that passwords might not need to be “strong,” or changed constantly. They say onerous requirements for passwords have given us a false sense of protection against potential attacks. In fact, they say, we aren’t paying enough attention to more potent threats. "
~ Randall Stross

http://www.nytimes.com/2010/09/05/business/05digi.html?_r=1&ref=technology

I have to admit that I agree with this heretical view point. For some of us just having a password on our computer would probably stop some of the hijacks and viruses. But please note that this is still only the beginning of protecting your digital self. Think about how even our Western Heroes rode with their posse, so there needs to be more than one thing protecting your computer.

Malwarebytes Review




You can find it here : 
http://malwarebytes.org/

Thursday, September 2, 2010

Top Tech News : Where Are You Now? A Rundown of Facebook's Places

" What exactly is Facebook Places, and how can you protect your privacy with location-based services? Services such as Facebook's Places leave an ever-expanding digital trail for online marketers, enabling them to target ads for you based on demographic information you've scattered about. Check your privacy settings before using Places. " ~

http://www.toptechnews.com/story.xhtml?story_id=0020002BFWB4

AH! BIG BROTHER IS WATCHING US..... oh wait.... It's just that creepy stalker down the street and FACEBOOK. AH!
Seriously, we all like our privacy, so why are we giving up many pieces of it so readily. I for one do not own a cell phone. That may make me seem archaic, and this article might make me look paranoid, but am I the only person who sees this as a bad thing. This is not to say that if I could I would not go out and get one, I would love to own an IPhone or DROID. I just don't have the capital to get either and pay for their subscriptions.
Privacy does not mean safe, but some part of your safety does concern your privacy. When a person can go online and see exactly where you are, it just seems a bit much. My thoughts not necessarily yours, but hope it starts some juices flowing.

Top Tech News : New VMware Products Advance 'IT as a Service' Vision

" VMware introduced new cloud products and services at VMworld 2010 to support its vision of "IT as a Service." CEO Paul Maritz said server applications on virtualized systems are growing and surpass the number on physical servers. Three new VMware products -- vShield Edge, vShield App, and vShield Endpoint -- provide security and edge services." ~

http://www.toptechnews.com/story.xhtml?story_id=00200076HCAC

This might be over some of the heads of readers here, but I thought it was interesting and worth note. I use VM software regularly, and at one point used VMware. I agree with the notion of IT as a service, and do think that this software is quite good. I just prefer VirtualBox for my uses.

Top Tech News : Solving Your Annoying Internet Explorer Troubles

" Internet Explorer is likely the most popular web browser around, but users have numerous gripes, such as fixing settings to comfortable levels and securing passwords and usernames. Third-party tools such as the free IE New Window Maximizer make it easy to set your options over how IE launches, including the ability to close pop-ups. " ~ Jay Dougherty

http://www.toptechnews.com/story.xhtml?story_id=0020005MILCO

Although I would state that it is the most popular only because it comes on every Windows machine, that might seem redundant. Customizing it could prove to better secure your system and also make your life easier as far as computing. Personalizing/Customizing is a big part of making your computer easier to use and more like the way you need it to work.
Personally I choose to use Firefox, but in the Securing Desktops course I took I was told it might be better to just use Internet Explorer. Let me explain. The reasoning behind this is kinda simplistic, but complex in it's own way. While using a different browser which is secure itself might be a good thing, it might inadvertently open holes in your system as well. While I do not agree with this logic, I do however, take it under advisement.