In this issue of Horse
Sense:
-News You Can Use
-Keep Your Software Up To Date!
-Sold State Drives Break Through "Magic" Price Barrier
-Get Ready for the Silly (Election) Season
News You Can Use
Mobile and fixed Internet traffic will grow dramatically over the next
few years. Are you ready for it?
Your next company may be playing games and it might be good for you and
for them.
If you buy a Windows 7 based PC today, you should be able to get Windows
8 for $15 when it comes out (promotion runs 6/2/12 to 1/31/13). <
http://www.windowsupgradeoffer.com>
A computer notebook is stolen every 53 seconds. 12,000 a week are stolen
from US airports. Notebook theft is also a leading contributor to
identity theft. Intel has new technology that helps alleviate the
information theft problem by using a poison pill to lock down the
notebook before it can even boot. Absolute Software Computrace can
track and locate lost or stolen notebooks. You can even set up a "fence"
where if a laptop leaves a specific area, it either yells for help or
implements the Intel poison pill feature. Computrace also has an
insurance policy if you cannot recover your laptop. You can also secure
your laptop with encryption either through hardware in the laptop or on
the disk or via software. This keeps anyone from accessing your data
unless they can supply the password.
Keep Your Software Up To Date!
My favorite tools for keeping software up to date are:
(1) <
http://WindowsUpdate.Microsoft.com>
Use this link or the tools in your operating system and choose to have
it update all your Microsoft applications as well. Pick the "custom"
button if you are updating Windows XP and you can update some hardware
drivers as well. You can turn off updating Silverlight, Windows
Messenger, and Windows Live applications if you do not use them (many do
not).
(2) <
http://www.Filehippo.com>
This is a good site for downloading all sorts of freeware and shareware
applications and the tool they allow you to download in the upper right
hand corner of the main page (FileHippo Update Checker) is very quick
and easy. Again, you can ignore Windows Messenger and other suggestions
for programs you do not use. I would also ignore any beta
recommendations.
(4) <
http://www.driveragent.com/>
DriverAgent offers free scans, but the links do not work unless you have
the inexpensive paid version, though you can look for those downloads
yourself for free. This site is great for updating hardware drivers.
(5) <
http://ninite.com/>
Ninite has free and paid versions. Ninite is a really good way to set
up a new PC with the freeware and shareware you want. Afterwards, you
can to check for and update that software easily. The corporate
versions allow you to maintain fleets of PCs and keep them updated.
(6) <
http://secunia.com/resources/product_sheets/>
Secunia Personal Software Inspector is free for home users and looks for
issues in your personal security. Unfortunately, you have to be a
little savvy to use this tool.
(7) <
http://www.belarc.com/free_download.html>
The free Belarc Advisor is an excellent way to inventory what is on your
machine and extracts installation keys for use later. This tool gives a
lot of data that will overwhelm many.
We have many other products, both free and paid, that my clients find
useful. Call us to discuss your needs.
Solid State Drives Break Through "Magic" Price Barrier
You can now buy solid state drives (SSDs) for less than $1 per
gigabyte. Besides reaching low price points, manufacturers are starting
to ship SSDs that can sustain a massive number of write cycles and
maintain top speeds while doing so. These drives will be extremely
useful in high performance server applications. SSDs are a requirement
for all high end ultra thin notebooks and tablets. Expect to see SSDs
displace hard drives for both high and low end computing needs.
Most people are not aware that they are already using solid state
storage. Usually this storage pales in performance when placed against
a true SSD. Still, the "instant" on and random access capabilities
built into cell phones, children's games, tablets, cameras, and portable
music players should give you some ideas of how an SSD might behave in a
PC. Blazingly fast and "instant" on are two capabilities most clients
cannot do without, though SSDs are also more reliable, resistant to
shock, and usually consume less power.
Get Ready for the Silly (Election) Season
If you have not seen the e mails, you soon will. They may look like
they are from a reliable source. Lots of spam and malware attacks
depend on the recipient believing it comes from a trustworthy source.
The mail may be from a military figure, a religious organization, or
even the FBI. It may be forwarded to you by a friend you trust. In any
case, you can expect to see lots of unsolicited political e mail in your
mailbox soon and there is a good chance a lot of it will be complete
nonsense. Political groups love e mail because it is an extremely
inexpensive way to get their message out to millions of people.
I am a computer security professional and sell lots of computer security
products. None of them are designed to stop political e mails. In
fact, most spam laws and telephone marketing laws have specific
exemptions for politically motivated contacts. The only thing that can
stop political e mail proliferation is a critical reader (you).
Although political e mails alone may be bad enough, untrue political e
mails are worse. If it sounds really juicy, gets your ire up, or is
something they ask you to forward to others like a chain e mail (obvious
sign of a productivity waster), turn your bullshit meter on high and
either avoid sending it on or check it out thoroughly at reputable urban
legend debunking sites like Snopes.com (my favorite) or
ubanlegends.About.com or other urban legend site. Do not assume that an
e mail is true if you cannot find it on Snopes.com. Remember, it is
often harder to prove something is true than that it is not in the realm
of politics. The Obama Administration and Obama in particular are very
common targets of this type of e mail and you can only expect the
disinformation machines to spew more nonsense as the election
approaches. During the previous election, George W. Bush was a big
target. Everybody loves to hate the "man" and wants to tear down
celebrities. If you are really shocked, then there is a good shot the e
mail is bogus. Think about it, most people do fairly boring things most
of the time.
These politically motivated e mails are like a fake virus alert. They
scare the hell out of everyone and cause resources to be expended that
do not need to be. Verifying the information contained in an e mail can
take a lot of time that might better be spent elsewhere. The computer
security term for this is scare mail. It used to be limited to fake
virus warnings, but their success has spawned imitators. Scare mail is
often used to energize a political base against something. False
information chews up a lot of people's time and energy. Conspiracy,
"startling revelation" and hidden secret e mails destroy real
productivity. Trust me, incompetence is easier than conspiracy and
incompetence is not all bad. My six year old knows I am incompetent at
child rearing. I have an excuse. It is my first time. I still got a
Father's Day card. People make mistakes. They usually do not trumpet
them. That does not mean that they are conspiring against everyone,
that a revelation of something they have done should be startling or
even relevant, or that it is secret or even true. So even if there is a
small amount of truth in a political e mail, the emphasis and slant of
an e mail trashing someone is almost certainly suspect.
If in doubt, keep that e mail to yourself. If you forward it on, you
risk others knowing that you have been duped. It is the e mail version
of the old line, "Better to have people think you are foolish than to
open your mouth and remove all doubt." That said, do not be too
chagrined at falling victim to a ploy like this. They are designed to
take advantage of you and even the most skeptical and brilliant people
can be fooled. That is why computer security is so hard.
Employers should severely limit political expression in e mail coming
from work addresses. True or not, they are productivity wasters and you
risk offending someone you do not need to with a political e mail. Even
worse is sending on something untrue. If someone in your organization
does that, they show that they not only have a political bent, but that
they can be fooled relatively easily. That can undermine the trust your
clients and business associates afford you. The default policy of a
business should be outbound political e mails of any kind are off limits
unless specifically authorized.
Political e mails may not mention a particular candidate or party, but
are political nonetheless and should not be recirculated. We have lots
of persistent stories that have been settled conclusively. Washington
did not cut down the cherry tree. Lincoln did lie at least once. "Under
God" got added to the Pledge of Allegiance and then removed. Not all
money had "in God We Trust." The Declaration of Independence was never
a legal document. Our servicemen are not about to provide you with tons
of gold bullion or access to millions of dollars from raided palaces in
Iraq and Afghanistan. And so forth.
Unfortunately, people tend to believe what they read, especially if it
comes from a "reputable" source. Debunking something might be difficult
and a juicy rumor is often too delicious to keep to oneself. These
political time wastrels and hacktivists count on your gullibility. Do
not let them get the best of you.
Of course, if they do get the best of you, admit it to everyone you told
to earn back your credibility and turn your bullshit filter on a little
higher.
Any computer security practitioner will tell you that user skepticism,
vigilance, and training are more important than any software or
procedure available. Unfortunately, security is very often reactive.
Wisdom is the cruelest teacher because the exam comes before the
learning. We will likely get burned before we take some precautions
seriously. Remember, paranoids have real enemies too!
©2012 Tony
Stirk, Iron Horse tstirk@ih-online.com