Blog

That’s My Password

Posted by on Oct 24, 2014 in front page, security | 0 comments

That’s My Password

Most people use the same password for many sites or have them written down some place. Both practices are frowned on by security professionals. To solve this there are many programs and sites that offer a “key chain program” to safely save your keys/codes/passwords for you. Last issue I talked about the advantages of password keepers. One advantage, I didn’t mention, is that if you have the same password at many sites and one of them is compromised you don’t have to change the password at all of your sites with that...

read more

What’s That Password?

Posted by on Oct 10, 2014 in front page, security | 0 comments

What’s That Password?

Most people use the same password for many sites or have them written down some place. Both practices are frowned on by security professionals. To solve this, there are many programs and sites that offer key chain programs to safely save your passwords (keys) for you. Save Keys On-line or in the PC (on-device) The on-line versions let you get your passwords anyplace there is Internet access and can be on any web enabled device. The on-device versions are not kept with a third party nor sent over the Internet. However, changes to the passwords...

read more

A New Computer

Posted by on Oct 3, 2014 in Business Computing, computers in general, consumer technology, front page, linux | 0 comments

A New Computer

Today I am introducing you to a “new” computer. I’m finding that people who use their computer just for email, facebook, the web, writing, spreadsheets and simple games are finding it easier, more enjoyable and less troublesome than Windows or Mac. The new computer I a talking about is called LINUX. Wait a moment some of you are saying. That’s been around since almost the dawn of the Internet and you are right. What’s So Good About It? First of all (believe it or not) it is familiar. Where I’ve installed it the (fussy)...

read more

Shell Shock, Take a Pause

Posted by on Sep 28, 2014 in front page, linux, mac, security | 0 comments

Shell Shock, Take a Pause

After reviewing the depth of the shell shock vulnerability experts seem to be taking a step back to come up with a more considered plan. As mentioned in yesterday’s blog the problem appears to be deeper than it originally appeared and may require more than just a fix of the problem program named bash. It may require changes by IT staff across the globe to change programs or test programs with a substitute program for bash. Researches are now divided on how sever this problem is. From my own research I see that a good portion of what was...

read more

Shell Shocked Apology

Posted by on Sep 27, 2014 in front page, linux, mac, security | 0 comments

Shell Shocked Apology

In the previous blog I brought up the specter of our printers and other devices being affected by the Shell Shock vulnerability in the Bash program. This is on the alarmist side and I apologize for my over zealousness. While it is a possible threat most devices will probably use one of the smaller cousins of Bash. Worse Than We Thought The problem in Bash while deeper and worse than we in the IT industry at first suspected the dangers do not increase for the regular computer user. The problems just make it harder for us to fix. There have...

read more

Shell Shocked (Printer?)

Posted by on Sep 26, 2014 in front page, linux, mac, security | 0 comments

Shell Shocked (Printer?)

The popular press is reporting on the recently discovered vulnerability in many of the Internet’s servers. While not a virus (it can’t spread from machine to machine) it can infect Macs and Linux computers. It does NOT infect Windows computers. However many of the places you go on the web can be compromised and thus what you put into those sites can be at risk. How Big Is The Threat Web servers are computers that take request from you via the Internet and return you the web page you ask for. The software that does this are from...

read more

We Are Microsoft, Trust Us

Posted by on Aug 26, 2014 in Business Computing, computers in general, front page, security | 0 comments

We Are Microsoft, Trust Us

Lately, here in Oklahoma there has been a rash of social engineering attacks on computers. Social engineering is just a fancy way of saying SCAM. People will call you saying they are from Microsoft, Apple, a virus protection company (Norton, McAfee…) or your Internet provider, and say that your computer has been detected as causing problems and it needs to be checked or fixed. How the Scam Works As mentioned above, someone calls using a name that is “reputable”. You trust that name and thus trust them. They hope you...

read more