That’s My Password

Most people use the same password for many sites or have them written down some place. Both practices are frowned on by security professionals. To solve this there are many programs and sites that offer a “key chain program” to safely save your keys/codes/passwords for you. Last issue I talked about the advantages of password keepers. One advantage, I didn’t mention, is that if you have the same password at many sites and one of them is compromised you don’t have to change the password at all of your sites with that password. That was the impetus for me starting to...

read more

What’s That Password?

Most people use the same password for many sites or have them written down some place. Both practices are frowned on by security professionals. To solve this, there are many programs and sites that offer key chain programs to safely save your passwords (keys) for you. Save Keys On-line or in the PC (on-device) The on-line versions let you get your passwords anyplace there is Internet access and can be on any web enabled device. The on-device versions are not kept with a third party nor sent over the Internet. However, changes to the passwords have to be synchronized on the various devices...

read more

A New Computer

Today I am introducing you to a “new” computer. I’m finding that people who use their computer just for email, facebook, the web, writing, spreadsheets and simple games are finding it easier, more enjoyable and less troublesome than Windows or Mac. The new computer I a talking about is called LINUX. Wait a moment some of you are saying. That’s been around since almost the dawn of the Internet and you are right. What’s So Good About It? First of all (believe it or not) it is familiar. Where I’ve installed it the (fussy) clients for whom things always seem to not be...

read more

Shell Shock, Take a Pause

After reviewing the depth of the shell shock vulnerability experts seem to be taking a step back to come up with a more considered plan. As mentioned in yesterday’s blog the problem appears to be deeper than it originally appeared and may require more than just a fix of the problem program named bash. It may require changes by IT staff across the globe to change programs or test programs with a substitute program for bash. Researches are now divided on how sever this problem is. From my own research I see that a good portion of what was originally thought to be a problem are not a...

read more

Shell Shocked Apology

In the previous blog I brought up the specter of our printers and other devices being affected by the Shell Shock vulnerability in the Bash program. This is on the alarmist side and I apologize for my over zealousness. While it is a possible threat most devices will probably use one of the smaller cousins of Bash. Worse Than We Thought The problem in Bash while deeper and worse than we in the IT industry at first suspected the dangers do not increase for the regular computer user. The problems just make it harder for us to fix. There have been three fixes in the last two days. These we have...

read more

Shell Shocked (Printer?)

The popular press is reporting on the recently discovered vulnerability in many of the Internet’s servers. While not a virus (it can’t spread from machine to machine) it can infect Macs and Linux computers. It does NOT infect Windows computers. However many of the places you go on the web can be compromised and thus what you put into those sites can be at risk. How Big Is The Threat Web servers are computers that take request from you via the Internet and return you the web page you ask for. The software that does this are from various groups. When you get a web page you have...

read more