Sunday, May 29, 2016

Annoying Ask-Agains

Hello reader!  Ready for my Week 11 post?  Are you sure?  Are you sure you're sure?

That was fun, right?  Right?  Right.

You hate the dreaded Windows "Are you sure" boxes, and I'm sure you equally hate the "This programs wants to access your system, will you let it?" boxes too.  Guess what, those are actually a good thing!

Have you ever accidentally deleted an important file, or clicked no too quickly on for something you meant to click yes for?  Of course you have, you're a person with a computer.  Don't be offended, I've done it more than you.

When the operating system asks you if you're sure about an action, it's not trying to be a jerk (contrary to common belief).  It is making sure you meant to do it and keep you safe all at the same time.

Most of the time when you are asked if you want to let so-and-so program run, it's because you asked it to run.  But, what if you didn't ask it to run?  Wouldn't you want the OS to keep you safe and not run a random malicious software you accidentally downloaded along with the latest bootleg of Civil War?  (I'm looking at you Henry, be ashamed)

As annoying as it might be, those pop-ups from Windows are there to keep your system and your information safe.  If random malware was able to run, you would blame Microsoft for not protecting your dirty Internet activity.  Instead, you curse them for making it too difficult to navigate and execute peacefully.

But I digest...digress...something like that.

Thanks for reading for the past few months.  Looking at what is due next week, I probably won't post for a little bit.  However, if you really like to read my randomness all that much, post a comment!  I'm here to support you and will be happy to keep going if you want me to...at least until my next class requires it.  Again, thank you for the support.  Stay safe on the Internet, it's a dangerous place!

REFERENCES:
http://www.howtogeek.com/173478/10-important-computer-security-practices-you-should-follow/
http://www.digitalcitizen.life/uac-why-you-should-never-turn-it-off
http://windows.microsoft.com/en-us/windows/what-is-user-account-control#1TC=windows-7

Sunday, May 22, 2016

Eerie Emergency Prep

Hey reader!  Welcome back to Week 10!

A few weeks ago we talked about backing up your system.  If you don't remember, here is the link: http://cyberschopp.blogspot.com/2016/04/baffling-backups.html

However, there is more to preparing for an emergency than backing up your system.  If something were to happen in your home, how would you know what to do to get your computer(s) up and running again?

Having a plan, sharing it with your family, and updating it regularly are necessary parts of an emergency action plan.  Another step is exercising the plan.  Simulating a loss of data integrity or availability and following your plans' checklist is a great way to make sure you haven't missed anything.

Some of the things you want to consider in your network emergency plan include (but are not limited to):
- reactions to specific events, such as discovered malware or hardware failure
- checklists covering broad responses as well as specific events with special actions
- notification lists, i.e. call Dad if..., or call police if...

Thinking of situations, or pulling crazy ideas from TV or movies is a great way to think about what your reactions would be in a variety of situations.

Thanks for reading!  See you next week.

Sunday, May 15, 2016

Disturbingly Disposal E-mail Addresses

Welcome back for my Week 9 post!

Do you love spam?  I know I do!  Actually, I really don't know because my spam filter gets rid of most of it.

I only have one personal, one business, and one school e-mail address.  So, 3 in all.  Amazingly, I don't see all that much spam...except for what my Gmail filters out that I peruse through on occasion. All that aside, there is much to be said for creating and maintaining an arsenal of disposal e-mail addresses.

If you sign up for more than one service out there, you are bound to come across a company who has no problem selling your e-mail to Hank, the lowly Burger King employee.  Hank will gladly send you spam in hopes you will click on a link of give him a million likes on Facebook.  Nothing against Hank, but ain't nobody got time for that!

Using a disposable address for signing up for site is a great way to not care about what random correspondence you get.

This also clears up your main e-mail to make sure the cookie recipe from Mom doesn't get lost in the crap!

Thanks for reading...if you don't normally look at my references, please look at the second one about responding to a spam e-mail.  It is totally worth the 10 minutes.

REFERENCES:

https://www.google.com/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-8#q=disposable%20email%20address
https://www.youtube.com/watch?v=_QdPW8JrYzQ

Sunday, May 8, 2016

Inconceivable Identity Theft

Hello reader, welcome to my Week 8 post!

If you had just stolen a few million passwords, how much would you sell them for?  I'm making a big assumption that you are some kind of criminal seeking a profit from someone else's info.  So, how much would you make off this score?

This past week a Russian hacker was selling 272 million unique e-mail addresses and passwords for the whopping price of 50 rubles.  Folks, that about $0.75.  The hacker was quoted as saying, "I am just getting rid of it but I won't do it for free."

This story got me thinking, was my e-mail and/or password one that he was selling?  I took the opportunity to see if I had been "pwned" at the fittingly named https://haveibeenpwned.com/.  It turns out, I have been, but not too recently.  My data was potentially taken during two different breaches in 2013.

So, what should I do?

The Federal Trade Commission has authored a handy guide to help you along if you are unfortunate enough to have your identity stolen, so I won't pretend I can help other than giving you the link below.  But here's the short-and-sweet:

1. Plan ahead - if you have a personal recovery plan to help you through, the process will be much much smoother.
2. Update and track your plan - if a step in your plan doesn't work, or something changes, it won't do you much good at all.  Updating it with current info will be your lifeline if you ever have to use it.
3. Contact - you need to get in touch with the credit bureaus and your banking institutions.  Having preprinted letters for each establishment, again, will help you in the process.

I hope you never have to deal with a full identity theft.  If you do, follow the guide and be committed to clearing your name.  Good luck!!!


REFERENCES:
http://www.vocativ.com/315608/russian-hacker-email/
https://haveibeenpwned.com/
https://www.consumer.ftc.gov/articles/pdf-0009-taking-charge.pdf

Sunday, May 1, 2016

Perplexing Power

Hello reader!  Welcome to my Week 7 post.

When you are done with your computer at the end of the day, do you turn it off or leave that sucker running into the wee hours of the night?  Does it matter?  This weeks post will touch on some benefits for both and then I will give you my recommendation on what you should do.

Leaving it on.  If you leave your system on between uses, this can be used for other tasks.  System updates can be applied at scheduled times during the night when you are less likely to be using the system.  You can also schedule backups, virus scans, or disk defragmentation.  These tasks are necessary to keep your system running optimally, but doing them when you aren't actively using your system keeps you from interrupting your work.  Additionally, you can donate your unused computing power for the greater good.  The World Community Grid will use your computers power to assist their research a variety of problems, such as drugs to fight ebola or mapping cancer markers.  For a more comprehensive list, see the references below.

Turning it off.  Shutting your system down each night will do one thing really well...not use electricity!  If your system is in the same place as you or someone else sleeps, they will not be disturbed by any noises, such as the fan, while they are trying to sleep.  Also, your system does need a reboot occasionally anyway, so you are just helping along the process, but on a more daily basis.

As promised, here is my recommendation.  Turn it off...or leave it on.  Honestly, it depends on how often you use your system.  If you use it everyday for several hours, leave it on.  You won't have to wait for the start up.  If you rarely use it, turn it off after use, or donate your computing power.  The choice is yours, you have the power.

REFERENCES:
http://www.digitaltrends.com/computing/should-you-turn-off-your-computer-at-night/
http://motherboard.vice.com/read/7-ways-to-donate-your-computers-unused-processing-power
https://boinc.berkeley.edu/wiki/Project_list
https://www.worldcommunitygrid.org/discover.action
and just for fun, yet not related at all ;)
http://fivethirtyeight.com/features/the-worst-board-games-ever-invented/