Random Post: Protect Your Online World
RSS .92| RSS 2.0| ATOM 0.3
  • Home
  • About Me
  •  

    My Public Key

    January 31st, 2018

    —–BEGIN PGP PUBLIC KEY BLOCK—–

    mQINBFpx69YBEACkJpUPTcIfDesoaiFhC1DAfrdatWbJnWvhfb/1YwkLQnFjq7At
    GTkyIG53Cb0kT2ImM0IWo573gzP4t/n3zIvV/r4+7Ycrf+wEpTIV6WhSD0bPHEfv
    3//Og0Dvos6kjotj/4oc927mfAawPZCLb7Ag2B5AzRBGtX5jiI+yErCd8PbfSVPG
    QMzz3MweM4B+rQg1ZYd7VQ4TFxXaWeXasvHaKLurk/5DBPDqbgrdiCtiR40hAhUj
    eqDYp0DjRhWrRZf1VqsqBAM+W6TzLZqM2KTwOEyQuxCq3U5DXaqTLQ4KY6ocM/wv
    ggdYU6s/V7l5W35ieCWCreE3a+gjo3Xncfm3yE/hsDPS6JSacWGXSyzPf7cqin6m
    H9JypLNZM0/zUxyfbn3P3QS8HRZQPRdJPKzSfh6KkDwmIfRRcc9q8199njACATM7
    90+CGIBNYtuzvzwU5HT3OLWimwOLNil5EAodJgJXwoT2kdz0rVouYO+YKHlhcm1w
    5Z8+H6BG2oZncKmDSPEe7bFSzX7OMnxFXhNpjwfPpGryh97QdKnx7WSVEmE+K94j
    JIvgnggRLlqa7Y37gQmLm0bR264IKGLKbfyO+J17W/ixCAajRdt47ZJ4Dwh693YR
    ZTMzoA7BEF+jCvGs+QozQjTeI1/dy+KN++MnddEneOq78BB36z1Ucw1QDwARAQAB
    tB9CcmVuZGFuIE1vb24gPGJtb29uQGJtaG9tZS5jb20+iQJOBBMBCgA4FiEEDRm3
    4pW56PinbBwkV7yXDrgqCrMFAlpx69YCGwMFCwkIBwMFFQoJCAsFFgIDAQACHgEC
    F4AACgkQV7yXDrgqCrOPkg//S1Td4OFyFFOf4sLyCaVMgqd8a5LdLkaGJ0vB9nDI
    JzMtObTVEgVQROTU75HY81aYzpXQzfgRFG3tC4gN8DqcywUbvwu/NDVRwS3A2F1S
    En/h8pMmVS7IcsIILSCTJWzvyLMXfo0axNrEmoK94MtTjbZ8uWIGNWQs3Vx44GnE
    4RgzNKdGLLupDk8bAafQ8eUMUmrXc2yimq/75o0vEhMAACDmuOysp4dwW5PM0jYq
    oVNnHuUQLqGoiLnec4lQCBSiPPQ1dA72EGVZS1p3pidS6e3ivNKWig3uRMO1XbRm
    gU/GCyEr8AZoibfQghJZvzuds8z0+Try5D7gEj5i/Ne07EImPK78b9TkyxfD8jfd
    kAA7Wz8zMLNfkt1PJ+M4cG1/9aVGwjxUSTFaISa9Q+7bJT/B3r+iPIokJiCxtAMu
    bPBcJlRwKCRBSacSHUB8NZWMUoXiDWRLWTv98UUIeL9f6I41qKIR/F645KD8Wdeq
    LGlSCRhaEwSCWDg817klzuHhck657gQ5NuOL2/5sCS+mx/nh13lxPMZqX1ZQ2JUE
    eBmBOJBVBiMWuB8u2xvCXnvpTp8S27l6j5iR8y/Ue3qFtFmFwpuu2tC5haF/obOy
    DmnpVL7OQZHgtSU4adg0fe1Ej9SbVBgDAp+DxFv6SVdETnF03C+f86+FJHR2bHQv
    AE65Ag0EWnHr1gEQAOt4ThLN4QITBfj0PA5WW5FVdMQg8pamnG+72X0Qjf7P4LiJ
    psYZ31TU9kkwjeuN3AFXJuIuMaZ9y73SpJ3IgSjbSZBDISFp/B8DL0c+m5MPBs2q
    zJC0gDGcqbNjBspRdmfiO5q+p2mWvI6Tr8k95xCGE3MTggH/+u4Rvurvx317Al1f
    0lG9nCTyRgTwkaqZ7AyXNvkAau3hZiiTDPHb5eYXNwNYZZftvBlP1TFonMhQSMyf
    VVuICBGI/uhK2g2hOFPyIpO08lWXSS1rKd9TLwDKwtVUFe6wsOFT7h02Hfhj3tk2
    o76cAlnlzkofdrlurIwSjxbxR7IhmDEQATnprN7EHuhu7W9Ig3CKqGSxxg/Fp6KS
    eLyhlMCbguYV1foJqvriFHRPUPl8tTNwVjwEXB4x/h0h29j61T3MTt/Vxi9nXh50
    NSOfTI+wahDxtb0PpkNV/jf2ADgUCmhxv89wz+Pyy44q4bKuEERR25RnOsCK1Q+r
    0ygyUqiCw9bwisSYDbf0LLSr3udsbrUw5uXjC0BNvKbtAlx16uHW9JzKjEpzC+SB
    GWGIWvSwcHOkWDbk0MlYo2GAZtO//9SNB48uade/lgh4A82IRl/fIdLHWtHhglyr
    cLC637MuenyGhrlAUOmxq/+Q3fVCYUsW9G3UFX4QpRv855foJBzBbrQiQbDXABEB
    AAGJAjYEGAEKACAWIQQNGbfilbno+KdsHCRXvJcOuCoKswUCWnHr1gIbDAAKCRBX
    vJcOuCoKs+vxD/4gXqOn05AvYip8TKGXs60yEd/CNaCMvC7PfFbB1+DKA8Cm28WK
    PKZCLtOxjzmGTqQ0aESE9of23lBaE4DMZF4XKoOBtL8X7FqDnvzWJDGFvv6LnQwZ
    daO4fuTPp3WCPUfLQzZDyHiGkCezRIkSAB1ppKhFaXJmHsd5l8u9nN0qQP4f9E4u
    BPDLwrOJ2HEGoK/0VrBL1j9RDGnP2jX1BBj3bs2oGu+OXwMzuFltGksvsYPmfiqq
    pGJcyp26LDPPpwUjVAks3wZOjqxExUVfakkP4bcXCcACkEwGBr3a8dLaf76K4LUd
    WOhpUS4Cct33eNJninEAXiYZ3VlZT67zzPCWn/WgMNRdUCEUj/KinKDDC9oTO4F1
    WjwH1ZUuPHQ4xXW0G05dN4qiTJ617VXqQYlDTfztlGE/x28z0FAnhE46DPT3WN4r
    EFbjhdBJIV/5MU55UJHuHL7hZUQKot8hWopTBUrGiAxCTW9KKBCzkCJBOPI6Qzcl
    LXpejVV+ddHMsbXiG8VJUICIgkS3Ig739bn8N87jWfHqL+hmcrVv2CGQV4T9SvyX
    C/JJWl1Ov6yAgro8fEZRVFA4ek4jo/3we9pn6cjSS3RFSKIfCxL1nP3QjMVyV2lo
    GSwFuZLpeVxdYwSsKTDCTvcnr/adBFe2SPaw2aXBmCxfL0fNdeWcKCPGqQ==
    =lJSJ
    —–END PGP PUBLIC KEY BLOCK—–


    Scars & Grief

    February 14th, 2017

    I’m old. What that means is that I’ve survived (so far) and a lot of people I’ve known and loved did not.

    I’ve lost friends, best friends, acquaintances, co-workers, grandparents, mom, relatives, teachers, mentors, students, neighbors, and a host of other folks. I have no children, and I can’t imagine the pain it must be to lose a child. But here’s my two cents…

    I wish I could say you get used to people dying. But I never did. I don’t want to. It tears a hole through me whenever somebody I love dies, no matter the circumstances. But I don’t want it to “not matter”. I don’t want it to be something that just passes. My scars are a testament to the love and the relationship that I had for and with that person. And if the scar is deep, so was the love. So be it.

    Scars are a testament to life. Scars are a testament that I can love deeply and live deeply and be cut, or even gouged, and that I can heal and continue to live and continue to love. And the scar tissue is stronger than the original flesh ever was. Scars are a testament to life. Scars are only ugly to people who can’t see.

    As for grief, you’ll find it comes in waves. When the ship is first wrecked, you’re drowning, with wreckage all around you. Everything floating around you reminds you of the beauty and the magnificence of the ship that was, and is no more. And all you can do is float. You find some piece of the wreckage and you hang on for a while. Maybe it’s some physical thing. Maybe it’s a happy memory or a photograph. Maybe it’s a person who is also floating. For a while, all you can do is float. Stay alive.

    In the beginning, the waves are 100 feet tall and crash over you without mercy. They come 10 seconds apart and don’t even give you time to catch your breath. All you can do is hang on and float. After a while, maybe weeks, maybe months, you’ll find the waves are still 100 feet tall, but they come further apart. When they come, they still crash all over you and wipe you out. But in between, you can breathe, you can function. You never know what’s going to trigger the grief. It might be a song, a picture, a street intersection, the smell of a cup of coffee. It can be just about anything…and the wave comes crashing. But in between waves, there is life.

    Somewhere down the line, and it’s different for everybody, you find that the waves are only 80 feet tall. Or 50 feet tall. And while they still come, they come further apart. You can see them coming. An anniversary, a birthday, or Christmas, or landing at O’Hare. You can see it coming, for the most part, and prepare yourself. And when it washes over you, you know that somehow you will, again, come out the other side. Soaking wet, sputtering, still hanging on to some tiny piece of the wreckage, but you’ll come out.

    Take it from an old guy. The waves never stop coming, and somehow you don’t really want them to. But you learn that you’ll survive them. And other waves will come. And you’ll survive them too.

    If you’re lucky, you’ll have lots of scars from lots of loves. And lots of shipwrecks.

    — Credit: “Snow” via Reddit

    Protect Your Online World

    December 28th, 2014

    As our everyday world becomes more dependent on Information Technology (IT) everyone must take steps to protect themselves from malicious threats. Government agencies and large corporations have large budgets for cybersecurity teams to prevent, detect, and respond to intrusions. Unfortunately home users typically do not.

    I’m sharing my thoughts on how to protect yourself and your family. Some steps may seem obvious to those who work in the IT field, but I hope you still find this information useful.

    Email Account

    Your primary email account is one of your most important assets. If someone can access your email account, they can do some very bad stuff:

    • Read your private correspondence.
    • Impersonate you by sending email from your mailbox.
    • Read information about your contacts, and use that to attack them.
    • Prevent you from accessing your email by changing your email password.
    • Reset your other passwords as most services allow a password reset by emailing you a link to click.

    You should take extra precautions to protect your email account. I recommend the following steps to protect yourself:

    1. Use one of the major online email providers like GMail, Outlook, or Yahoo. They typically invest in the latest security standards and provide the most user friendly experience. Also, if you use your Internet Service Provider (ISP) to host your email, you will need to change your email address whenever you change your ISP.
    2. Use a complex and unique password.
    3. Turn on two-factor authentication.

    Passwords

    Nearly every website and service you subscribe to asks you to create an account with a username and password. Unfortunately it is increasingly common for websites to be compromised which can expose your password to the attacker. For these reasons, I recommend that everyone use a password management tool to keep track of them.

    1. Use a password manager. Consider an online service such as LastPass, RoboForm, or Dashlane which can synchronize your password database among several computers and handheld devices. Alternatively you can use software such as KeePass, 1Password, or Password Safe which keep your password database protected on your own PC. If you’re really old fashioned, a paper notebook and pen will work though you run the risk of losing it.
    2. Use long and complex passwords. If your password is short or easy, malicious software can easily guess what it is. If you can remember a password, it is probably not a good password. Every website and service has different requirements and limitations. I recommend at least 10 characters with a combination of letters, numbers, and symbols. Password managers make this easy. They can generate and type complex passwords for you automatically.
    3. Never reuse passwords. If you reuse passwords, an attacker can capture your password from one hacked site and use that to compromise your other accounts too. Password managers make this easy, and can even warn you if you reuse a password unintentionally.
    4. Safeguard a backup copy. Regularly make a backup copy of your password database and keep it in a safe place. This might be on a USB drive in a small safe at home, or in a safety deposit box at the bank.

    Two-Factor Authentication

    To establish who you are, most services require only a username and password (something you know.) A second factor might be something you have (such as a cellphone or token.) This makes it much more difficult for someone to impersonate you or gain unauthorized access to your account.  Your ATM card operates on a similar principle, your card is something you have, and your PIN is something you know. Someone with both can withdraw cash from your account.

    Tokens come in both physical and virtual form. Your most important accounts like email and banking should support two factor authentication. Google, Microsoft, Apple, Yahoo, LastPass, and Facebook all support multifactor authentication. Turn it on!

    • Phone – After you login with a password, you will receive either an SMS text or phone call with a one-time code. You must also enter that to continue.
    • Authy – Use your smartphone or laptop as a soft token.  Syncs among multiple phones/devices.
    • Google Authenticator – Use your smartphone as a soft token for multiple web services.
    • YubiKey – A physical token that supports USB and NFC connection.
    • Symantec VIP – Both soft and physical tokens, supported by some banks.

    Use Security Software

    Anti-virus (AV) software became very common in the 1990s as malicious software began to be more common. AV providers will identify, track, and create signatures for known viruses. Today, malicious software can be automatically generated so fast it is no longer possible to keep up. AV software alone will not protect you anymore.

    I recommend a comprehensive security suite such as Norton Security, McAfee LiveSafe, Kaspersky, TrendMicro, Webroot, or Bitdefender.  Be sure to enable both anti-virus and firewall features. Most of these packages protect multiple devices and include online backup and password management features. All of these are purchased on an annual subscription, but you can sometimes find a better deal from a reseller like Amazon.

    Automate Backups

    Use an automated backup solution to keep backup copies of your important files, photos, videos, and software. Backups are “recovery points” that can be restored in the event of hardware failure, data corruption, or malicious attack. More frequent backups provide more recovery points.

    External hard drives are a low-cost and effective place to store backup data. Both Mac and Windows come with free backup software that works with external hard drives. Consider using more than one external drive, and occasionally rotate them between your desk (for daily use) and a safe (in case of fire or theft.)

    If you have a fast internet connection, also consider a cloud provider such as Mozy, Carbonite, iDrive, Backblaze, or Acronis who can keep backups in your home, and in the cloud.

    Embrace Encryption

    Encryption protects data from being accessed by unauthorized parties. Typically a “key” is used to unlock encrypted data. Think of an encryption key as an extra-long password. Be sure your password manager uses encryption to protect your password database. Also ensure your backup data is encrypted so it cannot be restored without your key.

    Software Updates

    Flaws and vulnerabilities are found in software on a regular basis. Quickly apply updates to your device operating systems such as Windows, Android, Mac, and iPhone. If possible, enable automatic updates for trusted software so you don’t have to remember to do it.

    DNS Service

    Your Internet Service Provider (ISP) includes DNS service which translates the easy-to-remember names like google.com to more complicated IP addresses.  There are third party DNS providers that can provide enhanced security by making a configuration change to your home router.  This change will provide some protection to all your home devices.  Read more at OpenDNS, CloudFlare, and Google.

    Note: Updated on April 3, 2018.


    My Public Key

    May 26th, 2014

    —–BEGIN PGP PUBLIC KEY BLOCK—–
    Version: Mailvelope v0.8.2
    Comment: Email security by Mailvelope – http://www.mailvelope.com

    xsBNBFODtJEBCACM/tNpTJH19MvadDWTO83kXmcWSCjxPORbI5Mx/6wWVtdH
    J8ALJxe4N/u4RF3MEjdLO+QbthBVefWQae46ZZjtDOQ3mWy0vkhsZcatVenD
    3o5Fk2GCFTgcML3v7Rhdq10sAkBnrJXutUA7d0c2zTsKzcaQ6Bty0dc5yKba
    LsE+hhh1T6EwW76JayMFnDHP7wCUiRq0kgaMr78Rs/mPAsb+7vln/BaufuKb
    VcN9yISSr/27iu/Bz7vjJ3npY8Jp1WBLHCNHIuQwAdqiS3SLPsFCF2NOchbn
    n5T1eVMtx/5z/DftSF8iY6bfKJZgTs0vyMKJHONgUryAVmOF6O+gJsoJABEB
    AAHNH0JyZW5kYW4gTW9vbiA8Ym1vb25AYm1ob21lLmNvbT7CwHIEEAEIACYF
    AlODtJMGCwkIBwMCCRCqT6Iz6QFyPgQVCAIKAxYCAQIbAwIeAQAAtDQIAIYf
    g3jGcmC88JBsZvSGvq20UkJTmSYftjuDeFXIvV/7jV6FWFEUwkhROeML6qun
    9dS8ugZVbDRVQL0t0c+v8ZoS9okR0iEefK+2F2Kvh0kd9KT/sjKc7Nj0uGyR
    a3IDre+TGEIICHwkGnqZBvUx10rHq696PHeKFDaixW9+lSH7uV+PfK1GKpYh
    Bghe5+7aPa1s/R8RiW0u3rhtK3RF994RKSBLMRfhVjiqoATHumUGhj6NnZqU
    QTyBI8SBTgvR+DY1EbNCRMrFCD6qFWoi1DzUfLJrxihfhXUCl3JWiHv+HfVt
    WBPJTClYvQxZ1J9ISkPAk7C59AHDFxQXqOK6X+DOwE0EU4O0kwEIAO0g4g0Y
    eBZACkhJK5itkYDtVTTNVIk3jJhHDlKo1XUoaYabgUHxPZNOYs6gxggOcML2
    YWzvBW/naTvIFZJYEfwXnW2FmxPvyzq7dEY2azW5Kpx/LdyTg+XrpVQetXED
    nkPoGn4QG45ItcYOEF+zvElofO+cEHuZsYprwAocdfiTr3qT/Da36oq87knL
    l3YnLrFa7yo8ZW4VRfWsjDv48/c6A4wEGHU+1Oyu7xUUeodMS9d06EpV4YPb
    dUwyYyBpuyLGIVEhh9pgdsEjUl0MSLSuray0Oq5AN8ZWokRAJ3rTgbqYvN+A
    uvI2qZSkWsUDhhNc4BsYq10R2w7L5tlDBTUAEQEAAcLAXwQYAQgAEwUCU4O0
    mQkQqk+iM+kBcj4CGwwAAERvB/wOszp9yYaPr4KDOZ+Eb/eASY8iH040spB1
    LggXh9621eL6QvTSGsiwxYL7Pr7WfPmRFKKLh3jj2Jp93GICtxdjGDt8nFlk
    Wl68dCf4fTzslwKgrcCU+ku+Zh4WNp/HDqcG/j/09XiKZ/DzIWXv3zA8zRff
    MhH26p/LZLjrD5TTShSeMrbg7pEuKrN6WK3bF5aC8KyFYAC1/S+ssxO7WyGp
    RQMZQO8HpfsgX9lVCd+2Ue3H3hMrFFMjdZQ0YEEyiccyiLorYbbwKUELF8jZ
    jvIuKfXLJAZdtfOFCYiJ3xeFpDNgzhiKYCRgd5gu5Q00RLVj2m9okZmP4J9C
    eRPT8kUN
    =1PIg
    —–END PGP PUBLIC KEY BLOCK—–

     


    Cloud File Storage

    April 23rd, 2013

    Do you frequently use more than one PC?  If so, you should consider using either Google Drive or Microsoft SkyDrive to share files among your different computers.  Both of these services operate in a similar manner.  Both services are free.  If you use GMail regularly, I recommend Google Drive.  If you don’t use GMail, I recommend SkyDrive.

    With Google Drive, your account is tied to a Google Account (GMail or Google Apps.)  SkyDrive is tied to a Microsoft Account (Hotmail, Passport, or Outlook.com.)  Moving forward I’ll use “Drive” to interchangeably reference either service.

    Once you’ve installed the “Drive” software, there will be a new folder on your PC.  When you save or copy a file to that local folder, a copy will be transmitted through your Internet connection to the “Drive” service.  If you have more than one PC running, with the same account, the file will automatically sent to each of those PCs.

    An additional benefit of using a “Drive” service is that you can access your files from a smartphone, tablet, or other Internet connected device at any time.  The data you store in your “Drive” service is only visible to you.  I would be reluctant to copy any sensitive or protected information to an Internet “Drive” service like this, but for most of your data, this should be a relatively safe idea.

    If one of these services stops working, or your Internet connection is interrupted, your data will still be stored on your local PC.

    DriveService