Do you use the LoJack anti-laptop theft tool? If so, you definitely need to read an article in The Register at: http://bit.ly/2JPqfVe.
In my recent article, US Hospital Pays $55,000 to Hackers after Ransomware Attack, I referred to “all good backup products.” That obviously leads to the question, “Which backup products are good ones?” I do not have a list of all good backup products for all operating systems, especially for those that are designed for use in large data processing centers. I am sure there must be dozens of such products. However, here are a few good ones I am aware of:
TimeMachine included free with every Macintosh computer. If you use a Macintosh, you need to be running TimeMachine! See https://support.apple.com/en-us/HT201250
Arq for Windows and Macintosh systems: https://www.arqbackup.com/
Acronis makes backup software for many operating systems, including Windows, Macintosh, Linux, Windows Server products, VMware, and more: https://www.acronis.com/en-us/
BounceBack for Windows: https://cmsproducts.com/bounceback-backup-software/
CloudBerry Backup for Windows desktop and laptop systems as well as versions for IT service providers: https://www.cloudberrylab.com/
Veritas System Recovery for Windows or Linux: https://www.veritas.com/product/backup-and-recovery/system-recovery
News stories over the past few years about the unconstitutional actions of the National Security Agency (NSA) and other government agencies should serve as a wake-up call for all of us. Yes, there are many people and organizations trying to obtain information about you. From hackers in third-world countries, to companies trying to sell you products, to semi-secret agencies of the U.S. Government, it seems as if nearly everyone is trying to find information about you. Indeed, many people seem to have a phobia about storing their personal information on servers on the Internet.
What saddens me most of all is that the entire issue is so easily avoided: encrypt the information. When you leave your house, I suspect you lock the door. When you leave your automobile in a parking lot, you probably lock it up, too. The same should be true with your information. When you leave your information unattended, whether it is in your home when you are not present or someplace in the cloud, you should lock it up.
Simply put, encryption programs scramble data within the file or files that you specify so that no one else can access that data without the key that you keep. If anyone does manage to obtain a copy of your file, all they will see is something that looks similar to this:
Security is under your control at all times because you have the key and you decide who gets copies of that key. Encryption is easy to do, requiring only a few seconds, and (in many cases) it is free of charge.
Today’s world is already comparable to George Orwell’s dystopian novel ‘1984’, since “everyone is being followed and everyone’s information is being collected.” Lack of awareness of the amount of data harvested online is “a perfect storm of a really bad idea,” according to Jon von Tetzchner. He said he was increasingly concerned about data collection and tracking by tech giants like Google and Facebook. He wants to change that.
von Tetzchner is the creator of Opera, the well-known web browser. Now he has a new project. Yes, he’s creating a web browser again. However, this one promises to be very different from Opera. He has since launched Vivaldi, which includes functions he says bigger browsers lack. Vivaldi.net does not track searches and is based on an online community of users who recommend features, he said. It also offers a million ways to customize everything.
You can learn more about the Vivaldi web browser and even try it for yourself at: https://vivaldi.com.
Government hackers were using a previously-unknown vulnerability in Microsoft’s .NET Framework, a development platform for building apps, to hack targets and infect them with spyware, according to security firm FireEye. The firm revealed the espionage campaign on Tuesday, on the same day Microsoft patched the vulnerability. According to FireEye, the bug, which until today was a zero-day, was being used by a customer of FinFisher, a company that sells surveillance and hacking technologies to governments around the world.
Details may be found at http://bit.ly/2f6rsO9.
You probably have read a lot in this web site and elsewhere about the various file storage services in the cloud. Some of the better known ones include Dropbox, Google Drive, iCloud, SugarSync, SpiderOak, Tresorit, Mega.nz, and perhaps a few dozen others. These are valuable services that allow you to gain access to your files wherever you are, to (optionally) share files with others, and to copy files from one of your computers to another. However, there are two major drawbacks to these services:
1. They tend to charge a lot of money if you have a lot of files you wish to keep available.
2. You have to give your files and, more importantly, CONTROL of your files, to someone else.
To be sure, all the better file storage services provide industrial-strength encryption that prevents anyone else from being able to read the contents of your files—not even the employees of the file storage service. Nonetheless, many people are uncomfortable with giving control to strangers on the Internet.
I often hear or read comments from non-technical computer owners who say, “I don’t trust the cloud.” That statement always comes from someone who doesn’t understand how encryption works. Even so, convincing someone to forego their fears of giving up control is nearly impossible.
One new product called “On My Disk” would seem to solve both problems.
If you use Windows 10, you need to read an article by Laurent Giret that describes a recently-discovered security weakness in Windows that apparently has been there for at least 20 years. The fix is simple: turn off SMBv1 file sharing protocol from your PC. Most people don’t need it anyways.
You can find the article at: http://bit.ly/2whtwFR.