Monday, June 25, 2012

The secret cyberwar of 21st century

If you haven't read about the Stuxnet, Flame, and Duqu viruses, it's time to brush up on the latest wave of cyber-warfare, website hacking, identity theft, and credit card data theft.  Even though the infamous Stuxnet is being phased out, the next generation of super-viruses is already in the works.  Naturally, due to the highest concentration of computer technology controlling most of our infrastructure, the U.S. will be the most likely target of the next attack.  Read the great Christian Science Monitor article:
There's no relief either for worried cyber security experts, some of whom have called Stuxnet the digital equivalent of the first nuclear attack on Hiroshima. They warn that Stuxnet's code provides a template and conceptual model for a far more destructive "son of Stuxnet" cyber weapon that could be deployed by other nation states or hacktivists for cyber attacks against power grids and other civilian infrastructure.

Let's face the facts: doesn't matter what operating system you use, your device is vulnerable to viruses and hackers.  Firewalls and antivirus software offer limited system protection against known malware.  Zero-day attacks or sophisticated root kit viruses can infiltrate any device - don't let be fooled by the talking heads on TV or computer stores.  

Although, casual use of the Internet, checking email, watching Netflix, and shopping on Amazon, may not pose much threat, heavy downloaders and power surfers (yes, adult entertainment included) must remember to stay on alert.  Systems patched with the latest OS updates are the first line of defense.  Strong passwords are also invaluable when it comes to protecting your email, brokerage, and bank accounts.

Physical security is also becoming an important part of your daily web encounters.  I used to smirk seeing people taping their laptop webcams - not anymore.  In fact, I would like to see a physical switch on every web-connected device to turn off a webcam, microphone, and speakers.  Yes, speakers also, since they are basically reverse microphones.  

Why all these precautions?  Because nobody, yes, nobody can guarantee you that your device is not being monitored by someone, some organization, or a government.  With questionable practices of major Internet Service Providers, Facebook exposure, and a vast search engine data - your privacy is worth more than you think.  Use common sense and stay safe.

Wednesday, June 20, 2012

Northwestern University graffiti rocks

What can you tell me about the fine and famous Northwestern University?  That is located in Evanston, IL?  Just north of Chicago?  That is has a gorgeous campus right on the Lake Michigan?  Yes, that's all true.

However, what I find unique are the graffiti rocks at The Lakefill peninsula.  Every time we take a stroll along the coast, newly painted rocks are fun to discover.  You can say, the rocks are a wild art gallery, changing and evolving.  Check out the pictures I took on Father's Day.

Thursday, June 14, 2012

Stronger online passwords? A must.

Recently, it seems like every week some new website or company is being hacked.  With the abundance of web connected laptops, tablets, e-readers, and smartphones, the Internet and social networks are accessible 24/7/365 to most users.  

In the 4th quarter of 2011, Americans spent 38.6 hours online.  That's a work week!  But Canadians beat U.S. into shame with 45.3 hours in the same quarter.  What's that all aeboot!

With all that net presence, it's becoming more and more burdensome to remember all the passwords to secure access to web services.  Feeble, duplicate, obvious, and stupid passwords are the weakest link in online security.  LinkedIn is a perfect example: six million passwords were hacked and exposed last week forcing users to change their passwords.  Other sites like eHarmony and Last.fm shared the same fate.  

So what can one do to protect web accounts?

Avoid weak passwords.
1. password
2. 123456
3. 12345678
4. qwerty
5. abc123
6. monkey
7. 1234567
8. letmein
9. trustno1
10. dragon
11. baseball
12. 111111
13. iloveyou
14. master
15. sunshine
16. ashley
17. bailey
18. passw0rd
19. shadow
20. 123123
21. 654321
22. superman
23. qazwsx
24. michael
25. football
Avoid reusing passwords on multiple websites.
It sounds easy: you think of one amazing (in your mind) password and you use it on every website.  In reality, if someone hacks your email account and tries the same password on your bank site or social site, chances are they will succeed.  It's a pain in gluteus maximus but the reward is your security.

Keep your password private.
Obvious but surprisingly common.  Do you know how many people I've seen having password taped to the back of their laptop?  Too many. 

Use mnemonics to create strong passwords.
One lesson one can learn from Johnny Mnemonic movie, is that people have trouble remembering things.  With millions of interesting websites, who can remember all unique passwords?  Well, Johnny can, but he had a hard drive implanted in his head. 

You can use password managers built into web browsers or change a number at the end of your main password, but those are questionable ways of securing your access.

My favorite way for strong passwords is an abbreviation of a unique sentence.
Let's say you owned an orange 1969 Chevy Camaro in your twenties.  You loved that car.  Especially on Saturday nights.  What a sweet time!  Right?

So come up with your sentence: I loved my orange 1969 Chevy Camaro 
Now, abbreviate first letters mixing upper and lower case: ILmo1969CC
For more security, add special characters: My hot wife was right on the money!
Now, abbreviate: MHwwRot$!
You get the idea.
This simple way allows you to cherish your memories and have secure passwords.

Use longer passwords.
The longer the password, the harder it is for a hacker to crack it.  So use 8 or more characters, mixed with numbers, upper and lower case letters, and special characters. 

Delete emails asking for your credentials.
Legitimate websites will never ask for your credentials in the form of an email.  Or any form.  They will simply reset your password if needed.  So delete all emails asking for an account update or password, even if they appear legit.  To confirm, you can always call the customer service or the help desk to check if the company or site sent that email.

I invite you to comment and add your ideas to secure your online access.

Wednesday, May 30, 2012

Watch that TV (price)

Photo by fedek6 @ SXC
Are the good old times of deep store discounts on electronics gone forever?  Not yet.  With national electronic store chains gone (Circuit City) or soon to be reduced in size and impact (Best Buy), the discounters (Walmart, Target) and the regional stores (Hhgregg, Fry's Electronics) are taking over the business.  Welcome to the Internet shopping age that changed how we shop, and more importantly, how we save our hard earned cash. 


As in any healthy, competitive economy, fluid markets will certainly help set lower prices for any product, especially for hot electronic gadgetry.  And then there is Samsung and Sony.


The Christian Science Monitor comments on the Wall Street Journal article:
Samsung and Sony, two of the biggest television manufacturers in the world, have begun to set price minimums on their television sets, according to the Wall Street Journal. The companies began the practice last month in an effort to curb falling prices and protect their profit margins.
The new policy would prevent retailers from advertising or selling the products for lower than the price requested by the manufacturers. The Sony policy also includes camcorders, audio equipment, and some computers.
Whatever happened to pure competition?  Is the quality of Samsung and Sony products so superior that consumers will reinforce their loyalty by paying higher prices?  The future will show.  For now, the Internet provides a great alternative to buy electronics.  Consumers can still enjoy discounts and savings regardless of price fixing by Samsung and Sony.

Freedom of choice is a key to happiness.  

Tuesday, May 29, 2012

Awesomeness: Men In Black 3

Yes, Men In Black 3 is that good - total Awesomeness!  We went to see the third part of the popular flick with mixed expectations fueled by many other mediocre sequels and prequels.  To our amazement, the MIB3 was funny, witty, and above all, it had a surprising finale.  The director, Barry Sonnenfeld, created a solid entertainment piece. 

Will Smith was hilarious as Agent J, who travels back to 1960s to stop a nasty alien from killing his partner Agent K, played by Tommy Lee Jones.  Josh Brolin played the young Agent K, and he was right on the money impersonating facial expressions and a voice of Tommy Lee Jones.

Not to give up too much: there is a lunar prison base, cool blasters, new alien forms, one-wheeler motorcycles, time travel, and, oh yes, the jokes!

The right amount of special effects and a very crafty story line, made MIB3 a fantastic choice for a whole family enjoyment.  The movie is rated PG-13 but younger kids should be just fine.  If you haven't seen it yet - I strongly recommend it.

   
 Video: MIB3 official website

Thursday, May 24, 2012

Ants be gone!

Spring time invites some uninvited guests - ants.  Plenty of websites provide some solid advise on dealing with the ants.  The sugar ants are pretty easy to eradicate, just use the Terro stations close to their paths.  After 2 days, ants will be gone.  

Recently, I've been noticing larger, black ants entering my house.  After sealing visible cracks or entry points, I found the colony.  It was under the retaining wall steps, right next to the house.  The ants refused to enjoy the plain and tasty Terro.  So, I came up with a protein based meal for my customers.

What do you need?
  • Small plastic container with a lid
  • Some peanut butter
  • Liquid Terro ant killer
  • Scissors and a metal spike
Make 3 pinholes on the bottom of the container.  
Also make a hole for the metal spike. 
Next, mix one teaspoon of peanut butter with 2 teaspoons of liquid Terro ant killer.  Ironically, I've used the natural organic peanut butter to prepare the ant meal.

Then, place the container next to the colony or the ant path.  Use the spike to secure the container against the critters.  Wait for the customers to arrive.

For my guests, it took about 2 hours to fill out the container.

For the next couple of days, I will monitor the colony activity to check on the effects of my mixture.

Update: After 3 days of feasting, the ant population reduced in size dramatically.  The tunnels under the concrete steps are empty and the main activity moved to the grassy side.  
I will post a new mixture idea shortly.

Tuesday, May 22, 2012

Mother's Day with a twist

While shopping for Mother's Day card, I couldn't help to notice some peculiar selection of the cards. Yes, the animal section.  Let me mention only a few:

From the Cat, Mom of a Dog, From the Dog, From the Cat

I wonder how the cat or the dog will pay for the card? Debit or credit? Cash maybe.  Personally, I find some of those cards quite offensive to the animal kingdom. Hidden messages are startling. What do you call "Mom of a Dog"? Yes, you've guessed it - a bitch. However, pregnant mom-to-be cat is called - a queen. Someone obviously is putting down man's best friend - the dog. Incidentally, father male dog is called - a sire. Would a sire care for a bitch? Not sure. One thing for certain, pregnant bitch is called - a dam. 

So, if the sire breeds with a bitch, she becomes a dam and they both enjoy the litter. The pedigree is astonishing.

For next Mother's Day, I'm waiting for some cards from calfs, kits, cubs, chicks, fawns, eaglets, ducklings, foals, joeys, and quite possibly piglets. Happy Mother's Day - Hee-Haw!