Archives for Security

The Do's and Don't's of Online Shopping

Woman’s Day has a little something for everyone in your family, from fashion to etiquette, meals and more …and a great list of things to keep in mind if and when you go looking for holiday presents online.  Perhaps “everybody is doing it”, i.e. buying digitally, but not everyone is doing it wisely.


Read More

Podcast Aug. 18, 2012: Woven Wind Project

Show Notes:

Weaving the Wind: John Barrie, Executive Director Appropriate Technology Collaborative A creative international volunteer project that combines advanced technology and the skills of native women weavers who make the blades for windmills that bring power to remote Guatemalan villages.

Tina Watson, Senior Infrstrastructure Manager at GE, and board member of ATC. Tina Watson’s Guatemala Trip.

For more information on the Circuits and  Solar class and Laptops for Latin America, send email to info@apptechdesign.org

College Hook Up: Once your student gets to college, what happens when they first hook up to the network? Foster’s adventure at Central Michigan University and tech dads Gary Baker and Ed Rudel add their experiences.

Internet Advisor Takeaway: Museums on Us – Save some money on a short getaway to a museum. Bank of America is offering free admission to lots of museums on selected weekends through out the year. Just present your Bank of America ATM card for one free admission per cardholder.

The Mac Minute with Erik Anderson: All the Apple rumors fit to spread at the start of hour 2.

Darik’s Boot and Nuke Software for complete erasure of a hard drive.

If you are listening


Read More

College Internet Hook Up Tips

Getting junior ready for college is not just about getting new computer devices and software; you have to understand and be ready for the whole university Internet security experience.

  1. Have good security in place before you hook up to the university system.
  2. Image (clone/completely copy) your student’s hard drive and keep a copy at home
  3. As an extra precaution install a special “tech” user account on the computer that only the family tech expert ( you ) have the password to and/or…
  4. Install a remote desktop application that allows you to enter, diagnose, back up and fix your student’s computer without driving 5 hours across the state! ;-D
  5. Be prepared to have your system scanned by university IT
  6. Understand having a good password ready for the university system
  7. Lock your screen/device when not in use
  8. Securing your equipment with locks, good solid covers and good bags
  9. Use your Common Sense Filter (often unused or underused)
  10. Find my iPad/iPhone/LoJack your computer/tablet/phone.  People steal stuff in the wide open environment of a university.
  11. Buy fake vomit or cigarette butts at a novelty store and glue it onto the cover of the laptop (This really worked for a friend of ours.  

Read More

Podcast June 9, 2012 Stuxnet: America's Cyber War Offensive?

Show Notes:

A whole new species of aggressive software is waging cyber war around the world.  The week of June 4th allegations were published that President Obama’s administration approved the unleashing of Stuxnet which targeted Iranian nuclear facilities with incredible precision.  Fact or Internet Myth?  On this show with the help of two experts we explore the possibilities of America’s role in this new type of global warfare.

Richard Stiennon, frequent IA guest and security expert and industry analyst, is known for shaking up the industry and insightful commentary like his recent Forbes column on Olympic Games, the code name for America’s cyber warfare initiative. He recently relaunched the security blog ThreatChaos.com and is the co-author of Cyber Styletto, a novel dramatizing the next field of mortal combat.

Gen.(ret) Michael V. Hayden

  • Director, Central Intelligence Agency (2006 – 2009)
  • First Principal Deputy Director of National Intelligence (2005 – 2008)
  • Director, National Security Agency (1999 – 2005)
  • As Director of the Central Intelligence Agency, General Hayden was responsible for overseeing the collection of information concerning the plans, intentions and capabilities of America’s adversaries; producing timely analysis for decision makers; and conducting covert operations to thwart terrorists and other …


    Read More

    World's Leading Terrorist Had Lousy Security…Online

    It is being reported that the man who held the world at bay and succeeded in hiding from American forces for so long, had lousy online security. This lapse has helped authorities find unencrypted documents that give a chilling window into the disturbed mind of Osama bin Laden during his last days just before he was slain in a commando attack in Pakistan.


    Read More

    Does Microsoft Have a Leak?

    That’s the question that has been hounded the Redmond, California software giant following recent revelations of code theft.  Chinese hackers have released proof-of-concept code that provides a roadmap to exploit a dangerous RDP (remote desktop protocol) vulnerability that was patched by Microsoft earlier this week.


    Read More

    Podcast: January 14, 2012

    Hour 2:

    The Team share emails and call listeners to answer their computer and Internet questions.

    Note that during Network shows you can email your question to us by clicking the Contact Us button on the homepage and sending us an email.  Be sure to include your phone number and you could  be one of the listeners we consult with over the phone during the Network show.

    Podcast: January 14, 2012 – Hour 1
    Podcast: January 14, 2012 – Hour 2


    Read More

    Google Chrome Safest Browser

    The Chrome browser may be the new kid on the block but it is fast becoming one of the most popular and now the safest.  According to a study by Accuvant, Google’s upstart browser is the safest one on the block.


    Read More

    Podcast: November 19, 2011

    Outsource to Detroit: Tim Bryan, CEO of GalaxE.Solutions, Detroit talks about why he brought his successful software company from New Jersey to Detroit and why other companies should do the same.

    Internet Usability: what does that really mean?  Cynthia Zimber VP, Business Development TecEd, Inc. How to be sure that your customers really love and use your website to its fullest?

    Having The Talk with our KidsTrend Micro’s Natalie Severino, Director, Consumer Product Marketing shares and eGuide that shows you how to talk with your kids about the the digital dangers that lurk on the Internet.

    Stick around for our second hour or enjoy it on our podcast when we talk with listeners about problems that they have sent us through the Contact Us form on our home page.  There’s always something new to share.

    Interview: Tim Bryan
    Interview: Cynthia Zimber
    Interview: Natlie Severino
    Full Show Podcast: November 19, 2011 – Hour 1
    Full Show Podcast: November 19, 2011 – Hour 2

    Tweet


    Read More

    Microsoft Weblinks

    Thanks to Dave Sawyer, Technical Director, Microsoft Heartland Division for these interesting and useful links:

    Microsoft Security Report http://www.microsoft.com/security/sir/default.aspx

    Take your browsers for a test drive and compare the results http://ie.microsoft.com/testdrive/Views/SiteMap/

    Your Browser Matters (Shows how your browser protects you) http://www.yourbrowsermatters.org/#/home

    Microsoft Home Security Essentials Suite (32 and 64 bit available) http://www.microsoft.com/en-us/security_essentials/default.aspx

    Steve Sinofsky, MS Windows Chief, presents Windows 8 Build: http://channel9.msdn.com/events/BUILD/BUILD2011/KEY-0001


    Read More