Protecting Data From External Attacks

Stop and read this before you make a mistake


Wannacry, Jaff, Cryptolocker, and many many more belong to a category of hacking tools called ransomware. This software works by infiltrating your system via a infected Word document, an image using steganography, a corrupt media file, or a host of other ways.

This works by using encryption algorithms that encrypts all of the data in your hard drive. More over, it also can encrypt data on ANY drive that you may be connected to. This includes USB thumb drives, attached hard drives (whether via USB or network connection), and any cloud connected drives such as Box, Google Drive, Microsoft OneDrive, or any other similar service.

So how do you protect yourself? Technology professionals know to use tools like Ghost, EaseUS, Acronis, or backup software like Crashplan, Carbonite, or even Backblaze can be used to take the data off of your hardware and place it on to either a local hard drive or some cloud based host.

Your data is protected with these tools because the imaging and cloning tools, essentially take a real time picture of your hard drive, store on the connected storage device that you then disconnect when the process has finished.

Yes these tools take a significant amount of time to run based on your drive size. Since many people have 1 terabyte or larger drive in their desktop, all-in-one, or laptop, you can start this process before going to bed at night. First make sure that you have setup your system not to go to sleep during the imaging process. Then follow the directions provided with the product you are using. Some products are free to use for personal use while others may run into hundreds of dollars but provide online data storage with its plan.

Before you disconnect the attached or networked drive, take the time to test your image/backup to insure it is holding data in a valid form. Once you have done this, you should make a hash of the data and I will cover that in a later piece. It is imperative for your data’s safety and your own sanity that the data you have stored on the drive is perfect. Any number of things can cause this data to become corrupt.

This is why I always suggest making a copy of your image and storing it someplace away from the location of the machine. What were to happen if your laptop and backup drive were stolen from your home? You would lose the original data plus the backup that you have just created. If your data is stored at some other location, they may get the laptop but you can replace that and then restore from your image, backup.

This goes for those of you with Windows systems, Mac systems, and even Linux systems.

This will be continued later this week….

Simple Way to better secure your stuff

Many of you are going to take a vacation over this coming Summer. Before you do, do you have a written record of all of your valuable things?

Having a record of everything can save you in the event of a fire, theft, or other damage.

I’ll show you a trick that will add an additional layer of security to your valuable items.

a guitar

Here is a guitar I found on Google images

Step one–identify the item–in this case we’ll use this random guitar image I found online:

Locate the serial number of the item. Sometimes the serial number can be found in a conspicuous space on the back of the item. Other times it is crafted into the model number of the device. On still other items, you can only get the serial number by peeking side of it.

If finding the serial number involves a screwdriver, a soldering iron, and dozens of screws, perhaps you would be better served pulling the serial number of the device off of the box it came in, your receipt, or sometimes you may need access a combination of buttons or commands that will push the items display to reveal the serial number.

However you come about it, the serial number for the device will give you the best evidence that the item is yours. The serial number is what you register with the manufacturer to secure your warranty. It is what you turn into your insurance company so they can provide coverage.

Now record that into a Google spreadsheet or an externally stored Microsoft Excel spreadsheet along with photos of the item.

Once you have that all recorded and saved on an external site, like OneDrive or Google Docs. You will want to store this some place outside of your home in the case of data loss, theft, a fire, or some other unforeseen circumstance.

Now you will want to take one additional step in order to prove property is yours and to find an easy way to get stolen or lost merchandise back.

I have used Zint for years. Link goes to Zint on SourceForce.net.

Now you’ll want to put as much personal information as you can out there. For example — your name, an address (use your work address), and a contact phone number with a description of the item into the software with the serial number. Remember to include, make, model number, year of model, serial number, and if possible, color of the item.

When you have done this it will create a QR code that you can now print out on a small sticker that you should affix to your device in a very inconspicuous place. For a device like a TV or stereo, place the sticker next to other stickers on the back of the device where the UL and power information are situated.

The finished product should look something like this —

Sample QR code

Congratulations, you have now taken a major step in protecting your hard earned devices or personal treasures.

Time to talk Windows 10

No Windows 10 icon from BetaNews.com

No Windows 10 icon from BetaNews.com

Julie Andrews famous song from the Sound of Music starts with “Let’s start at the very beginning. A very good place to start” and this is where I am at…starting at the very beginning.

Microsoft is touting all the greatness of Windows 10. They say it is more secure and it is more useful than previous versions but in reality, Windows 10 is nothing more than Windows Vista. Technically it is Windows version 6.4 and Vista is 6.1. That tells you that they put lipstick and mascara on a pig and called it your date to the prom. Whether or not you accept it as a date is entirely up to you.

And this is why I write this…to help you make an educated decision about either upgrading to Windows 10 or if you are already there with Win10, I can help you lock it down to limit Microsoft (and it’s partner’s) ability to spy on you.

Two things to remember while you go through this…one–Microsoft is in business to make money and not to provide you with the best or even a workable operating system. Two–you cannot trust everything you read, hear, or are handed by a for-profit company.

No–this is not paranoia but truth. Each publicly traded company’s first responsibility is to its investors…not to its customers or its employees.

So with that stated…I will start walking down the Windows 10 road during this next week. It’s my way of saying thank you for reading this.

So you want to give a camera to someone this Christmas?

You need to learn how that person would use a camera. So ask these questions either of yourself or of the person you are buying for:

  • Where do you normally find yourself saying “If I only had a camera?”
  • Can I/they learn how to adjust aperture, focal length, or shutter speed?
  • Would they be better off with a point and shoot or do they need a DSLR?

Once you can get a handle on those items, you can then adjust your purchase and remember…the bigger the opening of the lens, the more light that lens lets it.

So a camera that looks like this:

A photo of the Nikon Coolpix P100 camera

The Nikon Coolpix P100 has a larger aperture which lets more light in

Takes better photos than a camera like this:

A photo of the Nikon Coolpix L22 camera

A Nikon Coolpix with a small aperture (opening)

And don’t let price deter you. Spend the extra $50-150 and get a camera that will show you a lifetime (or at least 2-4 years) worth of excellent photos!