A VPN, Tor, DNS, or just clear my cache

Stop and read this before you make a mistake

The newly passed legislation that gives your Internet provider permission to monitor your web browsing, and then sell it to marketers, is not new. In fact, before this legislation was passed, this has been the way things have been done for years. You see, the FCC rule to protect your browsing privacy has not gone into effect yet. So nothing has really changed, however, interest in Tor and Virtual Private Networks, VPN’s, has skyrocketed.

Rather than see you waste money or effort unnecessarily, I’d rather educate you so that you can make up your own mind.

1) A virtual private network or VPN, is an encrypted network connection where your browsing requests go through a private tunnel and come out somewhere else. This private tunnel is encrypted and thus only the exit node knows what you are asking for. The data within the tunnel is hidden. VPNs are the best of the available options to protect your browsing from your ISP’s spying eyes while allowing your full access to the functions of the internet. This includes media streaming, and file sharing.

This will likely cost you money and it is very difficult to tell who owns these VPN providers. So it is best for you to review these providers and use your best judgement if you opt to pick one.

2) The Onion Routing network, otherwise known as Tor, is a point to point encrypted tunnel that plays whack-a-mole with your packets. Your connection goes through the Tor software which encrypts it. Each point along the line that handles your packets continues this encryption with only the exit node, and those who control it, seeing the final destination and content of your browsing request.

A word to the wise: It has been noted that many governments have set up exit nodes for Tor connections and that includes the US government. Tor is also the only way to get to the dark web and I advise your strongly to avoid the dark web unless you know how to turn off scripting, turn off Java, turn off all active content as much of the dark web consists of serious exploits aimed at your PC.

Also, please remember that whoever controls the exit node controls your data. So plan accordingly.

Now, let’s talk about some bad advice that is out there on how to hide your browsing from your ISPs.

1) No — erasing your cache will not prevent your ISP from seeing your browsing habits.
2) No — using HTTPS for every site you visit will not protect you much either. While the data you send back and forth to the site you are visiting is encrypted, you should know that the visit to the site itself is known to your ISP.
3) No — changing your DNS server alone will also not do much to protect you unless you do that in conjunction with a VPN or Tor. What happens when you type in a URL into your browser is that a request is made to turn the letters your system sends out into a series of numbers that relate to the site your are requesting. DNS does this, however your traffic to your site must travel from your system through your ISP’s hardware, to the site you specified and then the data returns back on the same path but only in reverse.

4) Using ad blockers and using incognito mode do not provide you with any protection either.

These are just some of the things that are being talked about right now. If I missed something, or if you wish to ask any questions, please feel free to drop me an email.

Microsoft updates, KB numbers, and the support articles that go with them

Cujo the sheppard mix

Cujo the sheppard mix

By now most of you know about Windows 10 and if you are on Windows 7, 8, or 8.1 you likely have a white flag icon in your system tray in the lower righthand corner of your screen.

This flag comes from a Microsoft update, KB3035583. and it does a couple of things, one of which is to push you to move over to Windows 10. If you actually try to read what MS’s own update tool says that this update does, it is cryptic. There is no mention of Windows 10 nor an operating system upgrade that could be pushed to you without your knowledge.

So…when was the last time that you actually read the support knowledge base articles that go with the Microsoft updates that are being pushed to your system?

Most of the time the wording is innocuous. Other times…it can be vague and your own imagination will have to go to work.

Infoworld magazine seems to have uncovered info about the “important” upgrade that is basically “nagware”

http://www.infoworld.com/article/2906002/operating-systems/mystery-patch-kb-3035583-for-windows-7-and-8-revealed-it-s-a-windows-10-prompter-downloader.html

The wording of the update says, “This update enables additional capabilities for Windows Update notifications when new updates are available to the user. It applies to a computer that is running Windows 8.1 or Windows 7 Service Pack 1 (SP1).”

But Microsoft seems to take advantage of their customers not reading what these knowledge base support articles are actually doing.

If you read the following article, also from Infoworld, you can see how MS has been pushing failed updates with old KB numbers months after their initial installation attempts have failed.

http://www.infoworld.com/article/3004441/microsoft-windows/microsoft-surreptitiously-reissues-botched-patch-kb-3097877-for-windows-7.html

So this wraps up the second short worded version of this conversation. More will follow—stay tuned!

Pa$$w0rds–good or bad without breaking your brain

Every year some computer security firm releases its list of the worst passwords that people are using. While I do not know the methodology used to compile these lists, I do know that I see these passwords used over and over again in both public and private sector arenas.

password image by Linux Screenshots on Flickr.

password image by Linux Screenshots on Flickr.

Why are people using passwords like 123password? It is likely because the average person, not techno-geek, has a hard time remembering what some ‘best-practices’ list decided was a good password. You know the one; there must be on capital letter, one lower case letter, one number, one special character, and the DNA signature of your neighbor’s cat (I just made the last part up).

Now this is a big deal because passwords are a big deal. They keep people from snooping on your computer, your email service, the websites you frequent, or even keep people out of your bank or credit card accounts.

Passwords are like diapers and politicians. They should be changed and often. Why? Because if you leave a password in place for too long you give an outsider a longer opportunity to crack it open and then gain access to your data/information.

So while password, letmein, 123456, qwerty, or something similar are examples of bad passwords, using a password like 3!dxt*RT2nr$xgg5t06 is a good password but not because it is complex. It is a good password because it is long however the human brain can only remember so much of this string, you have to go back and remember that you are trying to outsmart a computer and not a human being.

A human will guess words that can be found in a dictionary or will tell a computer to look for words that exist in a dictionary. In short…words that make sense to another human being. A computer does not care about dictionary words or special characters.

I will now enter the word “entropy” into this discussion. Entropy, while sometimes relating to thermodynamic relationships in chemical processes, also means a lack of predictability or reliability that can lead to a disintegration of order leading to disorder and thus a large positive run towards randomness. This is a good thing to have in a password or pin.

For instance…your four digit PIN that you use on your debit card has a number of possible combinations of 10^4 (numbers 1-4 give us 10 and since there are 4 of them, that gives us the number of possible combinations) possibilities.

And that 16 character string of special characters, upper and lowercase letters, numbers and your cat’s DNA marker? Well that only nets you an entropy, randomness score, of 119 bits. However, if you were to take the last names of your two favorite teachers, the model of your first car, and your first home phone number..that entropy ramps up to over 200 and that would take the most power computers, hundreds, if not thousands, of years to crack that password…and by then you should have changed it more than two times to something else.

Some examples of good strong passwords in this model are: hulusucksbecauseofcommercials , bernsteincoplandRodeoin38time, spotroverslurpeepepsi

The main purpose of this blog entry is to illustrate to you that a secure password can be one that is long, and strong but more importantly, something that you can easily remember. Just do not use the names of your kids, your pets, or other personal information that you might not want disclosed to the general public.

Which memory card for your DSLR?

The Sandisk Extreme Pro 64GB Class 10 280GB oer seciond SDXC card

Need for speed? That 280MB/sec rating may not be the number you are looking for.

When you think about your camera and your memory card needs, do you think bigger and faster is better? Wait a minute..not so fast. Some cameras cannot handle newer SDXC formats, some cameras cannot take advantage of the 128MB/sec read rates or faster, and sometimes smaller and slower win the day.

My example..I have and still use a Nikon D90. It works, takes great photos and works with all of my lenses so why not right?

Well the first thing to note is that I shoot in RAW format, meaning NEF files for the Nikon (Canon uses a CR2 format, Panasonic uses a generic RAW format) are going to be a different size as you get more megapixels. So my D90 takes RAW photos in about 10-11 megabytes per image. While my D7100 uses a 28 megabyte raw image. Your camera has a common raw file size average and you should know it.

Now…for my D90, I never use anything bigger than a 16GB SDHC card. Sure it will support a 32GB card but I get into a grey area I try to avoid.

If I have 28 GB worth of images on the card and it fails, I am going to be mad. However if I only have 7-10GB of photos on card, I will still be angry at the loss but it won’t be nearly as bad as with 32GB. See?

Now a word about speed. Most cards will put their fastest speeds on the card and that is usually the speed a device can READ from it. What you want are cards that sync up with your camera speed. If you shoot at 7 frames per second and have a 90MB/sec write speed on your card, you might be able to eek out a few more shots before your camera’s buffer for the number of images it can hold, runs out.

So..ignore that 250 MB/sec listing on the card and look up the write speed for that card. Odds are it is going to be less than the read speed for that card.

That’s a quick lesson. If you have questions, please let me know. Next time, the quickie lesson will be over picking lenses to take on a trip.