Showing posts with label tech talk. Show all posts
Showing posts with label tech talk. Show all posts

Tech Talk:The best computing choices require a thoughtful answer to a simple question

Sunday, May 25, 2014



In a rare idle moment on Tuesday, I watched the press event announcing the Microsoft’s Surface 3 tablet. The new tablet looks very impressive and the passion imbued by Corporate VP Panos Panay was palpable, even in an online webcast: 

“It does not matter what store you walk into, the conflict exists. It exists. You walk into a store and you walk up to the sales person. And you can stand between two very clear tables and ask a question: What is it that I'm supposed to buy?
Panos Panay, Corporate VP
Microsoft Surface
"What does the sales rep say almost every time, almost every time, what do they say? 
... ‘What is it that you want to do?’ 
"I don't know. I'm about to spend $1,000. I thought I needed to do everything. And that's how you feel. But why? That happened because of the conflict that we're creating every day. And does that conflict need to exist? You've been told to buy a tablet, but you know you need a laptop. And that's happening. That's a real conflict.”

Mr. Panay’s comments, taken from the transcript of the event, really rang home for me on a few levels.  

When I was the sales rep asking that question quite a while back, the conflict was, “should I get a computer or not.” Today, computing devices are ubiquitous and the conflict is, as Panos states, between “form factors” like desktops, laptops, tablets, and smartphone. Ok, he only mentioned tablets and laptops, but the question remains…

“What is it that you want to do? “

Inevitably, most consumers are not ready for that question. As a result it is rarely informative or useful. Often, it is “email and surf the web.” You might as well put your options up on a dart board and throw a dart at it blindfolded.

I find that to answer that question meaningfully, you have to take a few steps back and become a little more introspective. Forget that you are shopping for a computing device and think more about the kind of things that you do to connect, create, consume, or entertain that make life more interesting, entertaining or useful.

Whoa…this sounds complicated.  I am just buying a computer!

True, I am asking you to dig a bit, but that’s because a lot of the reasons we usually use to get these kinds of devices are the ones we see in the news media and advertising. They aren’t our reasons, but reasons “suggested” to us.

As Mr. Paney points out, it’s what you have been told to buy. If those reasons don’t resonate with your actual needs, the device gets added to stack of items in your closet.

Finding the Need behind the Want

I remember when my 88 year-old mother started wondering whether she should get a tablet or not. After some discussion, she blurted, “I just don’t want to be left technically behind!” It was a perfectly valid reason … but one that didn’t require a tablet to solve.

Part of the problem is that many people don’t know what computers and their connective ability can actually do for them. If you thoughtfully answer the question, “What is it that you want to do?,” the result might surprise you.

Listing your Needs

One way to prepare your answer is to take the areas I briefly mentioned earlier and start listing items in each that interest us.
  • Connecting –Communicating with family and loved ones or sharing common interests with like-minded people can build our sense of community and connection.
  • Creating – Writing, sculpting, singing, or organizing are all examples of creative pursuits that engage us purposefully and produce results for others to appreciate.
  • Consuming –Reading, watching or listening to content found in news, books, video, or music can entertain us, broaden our perspective, and inform our choices.


Solving a “Connecting” Need

Let’s say that under Connecting you listed that your family is scattered around the country and you wanted to stay connected to them. Phone calls, especially with today’s mobile device plans, are certainly doable but with the different time zones, it’s hard to get people together for a call.

Using a social network like Facebook might help bridge this gap.  If Facebook seems too overwhelming, a smaller network like Google+ might work. Those who treasure privacy could explore a network like Path (limiting you to 150 connections), Family Wall, or the minimalistic Everyme. While Facebook  can set up group text chats and Google+ also provide video chats through Hangouts, you can also use Skype or ooVoo for this purpose. While video chats on ooVoo have always been free, Skype in April also announced free video group chat as well.

So, here is something that doesn’t fall under “email and surfing the web.”  Its only one area, but you can see the pattern here. Express the need; determine the software or service that meets the need.

Discovering the Form of Your Solution

The next step is to find the form factor (desktop, laptop, tablet, smartphone) best suited to what you want to do. Sometimes this is dictated by whether the software or service is available for that type of device.


Generally, all devices work well with connecting, though mobile devices (laptops / tablets / smartphones) let you connect in more mobile situations. Consuming content is well-suited to mobile devices, especially tablets and the larger smartphones. Creation is easier with laptops and desktops.

Another factor is how mobile you are. If you travel frequently, desktops are less useful. Sometimes “mobile” means you would prefer to surf the web from the couch instead of a desk. Think about where you would like to use the device and what tasks (connecting, creating, consuming) you might be doing there.

What really matters

Above all, understand that what everybody tells you about what computing device to buy can be useful. But it is less essential than what you discover about your own needs. That also minimizes the conflict that Mr. Panay described.

Telling your own story when asked what you want to do will not only arm that sales rep with useful information, but can help measure how successful they are at meeting those needs.

“While technology is important, it's what we do with it that truly matters.” 
Muhammad Yunus -Bangladeshi social entrepreneur, banker, economist and civil society leader who was awarded the Nobel Peace Prize for founding the Grameen Bank and pioneering the concepts of microcredit and microfinance.

Do you have a follow up on this topic or technical question on that needs to be answered or explored? Please share it with me at brian@bostonlegacyworks.com. Your question may show up here on Tech Talk.



Read more...

Tech Talk: A resource above them all

Friday, May 16, 2014

By Brian Boston

A Resource above Them All

 

As you might guess, I involuntarily (according to my wife) collect information about technology. Often this is related to a client need or some training requirement but just as often, it’s just a fascination with how things work and how others can use them.

So I treasure information sources like Consumer Reports (unbiased product and service reviews), Lynda.com (clear, concise training videos and courseware), and Microsoft IT Academy (in depth training towards IT certifications). The challenges with these and many other quality information sources is they have membership fees for access…unless you have a “magic card.”

Your Library Card…it’s not just for books anymore!


Your library card number will get you into all of these subscription web sites and many more online resources on a variety of topics. For the purposes of this article, I am limiting myself to three local libraries:


Even you live outside these areas, you may be able to get a card for these libraries. Eligibility requirements KCLS, SPL, and Sno-Isle are fairly liberal. While there are some limitations for Seattle residents in King County, most counties and many library systems in Western Washington have reciprocal borrowing agreements or relations that permit you do get a to these local libraries.

Why Use Multiple Libraries?  Services can vary. 

When it comes to online resources, library systems have a lot of services in common, so check your local library first. As an example, Everett Public Library has Consumer Reports and Microsoft IT Academy in their research databases, but not Lynda.com. As most library require that you apply in person for a card, decide based on your needs and the library’s offerings whether it makes sense to make the trip.


While most databases allow you to access them from any location using your library card, some research databases require you to use them at a library location. Every library I have encountered requires me to access Ancestry.com (my favorite genealogy database) on site. Fortunately, that also means there are lot of libraries with access to Ancestry, very helpful during on genealogical field trips.

On the other hand, I found that access to Lynda.com varies, depending on the system. Sno-Isle limits usage to their Creative Tech Centers in Lynnwood and Marysville, SPL allows access within all its locations and KCLS allows access anywhere. It all depends on the license agreement for the service.



Brian's Favorite Library Resources

Here are my favorite online resources through these libraries and why I like them. While many of the these sites are technical, I take advantage of other kinds of sites as well:

Ancestry Library Edition (Sno-Isle, KCLS, SPL) – One of the complete comprehensive collections of personal and family records
Books 24x7 (KCLS) – Online searchable computer books and short instructional videos
Consumer Reports Electronic Issues (Sno-Isle) – Searchable copies of the original print publication
Consumer Reports Online (Sno-Isle, KCLS, SPL) – Access to the subscription Wedsite with review articles, ratings, and buyer’s guides.
eLibrary (KCLS, SPL) – Searchable full text repository of articles, transcripts from magazines, newspapers, broadcast news, and reference books. 
Freegal Music (Sno-Isle, SPL) –Three free music downloads a week and three free hours of streaming a day! (download only on SPL)
Health & Wellness Resource Center (KCLS, SPL) – Gale’s Health resource site, lots of fact sheets, articles, and other tidbits.
Lynda.com (Sno-Isle, KCLS, SPL) – My favorite tech training site. As noted above, this service has different restriction at different libraries.
Mango Languages (Sno-Isle, KCLS, SPL) – Nicely done 62-Language Learning site
National Newspapers (Sno-Isle, SPL) – ProQuest database of 5 current (and 20 years back) major newspapers.
Microsoft IT Academy (Sno-Isle, KCLS, SPL) – A set of online courses to learn Microsoft Products
Overdrive Digital Media Library (Sno-Isle, KCLS, SPL) – The most popular library ebook service. Also has audiobooks, music, video.
Price It! Antiques & Collectibles (Sno-Isle) – A service which aggregates prices on Ebay, GoAntiques.com and other sites to help you price items for sale.
Safari Books Online (SPL) – A great collection of online technical books (including the “…for Dummies” series)

There are many more online services besides these. At KCLS, most of these are known as “Premium Databases” but you can look for others in the Learning & Research and eBook and Download sections. SPL has a similar grouping under Articles & Research and E-books & Downloads. Sno-Isle calls their sections simply Research and “eBooks and More.”

Don't Know how to Proceed?

If accessing these sites and electronic services is a bit daunting, ask the library staff. They would love to help you get set up. KCLS has a number of classes to get you acquainted with ebooks and other computer help. Sno-Isle also offers a variety of computer classes as does SPL (search calendar for “TechHelp” under Event Type.  

Of course, you are also welcome to ask here…it helps me keep up my information-gathering habit!

Do you have a follow up on this topic or technical question on that needs to be answered or explored? Please share it with me at brian@bostonlegacyworks.com. Your question may show up here on Tech Talk.



Read more...

Tech Talk: Sampling Technology Mythology

Friday, May 9, 2014


Technical myths are like any other myths, a story with a compelling premise or particle of truth that is often embellished with untruths around it as it is told and retold. It doesn’t help that many of the tellers aren’t technical themselves.

I have been collecting myths and unanswered questions for this month’s Computer Q&A at the Commons.  It’s been a fertile area to explore thanks to your input. The following items have been shared by my clients and a number of you:


Myth: The Internet is so huge; no one will attack my computer. Besides, I have nothing to steal.”

Usually this is offered as a justification for not using a password, avoiding security precautions, or avoiding computer backups. The only truth here is that the Internet is really big place …. and more might have been true ten or fifteen years ago when malware threats were less prevalent or directed.

Today’s highly organized cybercriminals have software running 24/7, scanning millions of IP addresses (the number assigned to our Internet-connected systems) and looking for vulnerabilities (open ports, unpatched operating systems, etc.). In other words, they are looking for vulnerabilities system the same way a car prowler runs down a street, checking for unlocked vehicles.

That is why we use firewalls to close down ports, password protect our systems, and promptly apply security updates ... so the prowler doesn’t waste their time with our computer and moves on to a more vulnerable system. Since 14.5% of US computer users have an unpatched operating system (Secunia PSI Country Report for 2014, Q1, pdf), there are plenty of unlocked cars on the street.

The second part of this myth is that you have nothing worth stealing. Not true. Your computer or computing device supports your online shopping, financial dealings, social contacts, and parts of your identity. All can be discovered and used. Even if you don’t store anything on your computer, a hacked system can track your keystokes to discover passwords to take over your identity and trick your contacts into scams or just use your computer to attack other computers in a bot-net.

  • True or False: False  The truth is that preventing attacks is not as arduous as most people think, especially if they understand the potential threat.
  1. Use a strong password for your system and different passwords on your web site accounts
  2. Turn on Automatic Software Updates for Windows or Mac OS X.
  3. Use Tools like Personal Software Inspector (PSI) or Mac App Store to ensure your third-party applications are also up to date.



Myth: You should let your phone's battery drain before recharging.

There was a time when this was true. When Nickel-Cadmium (Ni-Cad) batteries were more commonly used in mobile phones, it was helpful to drain the battery so that the batteries would not maintain a memory effect of a partial discharge. This is behavior particular to Ni-Cads, and its more environmentally friendly cousin, nickel metal hydride (NiMH). However the most popular phone battery now is lithium-ion (Li-ion). Li-ion batteries do not have the memory effect and, in fact, lose some of their capability if you drain them completely.

  • True or False: False for today’s most popular phone power source, the Li-ion batteries; true for Ni-Cad or NiMH batteries that have been used in the past for phone batteries.

Myth: Putting your crashed hard drive in the freezer will allow you to get the data off of it.

As crazy as it sounds, there are an amazing number of success stories from people saying this actually works. Theories vary as well though there is general agreement that this doesn’t actually fix a drive, it may only make it usable for a few minutes, possibly enough time to get your most critical data off the drive.

That said, I do not recommend it it at all if the data on the drive is actually critical. Use a data recovery service instead if you don’t have backup copies available. The service can be costly but they can safely work on the drive in “clean room” conditions to get those prized documents or media files back. Local companies like Circle Hook Data Recovery or online services like DriveSavers are your best bet … certainly better than freezing your hard drive!

Of course, the least costly or risky method is to avoid the problem entirely by backing up that drive’s user data. You can either use built-in solutions like Time Machine or File History offered by the current OSes or third-party backup options for Windows and OS X

  • True or False: True as a temporary fix for some kind of disk failures, but not recommended for data recovery.

Have Computer or Technology myths you wish to explore?  Let me know share it with me at brian@bostonlegacyworks.com. Your question may show up here on Tech Talk.

Or you can join me on May 18th at Third Place Commons in Town Center at Lake Forest Park as we discuss “Your Five Favorite Computer Myths Explored.” 



Read more...

Tech Talk: Security - the right questions to ask

Saturday, May 3, 2014

Security – The Right Questions to Ask

We have an illusion of security, we don't have security.
-- Isaac Yeffet, aviation security consultant and former head of security for EL AL.

Answering any Tough Question is Challenging

In a month of talking with people about the HeartBleed bug, and this week’s Internet Explorer security patch, I have had some tough questions. The hardest questions I have encountered have ended with:

 “…Is it secure?  How do I know I am safe?”

I am initially tempted to respond these questions as Mr. Yeffet did. It is a technically correct answer. In his situation, it was his somewhat theatrical opening statement about increasing security measures at U.S. airports.

Putting Safety and Security in Context

In my case, it is a reaction to the notion that online safety and security are conditions achievable by flicking the right switches in the correct order. Your personal sense of security doesn’t operate with clear logical certainty. It is achieved when you feel “safe.”

Some people can cross a busy street, secure in their belief that drivers will see and stop. It would be less risky to cross at a marked crosswalk at an intersection with crossing lights, but unmindful drivers still hit pedestrians at those intersections too. Are those intersections secure?  No … and the only way you know you are safe is after you’ve crossed the street.



Asking the Right Questions

So we need change the questions being asked. In order to feel secure, it is most helpful to develop a ratio of risk versus reward and learn what can be done to mitigate the risk. That is where people like me can help prepare you or direct you toward less risky conditions.

But, that is not the answer to the questions being asked above. So, let's change the questions so you get what you really need.

“What are benefits and risks associated with [fill in the tech feature or service of your choice]?”
“What steps can I take to avoid those risks?”

Using those questions, you can build your own personal sense of security online and elsewhere.

Example: Is Gmail a Security Concern?
Let’s apply these new questions to a popular email service:

“I am uncomfortable sharing personal information online with Gmail. Are they “safe?”

 becomes

“What are the benefits and risks associated with Gmail accounts?”

Getting a Useful Answer

Gmail may be a free email account but your gmail address also opens the door to dozens of free services offered by Google, ranging from a calendar that can be shared, 15 gigabytes of cloud-based storage (Google Drive), a custom phone number (Google Voice) and its own social network, “Google+.”

Google is known for collecting a lot of information about its users, an area of concern for many people. Google is pretty open about this though you have to look in their privacy policy to get the details.

Most actions you take within Google services can result in data collection which helps the company develop new services, and capabilities, and personalize the user interaction. Your information is combined anonymously with data from other users to inform advertisers about who accesses Google services to target the right people with more relevant ads

“What steps can I take to avoid those risks?”

The same privacy policy provides a series of steps and resources you can use to address your concern about sharing information, including:

Google Dashboard provides detail by service what Google is tracking about you and your actions. You can use this area also to manage  or disable various services.

Google Ads show how your actions have allowed Google to assume certain demographic information about you and permits you to correct or opt out of “interest-based” ad targeting.



If this doesn’t improve your sense of security you can always enter false information in your profile. There is nothing stopping you from putting in a different birthday or name or location information. Just be aware that some Google services will “believe” that information and behave as if it is true. For that reason make sure you keep a record of any phony information you supply in case you are asked to repeat it “for security reasons” and be understanding when you receive mistimed birthday greetings!

See how it works?
  • Ask the right questions.
  • Collect information on the risks and benefits
  • Learn how to reduce risk
  • Build your personal sense of security

Remove that “illusion of security”… and take control of your own safety.

The only real security that a man can have in this world is a reserve of knowledge, experience and ability.
Henry Ford, American industrialist, the founder of the Ford Motor Company 


Do you have a follow up on this topic or have the right question on another area? Please share it with me at brian@bostonlegacyworks.com. Your question may show up here on Tech Talk.


Read more...

Tech Talk: Bloatware and the new PC

Saturday, April 26, 2014

Bloatware and the New PC
by Brian Boston


Like many people, V.M. made the move from her old Windows XP system to a new computer: 

“I am quite happy with the new Gateway that I purchased, in terms of the actual hardware. But the Operating System -- Windows 8 -- is another story!  It drove me totally bonkers for the first two weeks. “

“Then I started doing some research, and realized that my problem might be that it came loaded with ‘bloatware.’  Every time I turned it on, I'd get 4-5 little pop-up windows all over the screen. ‘Hi! You need to back up your work.’  ‘Free 60-day trial’, and ‘Do you know your machine is in dire peril??’ etc. Why…would I need to back up a machine I just got four days ago?”

Congratulations, V.M., for doing the research and learning about the software pre-installed on your computer. Many people would just throw up their hands at all the trial versions that come on today’s  PCs…or go with a Mac.

Since Apple builds both its own computers and operating system versions, they control the amount of pre-installed software much more effectively. Lack of third-party preinstalled software is also one reason why you pay more for a Mac than a PC.

Why do PCs have all this stuff pre-installed?

Most PCs available for sale now run the same operating system and can use the same applications. They are largely interchangeable.  The first appearances of pre-installed software came from makers trying to distinguish themselves with a mix of tools and software immediately available to use the system.

Over time, especially as the operating system expanded to include many of those tools, the inclusion of pre-installed software become a way for makers to maintain low cost as the capability of system improved. Since end of 2007 when the Consumer Price Index reset the base for Computers and Peripherals, prices have dropped by over 47 points, nearly half the starting price. 


Raising the Margin for PCs

So making deals with software makers to bundle their product has been become a critical way to increase the narrow profit margins on PC. Even Microsoft, who has complained about  the software bloat on new machines, also has major bundle deals for trials of its Microsoft Office,and  the BIng Bar.

Not All of Pre-Installed Software is at Fault
Typically there are three types of this kind of software

 Software developed by the manufacturer to support basic system functionality. This would include hardware drivers, system management tools and utilities. Though you may knowingly use them, they are pretty important to keep.

- Software provided to enable optional functionality specific to the system. This would include software to support special keyboard buttons or a webcam. Toshiba, for example provides facial recognition software and a utility that still permits of charging of mobile devices when the laptop is sleeping

- Software provided by third parties. While these used to be a mix of full products and trial versions, virtually all this software is now fully functional for a limited time or crippled in some other way. Welcome to the world of bloatware, junkware, shovelware, and crapware!

Clearing the Bloat
What V.M. did with her Gateway system was install a tool that removed all her pre-installed software. Then she reloaded the items she actually wanted and all is well.

The program she used is part of a “power tools” suite of utilities probably better suited to advanced users. Just like professional race car drivers don’t recommend you drive a Formula One vehicle, I am leery of pointing people to “optimization tools” that clean your system registry or tweak system operation. When these tools work well, it can be like a fast car, but then it doesn’t work well, you can have an out-of-control car wreck.

In lieu of a power tools, I have some removal options for you.

Uninstalling in Windows
As obnoxious as most bloatware is, it is not malware. Software makers actually hope you like their creation and use it. So, pre-installed software usually follows the rules and can easily be uninstalled. In Windows, the uninstall feature is easily accessed in the Programs section of Control Panel.

While Control is less obvious in Windows 8/8.1, you can access it quickly by the using the Quick Link Menu key combination (Windows Key+X). In Windows 8.1, right-clicking (or pressing and holding) the Start button on the taskbar also works.


Control Panel’s uninstall works for desktop applications in Windows. Manufacturers are also placing the new Windows Store Apps in the Start screen and in the All Apps screen. Fortunately,  right-clicking (or pressing and holding) the app tile will display a menu that includes an “Uninstall” option.

Trying an Automated Solution

V.M.’s idea of using some sort of tool is sound, though. The problem is not the mechanics of removing bloatware but the number of items that need to be uninstalled and uncertainty about which items are safe to remove. While I wouldn’t use her tool, I can recommend a couple of simpler tools that worked well for me.



It’s not just a question, but the name of a free service offered by Reason Software. Should I Remove It uses a downloadable program to scan your system for programs, showing a rating for each program found whether a majority of users chose to remove it. The program links to their web site and allows you to locate helpful descriptions and statistics of programs found. Uninstall is a simple button click once you decide it should go. In addition, they provide a listing of common pre-installed programs for Toshiba. If you are curious what software actually comes with your Toshiba/Sony/Lenovo/HP/Asus/Acer computer, they have a helpful list.



Though not as well-mannered or informative as “Should I Remove It?,” PC Decrapifier is very efficient at locating possible desktop-based bloatware. While information on individual program is available through the help button, this tool is better for someone who knows what they want to uninstall.

What I like about both tools is that they don’t do anything mysterious or tricky; they just automate the process of removing software and allow you to chose what stays and what goes.

Are Anti-Virus Removers Necessary?

There have been issues with Anti-Virus programs in the past completely removing themselves, but that is less of the problem now. Since Windows 8 and 8.1 now come with an anti-virus tool, Windows Defender, removing a trial subscription of an Anti-Virus program is also less of a concern. Norton has a removal tool if you are dissatisfied with its usual uninstall. MacAfee has a download they call the Consumer Products Removal tool (MCPR). In practice I don’t use them very much anymore.

Will Bloatware Ever Go Away?

I would not count on it. About  six or seven years ago, Dell tried to promote a limited software install option and, more recently, HP has offered selected business system its HP Premiere Image, featuring “a full suite of business software and antivirus protection, while eliminating trial-ware and other distractions.”

Perhaps, the most noticeable effort has been through Microsoft’s Signature Experience, the software configuration on the computers it sells through its retail stores. Though most trialware and junkware have been removed, Microsoft’s services and programs are bundled on the computer.

Wouldn’t it be nice to bundle your own items on a new PC?

You can “build your own bundle” using some of the most popular free programs at Ninite.com



This website lets you select up to 91 programs in 13 catagories to place on your PC. It then builds and downloads an installer you can use to automatically download the programs and install them.

Do you have a follow up on this topic or technical question on that needs to be answered or explored? Please share it with me at brian@bostonlegacyworks.com. Your question may show up here on Tech Talk.



Read more...

Tech Talk: Understanding Special Keys

Saturday, April 19, 2014

The Case of the Inexplicable Keys
By Brian Boston

I have been getting your questions. Here’s a sample, answered privately and expanded a bit here for your benefit.

Question: I recently acquired a new keyboard. After installing it, I inspected it, and had to admit that it has numerous keys the purpose of which I can’t even begin to guess. Some of these keys have symbols which I know are supposed to be “intuitive”, but they are not intuitive to me. There is no instruction manual. How do I figure them out? (GMW)

Keyboard makers add all sorts of enhancement to make their products stand out from the pack. Additional keys are one of those items though few people I know actually use them. Perhaps they have the same problem you have: no manual. .

Finding Manuals Manually

If no obvious documentation comes with your keyboard, and there is no disk included, it is still possible to find documentation on the web by looking in the support pages of your keyboard model.

As example, Microsoft’s keyboard drivers and docs can be found on their hardware support download site. Logitech also has a support location for its keyboards and keyboard/mice combos.

Aside the usual alpha numeric/function keys found on most PC keyboards, these keyboards either make use of system commands, Windows default options for email, web browser, media player, etc. or send a signal to a installed keyboard application. This application will automate a task or launch additional applications. Your best documentation is often to load the keyboard application and see that that key means in there.

In the meantime, here are common key symbols you might see:


In addition many keyboards have unlabeled keys that can be assigned a commonly accessed web page or launch a favorite application. Actually, many of labeled keys also can be reassigned other duties.

To manage these duties, you need the software from the keyboard manufacturer.

Microsoft’s older keyboards used IntelleType software, the counterpoint to their IntellePoint mouse software. Newer keyboards use the Mouse and Keyboard Center. Choose your keyboard in Microsoft’s Hardware Support Download site to determine which is appropriate for you to download.

Logitech’s keyboards use a number of utilities depending on age, method of connection and other features. SetPoint is their utility for customizing keys. Again, locating the model of keyboard or keyboard/mouse combo is the first step, then choosing Download to see your options.


Other keyboard makers will have similar download available on their web sites.

If you prefer more advanced key assignment and don’t mind doing a little scripting or using prepared scripts, AutoHotkey is a nifty open source key macro tool with an active community of fans supporting it.

~~~~~~~~~~~~~~~~~~
Do you have a follow up on this topic or technical question on that needs to be answered or explored? Please share it with me at brian@bostonlegacyworks.com. Your question may show up here on Tech Talk.

On Sunday, April 27th, Brian will be leading another Computer Q/A at The Commons session at Third Place Commons in Town Center at Lake Forest Park. The 2:30pm session topic is “Making Sense of Social Media.” More information at thirdplacecommons.org/calendar.


Read more...

Tech Talk: A HeartBleed Update

By Brian Boston

What a Difference a Week Makes – HeartBleed
The dust has settled on the alarm around HeartBleed, the bug in secure web connections between your computer and many of the web sites through which we shop, bank, and communicate. If you haven’t taken action to protect yourself, now is the time to do so.

What have web sites been doing to protect us?
Most sites have been patching their systems to eliminate the bug in SSL (or https-type) connections. As I mentioned in last week’s posting, the number of vulnerable sites among the top 10,000 sites has dropped from 630 pretty quickly to below a hundred. That should protect all of us going forward.


The next step many sites are taking is encouraging you to change your passwords on their previously vulnerable sites. This is a precaution to ensure your safety in case your current password or personal information was taken before the site was protected. I have seen notices posted on sign-in for various sites. Some have also be sending subscribers email either indicating no vulnerability was present or encouraging a password change.

Do I really need to do anything?
Yes. Do not wait to be notified, especially if you have a Dropbox, Facebook, GoDaddy, Google, Flickr, Netflix, USAA, Yahoo, or YouTube accounts. Those are sites that have indicated the need for a password change.

Aside from these sites, you can find out where passwords should be updated a few ways:
  • Mashable recently updated their list of sites that have issued statements on the topic and whether you should change a particular site’s password or not.
  • Use security consultant Filippo Valsorda’s testing results to compare which of the vulnerable sites he found on the 8th of have been patched (an important step before changing your password on a particular site).
  • Filippo’s testing site can be used to check your site’s vulnerability.
Bottom line: if there is any concern about your web site or web site account, change your password.

What about network routers? I heard they might have been affected.
Cisco and Juniper, two major networking manufacturers, have reported that some of their business-class routers have the bug and have fixes (Cisco’s list, Juniper’s list). This problem appears to be limited to them.

Linksys (formerly owned by Cisco until its purchase by Belkin last year) has said they don’t have the vulnerability. No other consumer routers wireless or otherwise have indicated a problem.

What this about Android?
Yes, a older version of Android (4.1.1) is reported by Google to have the bug on various tablets and smartphones. A fix has been issued to the device manufacturers who will be rolling it out as an update to the affected devices.

4.1.1 is an early version of Android’s Jelly Bean still used by around 34% of Android device users. You can check your version of Android, by going to Settings and scrolling down to “About device” at the bottom of the list. If you tap “Software Update, ” you can also check if for any updates to your version of Android.


Alternatively, you can install the free Heartbleed Security Scanner from mobile security developer Lookout to check your device for vulnerabilities and offer recommendations.

~~~~~~~~~~~~~~~~~~~~~~~

Do you have a follow up on this topic or technical question on that needs to be answered or explored? Please share it with me at brian@bostonlegacyworks.com. Your question may show up here on Tech Talk.

On Sunday, April 27th, Brian will be leading another Computer Q/A at The Commons session at Third Place Commons in Town Center at Lake Forest Park. The 2:30pm session topic is “Making Sense of Social Media.” More information at thirdplacecommons.org/calendar.


Read more...

Tech Talk Special Edition: What should you do about “HeartBleed?”

Saturday, April 12, 2014

A few days ago, news broke about a key vulnerability in the primary encryption method used to ensure the security of the web sites we use. If your eyes just glazed over during last sentence, it’s time to put a pot of coffee and see why this is a potential threat for you … and what you can do about.



The Story and the Danger
If you do Internet shopping, banking, and web-based email, you have made use of a “https” connection. This connection, also known as a SSL/TLS (Secure Socket Layer/Transport Layer Security) connection is designed to insure the privacy and security of your interaction.

The key provider of SSL/TLS is OpenSSL, an open-source project. As a majority of web servers, routers, and other network connection make use of OpenSSL, potential for stolen passwords and other critical data is high, especially since software designed to exploit this vulnerability has also been discovered. 

While the vulnerability is limited to a couple of recent versions of OpenSSL, the pervasiveness of the protocol improves the chance your information can stolen and used.

How does this affect me?
Unlike the hacks at Target and other companies, this is not a localized threat. Using encrypted connections is at the heart of our Internet commerce. Since we all use credit cards, communicate with banks, and share passwords and other personal data over SSL/TSL connections, all that data could have been at risk.


The challenge in this case is that unless you encounter signs of theft (card card use, account hacking, identity theft), there is no way to determine whether your data has been compromised. In security blogger Brian Krebs' story on this topic, he quoted Jonathan Sander of Stealthbits Technologies as saying, “Heartbleed is like finding a faulty car part used in nearly every make and model, but you can’t recall the Internet and all the data you put out on it.”

This sounds awful scary
Yes, it does, largely because of the uncertainties involved. There have been a lot of people who manage web sites working very hard to correct this problem. Sites like Tumbler, Facebook, Instagram, Pinterest, Dropbox, Intuit (Turbotax, Quicken) and Google announced their sites are now patched to prevent future incursions. The Canada Revenue agency shutdown its taxpayer sites until servers could be patched or features with the vulnerability are disabled.

Other sites that have NOT be affected according to company statements include Twitter, Microsoft services, Paypal, Amazon, AOL, and LinkedIn. Most major US banks and brokerages, according to Mashable.com are also safe from Heartbleed attacks, as a number of retailers, including Target!.
A scan of the top 10,000 web sites on April 8th, one day after the public announcement showed 630 still vulnerable to attack.  A followup scan on April 10th showed this number down to 137.

So, one part of this problem, current vulnerability, is being addressed, by most web site owners. The window of vulnerability is closing.

The second part of the problem needs to be addressed by you to insure your protection.

What should I be doing?
Be prepared to change passwords on the affected web sites … once you know that the site has been able to correct the problem. It’s important to confirm that the site is now safe before changing passwords. 

Key questions to answer:

Determine if the web site is affected by the vulnerability  There are a few ways to figure this out if the web site that concerns you was not listed above.

Look for a notice on your website regarding OpenSSL or Heartbleed. Search for news accounts of your site and press releases it might have made.


If there is no information on the site, try using the Filippo Valsorda site to test it. This is a service set up by Filippo Valsorda, an Italian security expert. If your site passes, it is either because the vulnerability has been fixed or it wasn’t affected at all.



Change passwords on any sites that you believe had the vulnerability once the bug has been eliminated. The point of changing passwords is to eliminate further access to information using passwords acquired prior to the bug being fixed.

Keep an eye on your credit and accounts. Since we don’t know who, if anyone , might be affected during the two years this vulnerability was open, it’s a good idea to watch your credit card purchases and account information a little closer. If unusual activity occurs, report it promptly to the bank or account manager.

Why is this bug called Heartbleed?
The bug is based in an extension of OpenSSL called HeartBeat and takes its nickname from there. HeartBeat - that keeps the secure connection active - even when no data is being transmitted. Heartbleed allows someone to eavesdrop on communications and even impersonate services and users.

How bad is this, really?
From the Internet perspective, this is pretty bad and there are a lot people scrambling about to fix things. From your perspective, it could be bad if you haven’t changed passwords on vulnerable site once they are fixed.

In the long term, this is probably just a glitch from which we all will recover. In the meantime, taking the proper precautions will help it stay as a glitch for you.


Do you have a follow up on this topic or technical question on that needs to be answered or explored? Please share it with me at brian@bostonlegacyworks.com. Your question may show up here on Tech Talk.



Read more...
ShorelineAreaNews.com
Facebook: Shoreline Area News
Twitter: @ShorelineArea
Daily Email edition (don't forget to respond to the Follow.it email)

  © Blogger template The Professional Template II by Ourblogtemplates.com 2009

Back to TOP