Tuesday, February 28, 2012

Don't bar the windows and pass around the keys

It’s amazing how after decades of the internet being around, there is still no one grand way to keep information safe. People are the single greatest threat to information security. Because of this, no one can ever guarantee with 100% certainty that information is safe. I bring up past decades because after reading The Cuckoo’s Egg by Clifford Stoll, a book based on hacking in the late 80’s and early 90’s, I saw that even back then, it was people that allowed information leaks. When you think of a stereo typical hacker, you might envision the cast from Sneakers, Hugh Jackman, or a much younger, more innocent Angelina Jolie. You might think of the people who seem to flawlessly navigate their way past firewalls, systems networks, and encryption. Based on the true account of Cliff Stoll—a Systems Manager from Berkley in 1989—and even up to news on current events, this was rarely the case. I’ve heard it called the “sticky note” problem. People use, or are assigned, strange passwords and usernames and in order to remember them, they put a sticky note next to the computer. In the case of Cliff Stoll, he witnessed people in his system saving their passwords in their files or sending them in emails. In other words, the key to a secure place was being stored in a relatively public place. Finding these keys is by far the easiest and most common way for hackers to access protected.

We are all caught in the balance between security and convenience. I hate, for example, that Chase makes me type in my password every time I want to check my account balance on my phone. However, that keeps my information safe from anyone stealing my phone and transferring money to their account. Human nature has changed a whole lot slower than technology has since 1989. We can use all the firewalls and extra security measures we want, but ultimately, it will be human error that will likely overthrow efforts to protect data. Using common passwords, storing passwords, sharing passwords, or using the same password for banking as you do for your shared wireless, are just some of the examples of through thoughtlessness, malicious people gain access to places they shouldn’t. Before you invest in new software or systems to protect data, make sure that you and whoever you want to have access are as careful about behavior and practices as they are with their homes; i.e., don’t lock the door and leave the keys on the porch.

Thursday, February 16, 2012

The Master Crowd Sourcer


I have to say it: I have little to no interest in my heritage. I think in my lines I have some Scottish and British kings, and I’m pretty sure that Shakespeare is in there somewhere. Undoubtedly there are also some rapists and murderers too. Both of these define who I am less than what I ate for breakfast. Were it not for the eternal perspective that family history has, I personally would have no incentive to be a part of it except for one thing. Crowd sourcing. Crowd sourcing fascinates me. In relation to family history, God has dropped the spirit of Elijah on the earth and hoards of people have joined the entirely voluntary effort of researching their family history. God himself sees the value of crowd sourcing and was doing it before it was cool. (Before even the discovery of electricity, believe it or not). Crowd sourcing is the only way to tackle massive projects like linking all of humanity together. It’s just so interesting how something so seemingly a part of human nature is actually a seed that has been placed there by God.

Tuesday, February 14, 2012

Honey Crisps are the only Apple worth Buying


Shortly after the beginning of the smart phone, Apple and Google have become strong opposing forces. Recently however, in an un-technological, yet important way, Apple pulled ahead. A recent study shows that Apple is now the US’s most likeable company, surpassing Google. The irony is mind-blowing because though everyone admired Jobs, few people close to him would call him a “nice guy”. Though I never knew him, the first few chapters of his biography give me a similar perspective. Apple’s vision and leadership has put itself in the forefront of the mobile device market. My question is, if everyone is jumping on the apple bandwagon, doesn’t that undo their whole idea of being the underdog, or the “anti-mainstream”? What will all those hipsters do when everyone else has an iPhone? It may have emotional appeal, social responsibility, a great environment, but I just don’t believe in it enough to join the exodus. It has catchy slogans, and is a crowd pleaser, but I for one, will never be found a mactavist.


Source:

http://www.digitaltrends.com/apple/study-apple-beats-google-as-best-liked-company-in-the-us/