Jun 22, 2016

Keeping Your Phone Safe

If there is one piece of property that you would want to save from a fire today it would probably be your computer. It is a treasure trove of memories and important documents and it is one of your major gateways into the greater world.

Now imagine that power in your pocket. Imagine still that you leave it at the restaurant you were just at or the cab you were just in. What do you do now? Hopefully you have security enabled because nearly everything your computer contains, your smartphone does too.

Why You Should Secure Your Phone

Your phone is arguably more valuable than your wallet. If your wallet is lost or stolen, you might lose a bit of cash, have to cancel your credit cards and get a new license. A smartphone can hold all this information and more if you haven’t done your due diligence to secure it. With wallet-less payments like Apple Pay becoming more popular, a thief doesn’t even need your wallet. This information along with access to your email and other electronic services means that you could come under identity theft in the future. With the rise of wearable technology and better sensors, your phone has some degree of access to your health information as well.

The Lock Screen

The lock screen is the first line of defense to keeping your smartphone information private. Just like you wouldn’t leave your car or house door open, don't forget to lock your phone.

Pins and Patterns

These are the easiest to remember and use, but they are also the least secure. This mainly comes down to a numbers game. A four digit PIN has 10,000 combinations while a five digit one has 100,000 options. The longer the pin or pattern, the more guesses it would take to get through it by brute force. Thankfully there are software features that limit this possibility by having penalties for getting a wrong answer. Longer time between guesses and a delay in how quickly numbers can be entered are among the typical penalties.

These are still relatively safe for the average user, just never commit the cardinal sin of passwords. Birthdays and important dates, names of friends and pets and a password and 12345 are always on the weakest passwords list, so never use them.

Software

Encrypting your data protects you from a better than average thief. Encryption scrambles the information on the phone in such a way as to make it unreadable unless the correct password is entered.

While no form of security is perfect, an encrypted phone can give you enough time to locate your phone if you leave it somewhere or to perform a remote wipe to completely destroy any important information before it can be broken into. It used to be that encryption was not turned on by default when you got a new phone. That is increasingly not the case because of the current political climate. This was because older phones were not as powerful as they are now and turning on encryption had a tendency to slow down the performance. But today, phones like the Galaxy Note5 have more than enough speed to keep full encryption without a noticeable dip in speed and performance.

Jun 7, 2016

How to Outwit the Credit Card Fraudsters

If you conduct a lot of business online, you're probably giving your credit cards a good workout. And why not? You get airline miles, bonus points and discounts. But keep in mind that credit card fraudsters stay a step ahead of the game. Here's how you can outwit the scammers.

Review your credit card statements

As more people open online shopping accounts, fraudsters are targeting the accounts, not actual credit cards, to run up charges. So if you shop online regularly, be smart and review your statement each week. Do this online; in fact, cancel those paper statements. Be especially alert for small charges for about a dollar — scammers test a stolen card with small charges.

Keep in mind that scammers don't need your credit card number to use it. Online stores that hold your credit card information may be vulnerable to break-ins. You might discover a breach by reviewing your statement even before a site's owners do.

Follow security industry reports

The security industry pays a lot of attention to scam developments and is eager to enlighten the public. Follow a consumer-oriented service like LifeLock, which posts useful information on social forums like Facebook. There, you can read about data chips, fraud alerts and security tips on your phone during a lunch or coffee break.

Look for news from major industry players and think tanks like Forrester Research, the Electronic Privacy Information Center and Kaspersky Lab's blog.

Shop at sites that require two-factor authentication

Limit your shopping to sites that require two-factor authentication (2FA) to open an account.
The 2FA method of security asks for more than a PIN or password to log on. It asks several additional security questions and records the answer. They rotate questions with each logon. For example, you may be asked to provide your father's hometown or the model of your first car — information that isn't readily available for crooks to discover.

If you shop via mobile, Kaspersky recommends using only official apps. Make sure they are upgraded to the latest version, and install strong mobile antivirus software on your phone and tablet.

Shop only via secure Internet connection

Mobile web is so tempting. It lets you make purchases anywhere through your smartphone.
Before you do this, make sure your phone isn't on an open Internet connection. If you're asked for a password before you can even connect to the Internet, be very grateful. This means no one can casually steal your information. It's even better if the shop providing the free connection changes its password every day.

Still, nothing is better than shopping through your own password-protected network.

Change your passwords frequently

Finally, change your passwords frequently everywhere one is demanded.

It's tough to keep up with new passwords, so use a password manager that creates new ones for you. Use the manger to access the sites, rather than typing in a password someone can steal. Password managers will also prompt you to change credentials and prevent you from using duplicate passwords on different sites.

May 9, 2016

How to Better Manage Businesses with Multiple Locations

Just a few of Business News Daily's top 2016 business trend predictions include continued small business growth, an increased desire for human connections within business, same-day delivery and cross-border selling, and on-demand delivery and logistics services. With all these predictions come multiple business locations as enterprises expand to serve more customers locally, nationally and globally. Challenges businesses with multiple locations face include guaranteeing compliance across marketing messages and customer communications, maintaining brand consistency in advertising, and delivering accurate analytics to benefit the entire company.

For business headquarters, managing multiple moving parts to benefit the entire company requires technological tools to streamline efforts and make them more efficient. Here are ways to save a business with multiple locations time and money.

Prioritize Security

To protect businesses against physical theft and keep an eye on what employees are doing in multiple locations, HD security cameras act as owners' eyes while they're not there and help protect locations from internal and external fraud committed by employees, shoplifters and burglars. They can also give a bird's-eye view of how employees are working at any time, which helps give owners insight into the way operations are conducted.

Data security protection from hackers, natural disasters, equipment damage and theft is also vital. A centralized backup system like Mozy that encrypts data and makes it accessible to team members with user-granted permission saves money on IT costs while protecting precious digital assets. A digital financial software tool with password protection, such as Intuit Quickbooks, keeps company financial data stored safely.

Execute Consistently

For distributed marketing networks with corporate headquarters and local franchises or independent sales representatives, it's important to empower all markets to optimize communications with their customers while still using compliant language and corporate-approved materials that fit with the brand. Research firm Gleanster reported that the best performers in the distributed marketing space used messaging that was relevant and timely to each local community. To allow all markets to customize branded materials, upload them to a centralized cloud-based marketing resource management system such as Siebel that allows them to be downloaded and amended based on immediate local needs.

This is also the place to upload guidelines on compliant language, so workers in every area can learn brand standards and more efficiently create materials that fall in line with legal regulations and are likely to be approved by corporate. Systems such as these also allow for inventory tracking to ensure stock never runs out, as well as vendor communication and budget monitoring. Integrating campaigns with an analytics tool, even a free one such as Google Analytics, allows all locations to gauge factors that contributed to success and identify techniques that should be improved or eliminated.

Keep Teams Connected

Inc. magazine cites a lack of spontaneous communication and a lack of team cohesiveness as two of the most significant challenges businesses with multiple locations face. Because employees want to feel like an integral part of overall business goals, fostering a team mentality across the organization helps workers in various locations still feel like they're working toward meaningful objectives.

Video conferencing tools such as Skype allow team members to meet "face to face" even when they're in different states or countries. Project management tools like Trello allow for transparency in project progress, including for those working remotely. An internal social network like Yammer allows team members to offer ideas for collaboration and learn more about each other no matter where they are. Hosting annual team summits in a central location allows team members to bond in person and reinforces company-wide goals, while a broadcast service such as Livestream allows businesses to broadcast events live to any device for those who can't physically make it.

Look for opportunities in every area of a business to use technological tools to streamline efforts while unifying your team. Employees who have clear expectations and experience consistency and organization in a business with multiple locations will work more efficiently and improve overall efforts.

May 2, 2016

Hacking my Earthwise lawn mower battery

I bought an Earthwise 24-volt lawn mower last year to keep my lawn in check. It worked pretty good, but the battery didn't last the summer. It just stopped charging. I of course got lazy and didn't contact Earthwise to get a replacement. When I pulled it out of the garage this year and noticed that I couldn't mow longer than ten minutes I remembered... Oh yeah, I was going to call them about this...

Well, the one year warranty expired so that left me with one choice... buy a new battery. I decided to look online for replacements and found one at Home Depot for almost $150!

 

$150 is a little more than I was willing to spend, so I started looking around and I found a blog post talking about how the internal components of the battery are just two basic universal batteries!

It turns out the post was right. You can open up the battery housing by unscrewing the screws around the under ledge of the housing.


When you pull off the top you have two super cheap generic 20 Ah Chinese batteries.


For replacements, the post recommends two Universal Power Group UB12220 22 Ah batteries which fit perfectly in the battery housing. On top of that they are only $40 each with free shipping! You just have to make sure you hook up the wiring the same way that the old batteries were hooked up.


 
After putting it back together, I found that it was already fully charged and my mower started working like a champ again!

So there you go, pay Home Depot $150, or hack your battery yourself and only pay $80. What would you choose?

Apr 28, 2016

How to monitor MySQL in Zenoss

Years ago I discovered Zenoss Core and it has been my favorite monitoring system ever since. I've used lots of monitoring tools from Cacti to Nagios, from Manage Engine OpManager to Solar Winds and Zenoss has been the easiest to work with in my opinion.

Well the other day a coworker of mine asked if I could monitor a MySQL database server we had running on an Ubuntu Linux virtual machine. I found a ZenPack for MySQL, but I had a little trouble getting it to work at first. I finally did it though, and I'll tell you what I did.

  • I installed the MySQL Database Monitor Zenpack on my Zenoss server.
  • On the MySQL server I created a new MySQL user called zenoss by running the following:

  • In the configuration properties of the MySQL server you want to monitor modify the zMySQLConnectionString information with zenoss for the username, the password you created above and 3306 for the port number.
  •  In the Modular Plugins area for the MySQL server, add the MySQLCollector module and click save.
  

  • Now re-model your server and you should now see MySQL Servers and MySQL Databases under the components section.

Now you are done! It does take a while before you start to see graph information to appear, but it seems to work rather well.

One thing to note, in order for this to work, you have to configure your MySQL server to listen on port 3306. If you have an inclusive LAMP server that is only listening on 127.0.0.1 it won't work.

One thing that confused me at first was a note on the ZenPack page saying that the zMySQLConnectionString doesn't work right in Zenoss 4.1 so you have to set it up with a JSON list. For one, I don't know how to do that, and two it seemed to work fine for me on Zenoss 4.2.4.

All in all, this plugin seems to do the trick! How do you monitor your MySQL servers? What monitoring tools do you use? Let us know in the comments!

Apr 22, 2016

Smart Home Technology for the Savvy Homeowner

Tech gadgets are sometimes the most handy when found in the home. They help you save time, prioritize items on your daily to-do list and even save money. But what tech gadgets are the latest and greatest in a world in which technology constantly makes itself obsolete? Here are some slick gadgets and home appliances that will make your life easier.

1) Smart Home Consoles

No longer the stuff of science fiction and the Jetsons, the smart home is real. Smart home consoles, such as the Amazon Echo, Ivee and Cubic, are voice-controlled smart home devices that let you control everything in your house that is smart home enabled. This includes lights, TV, stereo and your other online devices.

Many consoles act as alarm systems with a motion sensor that will alert you if it is activated. Not only can you control your home with a smart home console, but you can also look up information with nothing more than a question directed at your console.

Amazon Echo and the Apple HomeKit are the front-runners in this industry, but other competitors are becoming available.

2) Home Appliances

Technology doesn't just let you control your home with your voice — it has also changed the way you go about your homeowner tasks. For instance, did you know there's now a WiFi-enabled coffee pot? Just load it up with your favorite blend before you tuck in for the night, then in the morning grab your mobile device and start your morning Joe before you even get out of bed. You can even program it to communicate with your wearable to determine how strong that cup should be based on your sleep — or lack thereof.

If you think that's fancy, you'll also be surprised that washing machines have gotten a technological makeover. No, this gadget isn't WiFi enabled — not yet anyway — but Smart Motion technology has given a new dimension in your fight against stains. Smart Motion technology moves the clothes in a way that simulates a hand-washed item. The motion also provides full submersion of clothing at all times, while alternating directions to give all articles of clothing a good scrubbing.

An energy-efficient dishwasher is also a great investment for your home. Dishwashers have become not only more efficient but also quieter. Next time you throw a dinner party, you don't have wait to load the dishes, as many high end washers are as quiet as 44 decibels.

Of course, now that you have come to rely on all these top-of-the-line home tech gadgets, make sure to protect your appliances with a home warranty.

3) Solar Hybrid Automower

Yes, you read that correctly. Similarly to robot vacuum cleaners, an automower is like a Roomba for grass. And the Husqvarna Automower has a solar panel that can power the mower completely in the right light conditions for a yard up to .35 acres. If the mower doesn't finish the yard in one charge, it will visit the charging bay to recharge and then finish the job.

One drawback of this mower is that it doesn't have a rain or humidity sensor, so it will continue operations even in poor conditions such as rain or snow.

While this robot mower is relatively new on the market, it still has a high price point, but look for similar products in the years to come.

Apr 15, 2016

My company has finally moved away from tape backups!

I never thought I'd see the day when I'd work for a company that DIDN'T use tape backups. I mean, as far as storage goes tapes are pretty cheap. Well, a few years ago I developed a fairly cheap SAN storage solution that I call a Bauer-Power SAN using SuperMicro hardware, Ubuntu and SCST. It works great! It works so great in fact that the storage we use for virtualization for my company's home office, our QA environment and our DR environment all use Bauer-Power SANs for storage.

Enough about that though, so how did we move away from tape? Well, a few years ago I discovered CrashPlan, and started using it with two 20TB Bauer-Power SANs. We would back things up to disk with CrashPlan, then back those archives up to tape once a week. It worked pretty good, but tapes are super slow.

Last year my CTO said he wanted to move away from tapes, so I came up with the plan to send one of the 20TB Bauer-Power SANs to our DR site in another state, and setup CrashPlan out there. Now all of our Production servers backup directly to our DR site, and since it is in another state, it is already securely offsite should something happen to our primary data center.

We also backup to our local CrashPlan server for faster recovery. CrashPlan lets you backup to multiple locations simultaneously.

CrashPlan is probably the most reliable backup solution I've ever used. I've used Backup Exec, Yosemite, Microsoft DPM and Arcserve Brightstore. All of them have had issues, but I never have those issues with CrashPlan.

Do you use disk only backups? What software do you use for that? Let us know in the comments!

Mar 14, 2016

5 Encryption Methods That Will Change the Face of Business in 2016

As a result of the San Bernardino County shootings, a Federal judge has ordered Apple to unlock one of the shooter’s iPhones. Apple has denied the request, citing customer privacy violations if it overrode its encryption process.

A four-digit lock has more than 5,000 permutations and six digits jumps to 150,000 possibilities. Encryption methodology is fast evolving and the smart business owner will need to stay aware of the changes.

Secure Sockets Layer

The Secure Sockets Layer (SSL) is the most common method of encryption because it works so well. This is used to transfer data from one place to another without fear of a person intercepting and reading the information. It requires the creation of a public and private certificate at the sender and receiver end of the communication. At the time of the connection, called the SSL handshake, a one-time session key is created. Without all of these keys, the SSL link cannot be made. This powerful encryption method is what is used by cloud solutions provider Mozy to make certain that customer information stays safe. Because of this high level of safety, encryption has opened up a world of cloud-based computing and globally located staff at many companies around the world.

Chaotic Encryption

This security technique takes advantage of modern chaos theory, which is a mathematical process of making predictions out of bounded random events. Encryption using chaos starts by taking the text and overlaying it on an image. This image is cut into a predetermined amount of grids. Each of these mini-pieces is rearranged randomly using a math key. When transmitted, these pieces have billions of combinations without the key. Because of its high level of sophistication and mathematical knowledge, chaos cryptography is sought after by governmental agencies.

Advanced Encryption Standard

Like SSL, Advanced Encryption Standard (AES) is symmetric, meaning that there is a key at the sending side and the receiving end. AES is a specific algorithm set that uses the key as a base of the mathematical equation. The key length can be 128, 192 or 256 bits long, giving billions of permutations.

This is the technology that you see in ATMs. Since banking machines are fixed in one location and do not require multiple servers, the codes can be stored without fear of detection. A person would need to cut into the ATM or dig up the shielded wiring in order to tap into this information.

Data Encryption Standard

Data Encryption Standard (DES) uses asynchronous algorithms, in which the sender and receiver have different keys. DES is used less often than the others because the math behind it somewhat caps the key length to 16. You would find DES in computer systems that do not require a lot of security.

Hardware Based

In 2015, the three largest credit organizations (Europay, MasterCard and Visa) changed their credit card technology, adding a chip to each card. Where we see consumer safety, the cybersecurity professional sees hardware driven encryption. In each of the cards is a chip with a unique set of instructions. Whenever you use the card, a one-time transaction code is generated. This way every transaction is unique. Even if a thief was able to copy the information from the purchase, the key would not work a second time. The EMV chip is being hyped as the cyber security breakthrough that will make mobile shopping safe.



Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | stopping spam