Archive for August 22, 2024

Ultimate Guide to Eco-Friendly PC Disposal: Safe & Sustainable Solution

PC Disposal: Safe & Eco-Friendly GuideIn 2023, around 68.3 million tons of old or unwanted gadgets, which include PCs, were thrown out.  The United States generated approximately 11.9 million tons of e-waste in 2022.  This figure places the US as the second-largest global generator of e-waste.  The United Nations estimates that less than 17.4% of these unwanted gadgets are recycled as e-waste.  Unfortunately, a staggering 83% of e-waste ends up in landfills.  In these landfills, discarded gadgets leach toxins into the Earth.  You can help stop this by practicing proper PC disposal.

E-Waste

This improper disposal of e-waste resulted in the leaching of flame retardants, PFAS, and heavy metals into the soil and groundwater.  Some of the most hazardous chemicals found in PCs include:

  • Mercury: Exposure can harm the nervous system, kidneys, and brain.  It can also cause developmental issues in children and affect adults’ cognitive abilities.
  • Some of the most hazardous chemicals found in PCsLead: Lead poisoning can result in anemia, kidney damage, and developmental delays in children.  It affects both the nervous system and cardiovascular health.
  • Lithium: High levels of lithium can cause nausea, tremors, and kidney damage.
  • Barium: Exposure to barium can lead to gastrointestinal issues, muscle weakness, and heart problems.
  • PFAS (per- and polyfluoroalkyl substances) are also present in PCs (PDF).  Their potential health effects include increased cholesterol levels, suppressed immune response, and risks of kidney and testicular cancer.

Proper PC disposal and your other end-of-life devices is critical to prevent the toxins in e-waste from contaminating the Earth.  Preparing for proper PC decommissioning involves several steps to ensure your personal data is safely removed and the device is prepared for its next phase, whether reuse, recycling, or disposal.  Here are the steps to follow when decommissioning a PC.

Your first step in PC disposal should be to back up all important documentsBack up your files

Your first step in PC disposal should be to back up all important documents, photos, videos, and other files saved on your computer.  You can use a USB stick, an external hard drive, or a cloud-based file-syncing service like Google Drive or iCloud.  Remember, it’s always better to back up too much information than too little

Transfer Software

You bought the software on your PC.  Ensure you have the install key to transfer any licensed software to the new computer.  Some applications offer a deactivation feature that allows you to transfer the license to a different PC.

If you’re giving your computer away, also make sure that you’ve signed out of iTunes, iCloud, and iMessage—there’s a chance your Apple ID data will remain on the drive after you reset it, and you don’t want anyone to gain access to your account.

When you wipe your hard drive it renders a computer completely free of personal information.Wipe your hard drive

After you back up the necessary files, you want to wipe the drive.  When you wipe your hard drive, it renders a computer completely free of personal information.  This is irreversible and will essentially make your computer a “blank slate,” so make sure you’re done with your computer before doing this.  Some tools to wipe your hard drive:

  • Darik’s Boot & Nuke is open-source and free.  It is probably the most popular program of this type.  However, it has not been updated since 2015.
  • KillDisk comes in two flavors: Free and Professional.  The free version only has one way to delete the data on a hard drive, but it’s still good enough for a decent hard drive wipe.
  • Apple includes Disk Utility in MacOS, which can wipe Apple’s hard drives.

Clean your PC

The last step in PC disposal is to remove any markings, asset tags, sticky notes, etc.  Next, use a lint-free cloth slightly dampened with soap and water or 70% rubbing alcohol or alcohol-based disinfectant spray to wipe down your device.  Avoid aerosol sprays and cleaning solutions that contain bleach or abrasives, and keep liquids and moisture away from any openings on the device.

CD and DVD Destruction

CDs and DVDs containing personal information should be physically destroyedCDs and DVDs containing personal information should be physically destroyed when no longer needed.  More giant paper shredders or specialized CD/DVD destruction hardware can accomplish this.  Document management firms like Shred-it offer optical disk destruction services.

rb-

There’s no “right way” to eliminate an old computer.  PC disposal options include re-purposing it for another use, selling or giving it away, or environmentally safe recycling.  Consider organizations like Computer Aid International, which refurbishes PCs and other digital devices to bridge the digital divide worldwide.  They even use solar power in areas with unreliable electricity, benefiting over 14.5 million people in 115 countries

 

Related article

 

Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005.  You can follow me on Facebook or Mastodon.  Email the Bach Seat here.

Protecting Your Email: How to Stay Safe

Protecting Your Email: How to Stay SafeNow is a good time to take steps to protect your email address.  The recent RockYou2024 data leak released 10 billion passwords, which are another part of your email.  Your email address can provide the bad guys with enough information to cause significant harm to your credit score, banking account, or career.

Is it Safe to Give Out Your Email Address?

WIs it Safe to Give Out Your Email Address?hile keeping your email address completely secret is nearly impossible, you must be cautious about who you share it with.  Only share your email address with trusted friends and business partners.  Create an email alias for general everyday browsing and shopping.  It will reduce junk mail and phishing risks.  You can create an email alias at:

What can they do with your Email address?

Our email inboxes contain a treasure trove of personal information that the bad guys can exploit.  With your email address, hackers can execute phishing attacks to obtain your login credentials, financial information, and contacts.  Here are some ways the bad guys can exploit your email address.

  1. Spoof Your Email Address: Hackers can spoof your email address to deceive others.  They create counterfeit sender addresses resembling yours to send fraudulent messages.
  2. Find Personal Information: A simple online search using your email address can reveal personal details like your name, friends, and workplace.
  3. Send Emails to Your Contacts: If hackers gain access to your email account, they can use it to send fraudulent emails to everyone in your contact list.
  4. Email virusesAccess Your Online Accounts: Logging into your email account allows hackers to access other online accounts linked to that email address.
  5. Steal Financial Information: Once hackers access your email, they can use phishing tactics to obtain your financial information.
  6. Blackmail You: Hackers can obtain your email address and password to access personal and potentially embarrassing information.
  7. Steal Your Identity: Hackers could potentially steal your identity if they access your email account and obtain personal documents like bank statements or tax records.

Steps to Stay Safe from Hackers

To protect your email address, minimize sharing it and consider the following:

  • Creating separate accounts for different purposes.  At the very least, individual email addresses should be provided for work and home.
  • Use strong, unique passwords.  For optimal security, strong, unique passwords are complex combinations of letters, numbers, and symbols that are long, not easily guessed, and not reused across multiple accounts.
  • A password manager can securely store passwords with strong encryption, two-factor authentication, and automatic lockout after inactivity.
  • Enable two-factor authentication for enhanced security.  Two-factor authentication is a security method requiring multiple credentials to verify identity.

If you have been hacked

Change your passwords immediately if you suspect unauthorized access to your email account.  Next, inform your contacts and monitor for signs of identity theft.  Another step is to freeze your credit at the credit bureaus.  When you place a security freeze, creditors cannot access your credit report.  This will keep them from approving any new credit account in your name, whether fraudulent or legitimate.  The big three credit bureaus are:

Last but not least, make sure your devices are protected against malware.

Related article

 

Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005.  You can follow me on Facebook or Mastodon.  Email the Bach Seat here.

Bill Gates: Broadway Star You Never Knew Existed

Bill Gates: Broadway Star You Never Knew ExistedWho would have thought that the mastermind behind Windows would ever trade coding for choreography? Ernie Smith at Tedium surfaced a video of Microsoft CEO Bill Gates on a Broadway stage. In the fall of 1992, Microsoft spent $2 million to turn Mr. Gates into a Broadway star. The show, “How to Succeed in Business with Workgroup Computing,” opened (and closed) at Broadway’s Gershwin Theater, one of the biggest theaters in New York.

Windows for Workgroups 3.11The show celebrated and promoted Windows for Workgroups. Microsoft released Windows for Workgroups 3.11 in November 1993. It introduced support for 32-bit file access, drive sharing, and group calendaring. It also had built-in fax capabilities.

What’s new in Windows for Workgroups 3.11

Windows for Workgroups 3.11 was the first time Microsoft embraced connectivity on the PC. They added a Winsock package for dial-up connectivity. Winsock is an API that allows Windows network software to access network services, especially TCP/IP. Microsoft later replaced Winsock with a 32-bit stack add-on package that provided TCP/IP support in WFW 3.11. They also increased WFW connectivity with NetWare networks. Microsoft also introduced support for Open Data-Link Interface (ODI) cards and Internetwork Packet Exchange (IPX) drivers. Additionally, they introduced a Remote access service, allowing users to access their computers remotely.

The commercial play highlights some of the greatest hits of the 1990s: yuppies, dance tunes, the Blues Brothers, 90s clothes, and Bill Gates trying aerobics.

Bill Gates acting debut

miracle of computer networkingAccording to the Washington Post review of the extravaganza. The show cast Gates as a hero computer consultant who saves two employees, Jake and Max, from an impossible deadline. Gates demonstrated the miracle of computer networking to the beleaguered Kitty Carnival Amusement company employees using Windows for Workgroups. One of the actors exclaimed, “We’re not worthy!” in typical “Wayne’s World” fashion. Gates even attempted a dance routine with some performers dressed as the Blues Brothers, resulting in a symphony of misplaced steps and flailing arms. Mr Gates said,

That was so bad, I thought [then Microsoft CEO] Ballmer was going to retch.”

You can watch the entire production on YouTube.

If you don’t want to watch all 62 minutes, here are some links to the best parts:

rb-

Bills Gate’s Broadway debut did not do much for Windows for Workgroups. Microsoft Lore says that the WFW product was called Windows for the warehouse in Redmond. WFW was superseded by Windows NT, which was released while WFW was still available.

Bill’s presence improved, and he is frequently seen on CNBC. Here are some more Gates videos from Wired.

Related article

Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005. You can follow me on Facebook. Email the Bach Seat here.