Featured Posts

<< >>

Master Email for Business Efficiency

Discover how mastering email communication can boost business efficiency, avoid common pitfalls, and ensure secure, respectful online interactions.

Turkey Revenge

The turkeys are pissed this Thanksgiving they are seeking revenge.

Germs Infest 60% of Americas Phones

60% of Americans sleep with their phones, harboring germs. Cleaning regularly with UV sanitizer or alcohol wipes can help keep your phone and bed germ-free.

Smartphone Sanitizing: A Practical Guide

Securely erase personal data from your old smartphone before recycling. Protect your identity from hackers—easy steps to follow.

Why Soft Skills Matter in Today’s Job Market

Boost your career with essential soft skills like communication, teamwork, and emotional intelligence. Learn why they’re crucial for workplace success.

Happy Thanksgiving

Happy Thanksgiving

 

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Encryption on the Internet Primer

Encryption on the Internet PrimerI spoke to several of my mother’s friends the other day. They were all worried about being on the web. Kudos to these ladies for being connected at all (they are in their 70’s and 80’s), They also get a gold star for being alert enough to recognize that something on the ol’ Intertubes has changed recently.

Data theftThey hear that their information is being stolen at the banks and stores they frequent. One neighbor lady even said she was worried but the government stealing her data. I explained to the group that I too am concerned about how it seems everyone on the web is under attack lately.

I gave them the usual pointers. Don’t trust anything on the web.  Have someone (not me!) help keep their anti-malware and systems up to date. And use encryption if possible.

Navajo Code Talkers

Of course, none of my mother’s neighbors had heard of encryption. I explained to the ladies that encryption means changing a message so that anybody who heard the message would not understand it unless they knew how the message was changed. I used the example of Ig-pay Atin-lay.

  • An-cay ou-yay eak-spay Ig-pay Atin-lay? = Can you speak Pig Latin?
  • I-way ave-hay a-way ecret-say = I have a secret.

 

Then of course I was outsmarted. One of the wNavajo Code Talkers during World War IIomen chimed out, Oh like the Navajo Code Talkers during World War II. (Next time I will start with the smart answer and then go to the Pig-Latin.)  These ladies lived through the shhesh,

So that got me thinking, what does the end-user really need to know about encryption? Sure there are PKI’s, Salted hashes, Block-ciphers, and …. none of which mean anything to the end-user.

What users need to know about encryption

Miguel Leiva-Gomez at MakeTechEasier.com recently explained what beginners need to know about encryption. He says that encryption is a practice in cryptography where a piece of data is obfuscated (manipulated) in a mathematically predictable way. The manipulation makes it very difficult to recover its contents. The author says it is like my pig-Latin example, but much more complex. The mathematical equations used to encrypt (and decrypt/decode) things are called cryptographic algorithms.

These cryptographic algorithms are needed because hackers are getting smarter and sneakier. They’re compromising databases left and right. To protect your data from attacks system owners should use these algorithms to mathematically jumble up all your personal data Jumbling the data (encrypting) making it difficult (if not completely impossible) for a hacker to steal your data from that database. Mr. Gomez claims that encryption basically protects you from intrusion. If a hacker manages to break into a database and take your passwords, it would be reading something like “EAFC49BF4B496090EA2B7CA51674589” instead of “Mary_$mith.”

The article calls the jumbled-up text like “EAFC49BF4B496090EA2B7CA51674589” at the end of every algorithm is called a ciphertext. The decrypted equivalent is known as plaintext. These are very important words to remember when discussing cryptography.

The author explains that there are two ways that the plaintext “Mary_$mith” gets turned into the ciphertext to “EAFC49BF4B496090EA2B7CA51674589” and then back to plaintext “Mary_$mith.” The first method is called a symmetric algorithm:

Symmetric algorithms use a key to Symmetric algorithm:encrypt and decrypt data. The key is basically the “x” that will solve for “y” in the mathematical algorithm. The length of the key and some other properties of the algorithm determine its “difficulty.” The more difficult an algorithm is, the more difficult it is to crack it. A difficult algorithm requires immense amounts of computing power to crack. The kind of horsepower that is usually out of reach from run-of-the-mill hackers. More sophisticated attacks might use computer clusters to decipher your data. Even then, some symmetric algorithms might thwart these attacks.

Asymmetric (public key) algorithms.The second-way plaintext gets turned into the ciphertext and then back to plaintext are called Asymmetric (public key) algorithms. Asymmetric algorithms split the key into two pieces. The first is a public one (usually stored in the server). The second piece is a private one (usually stored in your computer by software). Mr. Gomez writes that asymmetric algorithms get their strength from this particular technique since a hacker will not be able to read the contents of your data even if he gets his hands on the public key (it’s only half the key).

rb-

In the end, no algorithm is created equally. All of them have some flaw or another that will be discovered in the future, so it’s difficult to know what services you should rely on.

The best advice is still the oldest advice. Look for URLs that start with HTTPS and have a little green lock in the URL line. This means some part of the connection is encrypted with Secure Socket Layer (SSL) an Asymmetric (public key) algorithm. The Internet is on the verge of a move to a more secure Asymmetric algorithm called Transport Layer Security (TLS) 

That’s why the age-old advice to keep your PC up to date is critical for keeping your personal data safe.

Related articles
  • Navajo, Pawnee Code Talkers remembered on Veterans Day (KOB.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Working Endless Hours Does Not Make You a Hero

Working Endless Hours Does Not Make You a HeroWorking endless hours may be nothing more than a waste of time. The BYOD and Cloud phenomenons have blurred the line between work and home with the goal of greater productivity. However, data from OECD and the Economist say just the opposite. Entrepreneur reports that Germany has the shortest work week, with employees averaging 35 hours a week at the office, but it also the most productive nation in the world.

According to the cloud-based software company PGi which created this infographic, the marginal benefit of each hour worked on a country’s gross domestic product declines pretty steadily as the number of hours increases.

How many hours a week do you work?

Working Endless Hours Does Not Make You a Hero

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

WWW is 25 Years Old

WWW is 25 Years OldThe world wide web (WWW) turned 25 this year.  The 1989 proposal from Sir Tim Berners-Lee for an “information management” system became the foundation for the World Wide Web. Professor Berners-Lee’s proposal has grown to a worldwide phenomenon  In honor of the milestone, Business Insider provided some insight into how the Internet has grown through the years. Statista made this chart for them using data from Pew. And here is the first U.S. website.

Rapid Rise of the Internet

 rb-

Despite republican political posturing and corporate greed, the Intertubes is 25 years old. It needs our help to keep the internet open for the next 25 years.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tablet Trouble

Tablet TroubleThere has been a shocking long-term trend in Apple (AAPL) iPad tablet sales. Despite the much bally hoed launch of the new iPad Air 2 and iPad mini 3, sales of Apple’s iPad have sunk to their lowest level since the 2011 introduction of the iDevice.This chart from Business Insider shows the decline of iPad sales.

Apple CEO Tim Cook was unfazed about the iPad’s plunging sales. During Apple’s latest earnings call Apple’s Cook said, “I’m very bullish on where we can take iPad over time.”Apple Quarterly Revenue

Users don’t want a tablet

Despite CEO Cook’s optimism, research from Kantar Worldpanel Comtech is not so sure. In an analysis of the tablet market, they found that consumers believe that they need the latest iPad. Or any tablet for that matter.

Their conclusion is based on research which found:

  • A majority of U.S. non-tablet owners said they would not buy a tablet in the next 12 months.
  • Of those who will not buy a tablet, 725 said that their PC or laptop was “good enough” as the reason why they are not buying a tablet in the next year.
  • Tablets are not seen as an alternative to smartphones.

Carolina Milanesi, chief of research at Kantar Worldpanel laid out four reasons why tablets sales are not growing at the rate many had expected.

  1. current tablet owners plan to keep their tablets even after upgrading to a new oneReplacement cycles are longer for tablets than smartphones. Ms. Milanesi explains,”Software upgrades help refresh the devices, and carriers do not provide incentives/subsidies to encourage replacements every two years, as they do with smartphones.
  2. Tablets are not as personal as smartphones.While there is no question that tablets are more personal than PCs, if less personal than smartphones, they still land in between the two,” the Kantar chief of research says.
  3. Tablet owners hang on to their old tablet when they get a new one. Smartphone users tend to turn in their old smartphone when they upgrade to a newer one according to Kantar Worldpanel data:
    • 36% of current tablet owners plan to keep their tablets even after upgrading to a new one.
    • 18% plan to pass their old ones on to a friend or relative, according to Kantar Worldpanel data.
  4. Finally, the value proposition of tablets remains weak.They report that only 3% of U.S. non-tablet owners said they will definitely buy a tablet in the next 12 months.

rb-

I thought that tablets were going to take over the world.

So what is the use case for tablets?

If the Apple fanboyz and gurls aren’t buying new iPads why should anyone else?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.