Tag Archive for 2012

Seinfeld Explains Facebook

Seinfeld Explains FacebookThe NYT reports that Facebook has 50 minutes of your time each day and it wants you to spend even more time on the site giving up your personal data.

Reddit has a Seinfeld clip from 1992 that explains why Facebook, and all social media, is such an irresistible life-resource hog.

 

Seinfeld Season 04 Episode 07 The Bubble Boy

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

First Computer Passwords Useless

First Computer Passwords UselessRobert McMillan at Wired dug thru the annals of tech and recently confirmed that passwords have been a pain in the tuckus for a millennium. But who’s to blame? Who invented the computer password?

ShakespeareThe origin of the password is shrouded in the mist of history like the invention of the wheel or the story of the doorknob, according to Wired. Roman soldiers memorized spoken passwords to gain access to camps. Shakespeare kicks off Hamlet but where did the first computer password show up? Wired asks.

Computer passwords probably arrived at the Massachusetts Institute of Technology in the mid-1960s. Wired says nearly all the computer historians they contacted said that the first password must have come from MIT’s Compatible Time-Sharing System. In geek circles, it’s famous. CTSS pioneered many of the building blocks of computing as we know it today: things like e-mail, virtual machines, instant messaging, and file sharing.

IBM logoFernando Corbató who worked on CTSS back in the mid-1960s is a little reluctant to take credit. “Surely there must be some antecedents for this mechanism,” he told Wired, before questioning whether the CTSS was beaten to the punch in 1960 by IBM’s (IBM) Sabre ticketing system. When Wired contacted IBM, big blue claimed it wasn’t sure.

According to Mr. Corbató, even though the MIT computer hackers were breaking new ground with much of what they did, passwords were pretty much a no-brainer. “The key problem was that we were setting up multiple terminals which were to be used by multiple persons but with each person having his own private set of files,” he told Wired.Putting a password on for each individual user as a lock seemed like a very straightforward solution.”

Back in the ’60s, there were other options, according to Fred Schneider, a computer science professor at Cornell University. The CTSS guys could have gone for knowledge-based authentication, where instead of a password, the computer asks you for something that other people probably don’t know — your mother’s maiden name, for example.

But in the early days of computing, passwords were surely smaller and easier to store than the alternative, Professor Schneider says. A knowledge-based system “would have required storing a fair bit of information about a person, and nobody wanted to devote many machine resources to this authentication stuff.”

Data breachThe irony is that CTSS may also have been the first system to experience a data breach. The article recounts that in 1966, a software bug jumbled up the system’s welcome message and its master password file so that anyone who logged in had access to the entire list of CTSS passwords.

The story goes that an MIT Ph.D. researcher was looking for a way to bump up his usage time on CTSS. He received four hours per week, but it wasn’t nearly enough time to run the simulations he’d designed for the new computer system. So he simply printed out all the passwords stored on the system.

There was a way to request files to be printed offline by submitting a punched card,” he wrote. “Late one Friday night, I submitted a request to print the password files and very early Saturday morning went to the file cabinet where printouts were placed and took the listing.

To spread the guilt around, Mr. Scherr then handed the passwords over to other users. One of them — J.C.R. Licklieder — promptly started logging into the account of the computer lab’s director Robert Fano and leaving “taunting messages” behind.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Detroit Safest Online City Again

Detroit Safest Online City AgainNorton, the anti-virus arm of Symantec (SYMC) teamed up with research firm Sperling’s BestPlaces to rank US cities based on a number of cybercrime risks and they found Detroit the safest online city for 2012. I wrote about Detroit’s 2011 ranking here.

DetroitBert Sperling, lead researcher for the analysis said, “By looking at data from consumer lifestyle habits as well as cybercrime data provided by Symantec, … we’re able to provide a holistic view of the various factors that put a person at potential risk.

The Huff Post reports that the study looked at the prevalence of Internet use in addition to the types of risks users face online. Consumer statistics include the number of PCs, use of smartphones, the use of social networks, e-commerce, and accessing potentially unsecured Wi-Fi hotspots. BestPlaces also looked at the following cybercrime data: bot-infected computers located within a specific city, attempted malware infections, spamming IP addresses found within a specific city, and web attacks originating within a specific city.

Wi=FiSymantec says Detroit had low scores in the number of Wi-Fi hotspots, potentially risky online consumer behavior, and PC expenditures. Other low-ranked cities include Tulsa and El Paso.

Users are at most risk for cybercrime in the following cities:

1. Washington
2. Seattle
3. San Francisco
4. Atlanta
5. Boston

SymantecWith the explosion of smartphones, tablets, and laptops in recent years, and the rise of apps and social networking sites, our online and offline lives are blending together in ways that we’ve never before experienced,” said Marian Merritt, Norton Internet Safety Advocate. “…this analysis highlights the potentially risky factors we face each time we go online. By taking a few simple precautions now, people can make sure they stay protected against online threats.”

Greg Donewar, manager of the National White Collar Crime Center told Huff Post,… over the past year, we’ve seen a considerable increase in cybercrime attacks, and whether a person lives in the riskiest online city or the safest, consumers everywhere need to be aware of the inherent dangers of online activity.

rb-

Forbes says that cyber-crime is a $37 billion crime that affects 1 in 25 Americans. Take these steps to protect yourself online:

Create better passwords. Avoid passwords like password, 123456, qwerty, abc123, or monkey, these are the top most common passwords (I have been writing about weak passwords for since 2010). Forbes says your first line of protection against cybercrime is to make sure all of your passwords follow these rules of thumb:

  • At least eight characters
  • A mix of these four types of characters: upper case letters, lower case letters, numbers, and special characters
  • Not a name, slang word, or any word in the dictionary
  • Don’t keep the same password; change it every six months
  • Have uniquely different passwords (not just slight variations of the same password) for every account and site

Monitor your financial accounts. If you shop online, use online banking, or have any personal or financial information available online, you are at risk of finance-related crimes like identity theft and fraud which Huff Post says costs the average victim $631 in out-of-pocket costs. Forbes says that one of the easiest ways to protect yourself is to monitor your credit to detect any red flags early. They recommend users set up spending limit alerts on credit cards and checking accounts to keep tabs on your balances. Automatically monitoring for suspicious activity and fraudulent accounts helps catch costly identity theft and fraud immediately.

Lockdown your smartphone. If you use your smartphone to shop, spend, socialize, and surf, your phone’s sensitive information essentially becomes a one-stop shop for cybercriminals. Forbes says if stolen or exposed to thieves, your smartphone can compromise your personal and financial information anytime and anywhere. Here’s a quick five-minute checklist from Forbes on how to properly secure your mobile phone:

  • Password-protect your phone with a complex and unique password, and set your phone so it auto-locks and never saves any passwords.
  • Enable a service with remote tracking. You can also set your phone to automatically wipe your data if your phone password is inputted incorrectly several times.
  • Turn Bluetooth off if you’re not using it. Thieves can pair their Bluetooth device with yours and hack personal information.
  • Be careful on public Wi-Fi networks where thieves can remotely access your data undetected. Only connect your phone to secure networks.
  • Before downloading any apps to your phone, always do a quick search to make sure it comes from a legitimate site or publisher. Check user reviews on sites like appWatchdog for complaints.
Related articles
  • Why you should password-protect your smartphone (ctv.ca)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

If Elvis had an iPad

If Elvis had an iPadBoingBoing brings us news of the Futulele from music app developer Amidio. What is a Futulele? Why it’s a ukulele synthesizer that combines an Apple (AAPL) iPad with an iPhone in a dedicated guitar-shaped case. The iPhone is used for chords and the iPad is used for strumming. The iOS devices are connected to each other via Bluetooth.

Amidio says it’s still looking for a hardware partner to build the case, but then there’s an app for that due out in April. Just in time to be one of the first music apps optimized for the iPad 3.

Elvis Presleyrb-

I wonder what Elvis would have thought about Can’t Help Falling In Love being played on an iOS-based jury-rigged Ukulele.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Top Wireless Predictions for 2012

Top 10 Wireless Predictions for '12 from Juniper ResearchUK-based Juniper Research published a year-end list of predictions for the mobile and wireless industry for 2012. A copy of the report can be downloaded from Juniper Research, with registration here. Are they on-target or off-the-wall?

Recession Likely to Hit Smart Device SalesRecession Likely to Hit Smart Device Sales. Juniper Research says the continued recession will hurt smartphone and tablet sales. They believe tablet sales will be hurt more than “must-have” smartphones.

They say cash-strapped consumers may opt for the lower-priced tablets. This could benefit players such as Amazon (AMZN) Kindle Fire or ARCHOS (ALJXR) ARNOVA branded devices rather than an Apple (AAPL) iPad. eReaders are most likely to be the hardest hit according to the report.

The Year of the Quad-Core Processor2012 – The Year of the Quad-Core Processor. ASUS (2357) was the first to release Quad-Core Processor. The new chip appeared n November 2011, It ran on the Eee Pad Transformer Prime with the newly launched NVidia (NVDA) Tegra 3 chip. Qualcomm (QCOM) has also added a quad-core chip to their Snapdragon line. Juniper Research expects more to come.

Quad-core processors offer improved performance and increased battery life. The performance boost comes from being able to multi-task more efficiently. It ensures that music will keep playing smoothly while the user is playing games or taking pictures. The power savings come from being able to keep those cores at a relatively low clock speed.

Quad-core processors will allow developers to add more realistic effects, getting ever closer to the elusive console-quality experience. The Tegra 3 even allows for controller support and mirroring to a 3D TV. Javascript and Flash will also run faster allowing web developers to create more graphics and script-heavy apps and pages.

Windows 8 OS to Fuel Nokia RevivalWindows 8 OS to Fuel Nokia Revival Disrupt Tablet Market.  Microsoft’s (MSFT) next OS will be compatible with both Intel and ARM architectures.  Windows 8 will run on both PC and mobile devices. The research firm believes Windows 8 will create a huge ecosystem of devices from smartphones to desktops for app developers to target. Juniper Research expects Microsoft to gain market share in the tablet space, as it replaces the non-tablet-optimized Windows 7. And, with Nokia (NOK) transitioning its existing (smartphone) and new products (likely to include a tablet) to Microsoft’s platform, the Finnish giant will be fighting back after spending several years losing market share to Google (GOOG) Android and Apple iOS devices.

High Profile Malware Attacks on Mobile Devices2012 to see High Profile Malware Attacks on Mobile Devices. There have been many malware attacks targeted at mobile devices. However, these attacks have been relatively small-scale. This is unlikely to continue. Cyber-criminals will not be able to pass up the opportunity that consumer smartphones and tablets will present. Juniper Research anticipates that 2012 will see several high-profile, international attacks on various mobile OSs. Consumers at large must bed aware of the pressing need to protect their smart devices by installing security software.

Cloud Mobility to Drive Collaborative CommunicationsCloud Mobility to Drive Collaborative Communications – The BYOD trend driven by the consumerization of enterprise IT will increase according to the research firm. Specifically, Juniper Research believes that 2012 will see a substantial increase in the number of enterprises moving to develop and deploy mobile-centric, social business strategies.

Other predictions from Juniper Research include:

  • The London 2012 Olympics will boost mobile advertising and M-Gambling, and kickstart NFC.
  • Mobile Coupons to drive the mCommerce market despite economic stagnation.
  • MEMsaccelerometers and gyroscopes to transform the sensor market for mobile devices.
  • Social Gaming will become a major mobile play with the introduction of synchronous gaming.
  • Online, Mobile and Physical will begin to fuse into one retail market.

 rb-

I’ll come back to these predictions at the end of the year and see which predictions were on target or off in space somewhere.

Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.