CompuBlab

If it's computer related, we'll blab about it!

Author: Peter Lee

Dropbox and Online Storage

If you are a user of an online storage facility like DropBox or one of the many others, have you considered the security ramifications of what you are doing?

Today, computing “in the cloud” is a big buzzword (that should probably be “buzzphrase”). Cloud computing, in its simplest form, is just a fancy way of saying that your computing resources are coming from someone else. Online storage and backup services have been around for a while, and I have been amazed at how people have not understood all of the impact of storing data online.

Perhaps the most important thing I want to make certain you consider is exactly WHAT information are you putting on someone else’s servers. Is it just pictures, or school projects, or other items not of great importance to anyone but you? Then you are fine. But what if you are storing files related to your banking, or tax returns, or other sensitive information? Here you might want to give pause for storing such information “in the cloud.”

You see, no matter what these companies tell you, computer security is still in its infancy. These companies may tout that they use “encryption” methods (that is, they “scramble” your data in such a way that hopefully only THEY can recover the original data at a later time) to hide your data…but what they don’t tell you is that encryption is not “fool-proof” protection. In addition, when you put your data on someone else’s servers, you have to also hope that the company who is hosting your data screens its employees very carefully. Encryption doesn’t mean diddly if the company’s employees are not properly screened and are given access to both your data and the encryption algorithms used to protect it.

I am not saying that online storage is not to be trusted…I am saying that you need to be made aware of the risks of putting your data online. If you choose to put your data online and you have an understanding of the risks and accept them, then this is a good thing.

KNOWLEDGE is your best weapon against bad outcomes with computing…and knowledge is what I hope to impart to you. Do not assume, just because your data is encrypted that it cannot be read. It makes it more difficult to be read, but there are ways of breaking encryption. If you need proof of this, just follow the tech news for a few weeks and you’ll see how many security violations are being reported in the news on a weekly basis. Encryption is good…but by itself it is not, in my opinion, sufficient to protect your data.

The best security for data is to not have the data accessible to those who might try to gain access to it. Tax return information stored on a CD in your home is much harder for a hacker in another country to gain access to than data you have uploaded to an online storage facility.

Don’t get me wrong…I am not saying “never use online storage”…I am only saying be very aware of WHAT you are storing there…and know the risks. Life is not without risks. The important thing is that we identify the risks and choose for ourselves what risks are worth taking and what risks we choose to avoid.

Knowledge is the key, my friends, and that knowledge will set you free!

More RAM is Better

A quick note for those of you who are contemplating buying a new computer…

Many times we are entranced by a salesman or a spiffy advertisement to spend a little extra money to go for that slightly faster processor than we originally planned. Well guess what? A computer’s performance can be degraded by many things…not all of which have anything to do with the processor.

In technical terms, we describe these different bottlenecks as “I/O bound” or “CPU bound”. What do these mean? The layman’s description for these terms has to do with what part of your computer is “standing around waiting for something to do.”

An I/O bound process means that your input/output hardware (things like your networking, hard disk drive access, etc.) is going as fast as it can (being utilized 100%) while your processor is standing around waiting for your I/O subsystems to fetch what it needs so it can do its work. In cases like this, that extra money spent on the faster processor is pretty much wasted.

A CPU bound process means that your CPU is working as fast as it can (being utilized at 100%) while your I/O subsystems are waiting for your CPU to give them more work to do. In THESE cases, the shelling out of more money for a faster CPU would make a difference.

But here is the kicker: More often than not, processes are I/O bound…NOT CPU bound! That is, more often than not, your processor is more than fast enough to do what you want…it is the rest of the Input/Output subsystems that cannot keep up!

So what’s a guy or gal to do to get the biggest computing “bang” for his or her computing “buck?” Well, it turns out that MOST of the time, adding additional memory (RAM) decreases I/O bottlenecks…and fortunately for you, RAM memory is a cheap component to increase.

So why would memory (RAM) help with Input/Output intense programs? Well, it has to do with how your computer uses RAM memory.

You see, RAM memory is the “fast” electronic memory your computer uses to hold running programs and their data. This is some of the fastest memory on your computer, and so it is a vital resource when it comes to your system’s performance. Due to some advanced memory techniques (known as virtual memory), when your computer runs short on this fast RAM memory, it starts to use your hard disk (in the form of a “swap file”) as additional RAM memory. The good news about this is that it lets you run more programs that you otherwise could. The bad news is that when your computer begins to use the hard disk in place of RAM memory, things slow WAY down (because a hard drive is MUCH slower than electronic memory).

The solution, you see, is to add more RAM!

Sadly, it has been my experience that most computer vendors today sell computers with far too little RAM. They will sell you a computer with FOUR processors (a quad-core computer) and not enough memory to hold just the operating system (like Windows) plus a complex program (like some of today’s newest games). Fortunately, adding memory today is pretty cheap, and is something with just a small amount of care you can do yourself.

This information that I have presented here holds true for most computing uses. However, there is one field of home computer use that needs more information, and that is the field of hard-core gaming.

Today’s latest computer games (the really graphics-intensive games) rely very heavily on the ability of the graphics card to perform countless computations in order to create a visual experience that rivals real life. If you are a person that is in to such games, then performance problems can also be related to your graphics card (for the non-gamer…the graphics card is rarely a problem). Even here, you have to be careful about buying a suped-up high-performance graphics card and then not giving your computer enough RAM memory to keep from getting bogging down.

I’m not going to go into a detailed discussion of video cards and gaming in this post, as it has already become rather lengthy. I may take that up in another post. But for now, just know that many times you can get better computer performance by adding one or two additional gigabytes of RAM than by spending the money for a faster processor.

Khan Academy

Today I added a link to the Khan Academy’s website (see links under “Education”). The Khan Academy is run by Salman Khan and makes available to the public over 2100 online training videos. These videos are heavy in math, but there are also other subjects covered such as Banking, Biology, Chemistry, Economics, and more. He began making math videos for family members who were struggling in school, and over time it just sort of snow-balled from there.

I am linking to his site because I have personally sat through several of Salman’s videos, and I have to say they are of a very high quality, and in my opinion, worth your time to watch.

Regarding his math-focused videos, the videos start as simple as basic arithmetic and range through advanced calculus. His videos are not “dry,” but rather are very engaging, and he has a gift for making information very straight forward and understandable to the common man. Every so often he includes videos where he does nothing but work out problems related to subjects that he recently covered. Because he doesn’t leave out steps when solving these problems, students of ANY level can follow along.

Best of all, Salman has made ALL of these videos available FOR FREE.

No, neither I nor CompuBlab get any compensation for singing the praises of or directing traffic to his site. I am linking to the Khan Academy for no other reason than I think it is a WONDERFUL resource and I want to make as many people aware of it as possible.

So go over and see what Salman has done. If you like his work, be sure to spread the word. In my opinion, Salman Khan has demonstrated a great application of technology.

SecureID by RSA Hacked!

Some very unsettling news about Secure ID tokens. Don’t know what a SecureID token is? Perhaps you have one but don’t know it by name.

A SecureID token is a small little device that can fit on your keychain. It is used as an extra layer of protection for when you log into a computer system. You see, the SecureID Token displays a number that changes every so many seconds. Through some computer trickery, the computer you are trying to log into (that is set up to use a SecureID Token) can calculate the SAME number that your SecureID Token is currently displaying. The theory behind this is that if someone manages to get a hold of your User ID and Password, they STILL cannot gain access to your account with the SecureID Token number…which presumably only YOU have in your possession.

Well, that entire game just changed,

You see, RSA, the company that makes the SecureID Token, reported recently that there was an intrusion/break in/hack into THEIR computer systems, and the hackers were able to steal enough information to be able to figure out what the SecureID Token number should be for a person’s SecureID Token…effectively rendering your SecureID Token useless (click here for the original story).

Now, the thing you need to understand about system security, and the thing you are going to read from me over and over again, is that there is no such thing as a completely secure computer system. The best you can hope for is to keep the amateurs away from your data, and to give the professionals a reason to go look elsewhere for the jollies (because your data is going to be so hard to crack). Of course, some hackers relish a challenge, so you have to be careful even there.

But the overall point here is that you may be able to protect your data for a while…but eventually, given enough time, hackers WILL be able to compromise your data if they have any way of actually reaching it. Of course, if your data is not accessible from the Internet, then the only way for them to steal your data is to physically enter your premises to do so.

So as far as computer security goes, I think of it the way my parents taught me to think about car thieves. We lock our doors to keep the pranksters away and to try to encourage amateurs to find another car to steal…one that is easier to break into. However, if a professional REALLY wants your car, there is virtually NOTHING you can do to stop them.

So if you have an RSA SecureID Token, be sure to get it replaced right away! The article that I liked to previously already tells of people havingt had their accounts broken into based upon what the bad guys learned from their hacking into the RSA network.

You have been warned!

Where to Begin?

Ahhh…the start of a blog. Where do I begin? Certainly not by telling you WHY I am writing this blog. That is already available on the About Us page. I guess to let you know that I have been giving though to the content of this blog for some time, and I am every so glad that the day has arrived where I can begin to add content.

So sit back…relax…and prepare for a ride!

Page 7 of 7

Powered by WordPress & Theme by Anders Norén