Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

A Quick Reco..

I sometimes “joke” when asked about computer/Internet security (I find it appalling how naive the average computer user is about “hackers” and “virus”-es) by answering, “if you knew what I knew, you wouldn’t use the Internet.”

Of course that answer isn’t realistic. The Internet has become an integral part of our lives. And it’s true enough: good folks are dedicating their time and talents attempting to make it somewhat secure – a reactive game of playing ‘catch up.’ (You see, our machines, and the Internet, were not originally designed with security in mind at all.. nor with the idea that all of us would use it..)

For those with an interest in such things as “InfoSec”, I have an quick reading reco today. 2012 Will Be The Year Of The…

Much to the embarrassment of several large corporations, last year saw some of the most impactful compromises in the history of the Internet, with companies’ digital dirty laundry dragged out in full view of competitors and the general public. Many companies hurried to find a new two-factor authentication solution, gamers were left wondering who now had their identities, and Lulzboat became part of the common lexicon. But what will 2012 offer in the big, bad world of the advanced threat?”  Read more..

Also.. a real book, book: Loyal readers may remember my mention.. I recently was handed a copy of Mark Bowden’s Worm – the First Digital World War.

“Worm” is about the potentially diabolical piece of computer malware known as Conficker and the efforts of cybersecurity experts to hunt it down…”

I took me a few hours to read, and though most of it was simple review for me, I think for the average person, it would give them a real (and valuable) education ..  How those magic “computer thingies” and that mystic “Internet” voodoo stuff actually works.

Maybe your library has a copy?

(Yes.. there’s some scary stuff in there.. but better that you know it, right? [Though, I understand the “ostrich method” has benefits too..].)
I thought his description of how the Internet came to be (and also, hackers) was particularly well done.

Want more? China Not The U.S.’s Only Cyber-Adversary

China long has been the focus of U.S. authorities and security researchers as a major source of cyberespionage against the U.S., but potential new evidence of targeted attacks by India against the U.S. demonstrates just how widespread cyberspying might be.Read more..

Today’s quote:Soon silence will have passed into legend. Man has turned his back on silence. Day after day he invents machines and devices that increase noise and distract humanity from the essence of life, contemplation, meditation…tooting, howling, screeching, booming, crashing, whistling, grinding, and trilling bolster his ego. His anxiety subsides. His inhuman void spreads monstrously like a gray vegetation.” ~ Jean Arp

Copyright 2007-2011 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


January 12, 2012 Posted by | Internet, security | | 4 Comments