{"id":9378,"date":"2016-03-17T14:47:20","date_gmt":"2016-03-17T14:47:20","guid":{"rendered":"https:\/\/forumarchives.tmsites.net\/index.php\/2016\/03\/17\/technical-advice\/"},"modified":"2016-03-17T14:47:20","modified_gmt":"2016-03-17T14:47:20","slug":"technical-advice","status":"publish","type":"post","link":"https:\/\/forumarchives.tmsites.net\/index.php\/2016\/03\/17\/technical-advice\/","title":{"rendered":"Technical advice"},"content":{"rendered":"<p><!-- Original Post Content --><br \/>\nIn this thread, I&#8217;m going to tell you about a couple of easy practices you can use to keep you and your family safer on the internet. <\/p>\n<p>\t<strong>oh yeah? why should we listen to you?<\/strong><br \/>\n\tI&#8217;ve been a career IT guy since 1991, where as a kid I was an early tech support phone jockey for a psychology billing software company. Since then, I rose in the ranks, starting with my dream job: network administrator at Williams Pinball. This led to a position that eventually was a pretty big network management position in WMS, the slot manufacturer (same company). I then left WMS to work with Obama&#8217;s campaign in Chicago in May 2007 and was one of the senior technical leads on that team. I&#8217;ve been under serious exposure and threat, and have made all the mistakes. I&#8217;ve since built worldwide network infrastructures, data centers, run infrastructures supporting tens of thousands of people.<br \/>\n\t<em><span style=\"font-size: 185px\">I know this is liable to start a political conversation, but that&#8217;s really not my intent here. I&#8217;m happy to do that in other threads, but I only mention this so you know the kind of risk I was exposed to for long periods of time.<\/span><\/em><\/p>\n<p>\tSecurity is about being a little harder to hack than the next person. You don&#8217;t have to do much. This book is the best easy read I&#8217;d recommend on the topic: <a href=\"http:\/\/www.dereferer.org\/?http%3A%2F%2Famzn%2Eto%2F1UCHsTa\">http:\/\/amzn.to\/1UCHsTa<\/a><\/p>\n<p>\t<strong>Haha, I tricked you!<\/strong><br \/>\n\tIf you clicked that link, I could have stolen your stuff. If you hover over it, you&#8217;ll see in the lower-left corner of your browser that I have a different URL than the one you&#8217;re clicking. Luckily, I&#8217;m on your side and I&#8217;m only sending you to a place that hides this site from Amazon on the other end. But this is how a &quot;bad actor&quot; can get you: by spoofing something innocent-looking to get you to click.<\/p>\n<p>\t<strong>OpenDNS to the rescue<\/strong><br \/>\n\tThis is one of the original services of its kind: OpenDNS provides a service that is essentially &quot;phone book lookups&quot; for the internet. If you type &quot;www.yahoo.com&quot; in your browser, where is that, at what address? That&#8217;s what the DNS, or  <a href=\"http:\/\/www.dereferer.org\/?https%3A%2F%2Fen%2Ewikipedia%2Eorg%2Fwiki%2FDomain%5FName%5FSystem\">Domain Name System<\/a>, service does.<\/p>\n<p>\tOpenDNS does a few key things that help you: [list][*]sanitizing the DNS that you use when you click stuff in your browser or use apps on your phone. If you click some fake link to some fake bank page designed to steal your information, they&#8217;ll block it and tell you.[\/*][*]<em>caching<\/em> which is lumping together absolutely everyone&#8217;s queries into a big, fast, ready-to-use state so we all share performance. Quicker DNS means that everything moves more smoothly.[\/*][*]This also gives you an opportunity to implement stricter controls, e.g. parental controls over pornography and such, should you want that kind of control.[\/*][\/list]This is <a href=\"http:\/\/www.dereferer.org\/?https%3A%2F%2Fstore%2Eopendns%2Ecom%2Fsetup%2F%23%2Ffamilyshield\">easy to implement<\/a> and inexpensive &#8211; basic functionality and safety is free. <a href=\"http:\/\/www.dereferer.org\/?https%3A%2F%2Fwww%2Eopendns%2Ecom%2Fhome%2Dinternet%2Dsecurity%2F\">Check it out here<\/a>.<br \/>\n\tThey&#8217;re not the only game in town: there are other filtering services, this is one that&#8217;s worked well for me over the years. <\/p>\n<p>\tThis is a really nice thing to do for gramps\/nana\/ma\/abuela\/auntie who isn&#8217;t really technical and can&#8217;t use that stuff etc. They won&#8217;t know it&#8217;s there, but it will protect them for nothing if you put in ten minutes&#8217; effort. The same goes for AirBnB\/HomeAway or bed and breakfast type places you stay: I will break into their router and set up OpenDNS and everyone suddenly thinks &quot;the internet got faster&quot;.<\/p>\n<p>\t<strong>username: berto<br \/>\n\tpassword: godimtiredofthis<\/strong><span style=\"font-size: 185px\">passwords suck.<\/span> passwords suck. Passwords SUCK!<br \/>\n\tI use a great service called <a href=\"http:\/\/www.dereferer.org\/?https%3A%2F%2Flastpass%2Ecom%2F\">LastPass<\/a>, which is used by means of a plugin on your web browser, a phone app and a web site that houses all your passwords. It has a few great advantages.[list][*]It sits in the background while you surf, and helpfully grabs when you log on to something and saves it. Next time you&#8217;re logging on there, it fills it in for you.[\/*][*]It also remembers when you fill out a form with your name and address, and the next time you can use Lastpass to autofill that. <em>You save a remarkable amount of time never typing (or mistyping!) your name and address ever again<\/em>[\/*][*]once you get used to using it, you can generate passwords that are random and whatever length the website asks for.[\/*][\/list]<br \/>\n\t<u>Bottom line on passwords is this<\/u>: while they suck, they are a <em>terrific<\/em> way to be a little harder to crack than your neighbor. Using a manager like Lastpass (or <a href=\"http:\/\/www.dereferer.org\/?https%3A%2F%2Fagilebits%2Ecom%2Fonepassword\">1Password<\/a> &#8212; there are others, I&#8217;m only including my favorite) really makes it easy to keep very complex passwords. Only having to remember a couple passwords: [list][*]my phrase I use to get into LastPass: something hard to type and nobody else would know it, but easy for me.[\/*][*]my eight character, minimally compliant password that I use to log on at work. Complex so you guard against a brute-force attack, but something I can type over and over all day to get through the day, like my signature, so it has to &quot;feel&quot; easy to type.[\/*][*]My Apple ID password for my iPhone. I need this because it needs to be typed on the phone itself, and it&#8217;s complex and meaningless, but easy to hammer out on the screen.[\/*][\/list]<br \/>\n\t<br \/>\n\t<strong>The Network Swiss Army Knife<\/strong><br \/>\n\tWhen you &quot;can&#8217;t connect&quot; or &quot;things are slow&quot;<br \/>\n\tThis is a catch-all way to test internet connectivity. Mac, use Terminal. Windows, use cmd. <br \/>\n\t&quot;ping&quot; is a <a href=\"http:\/\/www.dereferer.org\/?https%3A%2F%2Fen%2Ewikipedia%2Eorg%2Fwiki%2FPing%5F%28networking%5Futility%29\">clever little utility<\/a>, sort of like <a href=\"http:\/\/www.dereferer.org\/?https%3A%2F%2Fen%2Ewikipedia%2Eorg%2Fwiki%2FSonar\">sonar in the naval sense<\/a>, used for echo-location of ships.<br \/>\n\t<img decoding=\"async\" src=\"http:\/\/i.imgur.com\/oNFrzbBl.png\" alt=\"\" \/><br \/>\n\t<strong>4.2.2.2<\/strong> is the internet address, or IP address, of a DNS server (explained a bit above). It&#8217;s just easy to type &amp; remember. What you see above is success &#8212; you get replies. If you see &quot;Request Timed Out&quot; or other, more onerous messages, you have a problem. <a href=\"http:\/\/www.dereferer.org\/?https%3A%2F%2Fyoutu%2Ebe%2Fnn2FB1P%5FMn8\">Have you turned it off and on again<\/a>?<br \/>\n\tIf it&#8217;s slow, run a speed test.<br \/>\n\tif you use <a href=\"http:\/\/www.dereferer.org\/?http%3A%2F%2Fwww%2Espeedtest%2Enet%2F\">SpeedTest<\/a> and don&#8217;t get the results you want, there&#8217;s a very nerdy tool made by the folks at <a href=\"http:\/\/netalyzr.icsi.berkeley.edu\/\">Cal Berkeley<\/a>. This is a terrific resource for all-in testing of what&#8217;s set up and at least giving you Google Search terms you can use to fix whatever ends up in red. This is a Java-based tool, so you may need to use Internet Explorer (Windows) or Safari (Mac) to get it to run &#8212; Chrome has trouble with Java.<br \/>\n\texample: <br \/>\n\t<img decoding=\"async\" src=\"http:\/\/i.imgur.com\/VNRKIIQh.png\" alt=\"\" \/><\/p>\n<hr>\n<h3>Replies:<\/h3>\n<div class=\"migrated-reply\" style=\"border: 1px solid #eee;padding: 15px;margin-bottom: 15px;border-radius: 5px\">\n<p><strong>Posted by:<\/strong> Berto on March 17, 2016, 2:49 pm<\/p>\n<div><strong>Security assessment<\/strong><br \/>\n\tI&#8217;m going to open this thread by sharing a piece of the book I reference above. These are five questions, and some paraphrased commentary, that allow you to assess any security decision you make.<\/p>\n<p>\t<img decoding=\"async\" src=\"http:\/\/i.imgur.com\/1QWPdzkl.png\" alt=\"\" \/><img decoding=\"async\" src=\"http:\/\/i.imgur.com\/E7nFVLal.png\" alt=\"\" \/><\/p>\n<p>\tFor me, this book was wisdom &#8212; this is in the first few pages. This is so simple and yet so powerful, and you almost do it innately. You <em>just know<\/em> that dark alley isn&#8217;t the one to walk down. You don&#8217;t flash a lot of cash. You assess a lot of security\/safety trade-offs: you might get there faster if you speed, but you also might kill somebody.<\/p>\n<p>\t<strong>Security as a balance<\/strong><br \/>\n\tI had a CEO of a billion-dollar public company call me into his office. He loomed over me and then sat back on his desk, at ease. &quot;Rob,&quot; he said, smiling confidently. &quot;I want you to take care of this information security problem, so we can put it behind us.&quot;<br \/>\n\tI blanched.<br \/>\n\t&quot;Sir, it never goes away. It&#8217;s an ongoing situation. It&#8217;s basically an arms race.&quot;<br \/>\n\tI trail off. It was a scary moment. I couldn&#8217;t lie to the guy, because all you can do is <em>add acceptable trade-offs<\/em> that make you safer, or more secure. The cost-benefit analysis and balance should be being calculated all the time.<\/p>\n<p>\t\ud83d\ude08 <strong>Fear<\/strong> \ud83d\ude08<br \/>\n\tIt&#8217;s cliche, but Roosevelt had it right: fear really is the enemy; it&#8217;s the enemy of rational decision making. It&#8217;s not bad to explore fears, to assess your own reaction to them, to think out possible solutions or even just to explore the feelings so you feel more prepared. It&#8217;s dwelling on them, letting them lead decisions and guide policy: that&#8217;s bad.<\/p>\n<p>\tWhat I have discovered over the years is this: fear sells<br \/>\n\tIf I can get you scared, I can sell you a security solution to make you feel better. The converse is that any time you&#8217;re buying anything in that space, <em>caveat emptor<\/em> to the fear they&#8217;re protecting against. Any good sales person is going to amplify the risks. What the above <em>Five Questions<\/em> give you is a rational framework to assess security that subtracts for fear.<\/div>\n<\/div>\n<div class=\"migrated-reply\" style=\"border: 1px solid #eee;padding: 15px;margin-bottom: 15px;border-radius: 5px\">\n<p><strong>Posted by:<\/strong> Berto on March 17, 2016, 4:43 pm<\/p>\n<div><strong>Backup and Recovery<\/strong><br \/>\n\tYou&#8217;re sweating but you&#8217;re also cold, not shaking but you feel like you could be. You just wanted to get some of those cute baby photos you&#8217;d taken of your nephew for your sister, and the computer&#8217;s making a funny noise! You swear inwardly and hope against hope that you can fix this. C&#8217;mon, cmon&#8230; <span style=\"font-size: 185px\">oh jeez, this isn&#8217;t good<\/span><\/p>\n<p>\tStuff happens. So it goes. Data falls into the bit bucket and it&#8217;s sad.<br \/>\n\t<a href=\"http:\/\/www.dereferer.org\/?http%3A%2F%2Fon%2Etoday%2Ecom%2F1WuYNwc\">here&#8217;s a pretty good interview<\/a> on a &quot;worst case scenario&quot;.<\/p>\n<p>\tThis is a &quot;Smokey the Bear&quot; situation. Only you can protect your own data. Back that stuff up!<br \/>\n\t<a href=\"http:\/\/www.dereferer.org\/?http%3A%2F%2Fwww%2Ecode42%2Ecom%2Fcrashplan%2F\">CrashPlan<\/a> has a pretty good name. I use a service called Mozy, but I think it&#8217;s expensive.<\/p>\n<p>\tIf you&#8217;re paranoid, <a href=\"http:\/\/www.dereferer.org\/?https%3A%2F%2Fspideroak%2Ecom%2F\">Spider Oak<\/a> is a pretty good cloud file service. They allow you fundamental control of the keys used to encrypt your data (Dropbox, Google etc. do that for you, but you&#8217;re trusting them to handle it).<\/p>\n<p>\tTreat it like your taxes, or do it when the time changes. Spend time making sure your backups are sucking up everything. Ask yourself about getting particularly important pieces back (photos, finance, work) and test that you could if you had to. It&#8217;s more effort than changing the fire alarm battery, but it saves you heartbreak.<\/p>\n<p>\t<strong>The Cloud<\/strong><br \/>\n\tThis topic: data integrity, will become less and less relevant. You use Google, Yahoo or whatever for email, can put all your docs in the cloud, and with Dropbox backing up stuff you make yourself, it should all be stored forever. I use <a href=\"http:\/\/www.dereferer.org\/?https%3A%2F%2Fevernote%2Ecom%2F\">Evernote<\/a>, which is a great notebook app that works on every possible platform. Wish you had that thing you&#8217;d written down? Well, put it all in Evernote and it&#8217;s everywhere.<br \/>\n\tI&#8217;ll give you two of my use case examples.<br \/>\n\t1. my travel checklist<br \/>\n\t<img decoding=\"async\" src=\"http:\/\/i.imgur.com\/8vc52qvl.png\" alt=\"\" \/><br \/>\n\tI&#8217;m a terrific business traveler because of this thing. I duplicate it, adjust it to suit my trip and relax because I know once everything&#8217;s checked off (or crossed out), I&#8217;m ready to go.<br \/>\n\t2. appliance and other manuals<br \/>\n\twhen I find a PDF for a manual that I like, I put it in my &quot;Manuals&quot; notebook.<br \/>\n\t<img decoding=\"async\" src=\"http:\/\/i.imgur.com\/Y2M36T9h.png\" alt=\"\" \/><\/p>\n<p>\t<img decoding=\"async\" src=\"http:\/\/i.imgur.com\/ly9zGhgh.gif\" alt=\"\" \/><img decoding=\"async\" src=\"http:\/\/i.imgur.com\/ly9zGhgh.gif\" alt=\"\" \/><img decoding=\"async\" src=\"http:\/\/i.imgur.com\/ly9zGhgh.gif\" alt=\"\" \/><strong>Shut up, berto. You talk too much.<\/strong><img decoding=\"async\" src=\"http:\/\/i.imgur.com\/ly9zGhgh.gif\" alt=\"\" \/><img decoding=\"async\" src=\"http:\/\/i.imgur.com\/ly9zGhgh.gif\" alt=\"\" \/><img decoding=\"async\" src=\"http:\/\/i.imgur.com\/ly9zGhgh.gif\" alt=\"\" \/><br \/>\n\tOk, agreed. Let me know if you have questions, or berate me via PMs because this is uninteresting.<\/div>\n<\/div>\n<div class=\"migrated-reply\" style=\"border: 1px solid #eee;padding: 15px;margin-bottom: 15px;border-radius: 5px\">\n<p><strong>Posted by:<\/strong> Eyez on April 12, 2016, 2:11 am<\/p>\n<div>Sure is a lot of stuff in here &#8230; thanks for taking the time to write this up, actually gives me something to think about, especially the password app, and backing up of files.  I&#8217;m sure I will be back to read this a few more times!!!<\/p>\n<p>\tI&#8217;ve never used any of the back up services such as the cloud, but should really consider an external drive or something.  Not that I really have much to hide, but there are some things that I don&#8217;t want to lose, and don&#8217;t want to necessarily be gotten out due to a hack on those systems.<\/p><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In this thread, I&#8217;m going to tell you about a couple of easy practices you can use to keep you and your family safer on the internet. oh yeah? why should we listen to you? I&#8217;ve been a career IT&#8230;<\/p>\n","protected":false},"author":157,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[],"class_list":["post-9378","post","type-post","status-publish","format-standard","hentry","category-coffee-chat-lounge"],"_links":{"self":[{"href":"https:\/\/forumarchives.tmsites.net\/index.php\/wp-json\/wp\/v2\/posts\/9378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forumarchives.tmsites.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forumarchives.tmsites.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forumarchives.tmsites.net\/index.php\/wp-json\/wp\/v2\/users\/157"}],"replies":[{"embeddable":true,"href":"https:\/\/forumarchives.tmsites.net\/index.php\/wp-json\/wp\/v2\/comments?post=9378"}],"version-history":[{"count":0,"href":"https:\/\/forumarchives.tmsites.net\/index.php\/wp-json\/wp\/v2\/posts\/9378\/revisions"}],"wp:attachment":[{"href":"https:\/\/forumarchives.tmsites.net\/index.php\/wp-json\/wp\/v2\/media?parent=9378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forumarchives.tmsites.net\/index.php\/wp-json\/wp\/v2\/categories?post=9378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forumarchives.tmsites.net\/index.php\/wp-json\/wp\/v2\/tags?post=9378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}