Wednesday, August 12, 2009

“Vanish” Uses BitTorrent to Make Data Disappear





Encrypts messages with a secret key and then distributes pieces of it across random nodes so that as peers leave the swarm it gradually degrades over time, allowing users to regain control over data stored on the web like Facebook PMs, e-mails to others, and even simple posts.

Researchers at the University of Washington have a created a way to automate encryption key expiration, which means data can become inaccessible over a given period of time.

It’s called Vanish and it creates a secret key to encrypt a user’s data, breaks the key into many pieces and then sprinkles the pieces across random nodes in the Distributed Hash Table (DHT) provided by the popular Vuze BitTorrent client. As machines constantly join and leave the swarm, the pieces of the key gradually disappear. By default it supports data timeouts of 8-9 hrs, though they say longer timeouts are possible.

“Data persists for much longer than users expect or want,” they note in emphasizing importance of Vanish. “This is especially true as more and more data gets stored on the web and in the cloud, archived by third parties, or just stored on random backup tapes.”

The researchers say Vanish is important in today’s Web-centered world because a “users’ sensitive data can persist “in the cloud” indefinitely (sometimes even after the user’s account termination.” By using Vanish you can regain control over the lifetime of things like Facebook PMs, Google Docs, e-mails, etc..

It can also complicate efforts by authorities or other parties to subpoena sensitive data.

“Computing and communicating through the Web makes it virtually impossible to leave the past behind,” they add. “College Facebook posts or pictures can resurface during a job interview; a lost or stolen laptop can expose personal photos or messages; or a legal investigation can subpoena the entire contents of a home or work computer, uncovering incriminating or just embarrassing details from the past.”

The overarching benefit of using Vanish is that it lessens the risks of sensitive data being exposed. A PM or e-mail from years past doesn’t have to resurface to the embarrassment of yourself or others.

Overall it’s pretty useful to have. The only downside is that the people you communicate with have to also have Vanish installed so that they can decrypt your messages.

It’s available as a Firefox plugin.

Watch the screencast for more info…..

Thursday, August 6, 2009

Gmail flaw shows value of strong passwords

By Becky Waring

The disclosure of a back door allowing bad guys to repeatedly guess Gmail passwords should remind us all to protect our accounts with long and strong character strings.

There's a straightforward way to protect your online accounts — use signin phrases that are easy for you to remember but hard for others to guess.

The latest vulnerability affecting Gmail accounts was recently revealed by security researcher Vicente Aguilera Díaz in a posting on the Full Disclosure security list. (Aguilera previously revealed a Gmail flaw known as session-riding, which Google subsequently fixed, as reported by WS contributing editor Scott Spanbauer on April 23 and May 7.)

According to Aguilera's new security alert, Google allows anyone with a Gmail account to guess another Gmail user's password 100 times every two hours, or 1,200 times per day. No "captcha" keeps hacker bots from guessing passwords in this way. Worst of all: If a hacker controls, say, 100 Gmail accounts, 120,000 guesses can be made per day. Because Gmail accounts are free, many hackers control far more than 100 accounts, of course.

To its credit, Gmail requires fairly long passwords of 8 characters or more. However, as Aguilera points out, Gmail allows users to create extremely weak passwords such as aaaaaaaa.

A quick survey of my friends and relatives revealed that not one of them uses strong passwords. Most people have no idea how to create them. Yet everyone I asked expressed guilt at using easy-to-crack passwords: pet names, birthdays, and common dictionary words.

Most people's passwords could be guessed in far fewer than 10,000 attempts. And, despite using weak passwords, the people I interviewed say they rarely change their signin strings. (One-third of the people surveyed use the same password for every Web site they sign in to, and the infamous Conficker worm needed to try only 200 common passwords to break into many systems, according to an analysis by the Sophos security firm.)

Here's the topper: many respondents to my informal survey admitted to keeping an unencrypted file on their systems that lists every password they use!

You may not think the password to your webmail account is valuable. But anyone with access to your account can use it to send spam and ruin your online reputation. More seriously, you may have entered the same password at an online banking site, such as PayPal, or a site where your credit-card number is stored for easy ordering, such as Amazon.

Use tough passwords but make them easy to recall

You can see whether your current passwords — you do use more than one, right? — are rated "strong" by using Microsoft's online Password Checker. I bet you'll be unpleasantly surprised by the results.

Microsoft's Password Checker
Figure 1. Test the strength of your passwords by entering them in Microsoft's Password Checker.

The three keys to strong passwords are length, randomness, and use of different types of characters. Each additional character multiplies the potential combinations a brute-force attack must try.

Random passwords use upper- and lower-case letters, numbers, and symbols. When at least three of these four categories are used, an eight-character password should suffice in most instances. According to the FrontLine security site, such a password would take a century or more to crack by a hacker using a single PC. The eight-character standard is also the minimum the Microsoft Password Checker deems "strong." Of course, the more characters in your password, the safer you'll be.

If you wish to create your own password, use a sentence or phrase you can recall easily and then tweak it for each account.

For example, start with the phrase "all good things come to those who wait." Then take the second letter of each word — or the only letter in the case of single-character words — to yield lohoohha. Then use upper case for every other consonant and substitute numerals or punctuation for certain vowels: loHooHh@.

(Never use any password-creation system you've read in a book or on the Web, including the example in the preceding paragraph. The password crackers read these articles, too.)

You can be as creative as you want with your rules. The goal is to produce a random-seeming combination of letters, numbers, and special characters — one generated by a set of rules you can remember and recreate.

Next, add a few characters denoting the site or the account for which the password is required. For example, you could add the first three letters of the site URL to the beginning, middle, or end of your base password, but five letters later in the alphabet, so "ama" for Amazon.com becomes frf.

By this time, you'll likely have a password that's at least 8 to 16 characters long and fairly random-looking — strong by any measure. When you need to change a password, keep the same rules and change just the base phrase.

Dos and don'ts to keep your passwords safe

Now that you know how to create strong passwords, follow these ten tips for using and protecting them.

* DO use a password manager such as those reviewed by Scott Dunn in his Sept. 18, 2008, Insider Tips column. Although Scott focused on free programs, I really like CallPod's Keeper, a $15 utility that comes in Windows, Mac, and iPhone versions and allows you to keep all your passwords in sync. Find more information about the program and a download link for the 15-day free-trial version on the vendor's site.

Callpod Keeper password manager
Figure 2. Callpod's Keeper password-management utility lets you sync passwords between Windows and Mac PCs and iPhones.

* DO change passwords frequently. I change mine every six months or whenever I sign in to a site I haven't visited in long time. Don't reuse old passwords. Password managers can assign expiration dates to your passwords and remind you when the passwords are about to expire.

* DO keep your passwords secret. Putting them into a file on your computer, e-mailing them to others, or writing them on a piece of paper in your desk is tantamount to giving them away. If you must allow someone else access to an account, create a temporary password just for them and then change it back immediately afterward.

No matter how much you may trust your friends or colleagues, you can't trust their computers. If they need ongoing access, consider creating a separate account with limited privileges for them to use.

* DON'T use passwords comprised of dictionary words, birthdays, family and pet names, addresses, or any other personal information. Don't use repeat characters such as 111 or sequences like abc, qwerty, or 123 in any part of your password.

* DON'T use the same password for different sites. Otherwise, someone who culls your Facebook or Twitter password in a phishing exploit could, for example, access your bank account.

* DON'T allow your computer to automatically sign in on boot-up and thus use any automatic e-mail, chat, or browser signins. Avoid using the same Windows signin password on two different computers.

* DON'T use the "remember me" or automatic signin option available on many Web sites. Keep signins under the control of your password manager instead.

* DON'T enter passwords on a computer you don't control — such as a friend's computer — because you don't know what spyware or keyloggers might be on that machine.

* DON'T access password-protected accounts over open Wi-Fi networks — or any other network you don't trust — unless the site is secured via https. Use a VPN if you travel a lot. (See Ian "Gizmo" Richards' Dec. 11, 2008, Best Software column, "Connect safely over open Wi-Fi networks," for Wi-Fi security tips.)

* DON'T enter a password or even your account name in any Web page you access via an e-mail link. These are most likely phishing scams. Instead, enter the normal URL for that site directly into your browser, and proceed to the page in question from there.

Following these tips will help you keep your personal data safe online.

Friday, July 31, 2009

The Command Prompt.

Us old school types still call this the DOS prompt or DOS shell but everyone has probably seen the infamous black box with that malignant flashing cursor, waiting for you to enter some obscure command to work your sorcery.

In reality the command prompt isn’t that bad if you just read instructions carefully and know some of the secrets. To open a command prompt click Start and Run and type “cmd” and click OK or hit Enter. As usual, the quotes are for separation only and should not be typed. For a listing of the commands you can simply type “help” at the prompt and hit Enter. As usual, the quotes are for separation only and should not be typed. To get the standard commands available just type the utility name followed by a /?, for example “chkdsk /?” (note the space between chkdsk and /).

Speaking of chkdsk, this is likely the command you’ll use most. It’s the command prompt version of the old Windows utility Scandisk. It will check drives for damaged or missing files and replace them if possible, mark bad sectors and attempt to move data to good sectors as well as testing the drive for physical damage.

Using the utility requires you to indicate the drive letter as well as any actions you would like to carry out. For instance, “chkdsk e: /f” will scan drive E: and attempt to fix any errors. The / before a letter indicates a switch, or parameter for the utility to adhere to.

A very handy combo of commands if you find yourself locked off the Internet is:

Ipconfig /flushdns
Netsh winsock reset

Using these back-to-back requires a restart and will likely get you back online. The first flushes the DNS routing tables, which direct you to the appropriate servers and web pages during surfing. The second resets the files required to connect the PC to a network.

You’ll notice that the second command doesn’t use a switch. Netshell (netsh) is one of the few command line tools that don’t require them.

Diskcopy is very handy if you still use floppy disks and want to make some duplicates before valuable diskettes fail. The usage for this one is:

Diskcopy a: a:

This will read and image a floppy disk, then ask you to remove the disk and insert a blank one. It works much like a CD copy through a program like Nero or NTI in Windows and I would strongly suggest its usage to make copies if you use floppies.

PCs running older versions of Windows can often be repaired from a bootable diskette but those little plastic disks have alarming failure rates.

I could go on and on with stuff to use from the C: prompt but many of you would never need many of the things I do. Commands like CD and IF/THEN statements make batch files (a series of commands to carry out multiple tasks) possible and obscure commands like SUBST, NET USE and ATTRIB can make an untenable situation workable.

Just remember the option is there in case of trouble and make use of it if needed. Next week we’ll get back to the Windows tools, so you can reassure your mouse that we haven’t forgotten it.

Friday, July 24, 2009

Autoruns does a better job than MSCONFIG

To find out what programs are loading on your PC at startup, you can run Windows MSCONFIG, however Autoruns does the job better. MSCONFIG entries tend to be vague and less than descriptive, for example, but Autoruns includes a line of description for each entry in plain English. Autoruns also lets you Hide Signed Microsoft Entries, which allows you to quickly narrow your focus to third-party programs.

By the way, Microsoft bought SysInternals (the company that produced Autoruns) last year and touts these utilities from its own website.

Get Autoruns here:

http://www.softpedia.com/get/System/System-Info/AutoRuns.shtml

Windows XP self-help tools

Even though support for XP will continue into 2014 and it remains the dominant OS for now, many people are starting to worry that they’re going to be cast adrift. I assure you this isn’t going to happen but this week I’ll cover some hidden onboard tools that will help you do your own support.

One of the easiest to use is the Event Log. Windows logs every error and you can actually view those to get an idea where to start troubleshooting a problem. While true these entries are in geek speak they can give you something to start a Google search for to track down the source of the issue.

You can view the Event Logs by opening the Control Panel and double clicking Administrative Tools. Double click Event Viewer and you’ll see a list of different logs on the left. Application and System are the important ones; they contain the logs of the programs running on your PC and of the Windows OS itself.

You’ll see mostly Information entries in those logs but you can also find Error and Warning messages. The Error messages are the ones to look at for problems. They will tell you which .exe file triggered the error and, if you’re lucky, which related system file actually crashed. Then entry might also contain an error code, usually nXnnnnnnnn, where the Ns may be numerical or alphabetical. The X is always X.

Googling the error code along with the .exe file name and hopefully the system file name will usually give you some ideas for a fix.

Another handy tool, which is totally hidden and applies to MS Office users, is one to repair Outlook .pst files. Outlook is the email component of Microsoft Office and gives you much more flexibility than Outlook Express. It will handle your email and address book and adds calendar/scheduling, a task list and a journal for your personal thoughts.

All of that data is contained in a single file, called a Personal Folders file and saved in .pst format. As you can imagine, storing all that data can result in some rather large files and, as a rule, the larger the file the more likely it will get corrupted.

This rule doesn’t apply to things like video files or large photos that never change. This applies to files that change frequently like huge databases, which is a good description of .pst files that change frequently.

If you use Outlook and suddenly can’t open the program, can’t get email or save tasks you might panic, but the Scanpst tool might fix the problem.

To use the tool navigate to C:\Program Files\Common Files\System\Mapi\1033\NT and double click on Scanpst.exe. When it opens you’ll be asked for a .pst to check. Click the Browse button and navigate to C:\Documents and Settings\profile name\Local Settings\Application Data\Microsoft\Outlook and click once on Outlook.pst. Click Start and let it go. It might take a while but if the file is damaged this will probably repair it.

As usual when I start one of these things I discover that the topic is much too large to cover in one week and also may run a little geeky. I’ll try to tone down the geekiness but this time there are so many of these tools it may run for several weeks, so I’ll stop this one now. We’ll pick up next week with more cool and handy stuff you never knew you had ;)

Kevin Mefford, Editor
pcguru@microdome.net

Thursday, July 23, 2009

Wednesday, July 8, 2009

Google Plans to Launch Operating System for PCs

By JESSICA E. VASCELLARO

Google Inc. is preparing to launch an operating system for personal computers, a direct assault on the turf of software giant Microsoft Corp., which has long dominated the market for software that runs PC applications.

The Silicon Valley Internet giant announced the new move in a blog post late Tuesday night. It said the software, which will initially target low-end portable PCs called netbooks, would be based on its Chrome Web browser and available to consumers in the second-half of 2010.

View Full Image
Google
Getty Images

A Google employee rides a bicycle at the company's headquarters in Mountain View, Calif.
Google
Google
Journal Community

* Vote: Can Google's PC operating system rival Microsoft Windows?

The post--by Google's Sundar Pichai, vice president of product management, and Linus Upson, its engineering director -- said the operating system would be "lightweight" and optimized for running Web-based applications. Google's goal, they said, is to address shortcomings of PCs -- including security problems and lengthy delays while computers boot up, the Google executives wrote.

"We hear a lot from our users and their message is clear — computers need to get better," they wrote.

Eventually, Google hopes to scale the software to full-scale PC's as well, they wrote.

The effort marks the latest attack by Google on Microsoft, which dominates the market for operating system software that powers computer applications. The Mountain View, Calif., company, which makes 97% of its revenue from online advertising, has been trying to compete with Microsoft and other software makers by offering more software that runs in a Web browser and isn't downloaded directly to computers. Now it appears to be broadening its approach, in a move that could give it greater distribution of its own online software services, including word-processing and email software.

But whether it can chip away at Microsoft's dominance in the market remains unclear. In the months since its launch, Chrome has done little to challenge Microsoft's lead in the browser software. And some hardware companies have been slow to adopt Google software -- like its Android operating system, which is targeted at running applications on mobile phones -- arguing it isn't robust enough to handle many tasks.

The Google blog post stresses that the Chrome operating system is a separate effort from Android -- though, like Android, it will be "open source," meaning other developers can have access to and modify the code.

The software is designed to work on PCs running x86 chips -- the design used by Intel Corp. and Advanced Micro Devices Inc. used in most conventional PCs -- as well as chips based on designs from ARM Holdings PLC that are the standard in cellphones and are expected to be used in netbooks later this year, the executives said.

Though the software will be based on the core of Linux, its "kernel" in programming parlance, the Chrome OS, as it is called, will add a new layer of windowing software to manage what a user sees on a display screen. Instead of requiring programmers to write programs specifically for the operating system -- an uphill battle, at a time developers have many choices about where to focus their efforts -- the Google engineers said that the Chrome operating system will simply run programs written for the Web.

"And of course, these apps will run not only on Google Chrome OS, but on any standards-based browser on Windows, Mac and Linux thereby giving developers the largest user base of any platform," the Google executives wrote.

Google's incursion into operating systems could galvanize its critics, including privacy groups and competitors, who argued that the online search company already collects vast amounts of information about consumers' Internet use. While Google is still a tiny player in many of the new markets it is exploring, like mobile phone software and online applications, some worry it could leverage its massive online search market share to quickly grow its share of new industries as well, gathering even more data about its users.

The move comes as the rise of netbooks poses a series of competitive challenges for Microsoft. Several variants of Linux are being offered for the new systems, though the company's aging Windows XP operating system remains prevalent. Besides Android, for example, Intel is backing a Linux-based operating system known as Moblin.