Tag Archives: internet

Checkout Your Internet Risk Factor With OPSWAT’s Free Security Score

Not an imaginary conversation.

Me – How are you handling all the crazy new cyber threats currently being thrown at us on the Internet?

She – I’m cool! I’ve got the best Anti-virus program there is (her reference – the neighbourhood geek.)

Me – Good to hear that. So, what are you doing to take care of the rest?

She – What rest?

Rinse, wash and repeat this conversation a thousand times – and, the “rest” almost always becomes the new focus of attention. As it should – it’s here, in an often murky area (at least to a typical user), that, that user, runs a major risk of stumbling.

Security – both physical and electronic – isn’t about eliminating all risk – if it was, you and I (on the physical side), wouldn’t cross the road. Similarly, in Internet security, we can’t eliminate all the risks – short of unplugging the connection. Instead, a more realistic approach requires that we focus our attention on eliminating as many known risks as possible (just as we do in the physical world.)

In other words – we need to engage with the proactive side of Internet security rather than continuing to focus on the reactive side – the, “I’ve got the best Anti-virus program there is” side.

Luckily, there’s a terrific little application – OPSWAT’s Security Score – that in a matter of just a few seconds, evaluates and sets out the “rest” – and, should the application determine that a security issue needs to be addressed, helpful tips/hints are provided.

Regular readers may remember that I first reviewed this application several months ago, and while I agreed in principal with the concept, the execution (in my view), was not up to standard. OPSWAT has since revised and expanded the application in such a way, that Security Score should be considered a “must have” addition to a security toolbox. Particularly for those users who are less familiar with the ever changing cyber threat landscape.

Let me backtrack just a little and put up a graphic from the first run through with Security Score, in April. As you can see, the application teased out a score of 60/100. A less than impressive score for a security professional.

image

Good News:

The issues which prevented Security Score from digging into the system in order to provide an authentic result have been addressed and, are reflected in the following graphic – June 7, 2013.

image

The above graphic indicates an encryption raw score of zero which reflects the fact that I choose not to use Windows BitLocker.

However, as I wrote in my previous review – “I don’t do full disk encryption. I do however, encrypt selected files/folders (a much better choice for most users in my view), using what has long been considered the premier free encryption application available – TrueCrypt. Still, it’s good to see that the application addresses an issue which often escapes the notice of less experienced users.

image

Since application and operating system patches are often neglected by average users, a key component in Security Score measures the users adherence to a patch management routine.

image

Often not considered as part of a layered security approach, system/file backup is, in fact, a key element in any such process. You’ll note from the following graphic that Security Score has picked up on my use of a number of backup schemes including Google Drive…..

image

and Microsoft’s SkyDrive.

image

As the following graphic indicates, I’ve been marked down slightly on AV coverage since the application cannot be aware that I substitute full on-board AV scans with weekly scans using a Linux Live CD.

image

Given the conditions that we are now forced to deal with on the Internet – active PC monitoring with a view to insuring the security status of the machine is in good order is not just a preference or a recommendation – it’s an absolute necessity.

Sure, you can do all that this application does, manually. Choosing this route however, one could increase the risk of possible shortcomings in an otherwise acceptable security strategy. So, do yourself a favor and install OPSWAT’s Security Score. Better yet, introduce your friends/relatives/co-workers, to this neat freebie – we’ll all be the better for that.

Download at: OPSWAT

How OPSWAT calculates your security score:

OPSWAT’s score calculation is based on security industry and market research reports, over ten years of expertise in the security field, and feedback from leading security technology vendors on the relative importance of the categories and status of security software.

18 Comments

Filed under Anti-Malware Tools, Freeware, OPSWAT

The Suitcase Internet – The Internet Free Of Government Control (Updated)

imageOver the past few years, as I’ve compiled the Daly Net News column here, it became obvious that many of the major tech sites retitle and repost previously published articles. I’m not suggesting that this is a bad thing. In fact, it can often be a very good thing.

A particularly good case can be made for the reposting of information designed to educate computer users relative to system and Internet security, for example. So too, with data that addresses issues surrounding the ever evolving threats from governments designed to curb both privacy and freedom of expression, on the Internet.

The threats to twist and bend our civil liberties into unrecognizable shapes, hardly stop there of course. Still, I’m ever hopeful that we (assuming the average person finds the courage), will force governments to park the fascism bus and address the real needs of real people.

At one time, my programed response to the latest and greatest government threat would be to jump up and down like a lunatic (I keep this posture in reserve for those important moments in life). More seriously though, I’ve learned to handle the ever increasing bizarreness that’s coming out of the mouths of politicians, who seem intent on reducing me to a character in Orwell’s, Nineteen Eighty-Four.

I simply reaffirmed my view that no matter the technology that’s developed to attempt to “control” us – a techno solution will always be found that will reverse the field. A pipe dream? Maybe – but, I don’t think so.

It may well be that many of you have read the following article, originally posted here early last year – but, a little repetition when it concerns an issue that impacts us all at such a fundamental level, seems appropriate.

The Suitcase Internet – The Internet Free Of Government Control

“The most dangerous man to any government is the man who is able to think things out for himself………….. Almost inevitably he comes to the conclusion that the government he lives under is dishonest, insane and intolerable, and so, if he is romantic, he tries to change it.”

H. L. MenckenDecember 1919

Despite the fact that Mencken wrote those words almost 100 years ago – he might well have been describing current views held by “the man who is able to think things out for himself.” – Generally, governments are increasingly being seen as dishonest, and corrupt.

In recent years, particularly through events loosely termed “The Arab Spring”,   we’ve been witness to the inevitable clash between those who’s views run counter to the status quo (the thinking man), who stood in defiance of corrupt governments who’s very existence relied on violating the most basic tenets of human rights. Dishonest, insane and intolerable governments.

The Internet played some role, in broadcasting the desperate voices of those engaged in violent encounters against regimes who were intent on eliminating those who fought for the right to condemn the repugnant conditions of their existence. How much of a role, is the subject of continuing discussion.

At the height of those conflicts, countermeasures taken by these repressive regimes included, cutting off access to the Internet in an attempt to slam the door on the free flow of information. Information which, to some extent, ultimately led to the “the people”overthrowing unsustainable governments in Tunisia, Libya, and Egypt.

There are of course, an accumulation of lessons learned (and, still to be learned), by the successful outcomes of the Arab Spring. One rather obvious lesson it seems to me is – those who cherish the right to freedom of expression, and the right to have those views disseminated, will continue on a collision course with the undercurrent of repression circling the Globe.

Attempts are now underway, in Canada, the US and the UK, to limit, by way of regulatory controls (repression by any other name), the rights and freedoms we’ve come to expect when connected to the Internet.

Controls which effectively reduce, or in some cases, obliterate freedom of choice. Controls which could conceivably be used to slam the door on the free exchange of ideas, and political dissent. In a word – censorship.

It might surprise you to learn just how much Internet censorship is already in place world wide. The following graphic from Wikipedia is illuminating.

image

image

The graphic is based on 2009 data. You can bet that the situation has not improved.

It’s a fantasy, in my view, to believe that governments will learn to self regulate their persistent push to impose restrictions on how users travel the Internet. That, they will take the high road – based on an understanding that there is an undercurrent of hostility to interference with what many Internet users now believe is a basic human right. The right to surf the Internet without obstruction.

Instead, it’s much more likely that we will see a progression toward increased censorship and surveillance. Governments just never seem to “get it” – that there’s always a point beyond which people will push back. And, there are those who are pushing back against government Internet control – in a technical manner.

A recent article in Scientific American Magazine – Internet Freedom Fighters Build a Shadow Web – describes one such “push back”. (I’m sorry to report that this article is now a fee article at Scientific American Magazine. Rats!)

“Governments and corporations have more control over the Internet than ever. Now digital activists want to build an alternative network that can never be blocked, filtered or shut down.”

I’m neither a romantic (as Mencken suggest one might need to be to effect change), nor do I have a Don Quixote complex – but, I’m convinced, that in order to safeguard freedom of though and expression, the  transmission of information without government interference and restriction – then, the creation of a  decentralized mesh network (as described in the Scientific American article), that can’t be blocked, filtered, or silenced, is in our best interest.

3 Comments

Filed under Opinion, Point of View

InternetOff – Or Not?

imageI’m not in the habit of leaving the door to my home wide open – unlocked perhaps – depending on circumstances. But wide open? No. Nor, have I ever developed the habit of leaving my Internet connection wide open – unless I have a need to do so. Otherwise – I break the connection.

My Tablet computer is subject to the same set of rules. Unless I’m actively engaged with the Internet – off goes the Wi-Fi.

As a one-time user, and a big fan of the free ZoneAlarm Firewall (since the “olden days”), disconnecting from the Internet was as simple as flicking a switch from within the ZoneAlarm GUI –  “Stop All Internet Activity”. Until, that is, ZoneAlarm underwent “improvement” to the point that it became useless for my needs. But, that’s another story.

Next up, on the Firewall scene, was PC Tools Firewall Plus which offered the same – “switch off” capabilities. Unhappily though,  PC Tools Firewall Plus, went the way of the Dodo Bird (on Windows 8) – at least as a stand alone application.

Now running to catch up, I finally relented and activated Windows 8 internal firewall which, with the addition of the freebie application, Windows Firewall Control, suits my needs – for now.

image

Still, this is a fairly clunky method to accomplish a simple task such as shutting down a Network Adapter (Ethernet Card) – there has to be a better way. Other than pulling the Cat 5 cable.  Smile  And, there is.

Regular reader Hipockets, has reminded me (thank you Sir) that the freebie application – InternetOff – is designed to do just that – turn off an Internet connection.

Installation:

A couple of clicks ……..

image

…………… and, you’re finished.

image

Following the installation, you’ll find a “Globe” icon in the system tray which when activated, will bring up …….

image

Click – and you’re done – as shown in the following screen captures.

image

image

Reverse the process and, you’re back online. Quick, simple, and painless.

System requirements: Windows 2000, XP, Vista, Win7, 32/64 bit (Tested on Win 8/32 bit under which the application must be run as an administrator).

Download at: The developer’s site.

From the – “he got there first files.” Good friend and fellow blogger, Rick Robinette, posted on this application previously. You’ll enjoy reading Rick’s take on this neat little freebie.

13 Comments

Filed under 64 Bit Software, downloads, Freeware, Interconnectivity, Utilities

Digital Sheep – Grazing on the Internet

imageWith the Internet and social media providing instant satisfaction and entertainment, it’s very easy to get caught up in consuming an absurd amount of information. Instead of being spoon fed commercials and media from a handful of television channels, now it is coming from everywhere and directly to your person at all times. Though people still have the freedom to comment and believe what they will, the vast majority of internet users have simply evolved into digital sheep devouring content constantly.

In the modern age, digital sheep are information technology users (more specifically, Internet users) who are happy and satisfied to “graze” off the vast information fields available on the web. In other words, they’re just consumers, not bothering to produce anything—but more importantly, are unaware of the potential consequences of their attitude and behavior.

“But, wait, now,” you might say, “haven’t most people always preferred to be consumers rather than creators? Isn’t it true only a handful of people have written books, magazines and newspapers for the general population?”

For sure, media from the beginning has been lopsided—i.e., the many have always consumed what the few have created. The Internet, however, has greatly changed the playing field, and not just in terms of aesthetics or of professional responsibilities.

The Internet is a place where people come to not only be entertained, to socialize and to be educated, it’s also a place where they come to work, to share information and to connect with other people in ways that go beyond “socializing.” In other words, people now have an opportunity to participate more meaningfully in the process called “media” than ever before.

Beyond that, being just a consumer carries with it a few negative connotations and dangerous burdens. For one thing, it means that people are accepting what they read, often without analyzing it for accuracy and acceptability; it also means that they are following rather than making any attempt to lead or to at least participate meaningfully in the process.

The question everyone has to ask is, “Do I want to be ‘digital sheep,’ or do I want to actually participate in the information creation and evaluation diaspora?”

The fact is that few people, given the chance, would formally elect to be “digital sheep.” In fact, one might say that this is one of the mishaps of the information age—i.e., having people who have fallen into the role, without having been given much of a choice. On the other hand, everyone has a choice. The problem is that some people aren’t exercising it.

If you wish to avoid becoming (or presently being, as the case may be), digital sheep, these suggestions may be of use:

1. Become aware of the burdens and responsibilities inherent in Digital Asset Management (DAM) marketplace. By becoming better aware of the technology, you might better avoid becoming a victim of its intricacies and demands.

2. Don’t fall into the “follow the information Pied Piper” syndrome. Always look at what you read closely, deciding if you really want to follow, challenge what you read, or build on what is offered.

3. Listen to peers on your own level or beneath you (in position or training), not just so called “A-list” experts and pundits.

4. Don’t just attend networking events attended only by big shots—you can get important information from other venues as well.

5. Expand the quality and versatility of your reading material. Sticking, for example, to technical blogs or certain news sources may hamper your intellectual growth.

6. Read material beyond what you catch on the Internet. And don’t just focus on the material on the first few pages put there by search engines. Search engines have their agenda—it shouldn’t necessarily coincide with your yours.

7. Strive to write blogs, articles or even responses to materials you read. By doing so, you’re engaging with, not just consuming, material on the Internet.

8. Strive to become more technologically savvy. Find out, for example, what’s going on within the phone app developing industry. This will help to keep you educated within one of the fastest growing industries: the mobile device industry.

9. Become more of a risk taker. Digital sheep are content to just exist and don’t want to take any unnecessary risks. Well, risk is usually involved in any great achievement opportunity.

10. Meaningfully connect with people, establishing relationships that will mutually enhance lives. When you connect with people, you’re less likely to treat them like sheep; by the same token, people are less likely to treat you as sheep if they look up to you and respect you.

This guest post is contributed by Grady Winston. Grady is an avid writer and Internet entrepreneur from Indianapolis. He has worked in the fields of technology, business, marketing, and advertising – implementing multiple creative projects and solutions for a range of clients.

4 Comments

Filed under Guest Writers, Interconnectivity, Point of View, social networking

The Stigma of Being a Private Person – The Ad Industry Is Losing The Battle

imageTry as they might – apologists for the Internet’s ad industry push to overwhelm common sense in the creation of a bizarre concept – personal openness – appear to be losing. Despite an invasive and manipulative strategy, which has led to a manic drive to strip consumers of any semblance of privacy, it seems we just aren’t buying it.

Contrary to the claims by pseudo social scientists, supported by far to many tech pundits (who, in the real world, wouldn’t know their ass from a hole in the ground), that personal privacy is dead – that consumers don’t care about personal privacy – uncomfortable facts (uncomfortable for the ad industry, that is), appear to tell a different tale.

Hardly surprising, given that these pundits and social scientists deal in “bought and paid for” points of view. Manipulation and deception – by any other name – propaganda – has lost its luster. It’s been recognized for what it is – bullshit.

We are not as complacent, when it comes to personal privacy, as we have been led to believe. More users than ever, have come to the realization that the price of admission to active interaction with the Internet, should not be the complete stripping of the right to personal privacy. Consumers are advancing the notion that the right to privacy is a “natural right”, and should be recognized as such.

Better yet, consumers are pushing back against privacy predators who continuously boost the “creep factor”. In a just released survey from TRUSTe – one more in a long line of recent surveys which refutes the bought and paid for assertions of the ad industry’s propaganda merchants – it’s clearly apparent that these “lie merchants” are taking it on the chin.

Survey highlights:

94 percent think privacy is an important issue, with 55 percent saying that online privacy is a really important issue they think of often.

69 percent say that they trust themselves most when it comes to protecting their own personal information online (up sharply from 45 percent in 2011).

40 percent say a targeted advertisement has made them feel uncomfortable.

53 percent (52 percent in 2011) believe personally identifiable information is attached to browsing behavior.

Consumers take a variety of precautions to protect their privacy online, such as:

76 percent do not allow companies to share their personal information with a third party (up from 67 percent in 2011).

35 percent say that they have stopped doing business with a company or using their website because of privacy concerns.

90 percent say they use browser controls to protect privacy, including deleting cookies (up from 84 percent in 2011).

40 percent say a targeted advertisement has made them feel uncomfortable.

53 percent (52 percent in 2011) believe personally identifiable information is attached to browsing behavior.

For far too long, the Internet’s ad industry (and, the bad actors who support it), have gotten away with their attempts to stigmatize those of us who believe in the concept of the “private person”  – those of us who have sought a balance between the public and private. I’m hopeful, that we may have reached a stage where consumer action will result in tighter controls being implemented against what has turned out to be, a largely unethical Internet ad industry.

9 Comments

Filed under Point of View, Privacy

Thumbing Your Way To Friendship?

Grab a cup of coffee:

image

Dine out at your favorite restaurant:

image

Spend some time at the museum:

image

Meet at a popular diner:

image

Relax at the beach:

image

Go to a game:

image

Going out on a date:

image

Take a drive around town:

image

From “Is the Web Driving Us Mad?”Thedailybeast.com/newsweek

Questions about the Internet’s deleterious effects on the mind are at least as old as hyperlinks. But even among Web skeptics, the idea that a new technology might influence how we think and feel—let alone contribute to a great American crack-up—was considered silly and naive, like waving a cane at electric light or blaming the television for kids these days. Instead, the Internet was seen as just another medium, a delivery system, not a diabolical machine. It made people happier and more productive. And where was the proof otherwise?

Now, however, the proof is starting to pile up. The first good, peer-reviewed research is emerging, and the picture is much gloomier than the trumpet blasts of Web utopians have allowed. The current incarnation of the Internet—portable, social, accelerated, and all-pervasive—may be making us not just dumber or lonelier but more depressed and anxious, prone to obsessive-compulsive and attention-deficit disorders, even outright psychotic. Our digitized minds can scan like those of drug addicts, and normal people are breaking down in sad and seemingly new ways.

I’m not convinced that the Web is driving us mad but, if the photos above are any indication it seems to be affecting our social behavior. Disconnection is rampant; discourtesy is epidemic; empathy seems to be a long forgotten phenomenon.

Just saying.

The other side of the coin100 year-old Idaho woman on Jay Leno show. You’ll love this lady – she has a view or two you might share – even on on “thumb texting.”

A shout out to my good buddy Mike for sharing these photos. Since these photos came by way of email, I’ve not been able to track the originating site. If they originated at your site, please let me know so that I can link back and credit you accordingly.

12 Comments

Filed under addiction, Point of View, social networking

Trap Malware With Toolwiz TimeFreeze

Toolwiz CareBack in April, I reviewed and highly recommended, a suite of freeware utility applications – Toolwiz Care. Having tested the application extensively, at the end of the day, it was no great leap in logic to say –  “This application is feature packed, and includes a wide range of tools that an average computer user should find powerful, efficient, and effective.”

One of the components included in this super suite is Time Freeze (recently released by the developer’s as a stand alone application) – a “one click simple” virtual system which, when active, virtualizes the operating system. In other words, a copy of the operating system is generated, and it’s within this “copy” – or sandbox, if you like – that all activity takes place. Keep in mind – the operating system is virtualized, only when Time Freeze is active.

So, why bother running in a virtualized environment, you might wonder? The answer is pretty simple – in most circumstances, there’s no real benefit. In fact, running virtualized may create a slight time lag in system response. There are, of course, particular circumstances in which running a virtual machine offers major  advantages – but, those circumstances (since I’ve covered this aspect numerous times in the past), are outside the scope of this review.

Instead, I’ll focus on the security aspect of running in virtual mode with Time Freeze when connected to the Internet. And, there can be significant security benefits.

Let’s assume, for example, that while surfing the Internet you fall victim to a drive-by download (more common than you might realize), while visiting an infected web site. Running in “real” mode would mean that you now have a significant problem on your hands. You can, if you like, believe that your AV application will protect you from the consequences – but, don’t count on it.

The same scenario, while running in virtual mode, will have an entirely different outcome. Since, in virtual mode – it’s a copy of the operating system which is facing the Internet – all system and application changes are restricted to the virtual environment. In other words – it’s the copy which has been infected. Simply rebooting the system does away with the copy, and with it – the infection.

Toolwiz Time Freeze, of all the virtual solutions I’ve reviewed over the past few years, has to be the simplest. It’s easy to use, non intrusive, and after initial setup, requires a minimum of user intervention – perfect for the average user.

Installation was hassle free – it was just a matter of  following the on-screen instructions.

Since the application place a small toolbar (shown below), on the Desktop – launching the application is a snap.

image

A quick click on the toolbar and, a click on “Start TimeFreeze”…………

image

image

… and, you’re in business.

image

image

Backing out of the application is equally as easy. At which time, you will have the option of saving any changes made to the system – or not. Not saving changes will require a reboot.

image

Fast facts:

Start up system protection. Prevents malicious threats being made and doing harm to your computer. It puts the actual system under protection and creates a virtual environment for system partition.

Simply reboot to restore your system to the previous state.

Don’t reboot to accept all the changes. It will take several minutes to save the changes to your real system.

Folder Protection – Help you to prohibit the changing of files by others.

Helps you to prohibit accessing the protected folders by others.

Protects your files from being infected by viruses or stolen by trojans.

Very easy switch between virtual & real system.

To enter virtual system, no need to reboot computer. To return to real system, just exit System Protection.

System requirements: Windows XP, Vista, Win 7, Win 8(32 bit and 64 bit)

Download at: Major Geeks

FAQ for Toolwiz Time Freeze

A word of caution: There are no perfect solutions – this application will not protect you against rootkits. Developing safe surfing habits remains your best protection against malware infection.

A further word of caution: Although I’ve had no difficult with this application, there have been reports of system crashes caused by Toolwiz Time Freeze. It’s always good practice to occasionally create a Restore Point – just in case.

This just in: Jim Hillier over at Daves Computer Tips reports the following:

Hey Bill –

I was using Time Freeze pretty regularly to test software for review purposes. I actually stopped using Time Freeze because of persistent issues. Occasionally, after the reboot process, a random service would be stopped. It was no big deal, just go into Services and re-start whichever service had been affected. Then finally, after a reboot, the OS would not load at all. I tried everything to get the OS to boot but no go. I can only assume that this time an essential system service had been stopped. I ended up having to restore a recent image.

So, you may be better off avoiding this application.

10 Comments

Filed under 64 Bit Software, downloads, Freeware, Software, System Utilities, Virtualization

The War for Government Control of the Internet – We’re Losing

Make no mistake – we are unwilling participants in a war – a war to “tame” the Internet. We’ve long been at war on the Internet in a sense and early on, there was no mistaking the enemy – cybercriminals. But, who would have considered that as the Internet evolved, the free thinking and freewheeling principles under which it was established, would come under attack?

While it’s true that the battle against the cybercriminal element continues unabated, the level of conflict – and its direction – has vaulted into a new dimension.

In a world driven mad by economic uncertainty, it’s hardly surprising that the principal players allied against Internet users, in the war to tame the Internet, are right-wing focused governments (who hold little regard for civil liberties and the right to freedom of expression) and, profit hungry corporations (who hold little regard for an individual’s right to privacy).

China, based on it’s aggressive control of Internet dissent, has long borne the burden of being classified as the black sheep of the Internet family but, the reality is somewhat less clear. The U.S. government in its paranoid motivation to address self created issues in it’s war on terror (spurning the Constitution in the process), may well be in the forefront in the drive to change the focus of the Internet as we know it.

In an article this past week on Slate – Evgeny  Morozov (a visiting scholar at Stanford University, a fellow at the New America Foundation, and a contributing editor/blogger at Foreign Policy) wrote –

“While Hillary Clinton likes to give speeches in which she fashions herself the world’s greatest defender of “Internet freedom,” the harsh reality is that her own government is its greatest enemy. Given the never-ending flow of draconian copyright and cyber security laws coming from Washington, this fact is getting harder and harder to conceal from the global public”.

The U.S. is hardly alone in its contempt for the rights of the individual and it should be noted, that the long lineup of draconian governments has been  enthusiastically joined by the governments of Canada, Australia, and the U.K.

Sergey Brin, the co-founder of Google, in a recent statement made the point –

“Very powerful forces have lined up against the open Internet on all sides and around the world.. . . It’s scary.”

Scary, indeed.

The stakes in the battle for control of cyberspace are enormous and, the outcome will affect you most directly. Taking the “path of least resistance” and allowing restrictive legislated Internet policies to wash over you, is just not on. Certainly not, if you wish to continue to use the Internet in the way in which it has evolved – free of unbridled government interference.

Sir Francis Bacon (1561-1626) recognized that “Knowledge is power” and, if a situation ever existed in which the reality of this truth can be played out – this is one which qualifies. To effectively fight back against unconstrained government interference – you will require the knowledge to do so.

With that in mind, I encourage you to spend some time reading an excellent series of articles published by the London based The Guardian newspaper. The series is wide ranging and includes coverage on issues from – governments attempts to control citizens, the rise of Facebook, Apple-style “walled gardens”’, the seemingly never ending attacks on  privacy, the efforts to “tame” the web – and, much more.

Click on the appropriate links as follows:

Over seven days

The Guardian is taking stock of the new battlegrounds for the internet. From states stifling dissent to the new cyberwar front line, we look at the challenges facing the dream of an open internet.

Day two: the militarization of cyberspace

Internet attacks on sovereign targets are no longer a fear for the future, but a daily threat. We ask: will the next big war be fought online?

Day three: the new walled gardens

For many, the internet is now essentially Facebook. Others find much of their online experience is mediated by Apple or Amazon. Why are the walls going up around the web garden, and does it matter?

Day four: IP wars

Intellectual property, from copyrights to patents, have been an internet battlefield from the start. We look at what Sopa, Pipa and Acta really mean, and explain how this battle is not over.

Day five: ‘civilizing’ the web

In the UK, the ancient law of defamation is increasingly looking obsolete in the Twitter era. Meanwhile, in France, President Sarkozy believes the state can tame the web.

Day six: the open resistance

Meet the activists and entrepreneurs who are working to keep the internet open.

Day seven: the end of privacy

Hundreds of websites know vast amounts about their users’ behaviour, personal lives and connections with each other. Find out who knows what about you, and what they use the information for.

14 Comments

Filed under Opinion, Point of View

Working From Home? Are You REALLY Working?

imageIf you work from home, the chances are high that you really are working. Despite the friends, and critical neighbors, who can’t get their head around the idea that one can be productive working from the same location where they hang their hat.

Frankly, I find it less than amusing when I hear – “working from home is not the same as having a real job”.  A common enough comment from those who are stuck in a time warp.

Connected technology and the Internet, have dramatically changed not only how we work but, for many of us, it has changed where we work. Working from a home office has exploded in recent years – and, with good reason. Although, I must admit, I’ve maintained a home office for more than 20 years.

There are more than a few good practical reasons for working from a home office including; working in your PJs, not having to shower before sitting down at your computer, not having to put up with assorted smells on the Subway during “rush hour”…….

On a more serious note, the real advantages of working from a home office, especially for a freelancer, include –

No commuting – the cost savings can be substantial.

Big savings based on not maintaining an outside office.

Less life stress – tied in to “no commuting”.

Flexibility in establishing work hours. Depending on your personality, you might find that you work longer hours than you might otherwise. Knowing when to hit the “off” switch I find, takes some practice.

No ever present boss’s “watchful eye” (if you’re not self-employed).

You can dress comfortably and casually and, maybe save some money on not having to buy into the latest fashion look.

And, many more good reasons, I’m sure you have.

My home office – not big, not fancy, but – it works well for me.

DSCI0017

What you need to travel with the “big guys” while working from a home based office.

Technology:

A dependable high-speed internet connection.

At least one fast workhorse computer and a large LCD monitor. A tablet computer can be a very handy extra.

The appropriate software for the task at hand.

A multi-purpose printer that includes fax, copier and scanning capabilities. I might add, that a Laser printer, given their current low price, can be a good investment.

A dedicated business line with voice mail capabilities.

A smartphone – for those times when you’re on the run.

Nice to have:

A separate space (with a door), dedicated to office use only.

Lots of desk space and storage.

A neighborhood IT guy who likes you.   Smile

Working from home is not all “wine and roses” of course. It’s been my experience that working from home is HARD work. Work discipline, and dedication to results, are more important than  the latest in technology, or an ultra comfortable work space.

12 Comments

Filed under Connected Devices, Interconnectivity, Point of View

The Suitcase Internet – The Internet Free Of Government Control

image“The most dangerous man to any government is the man who is able to think things out for himself………….. Almost inevitably he comes to the conclusion that the government he lives under is dishonest, insane and intolerable, and so, if he is romantic, he tries to change it.”  – H. L. MenckenDecember 1919

Despite the fact that Mencken wrote those words almost 100 years ago – he might well have been describing current views held by “the man who is able to think things out for himself.” – Generally, governments are increasingly being seen as dishonest, and corrupt.

In recent years, particularly through events loosely termed “The Arab Spring”,   we’ve been witness to the inevitable clash between those who’s views run counter to the status quo (the thinking man), who stood in defiance of corrupt governments who’s very existence relied on violating the most basic tenets of human rights. Dishonest, insane and intolerable governments.

The Internet played some role, in broadcasting the desperate voices of those engaged in violent encounters against regimes who were intent on eliminating those who fought for the right to condemn the repugnant conditions of their existence. How much of a role, is the subject of continuing discussion.

At the height of those conflicts, countermeasures taken by these repressive regimes included, cutting off access to the Internet in an attempt to slam the door on the free flow of information. Information which, to some extent, ultimately led to the “the people”overthrowing unsustainable governments in Tunisia, Libya, and Egypt.

There are of course, an accumulation of lessons learned (and, still to be learned), by the successful outcomes of the Arab Spring. One rather obvious lesson it seems to me is – those who cherish the right to freedom of expression, and the right to have those views disseminated, will continue on a collision course with the undercurrent of repression circling the Globe.

Attempts are now underway, in Canada, the US and theUK, to limit, by way of regulatory controls (repression by any other name), the rights and freedoms we’ve come to expect when connected to the Internet.

Controls which effectively reduce, or in some cases, obliterate freedom of choice. Controls which could conceivably be used to slam the door on the free exchange of ideas, and political dissent. In a word – censorship.

It might surprise you to learn just how much Internet censorship is already in place world wide. The following graphic from Wikipedia is illuminating.

image

image

The graphic is based on 2009 data.

It’s a fantasy, in my view, to believe that governments will learn to self regulate their persistent push to impose restrictions on how users travel the Internet. That, they will take the high road – based on an understanding that there is an undercurrent of hostility to interference with what many Internet users now believe is a basic human right. The right to surf the Internet without obstruction.

Instead, it’s much more likely that we will see a progression toward increased censorship and surveillance. Governments just never seem to “get it” – that there’s always a point beyond which people will push back. And, there are those who are pushing back against government Internet control – in a technical manner.

A recent article in Scientific American Magazine – Internet Freedom Fighters Build a Shadow Web – describes one such “push back”.

“Governments and corporations have more control over the Internet than ever. Now digital activists want to build an alternative network that can never be blocked, filtered or shut down.”

I’m neither a romantic (as Mencken suggest one might need to be to effect change), nor do I have a Don Quixote complex – but, I’m convinced, that in order to safeguard freedom of though and expression, the  transmission of information without government interference and restriction – then, the creation of a  decentralized mesh network (as described in the Scientific American article), that can’t be blocked, filtered, or silenced, is in our best interest.

30 Comments

Filed under Opinion, Point of View