“Daniel” from “Microsoft” called me the other day. The number looked halfway legit so I picked up. He out and out claimed to be from Microsoft and said he was getting alerts from my computer. His voice sounded familiar–I think I’d talked to him before.
“Which computer?” I asked.
“Your Microsoft computer,” he said.
Continue reading I read Microsoft’s site to a “Microsoft” scammer
I went to install Linux (Debian) on an old Asus socket 775 motherboard (a P5LD2) and had a litany of problems getting my installation media to boot. Here’s how I finally got it installed.
Continue reading When Linux won’t boot off DVD or USB
If you’re in the market for a 960 GB SSD but you’ve been waiting for a deal, here’s one that’s been worth waiting for: an A-Data SP550 for $188. It’s remarkable only for the price, but what a price.
Continue reading A 960 GB SSD for $188
I picked up a couple of refurbished Linksys EA6200 routers this past weekend. For whatever reason, DD-WRT isn’t officially supported on them, though it does seem to be a popular DD-WRT router. A lot of people make the upgrade far more difficult than they need to. With some simple hacks, Linksys EA6200 DD-WRT installation is pretty straightforward.
I came up with an 18-step process that I simplified just as much as I could. Unlike some methods I’ve seen, I don’t have you editing any binary files or creating custom startup scripts.
Continue reading Linksys EA6200 DD-WRT installation
Last week at work, I noticed some odd events in an event log, and when I investigated them, I found they were part of a failed ransomware attack. This got me thinking about how to prevent ransomware at home.
Ransomware, if you aren’t familiar, is an attack that encrypts your data and demands a ransom, usually around $300, in bitcoins, and you get a short deadline until it destroys your files. More often than not, paying the ransom is the only way to get the files back, so it’s much better to prevent it.
Continue reading Simple tips to prevent ransomware
The CW-80, unlike postwar transformers, only has two accessory posts. To adjust the Lionel CW-80 fixed voltage, the posts are programmable. If you lost your manual, here’s how to do it.
The accessory voltage was set to 12 volts at the factory, which is usually a good setting, but sometimes they get adjusted, or sometimes you need something different. Here’s how to set it to what you want, in five steps.
Continue reading Adjust Lionel CW-80 fixed voltage
If you need an inexpensive DD-WRT compatible router, TP-Link is probably your best choice. But there are some big differences when you compare the TL-WR840n vs the TL-WR841n.
I’ve been running the TL-WR841n for more than two years, so I’m familiar with it. I’ve considered supplementing it with a secondary router, and the TL-WR840n was one I looked at.
Continue reading TP-Link TL-WR840n vs TL-WR841n
I’ve been asked a few times now for my recommended DD-WRT settings, or at least my good-enough settings. I think that’s a great idea, so I’ll walk through how I configure a DD-WRT router. Follow these steps and I can almost guarantee you’ll have the most secure network on your block.
For the purposes of this tutorial, I am going to assume you are configuring DD-WRT as your primary router.
Continue reading Recommended DD-WRT settings
When will SSDs be cheaper than hard drives? Based on history, it’s possible to make an educated guess, and I’m going to do it.
Back in 2011, I noticed that historical hard drive pricing fell in line pretty nicely with Moore’s Law, and predicted that SSDs would do the same. I predicted that SSDs would reach 25 cents per gigabyte sometime in 2016, and was wrong. They hit that price in 2015. So I was late by a few months.
But I’m still willing to try to predict when SSDs will cost less than hard drives. I’ll predict when they’ll hit parity too.
Continue reading When will SSDs be cheaper than hard drives?
Last week Apple released a bunch of patches up and down its product line. One of the vulnerabilities it fixed in OS X was a vulnerability in its font parser.
In the past you could mitigate vulnerabilities like this by only installing fonts from trusted sources, but since it’s now possible for web pages to transmit fonts along with other content, there’s a limitless number of untrusted fonts out there in the world.
Since it may take a while for all of the major operating systems to shake out all of the problems in their font subsystems, that’s the reason I’ve recommended filtering fonts at the proxy.
Continue reading Another reason to block fonts at the proxy