A neighbor asked me about a recommendation Steve Gibson and Leo Laporte made a couple of weeks ago about securing your IoT household “smart” devices, like doorbells, thermostats, televisions, and anything else that wasn’t traditionally computerized, by putting it on a guest network.
The short answer is yes, it’s something you should do. It doesn’t make them perfectly safe, but it’s the best you can do, so you should. But I would do it a bit differently from Gibson–I think the ideal setup has two guest networks.
I hear the question from time to time what the advantages and disadvantages of Windows 3.0 were. Windows 3.0, released in May 1990, is generally considered the first usable version of Windows. The oft-repeated advice to always wait for Microsoft’s version 3 is a direct reference to Windows 3.0 that still gets repeated today, frequently.
Although Windows 3.0 is clumsy by today’s standards, in 1990 it had the right combination of everything to take the world by storm.
Commodore International went out of business in 1994, after nearly a decade of declining revenue. But the company left a significant legacy, which leads to some logical questions. What became of Commodore? Who bought Commodore?
If you want a better laptop than the typical Black Friday special, I found just the thing: this Dell Latitude E6420 laptop from Newegg, for $225 (the price is good through Sunday, Nov. 22). It has several things going for it: it comes with Windows 7 Professional, so you can upgrade to Windows 10 when you want and you’ll get the better, more-feature-filled, easier-to-secure Professional version; you can upgrade the memory to 8 GB of RAM, and it comes with a 128GB SATA SSD, so you can drop in a bigger, faster SSD at a later date.
Note: When Newegg sells out of these, which happens occasionally, they’re fairly easy to find on Ebay, though some come with conventional hard drives rather than SSDs.
Last week Apple released a bunch of patches up and down its product line. One of the vulnerabilities it fixed in OS X was a vulnerability in its font parser.
In the past you could mitigate vulnerabilities like this by only installing fonts from trusted sources, but since it’s now possible for web pages to transmit fonts along with other content, there’s a limitless number of untrusted fonts out there in the world.
Since it may take a while for all of the major operating systems to shake out all of the problems in their font subsystems, that’s the reason I’ve recommended filtering fonts at the proxy.