What is DNS over TLS?

What is DNS over TLS?

Web browser manufacturers Google and Mozilla have been taking heat lately for wanting to implement a technology called DNS over TLS. This is an important technology, so let’s talk about what DNS over TLS does and why you need it.

An increasing amount of our communications online is encrypted, which keeps other people from snooping on what we do. Not encrypting our traffic to DNS, which is the Internet’s phone book, makes it possible to see who we’re communicating with online, even though the communications themselves aren’t visible. DNS over TLS seeks to close this huge privacy gap. When your operating system says your connection is secured, it’s only talking basic security.

Read more

Is debt a sin against God?

Is debt a sin against God?

I had lunch with a new friend one recent weekend. We talked about a lot of different things, but one of those things was debt. Is debt a sin against God? I know where that idea comes from. It’s something we struggled through together a bit. Here’s why I push back against that argument.

The Bible talks about money a lot, but not nearly as much about debt specifically. The Bible speaks more about the sin of pride than it talks about debt, and I see lots of pride on both sides of the debt argument.

Read more

First 486 computer: The Apricot VX FT

First 486 computer: The Apricot VX FT

It’s fairly common knowledge that Compaq made the first 386-based computer, but what about the 486? What was the first 486 computer? When did the first 486 computer come out? And why have you never heard of it?

The first 486 computer was the Apricot VX FT, a line of servers announced in June 1989, with general availability later that year. They were expensive and they were only marketed as servers, so that’s why they aren’t as well known as the Compaq Deskpro 386.

Read more

VGA connector doesn’t fit? Here’s why.

VGA connector doesn’t fit? Here’s why.

I dusted off my 486 the other weekend because I had some 90s nostalgia. And just like the 90s, I immediately ran into some trouble. The VGA connector didn’t fit on the 15-inch 4:3 LCD monitor I wanted to use. If your VGA connector doesn’t fit, you probably have the same problem I had.

VGA connectors used to leave out pin 9 as a key pin, to keep you from plugging the wrong kind of cable into the connector and damaging the connector. Modern VGA cables use pin 9, so if your cable doesn’t fit, check to see if the port has 14 pins or 15. A 14-pin VGA cable is almost a must-have if you travel and give presentations a lot, or are into retro computers.

Read more

Deliberate security threats

Deliberate security threats

A friend of a friend suggested to me that I should carefully preserve my Commodores and other vintage computer gear, because it’s the only secure computer equipment available. I said I don’t complain too loudly since security is my job. He then said I’ll always have a job, because so many security threats are deliberate. While he’s not wrong, saying all security threats are deliberate is unhealthy. Here’s why.

Deliberate security threats certainly exist, because planting backdoors in the supply chain is the best way to get into certain highly sensitive networks. But I’ll argue that more security threats are honest mistakes than intentional sabotage.

Read more

IBM PC vs XT

IBM PC vs XT

The difference between an original IBM PC and a PC/XT seems subtle today. The XT wasn’t a huge upgrade over the PC, but the improvements were enough to be significant. The changes IBM made greatly extended the lifespan of the XT, and that’s one reason XTs are so much more common than PCs today. Let’s take a look at the IBM PC vs XT.

The PC/XT had the same CPU running at the same speed and couldn’t take any additional memory over the PC. But the XT was more expandable, and in the late 1980s, that was everything.

Read more