USB flash drives are pretty much a necessity these days. They’re far more convenient for moving files around than optical discs, and they make good backup devices. But not all USB flash drives are created equal. Here’s what to look for in a USB flash drive.
Here’s a tip: I don’t just use USB flash drives for transporting data and backups. I like to keep a modest-sized USB flash drive plugged into my router, turning it into a small NAS. It gives me a convenient, reliable place to back up data from any of my computers.
Retro computing fans, especially Commodore and Atari enthusiasts, all know the story. Jack Tramiel left Commodore, the company he founded, in early 1984 at the height of its success. Then, within a few months, he gained control of Commodore rival Atari.
On Monday, March 13 at approximately 10:30 AM CST, I will be appearing on KFUO Radio’s Faith and Family program to discuss home computer security with host Andy Bates. One of the questions he’s planning to ask: “What can I do to improve the security of my digital information?”
This, fortunately, may be the easiest question to answer and the easiest step to implement.
It seems like about once a month an aspiring coworker asks me how to get enough CISSP work experience. I think this shows a misunderstanding of the requirement, so I’m going to try to clear it up.
You don’t have to get your five years of work experience in one big lump. And that’s a good thing, because that would be hard to do. Sometimes you can get a security job without a cert and work your way toward it, but a lot of employers want you to come in with the certification already.
But that’s OK. As long as you’re doing something more than selling computers at retail, odds are you have some security experience that can count toward the requirement.
Do you need a new router? If your Internet is slow after upgrading to a faster service, and if your wifi range and reception is poor, or your Internet connection just generally misbehaves a lot, you might need a new router.
Even the New York Times, of all places, has published articles extolling the virtues of new routers. If your wi-fi at home is bad, they say, think about picking up a TP-Link Archer C7 router. I like the Asus RT-AC66U myself, but in my experience, and the experience of my colleagues, a new router makes a huge difference.
When one longtime friend upgraded to a TP-Link Archer, he told me his wi-fi improved so much his wired network was suddenly struggling to keep up with it. That’s fixable. He’s a candidate for Gigabit Ethernet.
I’m not particularly worried about this, but under the very worst case scenario, certain solid-state disks can theoretically lose data in a week or two if they’re left without power. But that doesn’t instill panic and get clicks when you say it like that.
But you knew I was going to write about it. Let me tell you why I’m not worried.
“Whatever happened to the Legions of Doom server?” a coworker asked me as a technician swapped her computer.
I smiled a wicked smile. “Victory ping!” I then turned to my computer. “Ping pmprint02. Request timed out. Request timed out. Request timed out. Request timed out,” I read as the words scrolled onto my screen.
“Victory ping?” my boss–yes, my lunch ninja boss–came over and asked.
“I know that box,” the technician said. There’s a good reason he didn’t say “server.”
If you have a Windows domain, there’s a fairly good chance you have Backup Exec servers, because you probably want to take backups. Because you need them. (As a security guy, I no longer care how you get backups; just that you’re getting them somehow.) Backup Exec is a popular solution for that. But there’s a problem.
A security problem, that is. The quality of Backup Exec as a product hasn’t been my problem since 2005. The problem I have with it now is that Backup Exec stores its passwords in a database. The passwords are encrypted, but it’s possible to decrypt the backup copy, if you’re determined enough.