As of April 8 this year, Microsoft ended its support for Windows XP. This means that there will be no more security updates or patches released for that operating system. For home users and small business users who are still using this stalwart OS, the implication is when (not if) new vulnerabilities for viruses or hackers to penetrate such a machine are found, Microsoft will not be fixing those weaknesses, leaving users and their data exposed to these threats. Most major anti-virus vendors are also unlikely to continue with providing updates to the anti-virus and security products for Windows XP as well. For many users, particularly small businesses, they have kept XP running to support programs that they require. So, looking forward, what options are there for XP users to operate with less risk in the future?
Windows XP has been Microsoft's long-time mainstay of its product fleet - the old work horse. Whilst the later versions of the Windows OS, Windows 7 and Windows 8 have been in the market for some time now, there are home users who have not seen the value in upgrading. Also there are small to medium businesses running core programs that do not run under the new versions of Windows, and financial considerations may have stopped them from going down the upgrade path. Besides this, there has also been the system changes that Windows 7 and 8 have introduced, particularly under Windows 8, that have made the change for some people a little daunting. As a professional who originally cut his teeth on Windows 3.11 and Window NT 3.5, then Windows 98 SE and Windows XP, before making the move to Windows 7 and 8, I can fully understand the reticence of some users to change. I found the changes in Windows 7, frustrating at first because a number of the administrative features had been changed or moved about, and to some extent, locked down more. However, I've learned my way around those changes. Windows 8 however, I still find confusing, despite using it for a year. I think that part of the problem is that Microsoft are attempting to make an interface that keeps user's out of trouble by following the philosophy of out of sight out of mind. If regular users cannot change a setting, there is less chance for them to mess things up. For power users, who want control, this is an annoyance. The other part of the problem is that Microsoft are attempting to make one operating system that will work across platforms from mobiles to desktops. This is a good and worthy concept. However, as a first to market with this concept, Windows 8 is proving to be unsuited to the desktop/laptop platforms, and will probably continue to be until touch screens become a more regular feature of home computers.
So, is Windows 8 a worthy option to replace Windows XP? Windows 8 does have a Desktop interface. Whilst it does not start directly to this, it is easy to get to, and this provides a more familiar interface for long-time Windows users. However, a large part of the functionality on a Windows 8 computer is now wrapped up in the apps - not programs. One of the quirks of Windows 8 is that it makes a distinction between apps (like mobile phone apps) and full-blown programs. If you are a Windows XP user, and you want to move to Windows 8 and have programs that you want to keep running that are usable under Windows 8 - brilliant. These can run on the desktop interface of Windows 8. If however, you also utilise web based emails (Gmail, Hotmail, Windows Live, Yahoo, etc), or other Internet based services, these applications are likely to have more recent versions than your old XP programs, that will run on Windows 8, but they are likely to natively run on Windows 8 as an app from the Windows 8 Start screen - which will take you away from the Windows 8 desktop interface every time you want to use them. Of course, these issues are a moot point if the old programs that you want to keep using do not function on Windows 8.
Mac OSX could be an option, if you are willing to put up with an unfamiliar interface. Apple have done well over the years to develop an interface that is intuitive, if you have never been indoctrinated to the Microsoft Windows world. If you are a long-time Windows user, you may find such a change too much. Also, there is as much chance, if not more, that any old programs you wish to bring with you from Windows XP, will not run on Mac OSX. In some instances, these programs can be facilitated on Mac OSX by use of the WINE program. WINE is a compatibility layer that sits between the Windows programs and the POSIX-based Mac OSX operating system, acting a little like a translator. In some ways however, Mac OSX, like Windows 8, is made for the average user, not the power user. Options are looked down to stop the user from changing settings that might cause them problems. This fact has actually lead to a trend in the US, where it has been noted that IT professionals are recommending Mac OSX to their friends and family. The inability for the user to get into trouble, means that these professionals are less-likely to be asked to provide free support to their friends and family. If you do not want or need to be able to make certain changes to your computer system, this is fine. However, if you are a power user who wants greater control, this is unlikely to suite your needs.
There are various options in the market from Linux. For the home and small business user, one of the best things about the Linux stable of operating systems, is the low cost - with most Linux operating systems being free. However, there are some trade-offs for this low cost. Firstly, there are so many Linux operating systems out there now, that it is often difficult to know which one to choose. The interfaces of these systems range from mimicking Mac OSX, to doing a very reasonable impersonation of a Windows system, and everything in between. In my professional opinion, Linux Mint, and Zorin OS, are the two Linux systems that most closely replicate the older-style Windows interface, and will therefore feel the most familiar to long-time Windows users. Compatibility between Windows based programs and the Linux OS can be bridged in some instances by the WINE compatibility layer. The clear advantage of these two Linux operating systems being their look and feel is very similar to Windows XP and Windows 7 - unlike Mac OSX. The other advantage, particularly for home users, is that many popular programs that exist on Windows, are now available on Linux as well.
In the options presented above, the key concept of avoiding the vulnerabilities and threats that Windows XP will be afflicted by in the future, is to move to an operating system that has an outlook for a number of coming years of supported operations, and can expect security fixes and patches to be provided over those years by the vendor. However, as noted, these options are not without their draw-backs, and may not be able to facilitate the older programs that you want or need to keep running. If this is the case, there is another option - the use of a virtual machine. For the uninitiated, this is essentially the creation of a virtual (sort of imaginary) computer, inside another computer. The concept being that you upgrade your main operating system for your real/physical computer to one of the options mentioned above, then install on it a virtual machine management system such as Oracle's VirtualBox. Provided that you still have the installation media for Windows XP, you can then create a virtual machine with Windows XP installed as the operating system, and then you can install and run the older Windows XP programs on the virtual machine. The downside here is that you are still running Windows XP, and if the virtual machine is connecting to your network or the Internet, then it will still expose the same security vulnerabilities as a physical Windows XP computer. However, the risks of this can be limited, by limiting the use of the virtual machine. As an example, if you still need Windows XP for running your business' accounting software, you could run the virtual machine for 30 minutes a day to do the accounts, then switch it off. Mean while you could continue working with the other applications such as MS Office on your physical/real machine.
To wrap this up simply, there are options for what to do with your Windows XP computer, and they all have draw-backs. The worst option, is to ignore the problem and do nothing, leaving you with a computer that will be at an increasing risk of being hacked, or suffering a virus.
Sharing knowledge, experience, and news of the world of cyber, and how it impacts individuals, families, and small organisations.
Sunday, 4 May 2014
Thursday, 1 May 2014
Securing Wireless Devices: Locking the door is not enough.
Imagine having the peace of a restful night's sleep shattered by hearing the yells of an intruder's voice coming from the room of your sleeping infant. Scary. This is what happened to the Schrek family of Cincinnati. However there was no intruder - at least not physically. Their unsecured wireless baby-monitoring webcam had allowed a cracker (criminal hacker) - a virtual intruder - to violate their privacy, and the sanctity of their home.
As we progress further into the information age, connectivity of our devices is highly desirable - allowing almost seamless transfer of information from one device to another. For the Schrek's, this important information was being transferred from their baby's nursery through their wireless home network to their smartphones, so that they could both monitor their child where ever they were in the home.
Innovation, consumer demand and entrepreneurial ventures are driving the rapid increase in the regular household and office items that are now capable of being connected to our smartphones, our home or office network, and ultimately the Internet. This explosion of connected devices in the home and office, can be likened to increasing the number of doors and windows in your home. If a door or window is not locked, an intruder can enter through it.
Some device manufacturers have been very conscious of this and supply the device with default security settings and options that are ready for use straight out of the box. They do this however at the potential expense of market share, as the predetermined security settings will make it more difficult for some users to install. Consumers who are less technically inclined are more likely to purchase devices that are cheaper and are marketed to be easier to setup - and often the initial setup is made easier by disabling the security features by default. Many consumers may be falling for the trap of purchasing a product that is easy to install and has advertised security features built in to it, but never realising that extra steps are required beyond the easy setup to make the security features fully effective.
There is also the question of how well such devices are able to be secured. Your average home or small business computer is designed with the flexibility to be able to perform a multitude of different functions, and can generally be expected to run security software whilst being used for other activities. Big business, banks and government go a step further of using dedicated security devices in their networks that are purpose built for security. The increasing range of networked devices for the home and small office are designed almost solely for the performance of their main function as this cuts the cost of manufacturing the device. The implication is that such devices will not be able to be as effective in their application of security features, and may remain a soft-target for crackers due to this. And once crackers have found one weak link in your network defences, it gives them the opportunity to break down the rest of the defences
The range of consequences for not having a secure home network is increasing. With the continuing convergence of technology, the increased level of utilities, banking and corporate services enabling on-line interactions, and government service interactions with both individuals and business being pushed more and more on-line, the opportunity for identity and data theft is increasing. Certainly the events that the Schrek's experienced is a sign of an insidious and horrible violation of their privacy and safety - a home invasion where a device that they used for the safety of their child and their own piece of mind was turned against them.
The consequences need not be that drastic - not all crackers are out to empty your bank account and frighten your family. Some may be a lot more passive in their approach, making use of your Internet connection to conduct their downloads, a crime known as theft of service. Does your neighbour have fast Internet with a seemingly endless download limit? Or, is he using your Internet? When was the last time that you checked your Internet usage?
Next time you turn on your smart TV, or you walk past your ADSL modem, ask yourself, did you ever check the security settings? Are they on? Is your home network as secure as it could be?
As we progress further into the information age, connectivity of our devices is highly desirable - allowing almost seamless transfer of information from one device to another. For the Schrek's, this important information was being transferred from their baby's nursery through their wireless home network to their smartphones, so that they could both monitor their child where ever they were in the home.
Innovation, consumer demand and entrepreneurial ventures are driving the rapid increase in the regular household and office items that are now capable of being connected to our smartphones, our home or office network, and ultimately the Internet. This explosion of connected devices in the home and office, can be likened to increasing the number of doors and windows in your home. If a door or window is not locked, an intruder can enter through it.
Some device manufacturers have been very conscious of this and supply the device with default security settings and options that are ready for use straight out of the box. They do this however at the potential expense of market share, as the predetermined security settings will make it more difficult for some users to install. Consumers who are less technically inclined are more likely to purchase devices that are cheaper and are marketed to be easier to setup - and often the initial setup is made easier by disabling the security features by default. Many consumers may be falling for the trap of purchasing a product that is easy to install and has advertised security features built in to it, but never realising that extra steps are required beyond the easy setup to make the security features fully effective.
There is also the question of how well such devices are able to be secured. Your average home or small business computer is designed with the flexibility to be able to perform a multitude of different functions, and can generally be expected to run security software whilst being used for other activities. Big business, banks and government go a step further of using dedicated security devices in their networks that are purpose built for security. The increasing range of networked devices for the home and small office are designed almost solely for the performance of their main function as this cuts the cost of manufacturing the device. The implication is that such devices will not be able to be as effective in their application of security features, and may remain a soft-target for crackers due to this. And once crackers have found one weak link in your network defences, it gives them the opportunity to break down the rest of the defences
The range of consequences for not having a secure home network is increasing. With the continuing convergence of technology, the increased level of utilities, banking and corporate services enabling on-line interactions, and government service interactions with both individuals and business being pushed more and more on-line, the opportunity for identity and data theft is increasing. Certainly the events that the Schrek's experienced is a sign of an insidious and horrible violation of their privacy and safety - a home invasion where a device that they used for the safety of their child and their own piece of mind was turned against them.
The consequences need not be that drastic - not all crackers are out to empty your bank account and frighten your family. Some may be a lot more passive in their approach, making use of your Internet connection to conduct their downloads, a crime known as theft of service. Does your neighbour have fast Internet with a seemingly endless download limit? Or, is he using your Internet? When was the last time that you checked your Internet usage?
Next time you turn on your smart TV, or you walk past your ADSL modem, ask yourself, did you ever check the security settings? Are they on? Is your home network as secure as it could be?
Wednesday, 23 April 2014
Using Monkeys to Cross the Divide
What is this Survey Monkey link? What is Mike doing? He's going where?
And this is why I have created the survey on the Survey Monkey site: To help identify the needs of the community in and around the Canberra/Yass Valley region, for IT training. As an IT professional and former tertiary and vocational trainer, I believe that there is a need for greater access to affordable IT training. I am not relying on the online survey alone. Over the next couple of months I'll also be doing the regional markets, raising awareness, offering a paper-based survey, and talking with people. Coming to grips with the needs and wants of the Canberra/Yass Valley region. Got a question, or an IT problem, come and see me.
A better question might be, "what's the digital divide?". I believe that there is a real difference between the opportunities that exist in the city, compared to those in rural communities, for people to learn about and keep up with the changes in computers and technology. Governments have yet to bridge the gap, and may even be guilty of making it wider. If rural communities wish to keep up then learning opportunities must come from within the local community.
For some time, Australian governments have recognised a digital divide. There continues to be a difference in the levels of access to affordable information technology training between the city and rural areas. Governments have often funded courses aimed at various groups in the community; single parents returning to work, the disabled, recent migrants, the elderly. All worthy recipients. Often this training has been tied to the notion of making students job-ready, or ready for further education. And such education has often been focused in educational hubs, in major cities, at universities and tafes. But what about those in regional areas who want to learn, who do not qualify for a funded place, or, who just want to learn for the sake of learning, not necessarily to get a job, or to go to further study?
There is also the other empty equaliser of digital society, the National Broadband Network (NBN). A project that should bring equality of internet service to all Australians. Sadly it seems that those who are disadvantaged by the old system will be the last to receive the benefits of the NBN, perhaps 20 years later too.
Strange enough, the section of the community that has been left behind in both cases tends to be our rural and regional communities. As a recent arrival (blow-in) to such a community, it has been increasingly clear that there is still a difference. Living an hour outside the Nation's capital, (or anywhere) this should not be. Without equal opportunity, rural and regional areas will continue to loose jobs, business and population to the cities. The struggle for community viability will continue.
Whilst this may not be the only division of modern Australian society, this is one I believe, I can help address. We have seen how the regional farmer's markets have benefited local growers, craftsmen and consumers through the concept of buying locally. I believe there is similar benefits to be found in learning locally too.
Details of markets I'll be visiting will be posted as they are available
And this is why I have created the survey on the Survey Monkey site: To help identify the needs of the community in and around the Canberra/Yass Valley region, for IT training. As an IT professional and former tertiary and vocational trainer, I believe that there is a need for greater access to affordable IT training. I am not relying on the online survey alone. Over the next couple of months I'll also be doing the regional markets, raising awareness, offering a paper-based survey, and talking with people. Coming to grips with the needs and wants of the Canberra/Yass Valley region. Got a question, or an IT problem, come and see me.
A better question might be, "what's the digital divide?". I believe that there is a real difference between the opportunities that exist in the city, compared to those in rural communities, for people to learn about and keep up with the changes in computers and technology. Governments have yet to bridge the gap, and may even be guilty of making it wider. If rural communities wish to keep up then learning opportunities must come from within the local community.
For some time, Australian governments have recognised a digital divide. There continues to be a difference in the levels of access to affordable information technology training between the city and rural areas. Governments have often funded courses aimed at various groups in the community; single parents returning to work, the disabled, recent migrants, the elderly. All worthy recipients. Often this training has been tied to the notion of making students job-ready, or ready for further education. And such education has often been focused in educational hubs, in major cities, at universities and tafes. But what about those in regional areas who want to learn, who do not qualify for a funded place, or, who just want to learn for the sake of learning, not necessarily to get a job, or to go to further study?
There is also the other empty equaliser of digital society, the National Broadband Network (NBN). A project that should bring equality of internet service to all Australians. Sadly it seems that those who are disadvantaged by the old system will be the last to receive the benefits of the NBN, perhaps 20 years later too.
Strange enough, the section of the community that has been left behind in both cases tends to be our rural and regional communities. As a recent arrival (blow-in) to such a community, it has been increasingly clear that there is still a difference. Living an hour outside the Nation's capital, (or anywhere) this should not be. Without equal opportunity, rural and regional areas will continue to loose jobs, business and population to the cities. The struggle for community viability will continue.
Whilst this may not be the only division of modern Australian society, this is one I believe, I can help address. We have seen how the regional farmer's markets have benefited local growers, craftsmen and consumers through the concept of buying locally. I believe there is similar benefits to be found in learning locally too.
Details of markets I'll be visiting will be posted as they are available
Subscribe to:
Comments (Atom)