[x]Blackmoor Vituperative

Saturday, 2010-03-13

14 Windows 7 tips

Filed under: Windows — bblackmoor @ 14:12

If you are installing Windows 7, or if you just got a new computer, there are a few things you should do before you start using it. Here they are.

  1. Configure the Start Menu.
    • Right-click the Windows logo on the taskbar.
    • Select “Properties”.
    • On the “Start Menu” tab, click the “Customize” button.
    • Computer: display as a menu.
    • Connect to: not checked.
    • Control panel: display as a menu.
    • Default programs: not checked.
    • Devices and printers: not checked.
    • Documents: display as a menu.
    • Downloads: do not display this item.
    • Enable context menus: checked.
    • Favorites menu: not checked.
    • Games: do not display this item.
    • Help: not checked.
    • Highlight newly installed programs: not checked.
    • Homegroup: not checked.
    • Music: display as a menu.
    • Network: not checked.
    • Open submenus: checked.
    • Personal folder: do not display this item.
    • Pictures: display as a menu.
    • Recent items: checked.
    • Recorded TV: do not display this item.
    • Run command: checked.
    • Search other files: search with public folders.
    • Search programs: checked.
    • Sort All programs menu: checked.
    • System administrative tools: Don’t display this item.
    • Use large icons: checked.
    • Videos: Display as a menu.
  2. Configure Windows Explorer.
    • Hide Libraries. (Or hide favorites, but you certainly do not need both.) (I changed my mind about this. I actually do use both.)
    • Make your local network a Work network (or just hide Homegroup).
    • Open Windows Explorer, click the “Organize” button, and select “Folder and Search options”.
      1. On the “General” tab…
      2. Show all folders: not checked
      3. Automatically expand: checked
      4. On the “View” tab…
      5. Always show icons: not checked.
      6. Always show menus: checked.
      7. Display file icon: checked.
      8. Display file size: checked.
      9. Display the full path: checked.
      10. Hidden files and folders: Don’t show (we will do something about this further down).
      11. Hide empty drives: not checked.
      12. Hide extensions: not checked (this is the most idiotic option ever).
      13. Hide protected OS files: not checked.
      14. Launch folder windows in a separate process: not checked.
      15. Restore previous folders: checked.
      16. Show drive letters: checked.
      17. Show encrypted: checked.
      18. Show pop-up: checked.
      19. Show preview handlers: checked.
      20. Use check boxes to select: not checked.
      21. Use Sharing Wizard: checked.
      22. When typing into list view: Select the typed item.
      23. Click the “Apply To Folders” button, and click OK.
  3. Configure My Documents.
    • In Windows Explorer, navigate to “C:\Users\[your user name]”.
    • Right-click “My Documents”, and rename it to “Documents”.
    • Right-click “My Music”, and rename it to “Music”.
    • Right-click “My Pictures”, and rename it to “Images”.
    • Right-click “My Videos”, and rename it to “Videos”.
    • Drag and drop “Music” into the “Documents” folder.
    • Drag and drop “Pictures” into the “Documents” folder.
    • Drag and drop “Videos” into the “Documents” folder.
    • Drag and drop “Downloads” into the “Documents” folder.
  4. Move the Taskbar to the left side of the screen. With a widescreen monitor (which any new computer will have), it makes much more sense to waste a small strip on the left than a strip that runs all the way across the bottom of the screen, making a narrow display area even narrower.
  5. Install Classic Shell.
  6. Install Toggle Hidden Files and assign a hotkey to it (I use “Windows+h”).
  7. Show drive letters before the drive name.
  8. Install Search Everything.
  9. Install KeyTweak and remap the Caps Lock key to Left Shift.
  10. Add a Take Ownership context menu to Windows Explorer.
  11. Install Ditto clipboard manager.
  12. Install AllSnap (the 64 bit version, if you are running 64-bit Windows). You must disable “Aero Snap” (which is useless) first!
  13. If you use Photoshop, install FastPictureViewer Codec Pack
  14. Remove the user folder from the Explorer navigation pane.

Now that you have done all of that, there are a few essential applications you should consider installing:

  1. 7-Zip
  2. Notepad++
  3. Firefox You might also consider these addons:
  4. Thunderbird with the calendar plugin (You might also consider linking Thunderbird’s address book and calendar to Google.)
  5. Irfanview and the Irfanview plugins
  6. OpenOffice LibreOffice
  7. Avast! Free Antivirus (I eventually uninstalled this. It was just too much of a resource hog, even on a brand new computer.)
  8. Copernic Desktop Search (I paid for the professional version. I think it’s worth it.) (I eventually uninstalled this. It was just too much of a resource hog, even on a brand new computer.)
  9. SmartDefrag
  10. Dexpot
  11. Bulk Rename Utility
  12. FontExpert (It costs money, but if you work with fonts a great deal, it is worth it.) When you put fonts into groups, make sure you create shortcuts, rather than copying the font files.
  13. PeerBlock (Idon’t use this anymore. It interfered with games and I think the benefit is dubious.)
  14. Install VistaSwitcher

Thursday, 2010-03-11

A Closer Look at the PCI Compliance and Encryption Requirements of Nevada’s Security of Personal Information Law

Filed under: Privacy,Security — bblackmoor @ 17:52

In this blog post on infolawgroup.com, David Navetta takes a closer look at the PCI and encryption requirements of Nevada’s Security of Personal Information law, including the interplay between the PCI and encryption requirements, the scope of the obligations, potential problems/ambiguities in the law, and the applicability of a “safe harbor” for security breaches.

Thursday, 2010-02-25

Digital Rights Mafia condemns open source

Filed under: Entertainment,Intellectual Property,Software — bblackmoor @ 23:38

Never content to twist US law into pretzels, the media robber barons also attempt to use their power to make other nation’s laws as bad as those we have here….

In accordance with US trade law, the Office of the US Trade Representative (USTR) is required to conduct an annual review of the status of foreign intellectual property laws. This review, which is referred to as Special 301, is typically used to denounce countries that have less restrictive copyright policies than the United States.

The review process is increasingly dominated by content industry lobbyists who want to subvert US trade policy and make it more favorable to their own interests. […] One of the organizations that plays a key role in influencing the Special 301 review is the International Intellectual Property Alliance (IIPA), a powerful coalition that includes the RIAA, the MPAA, and the Business Software Alliance (BSA). The IIPA, which recently published its official recommendations to the USTR for the 2010 edition of the 301 review, has managed to achieve a whole new level of absurdity.

University of Edinburgh law lecturer Andres Guadamuz wrote a blog entry this week highlighting some particularly troubling aspects of the IIPA’s 301 recommendations. The organization has condemned Indonesia and several other countries for encouraging government adoption of open source software. According to the IIPA, official government endorsements of open source software create “trade barriers” and restrict “equitable market access” for software companies.

[…]

The Indonesian government issued a statement in 2009 informing municipal governments that they had to stop using pirated software. The statement said that government agencies must either purchase legally licensed commercial software or switch to free and open source alternatives in order to comply with copyright law. This attempt by Indonesia to promote legal software procurement processes by endorsing the viability of open source software has apparently angered the IIPA.

In its 301 recommendations for Indonesia, the IIPA demands that the government rescind its 2009 statement. According to the IIPA, Indonesia’s policy “weakens the software industry and undermines its long-term competitiveness” because open source software “encourages a mindset that does not give due consideration to the value to intellectual creations [and] fails to build respect for intellectual property rights.”

The number of ways in which the IIPA’s statements regarding open source software are egregiously misleading and dishonest are too numerous to count.

(from Big Content condemns foreign governments that endorse FOSS, Ars Technica)

“The IIPA — destroying your cultural future to line our pockets today!”

Saturday, 2010-02-13

Digital Rights Mafia successfully bullies BBC

Filed under: Intellectual Property,Technology,Television — bblackmoor @ 12:49

It appears that the Digital Rights Mafia and the media robber barons have successfully done in Britain what they failed to do in the USA in 2003 — bullied the broadcasters into allowing the robber barons to control not only the content, but the devices used to play that content.

In my latest Guardian column, “Why did Ofcom back down over DRM at the BBC?” I look at how lamentably credulous both the BBC and its UK regulator, Ofcom, have been in accepting US media’ giants threats to boycott the Beeb if it doesn’t add digital rights management to its broadcasts. The BBC is publicly funded, and it is supposed to be acting in the public interest: but crippling British TV sets in response for demands from offshore media barons is no way to do this — and the threats the studios have made are wildly improbable. When the content companies lost their bid to add DRM to American TV, they made exactly the same threats, and then promptly caved and went on allowing their material to be broadcast without any technical restrictions.

How they rattled their sabers and promised a boycott of HD that would destroy America’s chances for an analogue switchoff. For example, the MPAA’s CTO, Fritz Attaway, said that “high-value content will migrate away” from telly without DRM.

Viacom added: “[i]f a broadcast flag is not implemented and enforced by Summer 2003, Viacom’s CBS Television Network will not provide any programming in high definition for the 2003-2004 television season.”

One by one, the big entertainment companies – and sporting giants like the baseball and American football leagues – promised that without the Broadcast Flag, they would take their balls and go home.

So what happened? Did they make good on their threats? Did they go to their shareholders and explain that the reason they weren’t broadcasting anything this year is because the government wouldn’t let them control TVs?

No. They broadcast. They continue to broadcast today, with no DRM.

They were full of it. They did not make good on their threats. They didn’t boycott.

They caved.

Why did Ofcom back down over DRM at the BBC?

(From New column: Why is Ofcom ready to allow BBC DRM?, Cory Doctorow’s craphound.com

What the hell has happened to the once-great Britain? They gave us the foundations of our society — the rights of free men to bear arms, the rights of a jury to decide not only if a law was broken, but whether that law should be enforced at all, and the basic right of the governed to expect their government to treat them justly… all of this is due to our country’s British origins.

I have to say, I am a little disappointed with what’s become of them.

Thursday, 2010-02-11

OpenOffice.org 3.2

Filed under: Software — bblackmoor @ 21:17

OpenOffice.org 3.2 is now available, with a handful of new features and improved ODF compatibility.

If you haven’t migrated from MS Office to OpenOffice… what are you waiting for? Hello? It’s 2010!

Six easy steps to a more secure Linux server

Filed under: Linux,Security — bblackmoor @ 14:44

The actual title of the article is “Six easy steps to make a super secure Linux server”, but I think that’s hyperbole. Even so, these are some basic steps that should be followed, and they do help make a server more secure.

  1. Install latest security updates.
  2. Disable root login via SSH
  3. Disable or filter extra services
  4. Remove active guest accounts and test accounts
  5. Remove version notification
  6. Hide application errors and PHP errors

(From Six easy steps to make a super secure Linux server, Technicant)

Tuesday, 2010-02-09

Comically bad password policy

Filed under: Security — bblackmoor @ 11:09

I have believed for a long while now that passwords need to go away. I have to wonder if this comically bad password policy is someone working within the system to get rid of them by making them even more absurd than they already are….

In “How does bad password policy like this even happen?” we addressed the deep question of what goes through someone’s head when he or she creates password policy that makes little or no sense and substantially damages security. The case in point was that of Nelnet, which had a comically bad password policy with restrictions that make no reasonable sense at all. For instance:

It can’t contain two separated numbers (i.e., Abc12ef34 would be invalid)

Perhaps the developers are deathly afraid that someone will have 4+7 in a password and somehow cause SQL to do something dangerous with it. If the database is so brittle as to be incapable of handling something like that, even when special characters such as plus signs are disallowed anyway (another golden example of bad policy at the same site), we can be reasonably certain that the offending organization should not be trusted with any private data anyway.

What can be worse than such ludicrous password policy?

How about a slightly less ludicrous policy that is almost as bad for security and comes with a completely absurd, even insane, explanation for why the password policy is so bad?

This is the case of American Express, evidently. A customer received a thoroughly crazy customer service email explaining the reasoning behind a password policy limited to eight characters, with special characters prohibited. The most unbelievable thing about this entire situation is that the email reads like it was written by a Nigerian scammer, but it came from the American Express “Email Servicing Team.”

Key phrases illustrating the lunacy of the explanation include:

  • We discourage the use of special characters because hacking softwares can recognize them very easily. Presumably, this is meant to refer to keyloggers that might harvest passwords, but the fact of the matter is that detecting passwords is not dependent on the characters used. Key factors such as words (or non-word strings of characters) appearing out of context in the middle of other logged keypresses and time delays at either end of a single, relative short string of characters are much more important for identifying passwords than whether an asterisk is typed.
  • The length of the password is limited to 8 characters to reduce keyboard contact. Some softwares can decipher a password based on the information of “most common keys pressed.” For commonality of keypresses to be used to statistically identify passwords, your passwords will have to be incredibly long. Otherwise, every time you type Xerox, the date or time, or an emoticon, someone trying to parse a keypress log is going to have to check to see if it is a password. Sorry — this part of the explanation is even less reasonable than the first quote.

This little gem of an email from Saturday has already spread like wildfire amongst online communities populated by people with an inkling of what “security” means, and the consensus is that whoever this person is, he or she does not not know what “security” is. One can only hope that this person is making things up to BS a customer, rather than actually expressing official American Express “security” policy.

The alternative is too horrible to imagine.

Monday, 2010-02-08

Excessive use of Internet can lead to depression

Filed under: Entertainment,Society,Technology — bblackmoor @ 16:24

Excessive use of Internet can lead to depression

Wednesday, 2010-01-27

Apple bundles monstrous DRM with iPad

Filed under: Intellectual Property,Technology — bblackmoor @ 18:55

All your books are belong to us

This summer we saw the dangers of DRM on ebook readers, when Amazon deleted hundreds of copies of George Orwell’s 1984 from readers’ computers while they slept. Applying this control to a general purpose computer marketed especially for media distribution is a huge step backward for computing, and a blow to the media revolution that happened when the web let bloggers reach millions without asking for permission.

DRM and forced updates will give Apple and their corporate partners the power to disable features, restrict competition, censor news, and even delete books, videos, or news stories from users’ computers while they sleep– using the device’s “always on” network connection.

Apple can say they will not abuse this power, but their record of App Store rejections gives us no reason to trust them. The Apple Tablet’s unprecedented use of DRM to control all capabilities of a general purpose computer is a dangerous step backward for computing and for media distribution; we demand that Apple remove DRM from the device.

(from Defective By Design)

Oracle buys Sun

Filed under: Technology — bblackmoor @ 18:37

Oracle announced Wednesday it completed its acquisition of Sun Microsystems in a deal valued at more than $7 billion, a move that transforms the database and business-software giant into a hardware company as well.

(from Oracle buys Sun, becomes hardware company, CNet)

« Previous PageNext Page »