{"id":930,"date":"2012-06-14T21:16:00","date_gmt":"2012-06-14T20:16:00","guid":{"rendered":"http:\/\/leirdal.net\/blog\/?p=930"},"modified":"2012-06-14T21:16:00","modified_gmt":"2012-06-14T20:16:00","slug":"5-tips-for-safe-computing","status":"publish","type":"post","link":"https:\/\/www.leirdal.net\/blog\/archives\/930-5-tips-for-safe-computing.html","title":{"rendered":"5 tips for safe computing"},"content":{"rendered":"<p>As many you already have learned, the straits of Internet are dire to navigate. Just to have a presence online open you up for several new ways to get into trouble. I might not be a bonafide security expert, but I am a computer professional, advanced user, developer and software architect. Thus I will attempt to give a few advice for all you people online, both safe practice and software that might help you. I prefer software that do not cost too much, but I am not afraid to pay for useful tools.<\/p>\n<p>So below you will find my top 5 tips for being secure online:<\/p>\n<h2>1. Be up to date<\/h2>\n<p>The most important thing to do is to always keep your operative system and software up to date. If there are updates from Microsoft, Apple, Google, Ubuntu or whatever software vendor you are using, remember to install the latest security updates. Most software today have features that help you perform this task, but there are tools that may help you even further along. One of these only exist for Microsoft Windows, but if you are a Windows user check it out, it is free.<\/p>\n<p><a title=\"Secunia Personal Software Inspector\" href=\"http:\/\/secunia.com\/products\/consumer\/psi\/\">Secunia Personal Software Inspector (PSI)<br \/>\n<\/a>This program analyzes your computer and detects all software that have new updates you should consider applying.<\/p>\n<h2>2. Anti-Virus software and internet security suites<\/h2>\n<p>There are several that you might find interesting, especially for Windows. One that is free and probably safe enough is <a title=\"Microsoft Security Essentials\" href=\"http:\/\/windows.microsoft.com\/en-US\/windows\/products\/security-essentials\">Microsoft Security Essentials<\/a>. Other well known vendors are <a title=\"Norton\" href=\"http:\/\/norton.com\">Norton<\/a>\u00a0(Mac &amp; Windows), <a title=\"Norman\" href=\"http:\/\/www.norman.com\/\/en\">Norman<\/a>\u00a0(Windows), <a title=\"Kaskpersky Lab\" href=\"http:\/\/www.kaspersky.com\/\">Kaspersky<\/a>\u00a0(Mac &amp; Windows)\u00a0and <a title=\"F-Secure\" href=\"http:\/\/www.f-secure.com\/en\/web\/home_global\/home\">F-Secure<\/a>\u00a0(Mac &amp; Windows). (There are several other brands as well do a <a title=\"Google search for Best Anti Virus Software.\" href=\"https:\/\/www.google.no\/search?sugexp=chrome,mod=18&amp;sourceid=chrome&amp;ie=UTF-8&amp;q=best+antivirus\">Google search<\/a>).<\/p>\n<p>Several of these brands even have smartphone and tablet versions of their anti-virus software.<\/p>\n<h2>3. Secure passwords<\/h2>\n<p>One thing we have learned several times recently is that your passwords are under attack. Some days ago (when I wrote this blog-entry) someone managed to steal 6 million encrypted passwords from LinkedIn.com. One security professional got hold of this file and within 6 hours of playing around using a regular laptop <a title=\"Broken LinkedIn passwords\" href=\"https:\/\/community.qualys.com\/blogs\/securitylabs\/2012\/06\/08\/lessons-learned-from-cracking-2-million-linkedin-passwords\">he had broken 2 million of those passwords<\/a>. If your username on LinkedIn is a name you also use at other sites, and you use the same password at those sites you are in deep trouble. You can be hacked any moment. Please read his <a href=\"https:\/\/community.qualys.com\/blogs\/securitylabs\/2012\/06\/08\/lessons-learned-from-cracking-2-million-linkedin-passwords\">article<\/a> on this.<\/p>\n<p>In order to get around this, use a password manager! These tools help you create secure passwords and to remember them afterwards. Some of the best are listed here at <a title=\"Lifehacker - Five best password managers\" href=\"http:\/\/lifehacker.com\/5042616\/five-best-password-managers\">Lifehacker.com<\/a>. Personally I prefer <a title=\"AgileBits - 1Password\" href=\"https:\/\/agilebits.com\/onepassword\">1Password<\/a> (Windows, Mac, iPhone, iPad and Android versions), but <a title=\"KeePass\" href=\"http:\/\/keepass.info\/\">KeePass<\/a> is also very good. 1Password let you sync your passwords across all these devices, and have plugins for all the big web-browsers. It will be slightly harder to log-in, but the upside is enormous security wise.<\/p>\n<p>A quick user-tip, most of us are not able to remember that many passwords. Let the password manager create random passwords wherever that is possible. Some passwords you need to remember though. Create a random password that you will be able to remember, and add some rules to that for using on several sites\/log-ins. For example you might get a random part of <em><strong>dYzzb12%tw<\/strong><\/em>. You might even be able to remember that. A password I frequently have to use is my Windows login. In order to have different passwords for several sites I might add some letters to this base password for every site I need to remember my password. For example if I am using Windows 7, I might do <strong><em>W7dYzzb12%tw<\/em><\/strong>. Personally I will use something else though, I will take the first letter and add a number, and the second letter and reduce a number. W+1 = X and 7-1=6 so my to first letter will then be X6 and the rest. By doing this I am reasonably secure, and I am able to remember my password for several sites. I will then change the random password part quite frequently. By using the password manager I will also be able to remember where I used each password if I ever forget.<\/p>\n<h2>4. Safe networking<\/h2>\n<p>This is also quite a large point, but mostly do the following. If you are on another network than your home network, then prefer encrypted WLAN\/WIFI networks. If you are not able to use any of those, use a <a href=\"http:\/\/lifehacker.com\/5759186\/five-best-vpn-service-providers\">VPN<\/a> for a safe connection (this also applies to your smartphone or tablet). If you cannot use VPN, always try to use a site over SSL (use the https:\/\/&#8230;. address). It is quite common for cyber criminals to set up &#8220;open&#8221; WLAN\/WIFI networks at airports and conferences and trick you into using their network. When you type your password or other private information they then try to grab it. If you are not using some protection you are in big trouble.<\/p>\n<h2>5. Be smart<\/h2>\n<p>Do not use pirated software, don&#8217;t visit shady sites. Do not believe in offers to good to be true. Do not trust links from friends or email from strangers. Behave online like you would in an unknown city and walk only along the safe paths.<\/p>\n<p>By doing all these things you will be reasonably secure online. Good luck.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As many you already have learned, the straits of Internet are dire to navigate. Just to have a presence online open you up for several new ways to get into trouble. I might not be a bonafide security expert, but I am a computer professional, advanced user, developer and software architect. Thus I will attempt [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[5,13,11],"tags":[314,513,517,277,113],"class_list":{"0":"post-930","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-internet","7":"category-security","8":"category-technology","9":"tag-hacking","10":"tag-internet","11":"tag-security","12":"tag-tips","13":"tag-web","14":"czr-hentry"},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p1xqPf-f0","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":68,"url":"https:\/\/www.leirdal.net\/blog\/archives\/68-wish-for-2008.html","url_meta":{"origin":930,"position":0},"title":"Wish for 2008","author":"leirdal","date":"2008-01-08","format":false,"excerpt":"When you read the news from anti-virus companies and security advisors you get convinced that 90% of the software you find on the net is malware, and the last 10% have so many security issues that it turns out the same thing. At the same time a life seems to\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/www.leirdal.net\/blog\/archives\/category\/internet"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":846,"url":"https:\/\/www.leirdal.net\/blog\/archives\/846-a-wish-for-corporate-social-software.html","url_meta":{"origin":930,"position":1},"title":"A wish for corporate social software","author":"leirdal","date":"2012-01-12","format":false,"excerpt":"I attended an IXDA meetup yesterday discussing among else \"Collaborating in the stream\". Pete Lacey from Podio showed us some of their ideas regarding different communication types in different activity streams or different applications. The catch though, everything runs on their server; in the cloud. Now personally I use the\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/www.leirdal.net\/blog\/archives\/category\/internet"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1909,"url":"https:\/\/www.leirdal.net\/blog\/archives\/1909-online-webinars.html","url_meta":{"origin":930,"position":2},"title":"Online webinars and IT Trends","author":"leirdal","date":"2014-08-29","format":false,"excerpt":"If you know where to look there is an amazing amount free training or talks online. I recently attended a free Webinar from Gartner called \u201cTen Trends and Technologies to Impact IT Over the Next Five Years\u201d by Raymond Paquet. I found it interesting, mainly because it matches what I\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.leirdal.net\/blog\/archives\/category\/technology"},"img":{"alt_text":"Theme Geometry","src":"https:\/\/i0.wp.com\/www.leirdal.net\/blog\/wp-content\/uploads\/2012\/09\/5D32728-20120903.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.leirdal.net\/blog\/wp-content\/uploads\/2012\/09\/5D32728-20120903.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.leirdal.net\/blog\/wp-content\/uploads\/2012\/09\/5D32728-20120903.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.leirdal.net\/blog\/wp-content\/uploads\/2012\/09\/5D32728-20120903.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.leirdal.net\/blog\/wp-content\/uploads\/2012\/09\/5D32728-20120903.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":123,"url":"https:\/\/www.leirdal.net\/blog\/archives\/123-the-future-2-0.html","url_meta":{"origin":930,"position":3},"title":"The future, 2.0","author":"leirdal","date":"2008-11-01","format":false,"excerpt":"As a follow up to my earlier fantasy of new possibilities regarding a documented generation I would like to blow out some steam regarding social software as well. One of the problems we see today is that there are only a few people producing the information that is consumed by\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/www.leirdal.net\/blog\/archives\/category\/internet"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":30,"url":"https:\/\/www.leirdal.net\/blog\/archives\/30-fingerprints-as-identification.html","url_meta":{"origin":930,"position":4},"title":"Fingerprints as identification","author":"leirdal","date":"2007-10-26","format":false,"excerpt":"Bruce Schneier had a blog entry about the security of partial fingerprints yesterday. His main point is that there has been a ruling in an US court recently that partial fingerprints cannot be used in a murder case. He links among else to the news-article (update: link removed, not longer\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/www.leirdal.net\/blog\/archives\/category\/internet"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":35,"url":"https:\/\/www.leirdal.net\/blog\/archives\/35-social-software-the-roadmap-forward.html","url_meta":{"origin":930,"position":5},"title":"Social software &#8211; the roadmap forward?","author":"leirdal","date":"2007-11-02","format":false,"excerpt":"Earlier this week there was a launch of a new open web API called OpenSocial. Marc Andreessen writes a bit about it on his blog (Update 2010-05-28: Article gone - only links to his blog). He says that OpenSocial is an API that can be supported by \"Containers\" or social\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/www.leirdal.net\/blog\/archives\/category\/internet"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.leirdal.net\/blog\/wp-json\/wp\/v2\/posts\/930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.leirdal.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.leirdal.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.leirdal.net\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.leirdal.net\/blog\/wp-json\/wp\/v2\/comments?post=930"}],"version-history":[{"count":5,"href":"https:\/\/www.leirdal.net\/blog\/wp-json\/wp\/v2\/posts\/930\/revisions"}],"predecessor-version":[{"id":935,"href":"https:\/\/www.leirdal.net\/blog\/wp-json\/wp\/v2\/posts\/930\/revisions\/935"}],"wp:attachment":[{"href":"https:\/\/www.leirdal.net\/blog\/wp-json\/wp\/v2\/media?parent=930"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.leirdal.net\/blog\/wp-json\/wp\/v2\/categories?post=930"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.leirdal.net\/blog\/wp-json\/wp\/v2\/tags?post=930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}