101 Uses For a Password Manager

Posted by JD 03/25/2011 at 16:00

Ok, not really 101 uses for a Password Manager, but many more than you thought, about 30.

Use A Password Manager

For the last few years, I’ve been trying to get anyone with more than 5 passwords to remember to start using a password manager, PM, as part of increasing your desktop security. Below I’ll go into a few alternate uses for that password database beyond just storing computer and website passwords.

Off-Site Backup for Home or Small Biz

Posted by JD 02/02/2011 at 12:00

Scott the Storage Guy wrote a little blog post about the offsite storage options now that Mozy has removed their unlimited plan. Crashplan was his winner. It supports Windows, Mac, Linux and Solaris, nice. Seems there’s a 15% off deal for former Mozy clients.

Rdiff-backup vs Duplicati on Windows 2

Posted by JD 01/08/2011 at 10:52

I like backups. I like them more since losing many, many GBs of data over a decade ago – before I got backup religion.

Many of the long term readers know that I’m always looking for a better backup method.

I’ve been using rdiff-backup for about 3 years on Linux systems and mostly like it, but it isn’t perfect. Yesterday, I decided to check out a new way to backup my Windows7 laptop, Duplicati. I’d seen a few GUI tools for Windows that use the back end Duplicity tool. I’d always been interested in Duplicity because it does things that many other free tools do not. Things like encryption and networked backups to lots of services (Amazon S3) or just over ssh/sftp.

Keep reading for more on the different experience with Duplicati vs rdiff-backup.

Tips for Digital Photo Organization, Storage and Archival

Posted by JD 01/05/2011 at 15:35

By some standards, my 10,000+ digital photo collection is either very large or trivial. I suspect that professional photographers probably have hundreds of thousands of photos. Many of those will have different post-processing.

Organizing, backing up and archiving digital photos and images doesn’t have to be complicated to do well.

Organization

As you take the photos, place them into your organization. If you delay more than a week after returning from that once-in-a-lifetime vacation to Africa, then you probably will never perform any useful organization. Below are 8 steps to help you organize your photos efficiently.

2010 Article Summary

Posted by JD 01/01/2011 at 11:00

New Toy-Thermaltake BlacX Duet eSATA Dual Dock

Posted by JD 12/29/2010 at 07:45

I received a Thermaltake BlacX Duet eSATA USB Dual Hard Drives Docking Station for Xmas. I’d asked for it since almost no non-nerd would have known what it was. Today was the first day that I got a chance to plug this baby in.

Thermaltake Dual eSATA Dock

First Impressions

How to Deal With Computer Viruses

Posted by JD 11/12/2010 at 21:40

We all get computer viruses, eventually. There is nothing anyone can do, but whether it is a small inconvenience or a major computer-doesn’t-work-for-weeks issue is up to you.

It doesn’t matter which operating system you have. Viruses have been written for it. It is true that since 92% of all computers in the world run MS-Windows, that platform is the main target, but Apple’s OSX, Linux, Solaris, AIX, iPhones, iPads, Blackberries, Android, Windows7 Phones are all targets too. If it runs with a computer, then it can have a virus. Those electronic picture frames have carried viruses.

Below, I outline the steps to recover from a virus infection or worse.

Family Member Got Hacked - via Social Method 6

Posted by JD 11/08/2010 at 20:45

It had to happen eventually. Regardless of how careful we all are, if we run MS-Windows-something, our PCs will get infected. One of my family members, who lives a few states away, got infected with at least 1 virus, probably a botnet and a keylogger too.

I’m working on a plan to deal with the issue over Thanksgiving. Below are the initial thoughts.

Linux Training and Documentation Resources 2

Posted by JD 10/29/2010 at 11:27

If you want to learn something about Linux, there are a wide range of learning materials available out there.
Much is for beginners, but there are some intermediate and advanced course materials available too.

The best place to begin is with the documentation from your distribution.

Internet search engines will find lots of documentation for other distros too, but knowing that Distro-Z is based on Distro-Y means that the documentation for Distro-Y probably works for Distro-Z too. A concrete example – Ubuntu is based on Debian, so if you use Ubuntu and can’t find the document under Ubuntu, look for it under Debian.

Eventually, you will want know something that isn’t in those documents. To address this, each major distro also has forums and email-list-servers.

Be certain to spend at least 45 minutes searching the forums for your question and answer before you post. Read the Acceptable Use Policies for each forum too. Basically, if you are on-topic, respectful and cordial, then you won’t have any issues.

Some general information about Linux and HowTos also exist.

Because Linux is very much like UNIX, much of the information and techniques used and documented for UNIX systems over the last 30+ years will work on Linux. Don’t be afraid to read UNIX How-To Guides that you find out there.

Books – I find that anything written in a book is out of date by the time it gets published. That doesn’t mean you don’t want a classic like UNIX System Security in your collection, just that the details of an implementation covered in the book are probably out of date. The architecture coverage is probably just fine.

Just because you can do something doesn’t mean it is a good idea and doesn’t impact your security. When you read any online information that tells how to do something – ask yourself how it impacts your privacy and system security.

Linux Backups via Back-In-Time

Posted by JD 10/28/2010 at 08:55

One of the main reasons that people give for not performing backups is that it is too difficult. The Back In Time program solves that issue for anyone using Linux, Ubuntu, Redhat, Slackware, etc. Both Gnome and KDE version are available.

Back-In-Time uses file system hardlinks to manage snapshots efficiently. This trick has been used for 20+ years on UNIX operating systems to provide backups. That means it has been well proven, but it also means this technique doesn’t work on Windows because hardlinks in Windows work differently. After the first complete copy is made to the backup area, any snapshots made after that point use hardlinks for each file that doesn’t change. Basically, it costs ZERO storage to make additional hardlinks. Neato.