How to shuck corn like a man.
Blog Posts
I have a Samsung S3 that decided it wouldn’t boot on Wednesday. After talking to the very helpful people at Samsung they decided that they can replace my phone for me but I need to send them my broken phone.
Awesome!
But…
All my data is on my phone. All my email. All my passwords. All my texts. All my pictures. I have backups and I have a password on my phone but I still have to send my phone back to a company who could access it if they wanted to.
So what is a security professional to do? Normally I would just wipe my phone and send it in but since that isn’t an option I am stuck with either keeping a $400 brick or possibly exposing my data to Samsung.
I guess I have a $400 brick.
The Missouri Capitol on the 4th.
GodMode is a control panel In (Windows 7 and Windows 8) that brings together all of the customization settings to one place.
To activate “GodMode” do the following:
Step 1: Right click on the desktop
Step 2: Click create folder.
Step 3: Name the new folder: GodMode.{ED7BA470-8E54-465E-825C-99712043E01C} and press enter.
Step 4: The folder changes form a folder icon to a control panel icon.
Step 5: Open the folder and you have your god mode control panel.
Earlier today I was asked to come up with the best way to keep your social media accounts secure. Here are 5 easy ways to protect your social media accounts:
Update accounts with unique, complex passwords.
Complex passwords will contain a combination of upper and lower case letters, symbols and numbers, and have at least ten characters.
Change your password often.
No matter how complex your password is it is necessary to change it regularly. Normally I suggest changing your social media passwords two times a year.
Enable Two Factor Authentication.
Google, Facebook and Twitter all offer two factor authentication. Enabling it allows these services to know that it is you logging into your account and not someone else.
Review apps and add-ons regularly.
Review all apps and add-ons associated with your social media accounts at regular intervals. Remove apps and add-ons you no longer use or post to your social media accounts without your permission.
Log out.
Remember to log out when you are finished using it. It is an easy and highly effective step to protect your account.
I made the Alton Brown Skirt Steak on coals tonight. It was really good but next time I make it I will leave it on another minute to get it medium-rare instead of rare.
Here are a couple of pictures:
In two weeks I am on a career panel for a group of high school kids interested in technology careers. They sent a list of discussion questions they were going to use to get the conversation started and one of them was:
What does it take to be successful in information technology?
The answer to this question I always give is:
If you want to be successful in information technology and life in general you need to implement the no no rule.
The no no rule is extremely simple: When asked a question your first response should never be no.
The two none yes responses I use are:
1) Ask for more information or clarification.
2) Ask for time to research a solution.
In a lot of cases (especially in security) after you ask for clarification or time to research the answer may still be no but you will have given the question some real thought and understanding and the person making the request wont feel like you are ignoring them. A lot of information technology professionals get a bad reputation because they say no to often.
My son asked me on Saturday as we were going into the store why an old guy was selling flowers. It gave me an opportunity to tell him about the “true meaning” of Memorial Day and explain to him that some of our bravest hero’s don’t get to come home.
So today I will be spending sometime thinking about the people who gave everything.
In Flanders fields the poppies blow
Between the crosses, row on row,
That mark our place; and in the sky
The larks, still bravely singing, fly
Scarce heard amid the guns below.We are the Dead. Short days ago
We lived, felt dawn, saw sunset glow,
Loved and were loved, and now we lie
In Flanders fields.Take up our quarrel with the foe:
To you from failing hands we throw
The torch; be yours to hold it high.
If ye break faith with us who die
We shall not sleep, though poppies grow
In Flanders fields.– John McCrae, May 1915
The DBA in my office doesn’t read my blog and kept trying to convince me her CD-Rom kept opening up randomly until she finally broke down and caught it with her iPhone.
I got a call from a friend who was sure his PC was hacked because his CD-ROM drive kept randomly opening and closing. After looking at the machine I found a .vbs file in his appdata folder named RandomlyOpenCD.VBS (surprisingly It randomly opens and closes the CD drive) and nothing else that looked like an APT.
After making a copy of the code, deleting the file and rebooting his PC it was fine and his CD drive was back to a non-hacked state.
The practical joker in me makes it nearly impossible to not share the code:
Dim smax, smin, rmax, rmin, start, repeat
smax=900000
smin=300000
rmax=600000
rmin=100Set oWMP = CreateObject(“WMPlayer.OCX.7”)
Set colCDROMs = oWMP.cdromCollectionRandomize
start=(Int((smax-smin+1)*Rnd+smin))
wscript.sleep startdo
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
colCDROMS.Item(i).Eject
Next
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
End IfRandomize
repeat=(Int((rmax-rmin+1)*Rnd+rmin))
wscript.sleep repeatloop