Swamp Geek
  Login or Register HomeDownloadsYour Account   
Navigation 
Site Info 
Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 4,142,757
  • Today: 372
Server InfoServer Info
  • Mar 19, 2024
  • 05:48 am CDT
 
 
Reviews, comparisons, and opinions about the latest technology products, services, trends and anything of interest to the thick glasses crowd!

Swamp Geek: Swamp Tech



Search on This Topic:   
[ Go to Home | Select a New Topic ]

Circumventing screen savers More about
Swamp Tech

Your friend left you alone to remotely fix her PC, and didn't share her password.  You took a break while a long-running utility completed, and when you returned, the screen is locked or the system went to sleep, and your friend is unavailable.  What to do?  Not much, unfortunately.  But keep these links handy to install a way to prevent lock outs next time.

The utilities enable you to override the power settings and / or screen saver settings by simulating activity on a Windows computer.  They run in the task tray and can be configured there.  Since most don't require installation, require little space and memory and have no license costs, these utilities make great additions to your portable tool kit.

Power Settings

Windows Power Settings optimize the use of electricity by automatically shutting down, moving to standy, or hibernating the system.  This isn't always optimal for remote support.  Fortunately there are some free, no-install utilities to address this.

Preventing Screen Saver Locks

Microsoft Windows can also lock the screen due to inactivity based on the screen saver settings.  Some utilities prevent this by periodically simulating keyboard or mouse movements.

Awake

Microsoft PowerToys Awake is "designed to keep a computer awake without having to manage its power & sleep settings." Unfortunately, Awake must be installed with all the Microsoft Powertools (i.e. it is not portable), and the download is large.

Caffeine

Caffeine from Zhorn Software simulates a keypress once every 59 seconds, so your machine thinks you're still working at the keyboard, so won't lock the screen or activate the screensaver.

Don't Sleep

Don't Sleep from Software OK is "a small Freeware Windows program to prevent system shutdown, Standby, Hibernate, Turn Off and Restart."  It can also be used to schedule shutdown and restart actions based on time, battery level, CPU load and / or network activity.  You can also use the app to "Please sleep" (turn off the display, etc.) under similar conditions.

Mouse Jiggler

Unlike the other utilities, Mouse Jiggler works by simulating the slight movement of a mouse. For reference, there are hardware devices that serve the same purpose.  But also unlike other utilities, Mouse Jiggler requires an updated .NET framework, which is unlikely to be installed on your friend's computer.  Although there is a portable version, it contains multiple files and requires much more space.

SwampGeek Recommends...

With the most functionality in the smallest, portable executable, Don't Sleep earns the SwampGeek Recommended seal of approval.

Paying to be the Product More about Read More...
Swamp Tech

Now I'm Paying to be the Product?Anil Sabharwal, Head of Google Photos, May 28, 2015 introducing Google Photos: "And when we say a lifetime of memories, we really mean it. With Google Photos, you can now backup and store unlimited, high-quality photos and videos, for free." Maybe in Google years, 6 years is a "lifetime." 

As of June 1, 2021, Google users will be paying to be the product when Google ends free unlimited Google Photos storage. After that date, Google combines storage of new photos with Gmail and Google Drive, currently limited to 15GB for free. To ease the (pain) transition, the company estimates when your current storage will run out, based on historical usage.  Gee, thanks! Even worse, the company will purge inactive accounts.  Free Google Workspace, formerly Google Apps, accounts suffered a similar fate.

This update breaks the terms of the original contract with users: give us access to sell the private info we collect from your photos, and we'll let you store and search them for free.  But Google expects you to keep your part of the original bargain: it will continue to collect and market your personal information from those photos, even if you pay for storage. To make matters worse, Google makes deleting photos difficult for those who want to continue using Google's storage within free limits. For now, you can still add photos while they're free.  But those who don't agree to the new terms have alternatives to the impacted services: Gmail, Google Photos and Google Drive.

 Read More...
Limit access to your Facebook friends list to reduce spoofing Comment Read More...
Swamp Tech

The REALFACE by REAL-f.CO

How can you reduce the spoofing of Facebook accounts?  Asking for a friend...(actually, for all of them!)

"If you get a friend request or Facebook message from me, ignore it - I've been hacked."  Technically, you've been "spoofed," not hacked.  The spoofer merely created an account pretending to be yours for any number of nefarious reasons.  And it turns out that a simple privacy setting may have prevented that, or at least limited the scope of the spoof.

Here's how to reduce spoofing by limiting access to your Facebook friends list.

 Read More...
Should you use a virtual private network (VPN)? Comment Read More...
Swamp Tech

A Wall Street Journal article "Why You Need a VPN - and How to Choose the Right One" prompted a discussion on the benefits of using virtual private networks, or VPNs. VPNs can be an important part of online security and also of online privacy.  VPNs are absolutely necessary when connecting to a public network (hotel, coffee shops, airports, etc.).  However, using a VPN can also cause problems, and there are other tools that can complete your toolbox for online security and privacy.  

VPNs
 Read More...
Wordpress themes and page builders Comment
Swamp Tech

With the pending release of Wordpress 5.0 - including the Gutenberg editor / page builder, an evaluation of leading themes and page builders is in order.  This detailed comparison will consider features, usability, performance and price.

More later...

Does the future belong to Open Source? More about
Swamp Tech

An unfinished article originally published February 5, 2005:

The January 31, 2005 issue of Computerworld doesn't discuss it - but the headlines don't lie: 

A) Zend raises funds from Intel, SAP
B) Mapics acquired in $350M deal
C) Open-source gnaws its way into the heart of Oregon's economy
D) Sun begins its release of Open-Source Solar Code 

And there are several other articles that discuss even more open source initiatives. Important questions remain. Are Open Source initiatives forcing commercial vendors to consolidate or disappear? Does the future belong to Open Source? (article in progress)

It's free, or not to be...

IBM released database (Cloudscape) technology as open source. Computer Associates released its Ingress database to the open source community. SAP gave it's MaxDB to MySQL as open source. These major software vendors hope to gain market share to increase services revenue, making these open source offerings loss-leaders, in a sense. But, without the mass development made possible through an open source model, these databases likely would not have been able to compete with more successful commercial competitors DB2, Oracle and SQLServer and their deep-pocketed vendors. Sun's release of Solaris as open source seems like an admission that it can't compete with Windows, but possibly with Linux... 

Of course, most open source software is hardly recycled shelfware. Linux, Apache's HTTP server, MySQL's database and the PHP web scripting language have proven their superiority over commercial rivals for many applications - and it will be even more difficult for the commercial vendors to catch up.

High-quality open source applications have started to prove worthy in higher-end applications as well.SugarCRM (and others) offer full-function CRM applications via open source. Open source content management applications (too numerous to mention), customer service / help desk, compete more than favorably with their commercial counterparts. 

Why is it free? 

Is it secure?

Is Rural Outsourcing In Your Future? More about
Swamp Tech

Originally published November 15, 2004:

The former CIO of Cardinal Health is developing an alternative to offshore IT outsourcing. Her company, Rural Sourcing, Inc. (RSI), operates in low-cost rural areas in the US to compete with offsource outsourcers, and the idea is catching on.Kathy Brittain White started RSI after working with several large companies like Mattel and Cardinal Health, where she worked with offshore outsourcers. Her approach is to create development centers near rural universities, combining rigorous high-quality development methodologies with local resources in a low-cost environment. RSI's first two development centers are in Arkansas. Other companies, like Aurora Consulting Group, Inc. near Buffalo, NY, have a similar approach. RSI is taking advantage of incentives from New Mexico and North Carolina to open development centers there in 2005.

Large companies and government providers are increasingly working with rural outsourcers because rural outsourcing addresses the problems of offshore outsourcing:
face-to-face communication, time-zone, language and cultural differences, and citizenship requirements for government work. But, possibly even more important, it can also provide evidence in an ongoing debate on whether the real benefits of offshore outsourcing outweigh the real costs. Many IT workers believe this issue is swept under the rug by company leaders seeking to protect their public company's stock price.

If so, rural outsourcing's competition may be a sleeping giant. In addition to lower costs, offshore outsourcers tout higher productivity and processes compliant with international quality standards. But they haven't provided much proof - not that US companies are asking. Instead, the ITAA defends offshoring with conflicting arguments, claiming there is a shortage of IT labor in the US and that the loss of 35,000 IT jobs per year is related to economic conditions and the burst of the Internet and telecom bubbles. The ITAA, referred to by some US IT professionals as a lobbyist for offshore outsourcers, doesn't include outsourcing in the list of IT issues on its website, even though 11 of the 25 headlines listed there are related to outsourcing issues, and disputes of its studies supporting offshoring have been presented as testimony to Congress. 

But some big service providers with significant investments in offshore locations like CapGemini have noticed rural outsourcing and are developing rural centers themselves. However, they question whether smaller rural outsourcers can handle bigger projects. Ramping up for new projects hasn't been an issue for RSI, notes White.

Others question the positive impact of rural outsourcing on IT employment. In a Computerworld editorial, Frank Hayes described the "Farmshore Future." He argues that this won't be good for the corporate IT worker because it provides more incentives for companies to replace employees with outsourced workers, even if they are still in the US.

Rural outsourcing employees may earn less than their urban counterparts. They may live in less popular and less expensive areas, but they have jobs and pay taxes, and for many, that is the point.

Top 10 Implications of Microsoft Buying Google More about
Swamp Tech

Originally published October 31, 2003:

Stolen from the ever-hilarious Fool.com, this list is guaranteed to make you "search" for a laugh...

10. Free worm with every search.

9. Google renamed "Microoosoooft." 

8. Google becomes default search engine on all computers; attempts to use Yahoo! causes PCs to emit a pungent odor. 

7. The search choices on Google will change from "Web," "Images," "Groups," "Directory," and "News" to "Web," "Shop Microsoft," "Buy From Microsoft Because You Have No Choice," and "Steve Ballmer Dancing." 

6. Google Image Search will not show Microsoft's dark side. 

5. All searches on the term "Steve Jobs" will return bios on Art Garfunkel, Ike Turner, Burt Ward (a.k.a. Robin), and other second fiddles. 

4. Long speeches from Bill Gates about how "Smart Appliances" will allow owners to use Google to search for what's in their fridge. When pressed, Gates admits such appliances are only available in his mansion, and that he's never actually seen his refrigerator. 

3. Microsoft uses Google technology to search for weapons of monopolistic destruction. 

2. All searches on the term "Larry Ellison" will produce lists of garbage-collection websites. 

1. "Bill Gates is richer than Warren Buffett" subliminally inserted into all search results. 

Source: Fool.com

Computer Security More about
Swamp Tech

Originally published October 22, 2003:

Taken from a PC Magazine article, this article addresses all aspects of PC security, including data protection, communication protection, and physical protection.References:Computer Cops 

First, do this right NOW: block W2K, NT and XP pop-up spam messages (not the same as pop-ups from web pages) by disabling the Windows Messenger. To do this, open Control Panel, Administrative Tools, Services, then right click Messenger and go to Properties. Set Start-up Type to Disabled and press the Stop button. (Firewalls should also stop them, but may not if they are initiated via an email). 

There are multiple approaches to protecting data:

  • Encryption
  • Steganography
  • Data erasers
  • Activity Tracking Removal (Covering your tracks)
  • Secure USB drives
  • PDA protection

Encryption - used to prevent people from reading files without knowing a password
Key attribute: encryption level: 64-, 128-, 256-bit keys (64 is good enough, and higher is better)
Utilities: FileAssurity (www.articsoft.com)

Steganography - hiding documents inside multimedia files with a password and special software required to extract
Key Attribute: Unless you're a criminal or terrorist, use file encryption instead.

Data erasers - repeatedly overwriting files so they can't be recovered (e.g. when you sell your computer)
Key Attribute: DoD standards support
Utility: Eraser (free) www.heidi.ie 

Activity Tracking Removal - covering your tracks by removing the various histories left behind (auto-complete, web history, cookies, run history, find history).
Key Attributes: remove all types, integrate with data erasers, interface / ease-of-use, browser plug-in history removal support
Utilities: Window Washer (www.webroot.com), AbosluteShield Internet Eraser Pro (www.internet-track-eraser.com), Windows Trace Remover (www.bulletproofsoft.com) 

Secure USB drives - highly portable, easily lost requires security
Key Attributes: technology (e.g. fingerprint,password), software installed on drive or host
Alternative: data encryption of files on USB drive
Products: ThumbDrive, ThumbDrive Touch (www.trekstorusa.com), USB007 (www.sub007.com) 

PDA protection - physical (not worthy of consideration) and software protection for handheld devices
Key Attribute: encryption support, password database with desktop synchronization
Utilities: eWallet (www.iliumsoft.com), Signature Wallet (www.cic.com), Passwords Plus (www.dataviz.com) 

There are many ways to secure and protect your electronic communications (Internet browsing, email, IM):

  • Antivirus tools
  • Firewalls
  • Wireless security
  • Secure e-mail
  • Private information on public PCs
  • Antispam
  • Secure Browing
  • Anonymous browsing
  • Secure IM
  • Antispyware 

Antivirus tools - incredibly only 90% of PC users use these tools to stop viruses, worms, and Trojan horses (why not 100%??)
Key Attributes: frequent updates, effectiveness, cost
Utilities: AVG (free) (grisoft.com) 

Firewalls - software or hardware tools for blocking inappropriate access from or to a computer, most broadband routers have built-in hardware firewalls
Key Attributes: access control features, cookie blocking, effectiveness
Utilities: Zone Alarm (free) (ZoneLabs.com), Sygate (free) (Sygate.com) 

Wireless security - important for wireless users in high-density areas, includes technologies like password key-based WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) and MAC filtering (allows only specified wireless cards to access)
Key Attributes: features (WEP, WPA, Mac Filtering), cost 

Secure e-mail - encryption, digital signatures, public key access
Key Attributes: ease-of-use, security options
Utilities: Zip Lip (free) (ziplip.com), HushMail (free) (hushmail.com), FileAssurity (articsoft.com), SecExMail (bytefusion.com) 

Private information on public PCs - if you use public Internet access, this removes passwords, surfing history, temp files and other personal information - requires a USB device and USB port on public computer
Key Attributes: Cost, only one choice?
Utilities: P.I. Protectory Mobility Suite (imaginelan.com) 

Antispam - delete, prevent, and / or take action against spam and those who send it
Key Attributes: challenge / response (delays incoming email by forcing sender to identify himself - something spammers won't want to do), cost, accuracy (false positives, missed), integration with mail client
Utilities: SAProxy (free) (statalabs.com) 

Secure Browing - block ActiveX controls, pop-up ads - but most features are already built into open source browsers like Netscape / Mozilla and Opera
Key Attributes: integration with Internet Explorer
Utilities: Secure IE (secureie.com) 

Anonymous browsing - prevent web sites from tracking your IP address, previous page, cookies and your ISP / network admin or hackers from watching where you go
Key Attributes: traffic / data encryption, browser integration
Utilities: Anonymizer (free restricted) (anonymizer.com) 

Secure IM - prevent others from accessing your instant messages (which are totally unsecure) but must be running on BOTH ends
Key Attributes: digital signatures, encryption
Utilities: SimpLite (free) (secway.fr), IMsecure (free) (zonelabs.com) 

Antispyware - identify and disable or remove adware programs and cookies, keystroke loggers, and Trojan horses
Key Attributes: cost, accuracy
Utilities: SpyBot Search and Destroy (free) (security.kolla.de) 

The physical security of PCs can be protected in several ways:

  • Physical laptop security
  • Tracking utilities
  • Surveillance
  • Hardware Authentication 

Physical laptop security - use the security slot to lock the laptop to an immovable object, install an alarm, or track a stolen laptop
Key Attributes: cannot recommend 

Tracking utilities - Laptop LoJack
Key Attributes: notification method, file encryption / deletion
Utilities: cannot recommend 

Surveillance - keystroke loggers and video surveillance (track what others are doing on your PC)
Key Attributes: web, email, IM support; email webcam snapshots, motion detection, alarm
Utilities: cannot recommend 

Hardware Authentication - fingerprint / iris authentication, typically via USB device
Key Attributes: portability (passwords stored ON device)
Utilities: cannot recommend

Remember your passwords and protect your privacy Comment
Swamp Tech

Originally published August 1, 2003

Hopefully, you use different passwords for websites, ISPs, software / file protection (Quicken / Money), and other things that can identify you or cost you money. Unfortunately, most people use passwords that can be guessed easily by hackers or others.

Several utilities can help you generate passwords and keep track of all your user IDs and passwords, credit card numbers, email addresses, PIN and other info you'd like to secure, including these free programs:



Page 1 of 3 (28 total stories) [ 1 | 2 | 3 | > | >> ]  

Old Articles