Swamp Geek
  Login or Register HomeDownloadsYour Account   
Navigation 
Site Info 
Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 5,084,950
  • Today: 4,986
Server InfoServer Info
  • Nov 20, 2024
  • 11:24 pm CST
 
 
Reviews, comparisons, and opinions about the latest technology products, services, trends and anything of interest to the thick glasses crowd!
Welcome to SwampGeek.com!


News, information, and more about your favorite technologies


Create your digital business card for free in 15 minutes More about Read More...
Swamp Tech

A digital business card with a vCard QR code is a great way to connect with people at conferences, meetings, social events or on the subway. You display the QR code on your phone for your new contact to scan directly into their contacts (remember to add and save the new contact!). You can create and host one using easy-to-use free websites in about 15 minutes.  Here's how to create a powerful digital business card with contact info, links to social media websites liked LinkedIn, a vCard QR code with your image or logo, and a vCard file that can be downloaded if there are issues scanning or if the digital card is viewed from a desktop.

 Read More...
Replacing File Thingie with Tiny File Manager More about
Swamp Tech

The great, simple, single-file PHP file manager, File Thingie, made it really easy to manage files to download from a web server by simply loading the File Thingie index.php into a folder.  Sadly, File Thingie disappeared between August 12, 2015 and September 7, 2015.  As PHP changed, File Thingie stopped working (I think with PHP 8.x, but test for yourself if you need to know).  Since I still have a need for simple file management, I looked for alternatives and find Tiny File Manager.

Like its predecessor File Thingie, Tiny File Manager enables users to securely manage files using a single PHP file.  However, unlike File Thingie, Tiny File Manager enables editing of all files in the root folder, rather than all files in and below the current folder.  Let's say you want to use a /documents subfolder to allow users to upload documents (e.g. PDFs, Excel spreadsheets, Word documents and Powerpoint presentations).  By default, even if you load tinyfilemanager.php into the documents folder, users will have access to the folders above /documents.

Changing 2 configuration parameters ($root_path and $root_url) limits tinyfilemanager to the current folder and below and correctly displays direct links:

// Root path for file manager
// use absolute path of directory i.e: '/var/www/folder' or $_SERVER['DOCUMENT_ROOT'].'/folder'
#$root_path = $_SERVER['DOCUMENT_ROOT'];
$root_path = __DIR__;

// Root url for links in file manager.Relative to $http_host. Variants: '', 'path/to/subfolder'
// Will not working if $root_path will be outside of server document root
#$root_url = '';
$root_url = preg_replace("!^${_SERVER['DOCUMENT_ROOT']}!", '', __DIR__);
Now, if there was only a simple way to replace the view link with a direct link instead of having to select the tiny direct link icon to the right...
Circumventing screen savers More about
Swamp Tech

Your friend left you alone to remotely fix her PC, and didn't share her password.  You took a break while a long-running utility completed, and when you returned, the screen is locked or the system went to sleep, and your friend is unavailable.  What to do?  Not much, unfortunately.  But keep these links handy to install a way to prevent lock outs next time.

The utilities enable you to override the power settings and / or screen saver settings by simulating activity on a Windows computer.  They run in the task tray and can be configured there.  Since most don't require installation, require little space and memory and have no license costs, these utilities make great additions to your portable tool kit.

Power Settings

Windows Power Settings optimize the use of electricity by automatically shutting down, moving to standy, or hibernating the system.  This isn't always optimal for remote support.  Fortunately there are some free, no-install utilities to address this.

Preventing Screen Saver Locks

Microsoft Windows can also lock the screen due to inactivity based on the screen saver settings.  Some utilities prevent this by periodically simulating keyboard or mouse movements.

Awake

Microsoft PowerToys Awake is "designed to keep a computer awake without having to manage its power & sleep settings." Unfortunately, Awake must be installed with all the Microsoft Powertools (i.e. it is not portable), and the download is large.

Caffeine

Caffeine from Zhorn Software simulates a keypress once every 59 seconds, so your machine thinks you're still working at the keyboard, so won't lock the screen or activate the screensaver.

Don't Sleep

Don't Sleep from Software OK is "a small Freeware Windows program to prevent system shutdown, Standby, Hibernate, Turn Off and Restart."  It can also be used to schedule shutdown and restart actions based on time, battery level, CPU load and / or network activity.  You can also use the app to "Please sleep" (turn off the display, etc.) under similar conditions.

Mouse Jiggler

Unlike the other utilities, Mouse Jiggler works by simulating the slight movement of a mouse. For reference, there are hardware devices that serve the same purpose.  But also unlike other utilities, Mouse Jiggler requires an updated .NET framework, which is unlikely to be installed on your friend's computer.  Although there is a portable version, it contains multiple files and requires much more space.

SwampGeek Recommends...

With the most functionality in the smallest, portable executable, Don't Sleep earns the SwampGeek Recommended seal of approval.

Cybersecurity Awareness Tip 30: Just Say No to Bloatware More about
Cybersecurity Awareness Month

Cybersecurity Awareness Tip 30: Just Say No to Bloatware

Many software developers and distributors see downloading and installing software as revenue making opportunities. This unwanted and potentially harmful software has come to be known as "bloatware." Most smartphones, tablets, laptops, desktops and other computer come loaded with bloatware. Usually, you can remove preloaded bloatware, though it's not always easy. Microsoft is notorious for installing bloatware - sometimes without asking and without being able to remove it. For 8 days, Microsoft preloaded a password manager with a plugin vulnerability on Windows 10 installations.  CNET's Download.com was a major distributor of software in the early 2010's, when it was caught wrapping downloads in bloatware.

Just Say No to Bloatware

Although you can usually remove bloatware after the fact, why not just say no before it's installed? Bloatware promoters often disguise optional installation through "custom" installation techiques or fake download links.  Some give you the choice to install extras, usually with a convincing pitch and the default selection to install.  Just say, "No."

Resources

Cybersecurity Awareness Tip 29: Remove Unused and Review Permissions for Mobile More about
Cybersecurity Awareness Month

Cybersecurity Awareness Tip 29: Remove Unused and Review Permissions for Mobile Apps

Mobile apps change frequently, and many users simply accept the changes and install the updates.  After all, it's important to keep apps updated, right?  Users of the Android Barcode Scanner app found on the hard way: app owners change and some app updates are malicious.

Change Isn't Always Good

As part of your annual cybersecurity preparedness review, check the app permissions.  As PC World notes, "Does that Sudoku app really need access to your contacts, camera function, and location information?" VPN provider Private Internet Access explains how to review mobile app permissions on both Android and iOS devices. You can view and changes permissions by app and apps by permission.

Remove Unused Apps

Removing unused apps has several benefits:

  • Increases available storage
  • Reduces bandwidth usage due to updates and update checks
  • Reduces opportunities for malicious updates due to ownership changes, hacks or accidental or intentional changes that compromise your privacy and / or security

For Android, SwampGeek recommends the Files by Google app. This app offers multiple options to clean your phone, and will periodically prompt you to delete unused apps.

iOS offers the ability to automatically offload unused apps, which addresses the benefits of removing with the option of restoring unused apps at a later time.

Cybersecurity Awareness Tip 28: Catchy Slogans Communicate Cybersecurity Concept More about
Cybersecurity Awareness Month

Cybersecurity Awareness Tip 28: Catchy Slogans Communicate Cybersecurity Concepts

In the age of memes, catchy slogans increase awareness.  Fortunately, there are many great slogans for cybersecurity.  They can be used on social media, posters in common areas and email signatures (e.g. during Cybersecurity Awareness Month).

SwampGeek's Favorites

Here are some SwampGeek favorite cybersecurity slogans (in no particular order):

  • You are the at the center of secURity.

  • Security never sleeps

  • Think before you click

  • Control - Alt - Delete when you leave your seat.

  • If you use the same password for everything, your life is probably about to change

  • A password is like a toothbrush. You shouldn't share it with anyone

  • Don't be quick to click

  • If you suspect deceit, hit delete

  • The most important part of a secret password is the secret

  • If it blinks, it stinks. (Look out for malicious plug-ins and fake updates)

  • A long password is a strong password

  • Passwords are like underwear. Change them regularly

  • Don’t let your trash become someone else’s treasure. Shred often.

  • Before you leave the scene, clear your desk and screen

  • Protect personal information. The identity saved could be your own.

  • Just delete the spam texts.

  • Anti-virus protects you and me.

Cybersecurity Awareness Tip 27: Update software and firmware often More about
Cybersecurity Awareness Month

Cybersecurity Awareness Tip 27: Update software and firmware often

According to cybersecurity market rating company BitSight, more than 67 percent of the computer systems targeted by the WannaCry ransomware were those that had delayed updating to Windows 7 at the time, and were still using what is considered an outdated system at the time of the attacks.

Mobile device users generally receive prompts to update mobile apps and operating systems, but desktops require proactive reviews.  It's good to include an update check in your monthly cybersecurity status check and your annual cybersecurity preparedness check.  But you can automate checks on your Windows and MacOS systems, too.

Desktop Options

Don't Forget...

Since every device connected to your network introduces cybersecurity risk, it's important to update all devices, too, including:

  • Routers,
  • Smart TVs (FireTV, Roku, Chromecast, Apple TV)
  • Smart Displays
  • Home automation

Resources

Cybersecurity Awareness Tip 26: Increase Your Cybersecurity Awareness More about
Cybersecurity Awareness Month

Cybersecurity Awareness Tip 26: Increase Your Cybersecurity Awareness

Awareness is Key to Prevention

In an era of lockdowns, online activity has increased significantly on all devices and platforms. If you need proof that cybersecurity awareness is key to prevention, check out the results of this year's Gone Phishing Tournament. Or check out CISO Portal's Reasons Why Cybersecurity Awareness is Important.

Yes, Virginia, There's an App for That

The Safe Me app (Android, iOS) is a "comprehensive Cyber Risk Quantification platform for learning, assessing and improving Cybersecurity Awareness of people." The app contains a series of video-based micro learning courses and question-based assessments that provide a SAFE score on a scale of 0-5 for your cybersecurity awareness level. The can also evaluate and view recommended settings for the security features on your smartphone.

Resources

Cybersecurity Awareness Tip 25: Backup all devices continuously More about
Cybersecurity Awareness Month

Cybersecurity Awareness Tip 25: Backup all devices continuously

Pay A Ransom or Restore Your Backup

It's (possibly) your worst nightmare. The ransomware screen of death: pay up if you want to decrypt your hard drive and all your precious pictures.

Use Your Backup Plan

Then you wake up and laugh, remembering that your pictures are automatically backed up from your phone to your private cloud moments after being taken.  And the rest of the data on your Mac desktop (or Windows or Linux) are also backed up on your personal cloud nightly.  You have a local backup of your system from a week back, so you can get the system back online within a few hours and, after a day or two, have everything restored and your malware tools updated.

SwampGeek Recommends...

Years ago, SwampGeek recommended a backup plan that included a combination of offsite ("cloud" and onsite ("personal cloud") backup using a plug computer. Pictures from your phone could be uploaded automatically and without limits to your free Google account. Then cloud provider stopped supporting personal accounts.  And the plug computer stopped working. And Google forced its suppliers (i.e. users) to pay to be the product by ending unlimited, free photo storage. And the Internet speeds increased significantly.  And the cloud backup solutions multiplied.

SwampGeek recommends (without affiliate or any other compensation):

  • pCloud:
    • Synch multiple devices
    • Also good for file sharing
    • Can automatically backup photos from your smart phone
    • Offers encyrpted option for extra privacy
    • Great one-time payment, lifetime usage option, even better during November
  • IDrive
    • ​​​​​​​Supports sync and complete system backup / clone to local drives, other systems on the same network, and the iDrive cloud
    • Support file versions and limited file sharing
    • Can automatically backup photos from your smart phone
    • Backup or retrieve bulk data, within a week, using physical shipment of temporary storage devices
    • Look for significant discounts the week of US Thanksgiving holiday

 

Cybersecurity Awareness Tip 24: Check Your Cybersecurity Status. Often. More about
Cybersecurity Awareness Month

Cybersecurity Awareness Tip 24: Check Your Cybersecurity Status. Often.

The More Things Change, The More Cybersecurity Risks Remain

It would be great, you know, if things could just stay the same.  No new viruses, operating systems upgrades or app ownership changes to mess things up and introduce new cybersecurity risks.  It would be great...but highly unlikely.  So, from time to time, say once a quarter, check things out to make sure, you know, you're, like, still practicing safe computing.

Safe Me Device Settings Check

It’s Not the Tool Itself, But How You Use It

Fortunately, there are some great tools to do just that.  The annual security preparedness review checks for big picture risks and strategic changes (e.g. should I replace my antivirus or backup approach?).  A cyberscecurity status check is a more focused, tool-based approach for quickly checking your computing devices for issues.

Resources



Page 1 of 7 (63 total stories) [ 1 | 2 | 3 | 4 | 5 | 6 | > | >> ]  

Old Articles