{"id":6,"date":"2010-06-10T17:29:32","date_gmt":"2010-06-11T00:29:32","guid":{"rendered":"http:\/\/jepheverett.wordpress.com\/2010\/06\/10\/security-is-working-on-your-pc-really-better-than-working-online"},"modified":"2010-06-10T17:29:32","modified_gmt":"2010-06-11T00:29:32","slug":"security-is-working-on-your-pc-really-better-than-working-online","status":"publish","type":"post","link":"https:\/\/cloudagnost.com\/?p=6","title":{"rendered":"Security: Is working on your PC really better than working online?"},"content":{"rendered":"<div id=\"msgcns!BF81E790B6A7BF39!5693\" class=\"bvMsg\">\n<div>\n<p style=\"margin:0;\"><font color=\"#000000\"><font size=\"3\"><font face=\"Calibri\">It seems like every day lately I&#8217;m hearing one side or the other of the argument for storing data online, so I thought I would take a few minutes to write a post comparing a couple of possible strategies, with pros and cons.\u00a0 With all the heat coming down on Facebook for\u00a0privacy concerns, it&#8217;s no wonder people are starting to question the wisdom of storing all sorts of files online.\u00a0 As the number of critical files we all have increases, making certain that our storage systems and backup systems are in peak form becomes more and more important.\u00a0 <\/font><\/font><\/font><\/p>\n<p style=\"margin:0;\"><font color=\"#000000\" size=\"3\" face=\"Calibri\"><\/font>\u00a0<\/p>\n<p style=\"margin:0;\"><font color=\"#000000\" size=\"3\" face=\"Calibri\">In an ideal world, everyone would use both local and online backups, but the costs to do so\u00a0can be sky high.\u00a0 Towards the end of the post we&#8217;ll discuss some options for using an old PC as a file and backup server.\u00a0 Windows Vista and 7 both support backing up to a network location, which makes it easy to centralize backups, and then to have the backup computer copy the files to a couple of drives to ensure that even if one backup drive fails, there is another to take it&#8217;s place.\u00a0 Personally, I keep photos and documents in at <a href=\"http:\/\/www.skydrive.live.com\">www.skydrive.live.com<\/a>\u00a0since that&#8217;s stuff I want to be able to share, and I&#8217;ve not found an online storage option to match the 25 gigs Microsoft offers at SkyDrive.\u00a0 DropBox, GoogleDocs, and lots of other services are available, and keeping your most critical files online makes sharing easier, and disasters easier to recover from.<\/font><\/p>\n<p style=\"margin:0;\"><font color=\"#000000\"><font size=\"3\"><font face=\"Calibri\"><\/font><\/font><\/font>\u00a0<\/p>\n<p style=\"margin:0;\"><font color=\"#000000\"><font size=\"3\"><font face=\"Calibri\">To begin our security analysis, first, let\u2019s discuss the security of Windows versus the security of SSL online services.<\/font><\/font><\/font><\/p>\n<p style=\"margin:0;\"><font color=\"#000000\" size=\"3\" face=\"Calibri\"><\/font>\u00a0<\/p>\n<p style=\"margin:0;\"><font color=\"#000000\" size=\"3\" face=\"Calibri\">By default, Windows offers only password based user authentication, encrypting files like the online services encrypt the\u00a0data transferred between your machine\u00a0requires extra steps, which I explain later in the post.\u00a0\u00a0Not all versions of Windows even offer\u00a0file encryption,\u00a0only the\u00a0Pro and Ultimate versions, XP and Vista versions of home have limited encryption abilities.\u00a0\u00a0<\/font><\/p>\n<p style=\"margin:0;\"><font color=\"#000000\" size=\"3\" face=\"Calibri\">\u00a0<\/font><\/p>\n<p style=\"margin:0;\">\n<p style=\"margin:0;\"><font color=\"#000000\" size=\"3\" face=\"Calibri\"><\/font><\/p>\n<p><font size=\"3\"><font face=\"Calibri\"><font color=\"#000000\">To summarize\u00a0the situation for most Windows users,\u00a0the steps necessary to\u00a0steal your data\u00a0and potentially\u00a0your\u00a0identity would be: <\/font><\/font><\/font><\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\"><span><span><font size=\"3\" face=\"Calibri\">1.<\/font><span style=\"font:7pt 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><font size=\"3\"><font face=\"Calibri\">Steal your\u00a0computer and use a freely downloadable (albeit illegal) tool to hack your Windows password\u00a0(assuming you even have one)<\/font><\/font><\/font><\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\"><span><span><font size=\"3\" face=\"Calibri\">2.<\/font><span style=\"font:7pt 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><font size=\"3\"><font face=\"Calibri\">Use the same tool to hack the passwords to your quicken and quick books files.<\/font><\/font><\/font><\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\"><span><span><font size=\"3\" face=\"Calibri\">3.<\/font><span style=\"font:7pt 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><font size=\"3\"><font face=\"Calibri\">Search the web for your phone numbers and addresses and start applying for credit in your name<\/font><\/font><\/font><\/p>\n<p style=\"margin:0 0 0 .5in;\"><font color=\"#000000\" size=\"3\" face=\"Calibri\">\u00a0<\/font><\/p>\n<p style=\"margin:0;\"><font size=\"3\"><font face=\"Calibri\"><font color=\"#000000\">As a user of https secured\u00a0online services, I might be able to get in and see your logins to the online services, but would have little reason to do so.\u00a0 Those passwords are easy to change so in this scenario you would simply change your online passwords once a system was stolen.<\/font><\/font><\/font><\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\"><span><span><font size=\"3\" face=\"Calibri\">1.<\/font><span style=\"font:7pt 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/span><\/span><font size=\"3\"><font face=\"Calibri\">Steal your laptop and hack your windows password<\/font><\/font><\/font><\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\"><font size=\"3\"><font face=\"Calibri\">2.\u00a0\u00a0 Dig t<\/font><\/font><\/font><font color=\"#000000\"><font size=\"3\"><font face=\"Calibri\">hrough your browsing history\u00a0to find out what online services you use<\/font><\/font><\/font><\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\"><span><span><font size=\"3\" face=\"Calibri\">3.<\/font><span style=\"font:7pt 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/span><\/span><font size=\"3\"><font face=\"Calibri\">Somehow (I have no idea how) get the online password you should have\u00a0changed after your system was stolen.<\/font><\/font><\/font><\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\"><span><span><font size=\"3\" face=\"Calibri\">4.<\/font><span style=\"font:7pt 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><\/font><font color=\"#000000\"><font size=\"3\"><font face=\"Calibri\">Search for your personal info like\u00a0address, date of birth, etc,\u00a0to enable thief to begin accessing your accounts and opening credit in your name.<\/font><\/font><\/font><\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\" size=\"3\" face=\"Calibri\"><\/font>\u00a0<\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\" size=\"3\" face=\"Calibri\">Since the thief would be unlikely to check your browsing history to figure out if you use online services that might have personal info, and\u00a0even more unnlikely to be able to get your recently updated passwords, I for one have to conclude that out of the box, I&#8217;d rather store my data online in an https secured service than I would in most Windows computers.<\/font><\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\" size=\"3\" face=\"Calibri\"><\/font>\u00a0<\/p>\n<p style=\"margin:0;\"><font color=\"#000000\" size=\"3\" face=\"Calibri\">\u00a0<\/font><font size=\"3\"><font face=\"Calibri\"><font color=\"#000000\">If you still\u00a0prefer to keep all your data yourself, there are 3 steps you should take to make certain that it is as safe as it can be.\u00a0 Personally, I do keep most of my data on my own machines, I really use the web for sharing info much more than storage.\u00a0 If you want to store your own data and keep it as well secured as an online service can, follow these steps in additon to the normal healthy computing habits of running antivirus and antispyware applications.<\/font><\/font><\/font><\/p>\n<p style=\"margin:0;\"><font color=\"#000000\" size=\"3\" face=\"Calibri\"><\/font>\u00a0<\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\"><span><span><font size=\"3\" face=\"Calibri\">1.<\/font><span style=\"font:7pt 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><font size=\"3\"><font face=\"Calibri\">Use an old computer to duplicate files for you so they are stored on multiple drives in an organized manner, rather than having you duplicate your work &amp; effort on purpose.\u00a0 There are tools like Mesh\/Live Sync\/SyncToy to do this with the an old computer running Windows XP, or\u00a0uou could probably install Windows Home Server on it to give you remote access to your desktop, and enable you to leave it off if\/when you prefer.\u00a0 You\u00a0can <a href=\"http:\/\/www.microsoft.com\/windows\/products\/winfamily\/windowshomeserver\/eval.mspx\">download a trial <\/a>of\u00a0HomeServer from the web, or you can\u00a0get a free copy of the Beta\u00a0version of Windows Home\u00a0Server &quot;Codename Vail&quot; through Microsoft Connect if you&#8217;re registered there.\u00a0 It&#8217;s\u00a0 <\/font><\/font><\/font><\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\"><font size=\"3\"><font face=\"Calibri\"><\/font><\/font><\/font>\u00a0<\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\"><font size=\"3\"><font face=\"Calibri\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Both versions of Home\u00a0Server offer file duplication so that if one drive goes down\u00a0you won&#8217;t lose any data, and then you can also set the server to run scheduled backups for a potential 4th layer of\u00a0data security with layer 1 being the PC you use, 2 being the server, 3 being a duplicate drive, and 4 being the server backup.\u00a0 It is important to have the backup system isolated from the working machines as much as possible so you don&#8217;t lose everything to a power surge, flood, or break-in.<\/font><\/font><\/font><\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\" size=\"3\" face=\"Calibri\"><\/font>\u00a0<\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\"><span><span><font size=\"3\" face=\"Calibri\">2.<\/font><span style=\"font:7pt 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><font size=\"3\"><font face=\"Calibri\">Encrypting your\u00a0the files is the next step you should be taking to get SSL-grade\/128 bit encryption out of Windows. EFS is a feature in many versions of Windows, so that is a fairly minor configuration step- simply right click a folder or file, choose properties, and from the &quot;General&quot; tab choose &quot;advanced.&quot;\u00a0\u00a0Simply check the box next to &quot;Encrypt Contents\u00a0to Secure Data&quot; and OK out of both of the\u00a0menu boxes.\u00a0\u00a0<\/font><\/font><\/font><\/p>\n<p style=\"margin:0;\"><font color=\"#000000\" size=\"3\" face=\"Calibri\">\u00a0<\/font><\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\"><span><span><font size=\"3\" face=\"Calibri\">3.<\/font><span style=\"font:7pt 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><font size=\"3\"><font face=\"Calibri\">As a last step,\u00a0you should have a login name to something that isn\u2019t personally identifiable, so someone who steals your laptop wouldn\u2019t even know who it belongs to just by looking at the logon page.\u00a0 In theory, a savvy thief or purchaser of the stolen laptop might realize the laptop belongs to you, and that might cause them go\u00a0specifically\u00a0 after\u00a0your data.\u00a0 If there is no name on the login screen it would be much more difficult to figure out who the system belongs to, and what might be available on it.<\/font><\/font><\/font><\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\" size=\"3\" face=\"Calibri\"><\/font>\u00a0<\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\" size=\"3\" face=\"Calibri\">Both systems have their drawbacks- online services may not be an option if you don&#8217;t have constant access to the web, and often do not offer as full a feature set as what their software competitors might.\u00a0 Many online services also have recurring fees as well as the cost of maintaining a web connection.\u00a0 It&#8217;s not that hard to set-up and secure your own PC, but it does take a little extra work and planning to make sure that your own computer isn&#8217;t your biggest security risk.\u00a0 <\/font><\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\" size=\"3\" face=\"Calibri\"><\/font>\u00a0<\/p>\n<p style=\"text-indent:-.25in;margin:0 0 0 .25in;\"><font color=\"#000000\" size=\"3\" face=\"Calibri\">\u00a0I have tried a variety of HD monitoring tools, but for ease of use I reccomend <a href=\"http:\/\/www.panterasoft.com\/download_ok.html\">HDD health <\/a>from Pantera Soft.\u00a0 Drives will start to report\u00a0errors as they age or if they encounter problems due to bad usb ports or cables, being banged around too much, etc, and with a HD health monitoring utility you can stay aware of these sorts of issues.\u00a0\u00a0 As I mentioned earlier, in an ideal world,\u00a0have my server even with its\u00a0with 3 levels of duplication backing up to an online service, but for now I&#8217;m going to accept the fact that short of my house burning down, I&#8217;m not going to be losing\u00a0data anytime soon.\u00a0<\/font><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>It seems like every day lately I&#8217;m hearing one side or the other of the argument for storing data online, so I thought I would take a few minutes to write a post comparing a couple of possible strategies, with pros and cons.\u00a0 With all the heat coming down on Facebook for\u00a0privacy concerns, it&#8217;s no &hellip; <a href=\"https:\/\/cloudagnost.com\/?p=6\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Security: Is working on your PC really better than working online?<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-6","post","type-post","status-publish","format-standard","hentry","category-computers-and-internet"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/cloudagnost.com\/index.php?rest_route=\/wp\/v2\/posts\/6","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudagnost.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudagnost.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudagnost.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudagnost.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6"}],"version-history":[{"count":0,"href":"https:\/\/cloudagnost.com\/index.php?rest_route=\/wp\/v2\/posts\/6\/revisions"}],"wp:attachment":[{"href":"https:\/\/cloudagnost.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudagnost.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudagnost.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}