Recently, CNN.com ran a story about Marriott being fined $600,000 by the FCC after they were found to have blocked the use of personal Wi-Fi hotspots in their conference centers, leaving guests with little choice but to pay the hotel for Wi-Fi internet access if they needed to stay connected. Though Marriott’s method didn’t involve outright jamming of the radio signals used in Wi-Fi networks, it does illustrate how hotels (and practically anyone else offering public Wi-Fi service, for that matter) have the capability to use legitimate network security tools to prevent people from using the Wi-Fi hotspot service they pay for.
Microsoft may have discontinued official support for Windows XP back in April, but depending on the estimate you hear, as many as two thirds of Windows PCs still run Windows XP. While nothing will stop anyone from continuing to use XP as they always have, no new security patches or updates will be made available to Windows XP users going forward (even though they were nice enough to make a one-time exception for the Heartbleed bug). With that in mind, I’ve put together a short list of simple things anyone continuing to use XP can do to help protect their computers.
Time to answer a reader question from my buddy Eric, who is in a bit of a dilemma after his MicroSD card flaked out on him:
I have a Micro SD card in my Blackberry that simply quit working. I’ve tried it in multiple computers and devices and none of them will read it. So even data recovery software is useless given that the card can’t be read. What’s weird is that the card looks perfectly fine physically and I didn’t drop it, etc. So, any suggestions, or am I effed? (I lost pics of my daughter and about 80 audios from PWInsider.com!) Thanks Stu!
Don’t lose hope yet, Eric: there are a few things you can try. I can’t guarantee that any of them will work, but if the data does still exist on that MicroSD card, I have three ways you might be able to recover it.
While a lot of people find it extremely handy that Google has sent cars around to map nearly the entire United States (and many other places) down to the street level, others aren’t exactly comfortable with the idea of absolutely anybody being able to not only find their address online fairly easily, but also use Google Maps to see what their house actually looks like. Aside from just being able to see the house, there’s also concerns about what else Google might have picked up while driving around: children playing outside, license plate numbers, or any of a number of other potential privacy issues.
People stream a lot of video these days, and whether it’s Youtube, episodes of Dancing With The Stars from ABC’s website, Netflix, or a variety of other sources, streaming video has become so accessible to the average person that a lot of people are starting to cancel their cable TV service and just stream everything they watch.
However, the more time people spend watching streaming video, the more they notice increasingly common technical issues. Have you ever been watching a perfectly clear video that suddenly becomes so blocky that the people look like they’re made of Legos? Or been watching coverage of a major news story or a big sports game, and the video stops every ten seconds while a message pops up on screen to inform you that the video is buffering? Or worst of all, have you ever gotten the dreaded “I’m sorry, this video is not available at this time” message?
As many of you may have heard, a major Internet security flaw called Heartbleed has recently been discovered, though it has been around for a couple of years. It affects about two thirds of Internet web servers and compromises the security that protects your data, passwords and interactions. Many of the Internet services you use both personally and professionally may have been compromised. The nature of this flaw is such that it can be accurately detected if a site is vulnerable, but not whether cybercriminals have actually exploited the flaw to breach the site’s security.
Because of this, you can expect to receive notices for many of your Internet accounts to reset your password as a precautionary measure. It is important that you consider the following guidelines:
Time to dip back into the reader mail! Today’s question comes from Tim P., who had some questions about his recent attempt at BYOD:
“I have a question for you: at my job, me and the other people in my group spend a lot of time going back and forth between each other’s offices, and since the company gave us all laptops, we thought it would make our lives easier if we bought a wireless router so we can take our laptops with us whenever we need to move around. The IT department found out what we did and made us stop using it. I’m not gonna lie, we tried to use it anyway once after they left for the day but they somehow blocked it and it wouldn’t work even when we plugged it into other outlets that we know work.
So I have to know, how did they figure out we were using it (nobody knew we had it except us), how did they block it, and why is it such a big deal?”
Today’s blog is in response to a reader question from Greg H., who wrote in to ask about virtualization. He hears the tech guys at work talking about all kinds of virtual machines and virtual servers, but feels out of the loop because he doesn’t really know what they’re talking about. So for Greg and everyone else, here’s the skinny on virtualization.
If you’re a Comcast customer, you may not be aware of a pretty awesome new service they recently, and quietly, began rolling out to their customers. The newest wireless routers they’ve been issuing since the middle of 2013 not only provide internet service to the customer’s home, but also act as a public WiFi hotspot to other Comcast customers in the vicinity.
Over the last couple of years, I’ve gotten a lot of questions from people who want to know why the companies they work for are still issuing laptops to their employees instead of iPads or other tablet computers. It’s a reasonable question, especially if you travel a lot or commute on public transit, and get sick of having to lug a laptop around when you could be using a nice, light tablet instead. But even though it may seem like your company’s IT department is just being stubborn or refuses to budge because “this is the way we’ve always done things,” there are legitimate reasons for companies to hold back on handing out tablets for now.