Category: computers

  • Technology’s magic pills

    Technology’s magic pills

    As railways rolled out across the US in the mid 19th Century, the snake oil merchants selling dubious medicines weren’t far behind.

    Communities that had never before seen things that were taken for granted in the big cities were easily fooled by miracle treatments that would fix all their ills. By the time the locals discovered the scam, the snake oil salesman and his shills would be well out of town.

    Technological change always brings out hype and over the last few decades we’ve seen a similar thing happen with the tech industries, as products and services were sold on the back of claims that could be described as ambitious, if not outrageous.

    The Y2K bug was a good example of this as planes were going to fall from the sky and dams collapse if we didn’t hire an expensive consulting firm or buy a widget that would remind our computers they were now in the 21st Century.

    A similar thing is at work with Internet names, where the current push to sell Top Level Domains – a bargain with their $385,000 application fee – is being touted as the fix to everything that is wrong with web addresses.

    With digital snake oil it’s interesting how often big organisations sometimes act like 19th Century American sharecroppers – all too often we seen ministers and CEOs announce an outsourcing deal that will save taxpayers or shareholders millions only to later find the only winner was the consulting firm that sold the idea.

    A similar trend is at work in the PR industry, Sky News presenter John Kerrison has an entertaining look on his personal website on how social media is being sold as an easy fix for a business with far more fundamental problems.

    The sad thing is that there are real benefits behind the grandiose claims; Y2K was a real problem, money can be saved through intelligent outsourcing and social media is a great PR tool.

    Eventually hype backfires, consumers are rightly dubious about anything that has the slightest hint of PR spin while the IT sector is viewed with well-earned suspicion by business proprietors, executives and managers.

    A good example of this was last week’s Digital Readiness report from Optus that found businesses aren’t particularly interested in cloud services. This mirrors similar studies by Sensis, MYOB and MelbourneIT which all find organisations aren’t too fussed about the online world in general.

    The danger with this is there is fundamental shift happening in society and technologies like websites, social media and cloud computing  – just like the railroads in the 19th Century – are part of those changes which businesses need to understand.

    In an era where snake oil is a commodity there are two challenges for business people; the first is not to be perceived as one of the charlatans and the second is to see the miracle cures for what they are.

    Probably the best tool for dealing with the digital snake oil merchants is turn on your own, old-fashioned bullshit detector and treat the shills with the suspicion they deserve.

    Similar posts:

  • Is the PC dead?

    Is the PC dead?

    The Personal Computer may not be dead, but Microsoft are still going to be challenged in a world where consumer and business buying behaviour has changed.

    Last week Frank X. Shaw, Vice President of Corporate Communications at Microsoft, pondered the question of whether the Personal Computer era is over

    Given the PCs importance to Microsoft’s business it wasn’t surprising that Frank decided it’s not, declaring the personal computer barely middle aged at 30 and ready to take up snowboarding.

    Leaving the image of using a Windows Vista equipped laptop as a snowboard aside, the question for many businesses and households is should they buy a personal computer, either as a desktop or portable, in an era where smartphones and tablet computers like the iPad are becoming common? This is even more pronounced given the low cost of ownership for a smartphone or tablet.

    The first thing is to consider is can the non-PC devices do what PC can?

    For most people the answer is “yes”, particularly given most users are accessing cloud based and social media platforms that run on any web browser. However many prefer to have the options to connect keyboards, printers and scanners, which is expensive and clunky with tablets and smartphones.

    While many users could do most of their tasks on a tablet or smart phone, many prefer the utility and expansion options of desktop and portable PCs not to mention using a keyboard and mouse, although the latter points may change as the current generations give way to workers and computer users more used to touch screens as an input device.

    The cost of ownership is always a killer and the traditional rule of thumb that the purchase price of computer only represents a third of its cost over the device’s life has become skewed as PC prices have dropped along with other costs like Internet access and expensive printer consumables have increased.

    For PCs, the problem is tablets and smartphones have far fewer of the ancillary costs like anti virus software and apps through iTunes, Android or Windows Marketplaces tend to be either free or substantially cheaper than their personal computer counterparts, which skews decisions towards buying a tablet.

    Those apps however tend to be far more lightweight than the equivalent PC counterparts and tablets or smartphones don’t have the editing capabilities found on personal computers.

    Probably the biggest win for PCs however is that smartphones and tablets are still designed to be tethered to a PC or laptop. While a user can get away with a mobile device that never connects to a computer, they’ll almost be certainly missing out on a lot of the device’s functionality.

    So the PC isn’t dead yet, its role in the home and office is evolving and this is recognised by most businesses and consumers as they tend to be buying them to complement desktop and laptop computers.

    For Microsoft this is not necessarily good news as the PC sales model is broken.

    Until the mid-2000s, most corporate and home users replaced their PCs every five years and this was reflected in Microsoft’s product roadmaps.

    The overdue arrival of Microsoft Vista in early 2007 changed this as not only was the product late, it was also bad and customers stayed away.

    As a result customers have now learned that they don’t have to upgrade every few years and today nearly half of Microsoft’s customers are still using Windows XP, a ten year old operating system.

    So for Microsoft, the good news is the PC is not dead in an era of cloud computing and social media, but making money out of it is becoming harder.

    Similar posts:

    • No Related Posts
  • The Mac malware threat

    The Mac malware threat

    For years we’ve heard warnings of a deluge of Mac based viruses coming as the Apple systems gained popularity. Does the Mac Defender program that’s infecting OS X systems represent a new risk for Apple computer users or is just another trick targeting unsuspecting computer users.

    Recently Daring Fireball’s John Gruber called those predicting an immanent deluge of Apple Malware out in his “Wolf” post, pointing out seven years of warnings of an impending wave of Mac based security attacks which never eventuated.

    Mac Defender, a Trojan Horse which pretends to keep Apple systems secure, is catching unwary Mac users. To many who’ve cried “WOLF!”, this is the first horseman of an Apple apocalypse.

    Are we really about to see a wave of Mac based malware similar to that which plagued Windows users over the last 15 years? The truth is more complex than just Apple and Microsoft fanboys trading insults.

    Can an Apple Mac catch viruses?

    The short answer is “yes”. Every computer system has some weakness that can can be used by rogue software. Apple Macs, Linux computers and even corporate mainframes have software flaws that can catch out the unprepared user.

    Given there are always flaws in software code, it’s important that a computer operating system has some protection against installing unwanted programs. Apple, and other systems, avoided the problems of the Windows world by putting more barriers in the way of rogue applications finding their way on to machines.

    The “big target theory”

    Windows’ susceptibility to viruses is often put down to it being the biggest target. Because over 90% of the world’s computers were running on Microsoft Windows, the theory goes, it was the obvious target while Apple, Linux and smartphone applications are too small to be worthwhile for the dedicated hacker.

    This “big target” theory is bunk – predators, vandals and criminals go for the weakest victims and Windows was by far the easiest target.

    If we think of the different software systems as being homes on a street, most of the houses were small with well maintained fences and secure locks on their doors.  They weren’t immune from being broken into, though to do so involved a degree of skill and cunning.

    The biggest home on the block, the House of Microsoft, chose to have a pretty poor fence and few locks. It didn’t help that the occupants, more often than not, would gladly let anyone in and were mildly suprised when the odd uninvited visitor made off with the silverware or graffitied the garage door.

    Windows computers were the easiest target on the block and this was why they were targeted. The fact they were by far the most popular systems was an added bonus for malware writers.

    “Security by obscurity” is not the reason Macs attract fewer malware attacks.

    Why did viruses attack Windows?

    To understand why Windows is more prone to viruses we have to go back to 1998 when Microsoft were preparing for the next generation of systems to replace the aging Windows 95, 98 and ME platforms.

    Microsoft based their new operating system – Windows XP – on their existing Windows NT system which had a strong security focus that allowed users to run in restricted profiles, preventing them altering key system files, this was perfect in a world where users were connecting to the World Wide Web and exposing themselves to multiple new security risks.

    A problem for Microsoft was many of their consumer and office products didn’t like being denied full access to the systems they were installed on. It was possible to run Microsoft Office and other applications without full Administrator permissions – and many big organisations did – but doing so involved the resources of a skilled, full time IT department which was beyond most Windows users.

    So Microsoft made the decision to sell Windows XP to the general public with Administrator access enabled for ordinary users. It meant various programs would work properly but it also gave full access to all the internal parts of Windows. Microsoft decided there were would be no secure parts on a standard, out-of-the-box Windows XP computer.

    Internet Explorer blues

    To compound the security problem Microsoft had decided to continue the integration of the Windows web browser, Internet Explorer, into the core functions of Windows XP – something they’d started when they’d discovered the Internet shortly after releasing Windows 95 – a policy that had already created a malware nightmare with Windows 98 and ME.

    Internet Explorer itself was prone to security problems because of a programming language built into it called Active X that allowed applications to run without the user knowing. This was convenient for users and websites but basically invited virus writers and hacker into a system through the web browser.

    Put a deeply flawed Internet Explorer together with most users running their computers with full Administrator rights and conditions were perfect for the tidal wave of malware that swamped the Windows world in the period of 2001 to 2004.

    Faced with massive problems Microsoft steadily improved security on their consumer products, the later versions of Windows XP were substantially better than the first version with the releases of Microsoft Vista and Windows 7 seeing great improvements that reduced the virus and malware threats.

    Microsoft’s bad choices reverberate today though with Windows users lumbered with layers of security to protect them from rogue applications and frequent nasties that manage to sidestep the safeguards.

    Social Engineering

    As Windows computers became more secure, and criminal gangs more aware of the opportunities residing on people’s desktops, the threat moved on to “social engineering” tricks that involved either posing as a financial opportunity – phishing and the notorious 419 scams – or offering “free” software, pictures and music to unsuspecting users.

    Often the free download hid a program called a Trojan horse that would sneak something ontoward onto a victim’s computer, this is what the Mac Defender program is.

    Trojan horses and phishing attacks don’t rely on weaknesses in a computer’s software, they rely on fooling the user. So it doesn’t matter what computer system the victim happens to be running as long as they can be fooled into doing something.

    Is there a wave of Mac malware looming?

    While those who’ve called WOLF! on Mac viruses in the past might be celebrating what appears to be a breakout of malware targeting the Apple Mac, the conditions that caused the boom in Windows based malware don’t exist on the OS X operating system – or on mobile platforms like Android, Blackberry or the iPhone’s iOS for that matter – so a virus boom isn’t going to happen.

    On the other hand, new social engineering tricks are evolving as savvy conmen come up with new and original ideas to fool us into giving away our bank details or installing rogue application on our Macs, smartphones and social media applications.

    Fighting old battles

    In many ways arguments about malware attacking operating systems is the old battle. The virus fight is largely over as vendors, particularly Microsoft, and users learn secure ways to use their computers.

    Today’s security battles are being fought in the cloud and on social media platforms as scammers and users come to grips with the changed security and computing environment.

    Most of what we do on computers today relies upon the Internet, that we use a Mac or a Windows machine doesn’t really matter that much as the serious threats are now lurking on our Facebook and cloud computer applications. We need to stay alert regardless of the computer, or smartphone we choose.

    Similar posts:

    • No Related Posts
  • Holiday computer checklist

    With the Christmas holidays almost here, a lot of business and home computers will spend a good part of the next month turned off. Even though they are shut down, bad things can still happen. There’s a number of things you should do before heading off for a break.

    Before you go

    Backup
    Before shutting down for the holidays backup all your important data. Your backup should include favourites, mail, address books and documents. Some programs, such as accounting systems, have their own backup routines.

    Store the backups away from the computer, preferably offsite. We recommend making two copies, leave one onsite for easy access and store one elsewhere. If something terrible happens to your home or office while you are away, your data is at least safe.

    For working and essential documents, setting up a free Dropbox service and copying them to it is a great idea. Dropbox is also good for saving documents you foolishly intend to work on while you’re away as well as essential documents.

    Turn everything off
    Printers, modems, routers, should all be turned off and disconnected from power and communications lines. Most modern computer equipment still has power running through it even though it is turned off. Power surges from storms are common, so don’t take chances.

    If your computer is connected to a network, telephone line or cable connection then these should all be disconnected as well. Power surges are common on communications cables. Everything that connects your computer to the outside world should be turned off and unplugged.

    Hide your equipment
    Give thieves as little temptation as possible. Don’t leave computers in full view. Lock away anything portable and draw the curtains or blinds in the room where your computer is kept.

    What to pack

    As technology becomes an essential part of our lives, we tend to take it with us. This is particularly true with devices like iPads and DVD equipped laptops which are as much entertainment devices as they are for work.

    To get the most from them, there’s a few things to consider when packing.

    Update your systems
    Run the update routines for your operating system, essential software and security programs before you leave so there will be no major updates clogging up your downloads while you try to work or play.

    Power
    The most irritating thing when on the road with a computer is running out of power. Do you have all your chargers packed away? If you have space it’s also a good idea to carry a powerboard so you can share scarce power outlets with other users.

    Connectors
    Don’t forget your USB cables to connect phones and cameras so you can download photos, update music and, for some devices, recharge them.

    Packing
    If you are flying anywhere, it’s best to take electronics with you as carry on baggage. Carry them in a bag where they are easily accessible so you can take them out without fuss at security checkpoints.

    When you return

    Your computer is the very last thing you should turn on. Make sure modems, printers, external drives and networks are all running before turning your computer on. If you have a cable Internet connection, give it a few minutes to connect before trying to log on.

    Update your system.
    Before checking emails or surfing the net, update your anti-virus and check for any system updates. Run Windows Update and your anti-virus program’s update program. New nasties will have come out while you are away and there’s a good chance some of them may be waiting in your inbox.

    Christmas and New Year are a time to relax, by taking a few easy steps with your technology you can ensure your phones and computers are part of an enjoyable break.

    Have a merry Christmas and a great New Year.

    Similar posts:

    • No Related Posts
  • ABC Nightlife: 2 December 2010

    Microsoft Windows has celebrated its 25th birthday and the web turns 20 this month. Join Tony Delroy and Paul Wallbank to discuss where Windows has been and where computers are going over the next two decades.

    If you missed the program, a recording is available on the Nightlife website.

    Join us on your local ABC radio station or listen online at www.abc.net.au/nightlife.

    If you’d like to join the conversation with your questions or comments phone 1300 800 222 within Australia or +61 2 8333 1000 from outside Australia.

    You can SMS Nightlife’s talkback on 19922702 or twitter @paulwallbank using the #abcnightlife hashtag

    Similar posts:

    • No Related Posts