Technology’s magic pills

How a social media or cloud computing ointment won’t solve your business problems

As railways rolled out across the US in the mid 19th Century, the snake oil merchants selling dubious medicines weren’t far behind.

Communities that had never before seen things that were taken for granted in the big cities were easily fooled by miracle treatments that would fix all their ills. By the time the locals discovered the scam, the snake oil salesman and his shills would be well out of town.

Technological change always brings out hype and over the last few decades we’ve seen a similar thing happen with the tech industries, as products and services were sold on the back of claims that could be described as ambitious, if not outrageous.

The Y2K bug was a good example of this as planes were going to fall from the sky and dams collapse if we didn’t hire an expensive consulting firm or buy a widget that would remind our computers they were now in the 21st Century.

A similar thing is at work with Internet names, where the current push to sell Top Level Domains – a bargain with their $385,000 application fee – is being touted as the fix to everything that is wrong with web addresses.

With digital snake oil it’s interesting how often big organisations sometimes act like 19th Century American sharecroppers – all too often we seen ministers and CEOs announce an outsourcing deal that will save taxpayers or shareholders millions only to later find the only winner was the consulting firm that sold the idea.

A similar trend is at work in the PR industry, Sky News presenter John Kerrison has an entertaining look on his personal website on how social media is being sold as an easy fix for a business with far more fundamental problems.

The sad thing is that there are real benefits behind the grandiose claims; Y2K was a real problem, money can be saved through intelligent outsourcing and social media is a great PR tool.

Eventually hype backfires, consumers are rightly dubious about anything that has the slightest hint of PR spin while the IT sector is viewed with well-earned suspicion by business proprietors, executives and managers.

A good example of this was last week’s Digital Readiness report from Optus that found businesses aren’t particularly interested in cloud services. This mirrors similar studies by Sensis, MYOB and MelbourneIT which all find organisations aren’t too fussed about the online world in general.

The danger with this is there is fundamental shift happening in society and technologies like websites, social media and cloud computing  – just like the railroads in the 19th Century – are part of those changes which businesses need to understand.

In an era where snake oil is a commodity there are two challenges for business people; the first is not to be perceived as one of the charlatans and the second is to see the miracle cures for what they are.

Probably the best tool for dealing with the digital snake oil merchants is turn on your own, old-fashioned bullshit detector and treat the shills with the suspicion they deserve.

Similar posts:

Is the PC dead?

Has the personal computer era come to an end?

The Personal Computer may not be dead, but Microsoft are still going to be challenged in a world where consumer and business buying behaviour has changed.

Last week Frank X. Shaw, Vice President of Corporate Communications at Microsoft, pondered the question of whether the Personal Computer era is over

Given the PCs importance to Microsoft’s business it wasn’t surprising that Frank decided it’s not, declaring the personal computer barely middle aged at 30 and ready to take up snowboarding.

Leaving the image of using a Windows Vista equipped laptop as a snowboard aside, the question for many businesses and households is should they buy a personal computer, either as a desktop or portable, in an era where smartphones and tablet computers like the iPad are becoming common? This is even more pronounced given the low cost of ownership for a smartphone or tablet.

The first thing is to consider is can the non-PC devices do what PC can?

For most people the answer is “yes”, particularly given most users are accessing cloud based and social media platforms that run on any web browser. However many prefer to have the options to connect keyboards, printers and scanners, which is expensive and clunky with tablets and smartphones.

While many users could do most of their tasks on a tablet or smart phone, many prefer the utility and expansion options of desktop and portable PCs not to mention using a keyboard and mouse, although the latter points may change as the current generations give way to workers and computer users more used to touch screens as an input device.

The cost of ownership is always a killer and the traditional rule of thumb that the purchase price of computer only represents a third of its cost over the device’s life has become skewed as PC prices have dropped along with other costs like Internet access and expensive printer consumables have increased.

For PCs, the problem is tablets and smartphones have far fewer of the ancillary costs like anti virus software and apps through iTunes, Android or Windows Marketplaces tend to be either free or substantially cheaper than their personal computer counterparts, which skews decisions towards buying a tablet.

Those apps however tend to be far more lightweight than the equivalent PC counterparts and tablets or smartphones don’t have the editing capabilities found on personal computers.

Probably the biggest win for PCs however is that smartphones and tablets are still designed to be tethered to a PC or laptop. While a user can get away with a mobile device that never connects to a computer, they’ll almost be certainly missing out on a lot of the device’s functionality.

So the PC isn’t dead yet, its role in the home and office is evolving and this is recognised by most businesses and consumers as they tend to be buying them to complement desktop and laptop computers.

For Microsoft this is not necessarily good news as the PC sales model is broken.

Until the mid-2000s, most corporate and home users replaced their PCs every five years and this was reflected in Microsoft’s product roadmaps.

The overdue arrival of Microsoft Vista in early 2007 changed this as not only was the product late, it was also bad and customers stayed away.

As a result customers have now learned that they don’t have to upgrade every few years and today nearly half of Microsoft’s customers are still using Windows XP, a ten year old operating system.

So for Microsoft, the good news is the PC is not dead in an era of cloud computing and social media, but making money out of it is becoming harder.

Similar posts:

  • No Related Posts

The Mac malware threat

Is there a wave of viruses waiting to attack Apple Mac computers

For years we’ve heard warnings of a deluge of Mac based viruses coming as the Apple systems gained popularity. Does the Mac Defender program that’s infecting OS X systems represent a new risk for Apple computer users or is just another trick targeting unsuspecting computer users.

Recently Daring Fireball’s John Gruber called those predicting an immanent deluge of Apple Malware out in his “Wolf” post, pointing out seven years of warnings of an impending wave of Mac based security attacks which never eventuated.

Mac Defender, a Trojan Horse which pretends to keep Apple systems secure, is catching unwary Mac users. To many who’ve cried “WOLF!”, this is the first horseman of an Apple apocalypse.

Are we really about to see a wave of Mac based malware similar to that which plagued Windows users over the last 15 years? The truth is more complex than just Apple and Microsoft fanboys trading insults.

Can an Apple Mac catch viruses?

The short answer is “yes”. Every computer system has some weakness that can can be used by rogue software. Apple Macs, Linux computers and even corporate mainframes have software flaws that can catch out the unprepared user.

Given there are always flaws in software code, it’s important that a computer operating system has some protection against installing unwanted programs. Apple, and other systems, avoided the problems of the Windows world by putting more barriers in the way of rogue applications finding their way on to machines.

The “big target theory”

Windows’ susceptibility to viruses is often put down to it being the biggest target. Because over 90% of the world’s computers were running on Microsoft Windows, the theory goes, it was the obvious target while Apple, Linux and smartphone applications are too small to be worthwhile for the dedicated hacker.

This “big target” theory is bunk – predators, vandals and criminals go for the weakest victims and Windows was by far the easiest target.

If we think of the different software systems as being homes on a street, most of the houses were small with well maintained fences and secure locks on their doors.  They weren’t immune from being broken into, though to do so involved a degree of skill and cunning.

The biggest home on the block, the House of Microsoft, chose to have a pretty poor fence and few locks. It didn’t help that the occupants, more often than not, would gladly let anyone in and were mildly suprised when the odd uninvited visitor made off with the silverware or graffitied the garage door.

Windows computers were the easiest target on the block and this was why they were targeted. The fact they were by far the most popular systems was an added bonus for malware writers.

“Security by obscurity” is not the reason Macs attract fewer malware attacks.

Why did viruses attack Windows?

To understand why Windows is more prone to viruses we have to go back to 1998 when Microsoft were preparing for the next generation of systems to replace the aging Windows 95, 98 and ME platforms.

Microsoft based their new operating system – Windows XP – on their existing Windows NT system which had a strong security focus that allowed users to run in restricted profiles, preventing them altering key system files, this was perfect in a world where users were connecting to the World Wide Web and exposing themselves to multiple new security risks.

A problem for Microsoft was many of their consumer and office products didn’t like being denied full access to the systems they were installed on. It was possible to run Microsoft Office and other applications without full Administrator permissions – and many big organisations did – but doing so involved the resources of a skilled, full time IT department which was beyond most Windows users.

So Microsoft made the decision to sell Windows XP to the general public with Administrator access enabled for ordinary users. It meant various programs would work properly but it also gave full access to all the internal parts of Windows. Microsoft decided there were would be no secure parts on a standard, out-of-the-box Windows XP computer.

Internet Explorer blues

To compound the security problem Microsoft had decided to continue the integration of the Windows web browser, Internet Explorer, into the core functions of Windows XP – something they’d started when they’d discovered the Internet shortly after releasing Windows 95 – a policy that had already created a malware nightmare with Windows 98 and ME.

Internet Explorer itself was prone to security problems because of a programming language built into it called Active X that allowed applications to run without the user knowing. This was convenient for users and websites but basically invited virus writers and hacker into a system through the web browser.

Put a deeply flawed Internet Explorer together with most users running their computers with full Administrator rights and conditions were perfect for the tidal wave of malware that swamped the Windows world in the period of 2001 to 2004.

Faced with massive problems Microsoft steadily improved security on their consumer products, the later versions of Windows XP were substantially better than the first version with the releases of Microsoft Vista and Windows 7 seeing great improvements that reduced the virus and malware threats.

Microsoft’s bad choices reverberate today though with Windows users lumbered with layers of security to protect them from rogue applications and frequent nasties that manage to sidestep the safeguards.

Social Engineering

As Windows computers became more secure, and criminal gangs more aware of the opportunities residing on people’s desktops, the threat moved on to “social engineering” tricks that involved either posing as a financial opportunity – phishing and the notorious 419 scams – or offering “free” software, pictures and music to unsuspecting users.

Often the free download hid a program called a Trojan horse that would sneak something ontoward onto a victim’s computer, this is what the Mac Defender program is.

Trojan horses and phishing attacks don’t rely on weaknesses in a computer’s software, they rely on fooling the user. So it doesn’t matter what computer system the victim happens to be running as long as they can be fooled into doing something.

Is there a wave of Mac malware looming?

While those who’ve called WOLF! on Mac viruses in the past might be celebrating what appears to be a breakout of malware targeting the Apple Mac, the conditions that caused the boom in Windows based malware don’t exist on the OS X operating system – or on mobile platforms like Android, Blackberry or the iPhone’s iOS for that matter – so a virus boom isn’t going to happen.

On the other hand, new social engineering tricks are evolving as savvy conmen come up with new and original ideas to fool us into giving away our bank details or installing rogue application on our Macs, smartphones and social media applications.

Fighting old battles

In many ways arguments about malware attacking operating systems is the old battle. The virus fight is largely over as vendors, particularly Microsoft, and users learn secure ways to use their computers.

Today’s security battles are being fought in the cloud and on social media platforms as scammers and users come to grips with the changed security and computing environment.

Most of what we do on computers today relies upon the Internet, that we use a Mac or a Windows machine doesn’t really matter that much as the serious threats are now lurking on our Facebook and cloud computer applications. We need to stay alert regardless of the computer, or smartphone we choose.

Similar posts:

  • No Related Posts

Holiday computer checklist

A few ideas on making your holiday more enjoyable

With the Christmas holidays almost here, a lot of business and home computers will spend a good part of the next month turned off. Even though they are shut down, bad things can still happen. There’s a number of things you should do before heading off for a break.

Before you go

Backup
Before shutting down for the holidays backup all your important data. Your backup should include favourites, mail, address books and documents. Some programs, such as accounting systems, have their own backup routines.

Store the backups away from the computer, preferably offsite. We recommend making two copies, leave one onsite for easy access and store one elsewhere. If something terrible happens to your home or office while you are away, your data is at least safe.

For working and essential documents, setting up a free Dropbox service and copying them to it is a great idea. Dropbox is also good for saving documents you foolishly intend to work on while you’re away as well as essential documents.

Turn everything off
Printers, modems, routers, should all be turned off and disconnected from power and communications lines. Most modern computer equipment still has power running through it even though it is turned off. Power surges from storms are common, so don’t take chances.

If your computer is connected to a network, telephone line or cable connection then these should all be disconnected as well. Power surges are common on communications cables. Everything that connects your computer to the outside world should be turned off and unplugged.

Hide your equipment
Give thieves as little temptation as possible. Don’t leave computers in full view. Lock away anything portable and draw the curtains or blinds in the room where your computer is kept.

What to pack

As technology becomes an essential part of our lives, we tend to take it with us. This is particularly true with devices like iPads and DVD equipped laptops which are as much entertainment devices as they are for work.

To get the most from them, there’s a few things to consider when packing.

Update your systems
Run the update routines for your operating system, essential software and security programs before you leave so there will be no major updates clogging up your downloads while you try to work or play.

Power
The most irritating thing when on the road with a computer is running out of power. Do you have all your chargers packed away? If you have space it’s also a good idea to carry a powerboard so you can share scarce power outlets with other users.

Connectors
Don’t forget your USB cables to connect phones and cameras so you can download photos, update music and, for some devices, recharge them.

Packing
If you are flying anywhere, it’s best to take electronics with you as carry on baggage. Carry them in a bag where they are easily accessible so you can take them out without fuss at security checkpoints.

When you return

Your computer is the very last thing you should turn on. Make sure modems, printers, external drives and networks are all running before turning your computer on. If you have a cable Internet connection, give it a few minutes to connect before trying to log on.

Update your system.
Before checking emails or surfing the net, update your anti-virus and check for any system updates. Run Windows Update and your anti-virus program’s update program. New nasties will have come out while you are away and there’s a good chance some of them may be waiting in your inbox.

Christmas and New Year are a time to relax, by taking a few easy steps with your technology you can ensure your phones and computers are part of an enjoyable break.

Have a merry Christmas and a great New Year.

Similar posts:

  • No Related Posts

ABC Nightlife: 2 December 2010

Windows celebrates 25 years while the web turns 20, where do we go next?

Microsoft Windows has celebrated its 25th birthday and the web turns 20 this month. Join Tony Delroy and Paul Wallbank to discuss where Windows has been and where computers are going over the next two decades.

If you missed the program, a recording is available on the Nightlife website.

Join us on your local ABC radio station or listen online at www.abc.net.au/nightlife.

If you’d like to join the conversation with your questions or comments phone 1300 800 222 within Australia or +61 2 8333 1000 from outside Australia.

You can SMS Nightlife’s talkback on 19922702 or twitter @paulwallbank using the #abcnightlife hashtag

Similar posts:

  • No Related Posts

The strange story of the Stuxnet worm

A virus crippling the Iranian nuclear program could affect your business

The tale of the virus infecting Iran’s nuclear program is one of the fascinating stories of the computer world.

Whoever wrote the Stuxnet worm did a spectacular job in bringing together a number of security problems and then using two weak links — unpatched Windows servers and poorly designed programmable logic controller software — to create a mighty mess in the target organisation.

The scary thing with a rootkit like Stuxnet is that once it has got into the system, you can never be sure whether you’ve properly got rid of it.

What’s worse, this program will be writing to the Programmable Logic Controllers the infected computers supervise so plant operators will never know exactly what changes might have carried out on the devices essential to a plant’s operations and safety.

Damaging Iranian nuclear plants

A report on the Make The World A Better Place websites over the weekend indicates the Stuxnet Worm may have damaged the Iranian nuclear reactor program.

The story behind the Suxnet worm is remarkable. It appears this little beast is a sophisticated act of sabotage involving using a number of weaknesses in computer systems as detailed by Computer World in their Stuxnet Worm hits Industrial Systems and is Stuxnet the best Malware Ever articles.

The risk of unpatched systems

One of the things that leaps out is how servers running unpatched systems are an important part of the infection process. The Stuxnet worm partly relies on a security hole that was patched by Microsoft two years ago so obviously the Iranian servers were running an unpatched, older version of Windows.

This is fairly common in the automation industries. I’ve personally seen outdated, unpatched Windows servers running CCTV, security, home automation and dispatch systems. They are in that state because the equipment vendors have supplied the equipment and then failed to maintain them.

These companies deserve real criticism for using off the shelf, commercial software to run mission critical systems that it was never designed to do.

Commercial programs like the various Windows, Mac and other mass market operating systems are designed for general use, they come with a whole range of service and features that industrial control systems don’t need. In fact, the Stuxnet worm uses one of those services, the printer spooler, to give itself control of the system.

Securing industrial systems

These industrial systems require far more basic and secure control programs, a cheap option would be a customised Linux version with all the unnecessary features stripped out. In the case of Siemens, the providers of the PLCs supplied to the Iranian government, it’s disappointing such a big organisation couldn’t build its own software to control these systems.

Business owners, and anyone who has computer controlled equipment in the premises, need to ask some hard questions to their suppliers about how secure supplied computer equipment is in this age of networked services and Internet worms.

Similar posts:

  • No Related Posts

What is cloud computing?

Cloud computing is the buzzword of the moment. But what does it really mean?

Cloud computing is about using other people’s computers to do the work for you.

Rather than having programs running on your computer and saving information to the hard drive, a cloud service connects to your system and you access both the program and your data through a web browser such as Firefox, Internet Explorer or Safari.

That service could be free such as Hotmail and Flickr or it could be paid for like Salesforce or Google Apps. Either way, they use a “cloud” of computers to provide the application and store their customer’s data.

Having your applications and data saved on someone else’s servers brings a number of advantages in security, cost and flexibility.

For businesses, that flexibility comes out of not having to buy complex software licences for their networks, instead they only pay for what they use. For home users it means not having to install software that often slows down machines and sometimes conflicts with other programs.

As we use the Internet more on our phones or with mobile devices like the iPad, having the advantage of not needing different software versions for each device makes it easier for us to access and use the information that used to be locked in our personal computers or office servers.

Cost too is an important factor, while many programs such as Yahoo! Mail and WordPress are free, even the paid for programs like Sassu and Basecamp offer considerable savings over their traditional competitors that require you to buy a disk and install the tool on your system.

One of the reasons for those reduced costs is the cloud services are sharing the resources between many users. That reduces the supplier’s distribution and support costs while making it easier for them to update their program when new features or security problems appear.

Security is probably the most misunderstood part of cloud computing. While cloud services do require a degree of trust in the supplier, most providers are providing a much more secure and trustworthy computer environment than most homes and businesses.

There are downsides however; you do need to have a reliable Internet connection and you do have to trust that your supplier will not only keep a secure environment but also won’t share your data with others and won’t go broke.

While some of those disadvantages with cloud computing mean that some businesses — particularly those in the medical and banking industries — have to be careful about using online services, for most homes and enterprises the cost and flexibility benefits outweigh the risks.

Over the next few years we’ll see many, if not most, computer programs move onto the cloud as reliable Internet becomes commonplace. It is the way the IT industry is heading and where we will all be doing our computing in the next few years.

Similar posts:

  • No Related Posts