12/8/08

Computer Desk Plans

For a dedicated do it yourselfer, nothing brings more satisfaction than a well completed project. Building your own desk for your computer is a project worth contemplating if this is your hobby. A simple search on the Internet will bring in many computer desk plans to plan this project around. These plans come with parts lists and tools needed to make your planning of the project easier. The prices vary from no cost to a high of less than fifty dollars for the computer desk plans. You will be able to find computer desk plans in your local craft and hobby store as well.

A search for computer desk plans available at web sites on the Internet will turn up thousands of woodworking sites with plans available. The prices for the plans will vary with the method you choose to obtain them. Some sites will be happy to mail you a set printed on paper. Other sites will only have downloads available, leaving the printing all in your hands.

When making purchases from web sites on the Internet, always be sure that your order is done on a secure page. You can tell when a page is secure by looking at the pages address on your browser. Secure page addresses will always with https:// instead of the normal http://. If the order page is not secure, do not put any information on the page as it will be susceptible to hijacking. You can try contacting the owners of the web site to find a more secure method of ordering. The only time you should have shipping charges involved is when the web site is mailing a paper copy of the plans to you instead of you downloading the computer desk plans. On the sites I visited that had this option available, the shipping charges were reflected in the price of the plans.

Now that you have obtained the computer desk plans, the fun of starting the project begins. Finding a good lumberyard with reasonable prices for your wood will be easy if your choice of wood is pine or bonded plywood. If you want to make the desk out of select hardwoods, a little more effort will be required. You can get the wood in more or less bulk form and do the entire cutting yourself or have the lumberyard pre cut your wood to size. With precut pieces, you will still have to do all the finishing and assembly of the wood into the final state of your computer desk.

You have gotten your wood, cut it to size, sanded it to perfect smoothness and stained and sealed it against use. The final assembly will best be done in the location where you plan to use the desk. That way you will not have to move the desk after it is assembled. The feeling of satisfaction you experience every time you sit down at the computer, knowing that you built this desk with your own hands will make the purchase of your computer desk plans well worth the money you spend on them.

Dangers Of Illegal Computer Disposal

If your computer broke tomorrow and it was beyond repair, what would you do with it? Well chances are that after slamming it against the wall in a fit of rage, you’re going to throw it in the trashcan in your garage. Alongside all the other non-recyclable trash your household created this week, the trash men will come pick it up, condense it in their truck, and dump it into a huge pile of waste. The huge pile of waste will be compacted even more, and then sent out to some island where all the huge piles of your garbage go. Sounds simple, right?

Sure, it’s simple enough; until a bird lands on your crunched piece of laptop and dies from exposure to the acid that leaked out of the battery. Gasp! “Alright,” you say to yourself, “I’ll take the battery out and burn it in my backyard instead of throwing it in the trash.” Well unless you’d like an explosion in your backyard, then no, you should NOT burn any old battery solely because you know is it wrong to throw it in the trash.

So what exactly do you do with this battery? How about all the other parts of the computer that still function? After you consider all of the minute details that go into making a computer work, and you realize that your computer might be broken beyond repair but that the tiny pieces could function perfectly in someone else’s computer, it seems like a big waste to be disposing of the entire thing with one careless toss into the garbage. Not only would you be polluting the environment, adding to the amount of waste your family creates, and putting innocent animals at danger with the improper disposal of your computer, but you would also be wasting hundreds of dollars worth of useful items in a computer that can probably be refurbished anyways.

Aside from the battery leaking acid in a waste heap, other environmental concerns are with toner or ink from printers, glass pieces from tiny light bulbs, and other wires and metal pieces tangled inside every computer. Luckily, there are companies that deal with computer disposal or refurbishing to make your job a lot easier. If you feel the need to bash your computer against the wall in a fit of rage, simply wrap it up and send it to a computer disposal company who will, oftentimes for free, properly dispose of your computer. If your computer stops working or you simply care to invest in an updated version, then there are companies who you can send it to who will pay you for the parts that are still useable and will refurbish the computer so they can re-sell it or donate it to a low-income family or agency once it works again.

One might think, “Well, I know of a charity that could really use my old computer. I will donate it on my own”. Not so fast, buddy. Donating an older computer to an organization that you think could really use it doesn’t always work out so well. In many instances, the computer will cease to work after a couple of months, and the organization might have to spend more money to repair it. It is poor etiquette to donate something when you are not quite sure of its value. If you’d rather not give cash, some businesses will take your old computer and send the cash value of its remaining parts to an organization of your choice.

The bottom line is that there are many different things you can and should do with a computer that you no longer want as your own. For the same reasons that you taught your children how to recycle, that you turn off the lights when you leave a room, and because you try to take only as much food as you are prepared to eat at a buffet table, you should dispose of or recycle your PC properly.

12/1/08

Effects Of Spyware On The Computer

Spyware has a lot of side effects of the registry. One of the greatest drawbacks is the slowing down of the system. This process will continue until the registry is cleaned with a registry cleaner.

If you have browsed the Internet for a substantial number of hours it is guaranteed that you have downloaded some sort of Spyware to your system, albeit inadvertently. That is the reason it is called Spyware. If it made itself known it would not be spying. Spyware is not illegal software. It is downloaded with the 'permission' of the user. Once the Spyware downloads and installs itself it begins, first of all, to consolidate itself on the machine. It does this by entering its information in multiple parts of the registry. These entries can only be removed with Spyware removal utilities and there are many free anti Spyware and Adware removal tools available to do a satisfactory job for you.

Effects On The Registry

A lot of add-on Internet Explorer tool bars are also Spyware. They constantly monitor the users browsing habits and the type of software that is installed and run on the computer. At times this may be helpful to the user as the relevant advertisements are directed to the browser. However, in the long run this Spyware will definitely slow down the system to a crawl. This malicious software must be removed from the system as soon as possible with free Adware and Spyware removal tools. Spyware is constantly making entries to the registry. This makes the registry grow out of proportion. Since the system has to refer to the registry multiple times in a session, the registry has to be scanned from the beginning every time. Considering that the registry has tens of thousands of records it may take a very long time to scan and locate the information being sought. Spyware keeps adding junk to the registry and this slows the system down.

Removal Technique

Spyware can be removed from the Computer with the use of anti-Spyware utilities. However, these utilities will only uninstall the Spyware from the operating system. The anti-Spyware utilities are not designed to go in to the registry hives and make changes. Going into the registry and removing the entries is very specialized operations and cannot be clubbed with some other software or program. Removing the Spyware entries from the registry is very important. Because once the Spyware determines that the exe file has been removed it will kick in from the registry and reinstall the exe from the Internet site it came from initially. Therefore removing the entries with a registry cleaner is very important. Free Microsoft Spyware removal tools and PC registry Cleaner are good software that can remove all redundant and bad entries from the system registry.

Qualities Of A Good Registry Cleaner

A good free Spyware removal utility will have three facilities such as a registry backup function a restore function and a scan and repair function. It is important that the spyware cleaner make a good backup of the registry just in case the system fails to function properly after the computer clean up.

YOUR ADVERTISEMENT

Do you want your ADVERTISEMENT published on this site ?

Mail to us :
zockyemoreno@gmail.com.
Make yours get more visitors.

Computer crime and legislature

How have legislatures responded to crimes involving the use of computers? How has the Internet changed the debate over pornography?

Computer technology has changed nearly everything and everyone around the world in some way. Computer technology has been also increasingly been both the source of attacks as well as the target of various high tech attacks. Some of there attacks are so new that many law enforcement officials including state courts and governments has been unfamiliar with them. One such high tech crime is that of cyber stalking. Cyber stalking was at one time very rare and virtually unknown. Today it is very different. Most states have recognized this form of harassment and are also taking necessary steps to investigation and prosecute these cases. In cases of domestic violence and restraining orders cyber stalking has come to be a very big issue and is something that the legislature has to recognize as a problem. Many times the computer is what the target of the crime is. Things like spamming, hacking and virus dissemination have become some of the largest issues facing the modern high tech age. Legislatures have recognized the importance of the internet and have taken steps on Federal and State levels to address the various computer crimes which occur. Penalties are usually swift and severe, however that does not stop the criminals from taking part in these illegal activities.

I think the Internet has sealed the deal that pornography is here to stay and that it will continue to be protected. People are free to look at legal pornography and attempting to ban it across internet lines no doubt be an impossible task. With that said it is going to be an increasingly difficult problems keeping the illegal pornography off the Internet and equally as difficult in keeping all pornography away from children. Parents, educators and the government need to be away of all of the questionable material which is only a few mouse clicks away from children.

11/30/08

Top Ways To Make A Computer Run Faster

Today I am going to be talking about different ways you can make a computer run faster. There is actually a lot you can do yourself that will boost your PC's performance. So lets take a look at different ways we can remedy that slow computer of yours!

1. Free Up Disk Space

A great way to make a computer run faster is to free up some disk space. Windows comes with a disk cleanup tool that helps you free up space on your hard disk. The utility identifies files that you can safely delete without messing anything up, and then enables you to choose whether you want to delete some or all of the identified files.

How to use disk cleanup tool.

* Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.

* In the Disk Cleanup for dialog box, scroll through the content of the Files to delete list. (If you have multiple hard drives you will have to select which one to scan.)

* Clear the check boxes for files that you don't want to delete, and then click OK.

* When prompted to confirm that you want to delete the specified files, click OK.

2. Use Defrag Tool

When you add a file or a new program to a new computer, the hard drive is relatively empty so new data is saved to the hard drive in one whole block. When you need to use that information, the computer can quickly access it because it is all in one place. Defragging your system is definitely a way to make a computer run faster.

How to use defrag tool.

* From the start menu point to "all programs"
* Point to "Accessories"
* Point to "System Tools"
* Click on "Disk Defragmenter"
* The disk defragmenter will display the hard drives on your computer. Just select and click Defragment.

3. Get rid of spyware

Definition

Spyware is software with malicious intent - by design; it does something bad to your computer. Usually, it gets installed without your knowledge. It sometimes takes advantage of the fact that most people click "I Agree" to software licenses without reading them.

The only way to get rid of spyware is to have some kind of scanner, sort of like an anti-virus. In order to make a computer run faster and keep it safer your going to need an anti-spyware program. This is tricky, a lot of the spyware programs out there are malicious and will actually add viruses and spyware to your computer by using the "spyware scanner and blocker". So please remember to be very careful when choosing your anti-spyware program.

4. Find and repair disk errors

Detect and Repair Disk Errors

In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your computer, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.

How to run the error checking utility.

* Click Start, and then click My Computer.
* In the My Computer window, right-click the hard disk you want to search for bad sectors, and then click Properties.
* In the Properties dialog box, click the Tools tab.
* Click the Check Now button.
* In the Check Disk dialog box, select the Scan for and attempt recovery of bad sectors check box, and then click Start.
* If bad sectors are found, choose to fix them.
Tip: Only select the Automatically fix file system errors check box if you think that your disk contains bad sectors.

5. Get an external hard drive

Adding an External Hard Drive to your computer will allow you to clear out a lot of the things you don't need to be storing on your normal hard drive.

A great example would be your music or pictures. All those songs and pictures are sitting on your computer making it go slower. You will see a decline in your computers performance as soon as you use over half of your hard drive space.

Moving all your songs or pictures to your external hard drive will free up a lot of space on your main hard drive. You can even move applications such as photoshop or games.

An external hard drive is also handy because it is portable. You can unplug it from your computer and take it to a friends house and plug it in there, sharing photos and pictures very easily.

This is truly a great way to make a computer run faster.

Computer Scrapbooks

When digital cameras were first released on the market, everyone was excited. Finally, here was an easy way to take and store photos. No more would our closets be plagued with boxes and envelopes housing a hodgepodge of unorganized photographs. What we didn't realize was that soon, our computers would be filled with a hodgepodge of unorganized photographs.


The explosion of home computers and the Internet has led to an increased need for people to organize computer scrapbooks. It's easy to accumulate literally thousands of digital pictures, and it's just as easy to get them all mixed up. Try finding a favorite photo as you're scanning through a list of numbers and letters. Creating computer scrapbooks makes it quick and easy to locate the photographs, as soon as you want to see them.

When preparing your computer scrapbooks, the first step should always be renaming your photos. You should use file names that are easy to understand and organize, rather than keeping the default names set by your digital photography software. Anyone who has used a digital camera or camera phone knows just how hard it can be to decipher the file names, let alone selecting the photographs. Proper titles listed in computer scrapbooks make it easy to remember which pictures you have.

One key point to remember is that all of your computer scrapbook files will be sorted in alphabetical order. This can get confusing, particularly if you're naming pictures by date. Rather than call your photos 'January10', 'April21' etc, use the numerical format year, month and then day. Those same files will now be called 20050110Baby and 20050421Baby. In doing so, your computer will display them in the correct date order for you.

After your photo files have been renamed, you need to create folders to store the different types of photo files. Try organizing your computer scrapbooks by subject, theme or occasion. This will allow you to find your photos much easier later on. For example, create a folder called 'Baby Pictures' and save all of your baby photographs in that folder. By setting up and following a naming system, you'll soon have the most well organized computer scrapbooks around.

Whether or not you print your digital photos, always create backups of all your computer scrapbook files. There are many archiving programs that can be used to compress large files, enabling them to be stored on a CD or other removable disk. It is essential that you label your CDs to keep your computer scrapbook backups as organized as the originals. You can write the title on the CD itself, but you should also remember to alter the name of the CD as read by the computer. Most CD writing software automatically prompts you to give the CD a title, but check the instructions before you start the burning process so you, and your computer, will be able to clearly identify the CDs.

Digital cameras make it easy to take and save pictures. Computer scrapbooks make it easy to find the pictures anytime you're ready to take a trip down memory lane or share the digital images with your friends.

11/26/08

How to Clean Disc Drives

When your CD or DVD (disc) drive starts giving you problems, your first thought may be to replace it or take it to the repair shop, but a good cleaning may be all it needs.

Below are three methods to clean the disc drive. The easiest method is the least effective. The hardest method is the most effective. Since the hardest method takes some time to do, I recommend that you start with the easiest method. If it solves your problems, congratulations. If not, try the next method.

The Cleaner Disc method - this, the easiest method, uses a special cleaner disc which can be purchased in computer stores. The disc usually comes with a little bottle of cleaner solution. Apply a few drops of the solution to the disc and insert it in the disc drawer (be sure to read and follow the instructions that come with the cleaner disc). The drive will turn the disc and clean the lens. Unfortunately, this only works adequately about half the time.

The Cleaning Stick method - this is what I do in desperation when the cleaner disc does not work and I don't want to disassemble the drive. Since all that is needed (at least in my mind this is true) is a little more pressure applied to the lens, I start out in search of a thin, flexible stick of some type which is at least six inches long. It should not have sharp or rough edges that would scratch the lens. Next, get a soft, thin cloth and put water or rubbing alcohol in the middle of it. Place one end of the stick under the wet part of the cloth and slide it into the opened disc drawer. The goal is to rub the wet cloth on the lens to clean it. Do not apply so much pressure that you will scratch and ruin the lens. Also try blowing into the disc drive to remove any dirt that may have accommulated in it. If you do not succeed at this, proceed to the next method.

The Disassembly method - this method should work but it requires you to disassemble the drive. So if you are not comfortable with taking the drive apart, please take it to a computer repair shop and let them do it.

Take the cover off your computer, unplug the cords from the back of the disc drive, remove any screws holding it in, and slide it out (you may need to remove the face plate on the end of the drawer to get the drive out). Remove the screws in the drive housing and take the cover off. The bottom side of the drive is a circuit board, so if that is what you see when you take the cover off, figure out how to access the other side. On the correct side, you should see a lens that runs on a track (there is no harm in moving the lens along the track but do not touch the lens itself). Use a wet, soft cloth to clean the lens.

Sometimes a disc drive malfunctions because there is too much dust or debris in it, so be sure to clean out the inside with either compressed air, a soft cloth, or a cotton swab. Reassemble the disc drive, put it back in the computer case, and cross your fingers. Hopefully, it will work when you turn on the computer.

If these methods work, you just saved yourself some money. If not, you needed a better disc drive anyway.

SSH Tunneling In Your Application

Introduction :

This article is dedicated to the task of securing MySQL client-server connection using functionality provided by the Secure Shell (SSH) protocol. To be exact, the SSH tunneling concept is utilized. We will review the steps needed to build secure MySQL client applications and implement a sample one ourselves.

MySQL traffic is not the only kind of data that can be tunneled by the Secure Shell. SSH can be used to secure any application-layer TCP-based protocol, such as HTTP, SMTP and POP3. If your application needs to secure such a protocol by tunneling it through a protected SSH connection, this article will be useful to you.

Background

Let's imagine that we are developing an enterprise application that needs to send requests to a number of SQL servers all over the world and get responses from them (let's imagine that it's a super-powerful bank system that stores information about millions of accounts).

All the data between the application and SQL servers are transferred via the Internet "as is". As most protocols used by SQL servers do not provide data integrity and confidentiality (and those that do, do it in a quite nontransparent way), all the transferred requests and responses may (and be sure, they will!) become visible to a passive adversary. An active adversary can cause much more serious problems - he can alter the data and no one will detect it.

SSH (Secure Shell) is a protocol that may help in solving this problem. One of its outstanding features is its ability to tunnel different types of connections through a single, confident and integrity-protected connection.

Now you do not have to worry about securing the data transferred over the Internet - SSH will handle this for you. In particular, SSH will take care of the following security aspects:

Strong data encryption according to the latest industry-standard algorithms (AES, Twofish)
Authentication of both client and server computers
Data integrity protection
Stability with regard to different kinds of network attacks
Compression of the data being tunneled
Complete independence of the operating system and network specifics

Tunneling (or forwarding) works in the following way:

SSH client opens a listening port on some local network interface and tells the SSH server that he wishes to forward all connections accepted on this port to some remote host.

When another connection is accepted on the listening port, the SSH client informs the SSH server about this fact and they together establish a logical tunnel for it. At the same time, the SSH server establishes a new TCP connection to the remote host agreed upon in step 1.

The SSH client encrypts all the data it receives from the accepted connection and sends it to the SSH server. The SSH server decrypts the data received from the SSH client and sends it to the remote host.

Please note, that the SSH client acts as a TCP server for the connections it accepts, and the SSH server acts as a TCP client for the connections it establishes to the remote host.


A single SSH connection can tunnel as many application layer connections as needed. This means that you can defend your server by moving all the listening ports (e.g., database and application server ports) to a local network, leaving only the SSH port open. It is much easier to take care of a single port, rather than a dozen different listening ports.

Into the Fire
Let's develop a small application that illustrates the use of SSH forwarding capabilities. We will consider an important task of securing a connection between a MySQL client application and a MySQL server. Imagine that we need to get information from the database server, which is located a thousand miles away from us, in a secure way.

SecureMySQLClient is the application we are planning to implement. It includes the following modules:

SSH client-side module with forwarding capabilities
MySQL client-side module
User interface for configuring application settings and displaying query results.

The SSH server runs in a remote network and is visible from the Internet. The database (MySQL) server runs in the same network as the SSH server and may not be visible from the Internet.

The process of performing secure data exchange between SecureMySQLClient and the Database server goes as follows:

The SSH client module negotiates a secure connection to the SSH server and establishes forwarding from some local port to the remote MySQL server.
The MySQL client module connects to the listening port opened by the SSH client module.
The SSH client and server set up a logical tunnel for the accepted connection.
The MySQL client sends SELECT to the port opened by the SSH client module, which encrypts it and sends it to the SSH server. The SSH server decrypts the request and sends it to the MySQL server.
The SSH server receives a response from the MySQL server, encrypts it and sends it back to the SSH client, which decrypts it and passes it to the MySQL client module.

Looks too complex? Implementing this is easier than you think.So, let's go and do it.

We will need the following products installed on the computer before creating the application:

Microsoft Visual Studio .NET 2003, 2005 or 2008.
EldoS SecureBlackbox (.NET edition). Can be downloaded from
http://www.eldos.com/sbbdev/download.php.
MySQL .NET Connector. Can be downloaded from
http://www.mysql.com/products/connector/net/.

Let's now open Microsoft Visual Studio .NET (we will use the 2005 version) and try to build such an application from scratch.

After the GUI design has been finished, we can go on with the business logic code itself. First, adding references to the following assemblies to our project:

SecureBlackbox
SecureBlackbox.PKI (only in SecureBlackbox 5. SecureBlackbox 6 doesn't have this assembly)
SecureBlackbox.SSHClient
SecureBlackbox.SSHCommon
MySql.Data

SSHForwarding notifies us about certain situations via its events, so we need to create handlers for some of them:

OnAuthenticationSuccess - Is fired when the client authentication process has been completed.

OnAuthenticationFailed - Is fired if the client was unable to authenticate using particular authentication method. In general, this does not mean that the authentication process completely failed – the client may try several authentication methods consequently and one of them may succeed.

OnError - Is fired if some protocol error occurs during the session. Usually this leads to a connection closure. The exact error can be detected via the error code passed to it.

OnKeyValidate - Is used to pass the received server key to the application. Please note that incorrect handling of this event may result in a serious security breach. The handler of this event should verify that the passed key corresponds to the remote server (and warn the user if it does not). If the key is valid, the handler should set the Validate parameter to true. The sample does not perform key checkup for the sake of simplicity.

OnOpen - Is fired when the SSH connection is established and the component is ready to tunnel data. We will use the handler of this event to kick the MySQL client component.

OnClose - Is fired when the SSH connection is closed.

OnConnectionOpen - Is fired when a new tunnel is created. The corresponding tunneled connection object is passed as parameter.

OnConnectionClose - Is fired when an existing tunnel is closed.

Implementing two core methods, SetupSSHConnection() and RunQuery(). The first one initializes the SSHForwarding object and establishes an SSH session to the remote server by calling its Open() method, and the second one sends the query to the MySQL server.

The code of the SetupSSHConnection() method is pretty simple:


private void SetupSSHConnection()



{


// Specifying address and port of SSH server


Forwarding.Address = tbSSHAddress.Text;



Forwarding.Port = Convert.ToInt32(tbSSHPort.Text);


// Setting credentials for authentication on SSH server


Forwarding.Username = tbUsername.Text;



Forwarding.Password = tbPassword.Text;





// Specifying network interface and port number to be opened locally



Forwarding.ForwardedHost = "";


Forwarding.ForwardedPort = Convert.ToInt32(tbFwdPort.Text);






// Specifying destination host where the server should forward the data to.


// Please note, that the destination should be specified according to


// SSH servers point of view. E.g., 127.0.0.1 will stand for



// SSH servers localhost, not SSH clients one.


Forwarding.DestHost = tbDBAddress.Text;


Forwarding.DestPort = Convert.ToInt32(tbDBPort.Text);






// Opening SSH connection


Forwarding.Open();



}


A bit more complex is the code of the RunQuery() method (to be exact, the code of RunQueryThreadFunc() method, which is invoked in a separate thread by the RunQuery() method):




private void RunQueryThreadFunc()


{


MySqlConnection MySQLConnection = new MySqlConnection();






// forming connection string


string connString = "database=" + tbDBName.Text + ";Connect Timeout=30;user id=" + tbDBUsername.Text + "; pwd=" + tbDBPassword.Text + ";";


if (cbUseTunnelling.Checked)



{


// specifying local destination if forwarding is enabled



connString = connString + "server=127.0.0.1; port=" + tbFwdPort.Text;


}


else


{



// specifying real MySQL server location if forwarding is not used


connString = connString + "server=" + tbDBAddress.Text + "; port=" + tbDBPort.Text;


}



MySQLConnection.ConnectionString = connString;


try


{



// opening MySQL connection


MySqlCommand cmd = new MySqlCommand(tbQuery.Text, MySQLConnection);


Log("Connecting to MySQL server...");



MySQLConnection.Open();


Log("Connection to MySQL server established. Version: " + MySQLConnection.ServerVersion + ".");





// reading query results



MySqlDataReader reader = cmd.ExecuteReader();


try


{



for (int i = 0; i <>


{


AddQueryColumn(reader.GetName(i));



}


while (reader.Read())


{



string[] values = new string[reader.FieldCount];


for (int i = 0; i <>


{



values[i] = reader.GetString(i);


}


AddQueryValues(values);


}



}


finally


{



// closing both MySQL and SSH connections


Log("Closing MySQL connection");


reader.Close();



MySQLConnection.Close();


Forwarding.Close();


}


}



catch (Exception ex)


{


Log("MySQL connection failed (" + ex.Message + ")");



}


}








And, that's all But there is one more thing I need to draw your attention to. As both SSH and MySQL protocols run in separate threads and access GUI controls from those threads, we need to handle the GUI access in a special way to prevent a cross-thread problems. I will illustrate this with the example of the Log() method:









delegate void LogFunc(string S);






private void Log(string S)


{


if (lvLog.InvokeRequired)


{



LogFunc d = new LogFunc(Log);


Invoke(d, new object[] { S });


}



else


{


ListViewItem item = new ListViewItem();


item.Text = DateTime.Now.ToShortTimeString();



item.SubItems.Add(S);


lvLog.Items.Add(item);


}



}



Finally, the application is finished, and we may try it in work. So clicking F5 and specifying the following settings in the text fields of the application form:


SSH server location, username and password used to authenticate to it.
Database server address, port, username, password, database name and query. Remember that database server address should be specified as it is visible from the SSH server.
Turning on the "Use tunneling" checkbox.

Now click the Start button and wait for the query results. If all the parameters have been specified correctly, we should get something like this:

Features and requirements

SSH protocol provides (and SecureBlackbox implements) the following features:

Strong data encryption using AES, Twofish, Triple DES, Serpent and many other symmetric algorithms with key lengths up to 256 bits
Client authentication using one or multiple authentication types (password-based, public key-based, X.509 certificate-based, interactive challenge-response authentication)
Server authentication
Strong key exchange based on DH or RSA public key algorithms
Data integrity protection
Compression of tunneled data
Multiplexing several tunneled connections through a single SSH connection

SecureBlackbox provides the following functionality as well:

Comprehensive standards-compliant implementation of the SSH protocol (both client and server sides)
Support for cryptographic tokens as storage for keys and certificates
Windows system certificate stores support
Professional and fast customer support

SecureBlackbox is available in .NET, VCL and ActiveX editions. This means that you can use the components in projects implemented in C#, VB.NET, Object Pascal (Delphi and Kylix), FreePascal, VB6 and C++ languages.

SecureBlackbox (.NET edition) is available for Microsoft .NET Framework 1.1, 2.0, 3.0 and 3.5, and .NET Compact Framework.

Creating A Software Library

Every business uses computer software. But not every business realises the importance of having a user friendly software library for cataloging all their software.

While sharing software and using it on more than one computer is against the law, making a copy to keep in your software library in case it is ever needed is not only allowed, it is strongly advised.

In this sense a company’s software library is the computer equivalent of the box that says ‘break glass in emergency’; it grants you access to the vital software your company uses to run its day to day business. If anything goes wrong or the original software is corrupted in any way, you have the back up you need to get you out of trouble.

It’s obvious then that the library needs to be properly catalogued and kept fully up to date, to ensure that everything is where it should be in the event that it’s ever needed. Consider it as a fire extinguisher to help put out the flames caused by malfunctioning computer equipment. If you don’t know where that extinguisher is – or even worse, you haven’t got one at all – the flames could spread out and affect your whole business. Use the fire extinguisher however and everything is back to normal in no time.

The process of creating a software library can ironically be made much easier by purchasing software that is designed to make the task easy to perform and control. The companies that specialise in this kind of software also offer support services to help you get your own library up and running.

The most important aspect is to consider your needs and the best way of organising your own business software library. It needs to be easy to access and update, while remaining secure at all times.

For this reason it’s advisable to make sure that only a few key members of staff can access the software library. It’s not necessary for everyone to have access to it, and the more people are able to do so, the more likely it is that it will be compromised.

Once the library has been created it will be necessary to update it every time a new piece of software is integrated into the current computer system. Making a particular person responsible for seeing that this is done will ensure the integrity of the software library remains secure.

Stop Blog Spammers

Blogs are now an extremely popular and important part of the internet. Millions of people blog every day. As blogs have evolved over the years, so has the commenting system. Now anyone can make comments on a particular blog posting. As blog commenting has grown more popular, so has spam commenting. In this newsletter, we’ll go over why comments are a great form of feedback for your blog, how they help the credibility of your content, what spam comments are and how to prevent them from happening.

Comments – A great form of feedback

When blogs first came around, they were simply online journals. No one could post comments on a blog posting. That all changed in 1998 with OpenDiary, a site which allowed people to comment on blog postings. Now every blog, whether it is remotely or self-hosted, includes this option to comment.

Commenting is great because it allows real people to tell you what they think about your form. It gives you feedback on what you are doing right and what you may need to improve. Comments can be encouraging to you and motivate you to post more quality blog messages. Or they can be constructive criticism to make you work harder to get better at writing content.

Whatever the style of comment is, it is still very useful to your blog. High numbers of comments have the ability to make a blog look credible because they show that the blog is being read by a lot of people. That’s something that every blog owner wants, and comments help to let them know just how many people enjoy their content.

Bad comments

Unfortunately, spammers have now started to use comments as a way to spam. How do you know what a spam comment is? Well, a spam comment is a comment that only advertises another site or product. If the comment seems bland/generic with a cheap link thrown in, then it’s definitely a spam comment.

Here is an example of a typical spam comment:

“Hey, this site is really cool. Check out my really cool site at spamsite.com.”

Of course not all spam comments will be this blatant, but you get the point.

Fortunately for bloggers, as spam comments have grown, so has the ways to prevent it. Here are a couple ways that you can prevent spam comments from even being posted on your blog.

#1: Close off commenting on older blog posts

There are options for you to stop comments from being posted on any particular blog post. Lots of times, spammers will post comments in weeks or months old posts. So take away this opportunity from them to keep it from happening. Most blog hosters now offer this as a standard option in the tool panel. If one of your posts has been up for a couple weeks, close it up.

#2: Take advantage of software offered to prevent comment spam

If you host your own blog using WordPress, you can use an option in that software to prevent spam. Even if you aren’t using WordPress, you can still use other Spam comment blocking software like Spam Karma, Akismet, and Bad Behavior. While these aren’t 100% effective, they have proven to be quite effective in preventing spam from happening.

#3: Take a look at your settings and see what can be tweaked to toughen your protection

Lots of blogs now have settings to help prevent spam. If you already have a spam blocker on in your blog and are still experiencing spam, take a closer look at the settings to see if there’s anything that can be tweaked to make your protection stronger. However, if you do this, you should closely monitor your posts to make sure legit comments aren’t being blocked out. If they are, you might have to lighten up a bit.

#4: Regularly read your blog comments

Be sure to keep an eye on your comments. Even the best software or setting can’t prevent everything, so you will have to occasionally manually remove comments on your own.

By applying the above principles, you can ensure that your blog is full of only good, quality comments, which will help your credibility tremendously.

Comments are a great form of communication between yourself and your readers. They help the credibility of your blog!

How to Clean the Registry

In the beginning Windows' registry consisted of two files totalling around 5mb in size. Today it consists of at least 12 files with the Software file itself being 30mb or bigger in size. As the size of the registry has exploded, so has the trash and clutter in it. It may seem like a daunting task, but cleaning the registry properly can fix system problems, speed your computer up, and make it run more efficiently.

I have spent many years developing and refining thousands of procedures to do just that. I could share these methods of hunting down the trash with you and let you find them and delete them by hand, but if you were to sit down at your computer right now and work nonstop, you would still be busy with them a week from now when the next issue of Ray's Computer Tips arrives. By then your registry would have new clutter and you would have to start all over again.

To make registry cleaning easier on everyone, I wrote a program called RegVac Registry Cleaner perform those procedures. It has been so successful that several companies have asked me to model their registry cleaners after RegVac and even more have copied processes that first debutted in RegVac.

The first place RegVac cleans is the HKEY_CLASSES_ROOT section (the Classes Vac in RegVac does this). This section contains settings for the classes of Windows. Think of a huge box full of snakes and you will get an idea of how complicated and interwoven it is. It is so complicated that many registry cleaners bypass it or simply perform surface scans of it. RegVac uses over a hundred processes to follow each tentacle of each class deep into this area and make sure that they abide by the rules.

Next RegVac validates the entries in 22 lists with 7 different methods (the FilesList Vac does this). This is a minor part of RegVac but the bulk of most other registry cleaners even though they usually do not clean all 22 lists.

Another part of RegVac, the Software Vac, which is unique to RegVac, finds old software sections in the registry and provides a way to remove that software's entire branch. Other registry cleaners only remove a few entries in this area often leaving huge portions of the registry that do nothing but take up space and get in the way.

Even more trash can be discovered in hundreds of stashes used to store data you will never use. Most registry cleaners do not even touch these. The Stash Vac lists these stashes and lets you go through and select which ones to empty out. Please use caution when using the Stash Vac because some of the items listed there may be important. For example, one folder in the Stash Vac lists places where data for international keyboards are stored. You probably will never use the data for Bulgarian keyboards, so you can remove it, but if you live in the US you may experience problems after removing the United States 101 keyboard. The items that you can safely remove are usually obvious.

Last but not least, when cleaning the registry, you should look for broken links to files on the computer (this is what the Bad Link Vac does). If a file is referenced in the registry but it does not exist on your hard drive, that is a good indicator that something is wrong. Many programmers start out writing a registry cleaner thinking all it has to do is check for these broken links and remove them. In fact, that is all many registry cleaners do.

Even though that is all they do, they often don't do it correctly. If you check the results of such scans, you will find out that many of the broken links are really good links. I spent several months refining this part of RegVac so that as far as I know it is 100% accurate. Despite this, please realize that some software enter broken links in the registry and require them to be there in order for them to run. RegVac skips the ones it knows about, but you still need to be careful with this part of RegVac.

RegVac has six more tools that clean even more areas: the Add/Remove Editor, the System Config Utility, the OpenWith Editor, the AutoComplete Editor, the Junk Keys Editor, and Registry Backup, Pack, and Restore.
Keep the Windows registry clean and running smoothly with RegVac Registry Cleaner.

How To clean your Case

There is nothing wrong with leaving spills, dirt, and stains on your computer case. After all isn't that what the case is for, to protect the electronic components inside from spills and dirt? This is true, but there are still parts of the case that need to be cleaned and checked if you want your computer to live a long and prosperous life.


Unless you like looking at dirt everytime you look at your computer, you should go ahead and clean those spills, stains, and dust off of the case. You can do this with just about any cloth and cleaner. Do not use highly abrasive cleaners that might ruin or mar the surface and do not use solvents on plastic. A wet sponge will even work. Just make sure that the cleaner or any liquid does not seep into the inside through cracks and vents. If there is any possibility that you are going to get that messy, turn off and unplug the computer first and wait to turn it back on until any liquid has had a chance to fully dry.

After you have wiped off the outside, it is time for a little inspection. Look at the blades of the fan in the back of the computer. Also look at any vents. Is there dust there? Is there a lot of dust and grime caked on to it? If so, that is an indicator that the inside also needs to be cleaned (I will tell you how to do that in next week's article - How to Clean your Motherboard).

Some clean environments never have to have the inside cleaned. Some need it cleaned monthly. When I lived in Russia, even though I didn't notice it, the air was not clean. The fan on the computer would cake up with dirt and grime after about a month of use. And so I would have to clean the fan, vents, and inside monthly. If I had let it go for several months without cleaning, the fan would have stopped working and the computer would have overheated. Where I now live in the US, the air is clean and I have gone years without having to clean it. Again, the indicator of this is the blades of the fan and the vents. If they are dirty, they need to be cleaned.

You can do some of the cleaning from the outside. First, turn off the computer. Then get out the vacuum sweeper and using the hose, vacuum out the vents and the fan(s). If you have compressed air (you can purchase compressed air from your computer store), you may want to blow air in through the vents (or intake fan if you have one) to loosen the dust and suck it out using the vacuum. If there is still dust or dirt in the vents or on the blades of the fan, you can use a Q-tip to clean them.

If you do not have a vaccum, you can use compressed air alone. Always use short bursts to avoid moisture buildup. Start with the computer off and blow into every hole and vent. Then turn the computer on and blow everything except for the exhaust fan once again.

With the case clean, your computer will look nicer and with the fan and vents cleaned out it will breathe easier and run cooler.

A Guide to RSS Aggregators

One of the most popular features of Internet portals, websites, pages and even emails is a frame that features an organized list of news headlines and periodic updates from other web sources. Really Simple Syndication, formerly “Rich Site Summary” or simply, RSS makes this possible.

Most users visit a lot of websites whose content continually change, such as news sites, community organization or professional association information pages, medical websites, product support pages, and blogs. As Internet surfing became an intrinsic part of business and leisure, it became important to get rid of the very tedious task of repeatedly returning to each website to see updated content.

RSS easily distributes information from different websites to a wider number of Internet users. RSS aggregators are programs that use RSS to source these updates, and then organize those lists of headlines, content and notices for easy reading. It allows computers to automatically retrieve and read the content that users want, then track changes and personalize lists of headlines that interests them.

The specially made computer programs called “RSS aggregators” were created to automatically find and retrieve the RSS feeds of pre-selected internet sites on behalf of the user and organize the results accordingly. (RSS feeds and aggregators are also sometimes referred to as "RSS Channels" and "RSS Readers".)

The RSS aggregator is like a web browser for RSS content. HTML presents information directly to users, and RSS automatically lets computers communicate with one another. While users use browsers to surf the web then load and view each page of interest, RSS aggregators keeps track of changes to many websites. The titles or descriptions are links themselves and can be used to load the web page the user wants.

RSS starts with an original Web site that has content made available by the administrator. The website creates an RSS document and registers this content with an RSS publisher that will allow other websites to syndicate the documents. The Web site also produces an RSS feed, or channel, which is available together with all other resources or documents on the particular Web server. The website will register the feed as an RSS document, with a listed directory of appropriate RSS publishers.

An RSS feed is composed of website content listed from newest to oldest. Each item usually consists of a simple title describing the item along with a more complete description and a link to a web page with the actual content being described. In some instances, the short description or title line is the all the updated information that a user wants to read (for example, final games scores in sports, weblogs post, or stock updates). Therefore, it is not even necessary to have a web page associated with the content or update items listed -- sometimes all the needed information that users need would be in the titles and short summaries themselves.

The RSS content is located in a single file on a webpage in a manner not very different from typical web pages. The difference is that the information is written in the XML computer code for use by an RSS aggregator and not by a web user like a normal HTML page.

There are 2 main parts that are involved in RSS syndication, namely: the source end and the client end.

The client end of RSS publishing makes up part of the system that gathers and uses the RSS feed. For example, Mozilla FireFox browser is typically at the client end of the RSS transaction. A user’s desktop RSS aggregator program also belongs to the client end.

Once the URL of an RSS feed is known, a user can give that address to an RSS aggregator program and have the aggregator monitor the RSS feed for changes. Numerous RSS aggregators are already preconfigured with a ready list of RSS feed URLs for popular news or information websites that a user can simply choose from.

There are many RSS aggregators that can be used by all Internet users. Some can be accessed through the Internet, some are already incorporated into email applications, and others run as a standalone program inside the personal computer.

RSS feeds have evolved into many uses. Some uses gaining popularity are:

•For online store or retail establishments: Notification of new product arrivals
•For organization or association newsletters: title listings and notification of new issues, including email newsletters
•Weather Updates and other alerts of changing geographic conditions
•Database management: Notification of new items added, or new registered members to a club or interest group.

The uses of feeds will continue to grow, because RSS aggregators make access to any information that individual users like more convenient and fun.

In the mean time, Good Luck on your journey to success…

OR if you would like to succeed immediately to create financial freedom working only 4 hours a week, check out http://www.Secrets2InternetFortunes.com.

AND for a Limited Time, you will also receive a FREE copy of a limited number of the amazing 60 page eBook “52 Highly Profitable Instant Online Business Ideas That You Can Steal As Your Own And Start Today On A Very Tight Budget!”, which is jam packed with so many ideas you can use to instantly create an automated income for life! That’s my GIFT to You as a way of saying thank you for reading my articles.


A Guide on RSS Tool

RSS is an abbreviation that has evolved into the following, depending on their versions:

• RDF Site Summary (also known as RSS 0.9; the first version of RSS)
• Rich Site Summary (also known as RSS 0.91; a prototype)
• Really Simple Syndication (also known as RSS 2.0)

Today, RSS stands for 'Really Simple Syndication', and it has the following 7 existing formats or versions:

• 0.90
• 0.91
• 0.92
• 0.93
• 0.94
• 1.0
• 2.0

RSS tools refer to a group of file formats that are designed to share headlines and other web content (this may be a summary or simply 1 to 2 lines of the article), links to the full versions of the content (the full article or post), and even file attachments such as multimedia files. All of these data is delivered in the form of an XML file (XML stands for eXtensible Markup Language), which has the following common names:

• RSS feed
• Webfeed
• RSS stream
• RSS channel


They are typically shown on web pages as an orange rectangle that usually has the letters XML or RSS in it.

RSS feeds can be used to deliver any kind of information. Some of these 'feeds' include:

• Blogs feed - each blog entry is summarized as a feed item. This makes blog posts easier to scan, enabling 'visitors' to zoom in on their items of interest.

• Article feed - this alerts readers whenever there are new articles and web contents available.

• Forum feed - this allows users to receive forum posts and latest discussion topics.

• Schedule feed - this allows users (such as schools, clubs, and other organizations) to broadcast events and announce schedule changes or meeting agendas.

• Discounts or Special feed - this is used to enable users (such as retail and online stores) to 'deliver' latest specials and discounted offers.

• Ego or News Monitoring - this enables users to receive 'filtered' headlines or news that are based on a specific phrase or keyword.

• Industry-specific feed - used by technical professionals in order to market, promote, or communicate with current (and prospective) customers and clients within their specific industries.

RSS feeds enable people to track numerous blogs and news sources at the same time. To produce an RSS feed, all you need is the content or the article that you want to publicize and a validated RSS text file. Once your text file is registered at various aggregators (or 'news readers'), any external site can then capture and display your RSS feed, automatically updating them whenever you update your RSS file.

RSS tools are useful for sites that add or modify their contents on a regular basis. They are especially used for 'web syndication' or activities that involve regular updates and/or publications, such as the following:

• News websites - as used by major news organizations such as Reuters, CNN, and the BBC.
• Marketing
• Bug reports
• Personal weblogs

There are many benefits to using RSS feeds. Aside from being a great supplemental communication method that streamlines the communication needs of various sectors, RSS tools and feeds can also have tremendous benefits in your business, particularly in the field of internet marketing.

RSS tools and feeds provide Internet users with a free (or cheap) and easy advertising or online marketing opportunity for their businesses. Below are some of the RSS features that can help make your internet marketing strategies more effective.

1. Ease in content distribution services. With RSS, your business can be captured and displayed by virtually any external site, giving you an easy way to 'spread out' and advertise them.

2. Ease in regular content updates. With RSS, web contents concerning your business can now be automatically updated on a daily (and even hourly) basis. Internet users will be able to experience 'real time' updates as information in your own file (such as new products and other business-related releases) is changed and modified simultaneously with that of the RSS feeds that people are subscribed to.

3. Custom-made content services. With RSS, visitors can have personalized content services, allowing them total control of the flow and type of information that they receive. Depending on their interests and needs, visitors can subscribe to only those contents that they are looking for (such as real estate or job listings).

4. Increase in (and targeted) traffic. With RSS, traffic will be directed to your site as readers of your content summary (or 1 to 2 lines of your article) who find them interesting are 'forced' to click on a link back to your site.

These are just several of the many things that you can do with RSS. The possibilities are endless, and they are all aimed at providing you with an effective internet marketing strategy for your business.

In the mean time, Good Luck on your journey to success…

OR if you would like to succeed immediately to create financial freedom working only 4 hours a week, check out www.secrets2internetfortunes.com.

AND for a Limited Time, you will also receive a FREE copy of a limited number of the amazing 60 page eBook “52 Highly Profitable Instant Online Business Ideas That You Can Steal As Your Own And Start Today On A Very Tight Budget!”, which is jam packed with so many ideas you can use to instantly create an automated income for life! That’s my GIFT to You as a way of saying thank you for reading my articles.

Web Development And The Big Time Out

One of the great debilitators in online business is simply the perceived (or real) lack of time. Business owners are used to moving forward. An online web presence can make them feel tied to an office chair learning skills they aren’t sure they want to know.

It’s not uncommon for those who deal in full time web design to have individuals contact them for a site design, but have absolutely no idea what they want. Furthermore when the designer questions them the response might be, “I don’t know, just make it look nice.”

Let’s not forget the core values or mission of the business. Many business owners have no idea how to answer those kinds of questions. They may stare blankly for a moment or two and there’s no more time for further deep thought so they go back to action – without answers.

In many cases it is possible to answer some of the questions needed, but it may require taking time away from a familiar setting. It may also require more time than you think you want to give.

If you can get to a place of concentrated contemplation you are likely to find yourself stripping ideas to their core to find out what your business is trying to accomplish and what your ultimate goals might be.

As with almost any project you can turn frustration around if you will just take the time to come to terms with your vision.

Sometimes we spend so much time ‘doing’ we never stop to ask the question, “Why?”

This process can be a bit like taking a bus that drives around the park. You keep looking at the flowers and the park bench and long to sit in the quiet shade of a tree and just absorb the calming atmosphere. You know they will have a positive effect on you, but for some reason you just can’t seem to find the energy to get off the bus.

It seems to me there are some sites that are misguided or rarely guided that could benefit from the process of self-evaluation. These sites may look nice, but there is a sense of disconnection that may not be easy to identify, but it’s fairly obvious to visitors.

Creative energy is at a minimum while business owners simply tackle what seem to be the most urgent details.

As more people gravitate to online business there needs to be a shift in the thinking of how one goes about doing business online. In many ways it can’t be approached in the same way a traditional business is developed, yet that is typically the way many new web commerce ventures choose to tackle the subject.

You may discover your business will be more successful if you take some time for rigorous reflection. The time set aside can be a bit like an architect that takes the time to develop plans for a new building. You wouldn’t expect the architect to simply tell a construction crew to, “Go out there and build – something.”

Work at ‘building’ your online business in a comprehensive way. Your effort can develop a firm foundation for long-term success.

Can Data Breaches Be Expected From Bankrupt Mortgage Lenders?

The stock market is in a tumult. Actually, it has been for about a year, ever since the subprime fiasco (anyone take a look at Moody's performance over the past year?) Now that that particular issue has been beaten to death, other mortgage related issues are cropping up. Most of the stuff covered in the media is financial in nature, but some of those mortgage related issues do concern information security.


It's no secret that there are plenty of companies in the US that discard sensitive documents by dumping them unceremoniously: leave it by the curb, drive it to a dumpster, heave it over the walls of abandoned property, and other assorted mind boggling insecure practices. In fact, MSNBC has an article on this issue, and names numerous bankrupt mortgage companies whose borrowers' records were found in dumpsters and recycling centers. The information on those documents include credit card numbers and SSNs, as well as addresses, names, and other information needed to secure a mortgage.

Since the companies have filed for bankruptcy and are no more, the potential victims involved have no legal recourse, and are left to fend for themselves. In a way, it makes sense that companies that have filed for bankruptcy are behaving this way. (Not that I'm saying this is proper procedure.) For starters, if a company does wrong, one goes after the company; however, the company has filed for bankruptcy, it is no more, so there's no one to "go after." In light of the company status, this means that the actual person remaining behind to dispose of things, be they desks or credit applications, can opt to do whatever he feels like. He could shred the applications. He could dump them nearby. He could walk away and let the building's owner take care of them. What does he care? It's not as if he's gonna get fired.

Also, proper disposal requires either time, money, or both. A bankrupt company doesn't have money. It may have time, assuming people are going to stick around, but chances are their shredder has been seized by creditors. People are not going to stick around to shred things by hand, literally.

Aren't there any laws regulating this? Apparently, such issues are covered by FACTA, the Fair and Accurate Credit Transactions Act, and although its guidelines require that "businesses to dispose of sensitive financial documents in a way that protects against 'unauthorized access to or use of the information'" [msnbc.com], it stops short of requiring the physical destruction of data. I'm not a lawyer, but perhaps there's enough leeway in the language for one to go around dropping sensitive documents in dumpsters?

Like I mentioned before, inappropriate disposal of sensitive documents has been going on forever; I'm pretty sure this has been a problem since the very first mortgage was issued. My personal belief is that most companies would act responsibly and try to properly dispose of such information. But, this may prove to be a point of concern as well because of widespread misconceptions of what it means to protect data against unauthorized access.

What happens if a company that files for bankruptcy decides to sell their company computers to pay off creditors? Most people would delete the information found in the computer, and that's that-end of story. Except, it's not. When files are deleted, the actual data still resides in the hard disks; it's just that the computer's operating system doesn't have a way to find the information anymore. Indeed, this is how retail data restoration applications such as Norton are able to recover accidentally deleted files.

Some may be aware of this and decide to format the entire computer before sending it off to the new owners. The problem with this approach is the same as deleting files: data recovery is a cinch with the right software. Some of them retail for $30 or less-as in free. So, the sensitive data that's supposed to be deleted can be recovered, if not easily, at least cheaply-perhaps by people with criminal interests.

Am I being paranoid? I don't think so. I've been tracking fraud for years now, and I can't help but conclude that the criminal underworld has plenty of people looking to be niche operators, not to mention that there are infinitesimal ways of defrauding people (look up "salad oil" and "American Express," for an example). An identification theft ring looking to collect sensitive information from bankrupt mortgage dealers wouldn't surprise me, especially in an environment where such companies are dropping left and right.

The economics behind it make sense as well. A used computer will retail anywhere from $100 to $500. The information in it, if not wiped correctly, will average many times more even if you factor in the purchase of data recovery software. Criminals have different ways of capitalizing on personal data, ranging from selling the information outright to engaging in something with better returns.

Is there a better way to protect oneself? Whole disk encryption is a way to ensure that such problems do not occur: One can just reformat the encrypted drive itself to install a new OS; the original data remains encrypted, so there's no way to extract the data. Plus, the added benefit is that the data is protected in the event that a computer gets lost or stolen. However, commonsense dictates that encryption is something ongoing concerns sign up for, not businesses about to go bankrupt. My guess is that sooner or later we'll find instances of data breaches originating from equipment being traced back to bankrupt mortgage dealers.

The stock market is in a tumult. Actually, it has been for about a year, ever since the subprime fiasco (anyone take a look at Moody's performance over the past year?) Now that that particular issue has been beaten to death, other mortgagerelated issues are cropping up. Most of the stuff covered in the media is financial in nature, but some of those mortgagerelated issues do concern information security.

It's no secret that there are plenty of companies in the US that discard sensitive documents by dumping them unceremoniously: leave it by the curb, drive it to a dumpster, heave it over the walls of abandoned property, and other assorted mindboggling insecure practices. In fact, MSNBC has an article on this issue, and names numerous bankrupt mortgage companies whose borrowers' records were found in dumpsters and recycling centers. The information on those documents include credit card numbers and SSNs, as well as addresses, names, and other information needed to secure a mortgage.

Since the companies have filed for bankruptcy and are no more, the potential victims involved have no legal recourse, and are left to fend for themselves. In a way, it makes sense that companies that have filed for bankruptcy are behaving this way. (Not that I'm saying this is proper procedure.) For starters, if a company does wrong, one goes after the company; however, the company has filed for bankruptcy, it is no more, so there's no one to "go after." In light of the company status, this means that the actual person remaining behind to dispose of things, be they desks or credit applications, can opt to do whatever he feels like. He could shred the applications. He could dump them nearby. He could walk away and let the building's owner take care of them. What does he care? It's not as if he's gonna get fired.

Also, proper disposal requires either time, money, or both. A bankrupt company doesn't have money. It may have time, assuming people are going to stick around, but chances are their shredder has been seized by creditors. People are not going to stick around to shred things by hand, literally.

Aren't there any laws regulating this? Apparently, such issues are covered by FACTA, the Fair and Accurate Credit Transactions Act, and although its guidelines require that "businesses to dispose of sensitive financial documents in a way that protects against 'unauthorized access to or use of the information'" [msnbc.com], it stops short of requiring the physical destruction of data. I'm not a lawyer, but perhaps there's enough leeway in the language for one to go around dropping sensitive documents in dumpsters?

Like I mentioned before, inappropriate disposal of sensitive documents has been going on forever; I'm pretty sure this has been a problem since the very first mortgage was issued. My personal belief is that most companies would act responsibly and try to properly dispose of such information. But, this may prove to be a point of concern as well because of widespread misconceptions of what it means to protect data against unauthorized access.

What happens if a company that files for bankruptcy decides to sell their company computers to pay off creditors? Most people would delete the information found in the computer, and that's that-end of story. Except, it's not. When files are deleted, the actual data still resides in the hard disks; it's just that the computer's operating system doesn't have a way to find the information anymore. Indeed, this is how retail data restoration applications such as Norton are able to recover accidentally deleted files.

Some may be aware of this and decide to format the entire computer before sending it off to the new owners. The problem with this approach is the same as deleting files: data recovery is a cinch with the right software. Some of them retail for $30 or less-as in free. So, the sensitive data that's supposed to be deleted can be recovered, if not easily, at least cheaply-perhaps by people with criminal interests.

Am I being paranoid? I don't think so. I've been tracking fraud for years now, and I can't help but conclude that the criminal underworld has plenty of people looking to be niche operators, not to mention that there are infinitesimal ways of defrauding people (look up "salad oil" and "American Express," for an example). An identification theft ring looking to collect sensitive information from bankrupt mortgage dealers wouldn't surprise me, especially in an environment where such companies are dropping left and right.

The economics behind it make sense as well. A used computer will retail anywhere from $100 to $500. The information in it, if not wiped correctly, will average many times more even if you factor in the purchase of data recovery software. Criminals have different ways of capitalizing on personal data, ranging from selling the information outright to engaging in something with better returns.

Is there a better way to protect oneself? Whole disk encryption is a way to ensure that such problems do not occur: One can just reformat the encrypted drive itself to install a new OS; the original data remains encrypted, so there's no way to extract the data. Plus, the added benefit is that the data is protected in the event that a computer gets lost or stolen. However, commonsense dictates that encryption is something ongoing concerns sign up for, not businesses about to go bankrupt. My guess is that sooner or later we'll find instances of data breaches originating from equipment being traced back to bankrupt mortgage dealers.