Home
Randy Julander presents “Snow Survey and Water
Contents
1. Tal z E E 1 technolytics Results 1 10 of about 581 000 for lose laptop 0 28 seconds d 91271557 Last month the human verification tests which typically require users to iden tify deformed letters set against a cluttered backdrop were bro ken by a computer The test is called CAPTCHA which is an acronym for Com pletely Automated Public Turing Test to Tell Computers and Humans Apart As the name suggests it Page 17 Blue Chips Magazine May 2008 is a test that determines the probability of the solver being a human The letters are supposed to be impossible for com puters to read in the time allotted but is relatively easy for humans To send a message Ue character Fs ou gee this picture CBE 12 x WX ant rh Boe YAY7D The computer then repeatedly created free Hotmail e mail accounts and sent spam from them according to Websense the security firm that detected the hacking Solving the human verification tests with comput ers allows spammers to rapidly create new e mail accounts from which to is sue spam which is estimated by Ferris Research to cost the U S economy 42 billion annually 702 869 Briefs Distributed WorldWide Current Spy Ops Briefing Data lt www spy ops com gt Date Monday April 14 2008 Title Hacking gets physical Briefs The first computer attack to inflict phy
2. You ALWAYS IT S ALL ABOUT MONEY ANO IT COULD EASILY BE YOURS Created with Comic Book Creator Page 12 Blue Chips Magazine May 2008 Qt ge nori Per Record Cost Of Breaches Keeps Going Up 197 Por record cost of a breach 2005 2006 2007 Data Ponemon Institute survey of 35 companies that experienced breaches involving the loss of personal data during 2007 DYCRAV EZ as 1 2 3 Automated Encryption AutoEnc AE Brand New Security Technology Paradigm Shift AutoEnc hnamk USE i 3 Factor Auth FOBBRACHLDON CAM amp Encryption 1 4 F TVDUOMESLZI GZPBTDUNCFTYKE RODNGAZLCEBYN urToOMPTYOQSBOWTYI XTRJLAYNGATIO IBTMTORASKVEP Automated Encryption la 1 eral KISS The zum Highest and Safest Level of DnD Dynamic Secure Digital Data Management Stordge Handling amp Transportation Created with Comic Book Creator Page 13 Blue Chips Magazine May 2008 STEALING amp YOU 147 4d Cloned Credit Cards Are Stealing Yau Claned Credit Cards Are Stes Clanad Cradit Cards Are Stealing ad with Comic Book Creator Page 14 Blue Chips Magazine 2008 ned C re dii gras s ps E Mire fL HIT
3. as one derivation and I get it Yes sir Rock on as another BIW Here s the only Gumment Employee who definitely knows how to take back something that has been stolen from him in this case his sleep GOD Bless them all Hurry back home safely our young heros Well done See Security Related News amp Views 101 cont Outlets and Updated Information immedi ately following this review About Copy 2Go Storage Solution USB Drive I must admit that it took me a little while to figure out the real or imagined difference between a 2Go Drive 2GD and a Copy2Go Drive C2GSS They can be synonymous meaning they can be one in the same function alternatively and more likely they will be entirely unrelated as the titles imply Let me try to explain that conundrum for you A Copy2Go Storage Solution C2GSS is the state of the art standalone USB 2 0 Hard Drive manufactured by CMS Duh It is sold in two 2 sizes 60MB and 100MB It is an ex tremely handsome piece of hardware to say the least Plus it comes with its own beautiful traveling case as well It works Best hand in glove with the Copy2Go Professional Software C2GP BIW that s why C2GSS is named like it is and what it is originally designed for but repeat but it can be equally as effective as a standalone USB HD exactly like any other USB 2 0 Storage Device I m making a fuss about all this because this is my 17
4. USB Storage Device review herein BCM and this one s a genuine beauty Then too simply because I really didn t fully understand the differences initially because of the similarity of their names Clear as mud Right Let s clear up the muddy waters a bit The 2Go Drive 2GD is exactly what is says it is It is The repeat THE 2Go Drive located on the Right Hand i e Storage Side side of the Copy2Go Professional s Simple Intuitive Interface The My Com puter C Drive et al is located on the Left Hand side of the C2GP Interface C2GP s Center Section is the Common View Area wherethe contents of your On going Project are stored at your Beck and Call awaitingfurther action See graphic and C2GP explanation below Whew C2GSS s installation is a piece of cake It s exactly like all other USB Storage devices today except it s prettier CMS provides a power cable in case your computer can t handle the C2GSS but in this case you connect the cable to a SEPARATE USB PORT The C2GSS comes pre formatted as an NTFS volume Once the C2GSS is seen in the My Computer option of the Windows Start menu you are ready to install the Copy2Go Pro fessional Software C2GP BTW Minor inconvenience You must have Microsoft Framework 2 0 installed on your computer If you do not C2GP will guide you through that too FYI Any repeat ANY external USB Storage device can do the same job
5. restore and manage files configured by users C2GP serves as a content man ager by providing a gateway or digital bridge between a portable or desktop computer running the Windows XP Vista OS and a wide array of stor age devices More specifically CMS Products Copy2Go Professional Multi Media Xplorer is the ultimate tool for managing your important Multi Media files Represented in a Simple Intui tive Interface C2GP sports a very easy to navi gate interface With it you can easily and quickly 1 Perform Operations Straight From That One In tuitive Screen What s more you can easily view photos or listen to pre views of music files all from within C2GP 2 LOCATE the files you want click on them and let C2GP send them to the storage device of your choice 3 FIND your Multi Media files in a flattened folder structure elimi _ nating the need to wade through multiple levels of buried and hidden folders You can even do Page Blue Chips Magazine May 2008 a keyword search on file names 4 VIEW your Multi Media files as thumbnails or expand your image to full screen for a better view The built in slide show viewer allows you to manually or automatically move quickly between files within a direc tory 5 SELECT your Multi Media files using C2GP s Sticky Selection feature Select and maintain files across multiple folders without losing your previous se lection
6. Monitoring Key Strake Loggers SnoopStick Product ID TH SNSTE Price 45 00 KeyCarbon 512K Home Product ID ES KECUSBHOME Price 99 501 KeyCarbon 1 5 USB Corporate SE Praduct ID ES KCUSBSE Price 120 304 KeyCarbon ZME USE Forensic Product ID ES ECFOR Price 174 50 2 USE Key Logger Including amp Linux Product ID TH USBEL Price 119 504 KeyKatcher 128K Family 4 X Product ID ES EK5 Price 39 50 KeyKatcher 256K PRO _ ProductID Price 49 504 KeyKatcher MAGNUM 4hib i Product ID ES KEMAGHUM Price 73 50 KeyKatcher Mini 64K Praduct ID ES EKZ Price 29 304 Security 1 5 Whole Disk Encryption Apps 7 Whole Disk Encryption Apps Put A Lock On Data TruCrypt Also used in CE Secure PGP FreeOTFE BitLocker DriveCrypt and 7 Zip provide remarkably strong on the fly encryption to keep your data secure from loss theft or prying eyes See lt http www informa tionweek com news security privacy showArticle jhtml articl eID 206905765 amp pgno 1 amp query Text amp isPrev gt By Serdar Yegulalp Information Week March 28 2008 Few IT professionals need to be lectured about data security too frequently we hear of the theft or loss of a computer or hard drive with data stored in the clear without encryption Fortunately on the fly data encryption is no longer s
7. Watch your six SURVEILLANCE EQUIPMENT Utah Blue Chips Calenoar May 2008 June 2008 Sunday Monday Tuesday Wednesday Thursday Friday Saturday 11 May 12 13 14 May 17 UBC General Meeting U of U 7 00 p m Weather E N E Magazine JT FL be Deadline May 1 May 9 May 28 May30 May 31 Jun Jum 2 Juin 4 Jun 5 Jum UCS Board of Trustees C amp C Bldg Room N3005 6 30 p m Jun 5 9 Juin 10 Jun if 12 Juin 13 Pn f UBC General Meeting UofU 4 7 00 Deadline Jun 15 Jun 16 Jui 17 Jun 15 Jun 19 Jun 20 21
8. ing review on the very next page which must obviously be Security based I leave you with this quote from Robert Lewis Stevenson who most surely must have been pondering the Nemesis of All Security Static Passwords PIN s and UserNames when he wrote You cannot run away from weakness you must sometimes fight or perish Ciao JUST FOLLOW THE BOUNCING SADDLE AGAIN WHERE A FRIEND IS A FRIEND AE D BACK TN TH THE 5 SADDLE AGAIN RIDIN T THE PANDE E TOTIN MY OLD 44 WHERE YO EU M EVERY NIGHT AND BACK IN IN THE 2 SADDLE AGAIN jy WIC 4 i 20 Ol 2 CREATE YOUR MWN PHOTO BODES COMIC ROOKS e STOR THORS B MINUTES VV LACE ORE CHOOSE GLIM CHIPS A MAG AZINE MAR 2008 ARCHIVES EEE SELEST 78 ADF VERSION FCR ITS PEALT 11 Blue Chips Magazine 2008 spying and now have more than 800 cases currently uncer Feds Lose Laptop Containing Sensitive Data Again 1 urne made Com E LOC mg unencrypted Ils 01 art ants in an iri i m eder T wi Ern et perl 1 a 2008 but it s not a joke Mo Sheel Google bum sed b Results 1 10 of about 581 000 for lose laptop 0 28 seconds No Matter What DU Road You Travel T E With Digital Data
9. push comes to shove with minor exceptions See be low For example SIZE DOES COUNT IN CASE YOU DIDN T KNOW the more reason to have a C2GSS or two 2 the Big Guy on the block Copy2go Professional Overview Diagram oo Types of Storage Devices Associated with Copy2Go Pro Software App Sytem Line Letter Aon geri By Windies 6 Blue Chips Magazine May 2008 Note C2GSS HAS BOTH THE Copy2Go AND U3Copy2Go Applications pre loaded on it Therefore it is not absolutely necessary to install C2GP from the Installation CDROM nor pur chase C2GP separately for 39 00 etc which you can do BIW Thought you might like to knowthat little tidbit Also the C2GP User s Manual from off the CDROM is pre loaded on the C2GSS so we don t have to dig out the CDROM again any time we have a question or two Guess what You re now all set for the Big Gun Copy2Go Profes sional Software installation 22 3 The Ultimate Multi Media Manager A r rfr Ur DET apre Tte TL y FNERIT About Copy 2Go Professional Software Copy2Go Professional C2GP Multi Media storage solution for Win dows XP and it s also VISTA Ready 1 Istheultimatetool for managingimpor tant Multi Media files C2GP software allows users to find view select edit transfer and group Multi Media cre ations including image files video fi
10. showing up in 0 28 sec onds and after going through the first 60 returns I gave up in total disgust and shook my head vigorously Noth ing ever changes it seems Well how can it really The End users aren t the only ones who never change Aha That s why we re doing this Google saris Search More to the point the following Latest Security News is just a taste of what s been going on the past six months or so at a location near you And the breaches only get worse with time Like I said It s all about money pure and simple folks Per Record Cost Of Breaches Keeps Going Up 197 Per record cost of a breach Data Ponemon Institute survey of 35 companies that experienced breaches involving the loss of personal data during 2007 Which translated only means Ev eryone has to prepare themselves for the worst my friends it s definitely going to happen to someone you love maybe even you Security 1 3 Latest Security News I always run across some of the most interesting stuff while researching these reviews This for example Unsolicited e mails Comput ers mimicking humans crack code A machine was able to decipher wavy letters to create Hotmail e mail accounts to send spam By Peter Whoriskey The Washing ton Post Salt Lake Tribune 05 02 2008 http www sltrib technology rch Preferences Web Likelihood of Occurrence fence E
11. Access Management ignominiously used in conjunction with Usernames and PINS and 2 Used in encrypting things such as Zipping To be sure they are all extinct TARN TOOTHED TIGER LIKE US THEYRE EXTINCT By way of explanation 2 months ago March 2008 I kick started my attack on Static Passwords as they are used within the gentle confines of Comic Book Creator 2 s CBC2 Zipping capability which can be employed while Publishing newly created Comic books Then too last month April 2008 I did the exact same thing again with Nero 8 Ultra Edition s N8UE Zipping capability also with Static Pass word protection I admit is was a bit of a stretch to include Password Protecting a ZIP file as a Security related Ap plication but in truth that s exactly what it is You may not have thought of it that way but let me ask you this question Why Password Protect your file in the first place or even at all What s the Password for J ust so you can pick up the phone and tell the recipient on the other end what the Static Password you used was Oh really What you really wanted was privacy which is just another word for security that s all Page 19 Blue Chips Magazine 2008 Robert Siciliano Identity Theft Expert and CEO IDE Dorn Security 1 7 Last But Obviously N
12. This Month s Presentation Magazine Volume 26 No 5 May2008 eae eee Randy Julander This Monti Meeting presents Snow Survey and Check Out the Water Forcasting Review of Copy2Go Professional Software and Storage Solution oh Page 4 Utah s Award Winning Computer Magazine I Need One of These for Brain Researchers at HP Labs have discovered the existence of the memristor electrical circuits that might lead to computer systems with memories that never forget Memristor is short for memory resistor They con sume less power than current systems and computers based on the memristor would not need to be booted up If I had one of these in my brain my poor memory would disappear and maybe I wouldn t need a cup of coffee in the morning to get me started But then again I might need XP or Vista to run it and I don t want Microsoft in my head I Phone Advances A University of California professor is working on an small imaging machine that somehow connects to a regular cell phone It would send images to a doctor or hospital for a speedy diagnosis of a problem I would be a boon to remote parts of the world where medical as sistance is in short supply It would also speed up things in the US as well A quick diagnosis of a suddenly severe problem will save lives Perhaps someone someday will find a way to include the scanner in your cell phone Then for example if you th
13. WIT H NO LONGER A BLANK CAQD Claned Credit Cards Stealing dd wth Comic Book Creator Page 15 Blue Chips Magazine 2008 Security Related News and Views 101 Reviewed by Don Nendell Prolog Yes I m back in the saddle again It s been over six months now since my last Security 101 column long enough because there s no turning back to naive ty ever again at least as long as They are out there out to get you And They definitely are folks make no mistake about it This is not meant to be a scare tactic it s simply a Fact of Today s Everyday Life Get used to it It s all about money Security 1 0 Security Facts of Life I would guess t mate that fully 50 75 of you out there reading this have very little if any to do with the day to day business world You re simply an End user you say Wrong You re in the business world all the time whether it s at the super market on line banking chatting on your cell phone accessing your PDA laptop Blackberry or doing virtually any type of mobile telecomputing The catch Truth be known in the eyes of a potential thief you are really no different than any other mobile employee of some business or other Thieves initially can t differ entiate between the two of you sitting side by side in an airport using your mobile device s or at a Starbuck s remote terminal or most
14. buch Mp ede meran dinves flash cards DVDs al cameras an Ana ccrta ne co sr selected Multi Media fies 1 Fidi Vie Select E Backup imponi iln raw leac aic n da vri peor tries Emily cena wiha mutile dide Select lim bom vaihin maliiple Create pour cram gropii ul valet Las idea ds eve toner operation ipea mi le click ch wh SELL poor mpi is vari pr molriie iH cnm fies EE gm EM puter on and find that the drive has crashed and the photos music files or documents are gone Using Copy2Go Professional keeps all of those valu able files safe and secure Why Use C2GP Hard drive capacities have grown tremendously overthe years See above making it difficult keeping track of many image audio movie and document files C2GP is specifically designed to easily locate these files that are often scattered amongthe hundreds of gigabytes of stor age present on today s modern computer systems Once located these files then can be viewed played copied or even backed up to a mobile storage device such as an external hard disk USB flash drive UFD digital camera or MP3 player et al C2GP uses a mobile storage device Copy2Go Storage Solution C2GSS See above to collect backup
15. een v the corte wc Chee current folder bars m um color Page9 Blue Chips Magazine May 2008 2go Drive Side Active Basic Functions Backup and Restore bey Ph due denen 4 Cole nor dee star inhares Cee Pare Cond iguratica dor Rarkup an Restore m global mrg cre Pe es bo boh Puree Um dir left thee cng eee for Al eer The calgary conl gare dace Proewiew Central Lor apr ton cau Din ate Uraga Mie Wiens zr Doc AI Hos lor pn Hub elected dieses Freed DI Ha ipay ol h m greater an fhe at Paice ia mus THE d AER Revere eerste al the Conon Fla to the Ay cere HE Inlormaliese Lermiral Fama Created wih Comic Book Creator In Summary C2GP is extremely valuable in as sisting me in locating graphics for these reviews graphics that are scattered all over my computer I mean Scattered Splattered It s Tornado Alley in spades out there folks Now with C2GP I am presented a th
16. ense Department cur rently is detecting about three million unauthorized probes on its computer networks every day and the State De partment fends off two million probes daily That being said China has pen etrated key government and industry databases in the United States The advanced attack used key loggers my emphasis here as downloads at tached to phishing email and social engineering to compromise the systems T x n 24 2008 Date Thursday J anuary Title 7 1 Billion Dollar Fraud Briefs French Bank Societe Generale ond largest bank in France announced today that a fraud committed by a single trader had caused it a 4 9 billion euro 7 16 billion USD loss and that it would seek emergency funds as a result he 31 year old trader insider was said to have extensive insight into the operations of the computer system and used stolen Passwords that aided in his ability to commit the largest fraud in history Security 14 Digital Spy Tools The Covert World of Espionage FYT Key loggers are very easy to buy all over the Internet Anyone can do it especially crooks Here s but one example from my favorite Security Magazine Eye Spy Note At the Eye Spy online store lt www eyespymag com gt you can buy a whole host of Spy Gadgets naturally including Key loggers Page 18 Blue Chips Magazine 2008 Key Stroke Loggers Computer
17. ery single day since it came out more than 16 years ago it s actually a Windows 3 1 version you know Yes that B Drive still works very well thank you But I digress this is about storage isn t it Oh well Same song different verse could be better could be worse Third Remember obsolescence is by design not just in data storage media but in pretty much anythingthat s sold nowadays They have to keep com ing out with new stuff for us to buy and convincing us it s better than the old stuff or they d go out of business Not a coincidence FYI MBA s the world over are taught this underlying Suc cessful Business principle They even have a name for it It s called Planned Obsolescence But you don t have to wait that longfor a great storage product to come along it s already here It goes by the name of CMS s Copy2Go Storage Solution i e USB 2 0 External Hard Drive And it gives me great pleasure to review it for you here and now What makes me most excited is not only what it does but most especially theapplicationsthat come and work with it They are 1 Copy2Go Profes sional Software and 2 Optionally also from CMS CE Secure Vault Edi tion Pro Data Encryption See Part 2 next month Hoo aah BTW Did you ever wonder what that stands for From Ghost 1 Blue Chips Magazine May 2008 Wars 2004 Steve Coll tells us it s Heard Understood and Ac knowledged
18. este en brc ar Pos LL Hirn Fin xmi dat km m oom bp om numo 5a amcmil emm Fe pm meri miii ee yari Opening Screen Basic Functions Sides Categories Drives These two bubons ore and set the xa cong n nol ported The miie vide controls Fa jiona Central panem the catagory bine Page 8 Blue Chips Magazine May 2008 It s Easy To Use And Here s How F Dag ame lle i aem bee soe v puma rg Pad a dm bitum Fire aes mS Ler Che ign hiire sole lie ay jey Yad Phen LL Ug red Fike ba Ay Camper Screen Annotated Created with Comic Book Creator Folder infonnation ae ee tne prt E Teo holder Bey computer biir and zs i bul bras ri gon dH a Der mh Ew ume ol bam information Bag heh Phy Folter hakir B gest bu Maecen Cane ivi Hp iti ai eie Formal Se dapured riran For alba ee pe Fi vieles er Pokker Same Sambi bey Eras ju ci bet bey ah SR an central after the Fodder Fuss b
19. fically instead of merely Crying about it simply because we are all at the mercy of would be actual thieves et al See lead in graphics pages once again such as those shown in the excellent presentations on ABC WorldNews with Charles Gibson re Thieves May Be Stealing and Selling Your ID How Do You Protect Yourself From Online Crooks Apr 30 2008 How Identity Theft Happens and How to Pro tect Yourself Most Common Ways Your Identity Gets Stolen and How to Fight Back May 1 2008 and Crooks Have Your Card and You Don t Even Know It How Thieves Copy Credit and Debit Cards and Drain Ac counts May 2 2008 Note See the original broadcast s for yourself at lt http abc news go com Technology story id 4773999 amp page 1 gt 20 Blue Chips Magazine 2008 ABC WorldNews certainly de serves a resounding round of applause for this great educational community service about Identity Theft to all of hu manity Thank you ABC Mr Gibson all of your staff Well done Prolog John Steinbeck wrote Must the hunger become anger and the anger fury before anything will be done Recent statistics indicate that an identity is stolen every three seconds Best of Luck Til the next time Stay Safe Ciao Footnote 1 See the actual Reviews in the Blue Chips Magazine Archives at lt www ucs org gt Note Always choose the pdf for mat for its beauty
20. ink you broke your leg you could x ray it send itto a doctor or hospital and get a professional opinion quickly They could then send you or talk to you information as to what steps you could take to alleviate the situation Some researchers have already developed wireless Band Aids containing RFID chips that transmit informa tion to a cell phone Itis speculated that when not if this cell phone con nection comes to fruition it will greatly reduce emergency room visits and provide better and quicker relief to any emergency Recent Trends Gone Phishing See the Sign Upon the Door Last week the Internet Crime Compliant Center is Sued a warning about a phishing scam designed to steal your personal information using the tax rebate check as bait The phishing messages claim that the best and fastest way to get your rebate is through direct deposit They even include a Web link to a site designed to fool you into believing that providing your per sonal data will speed your rebate It even includes a fake IRS message that warns you that failure to submit information may delay the rebate These pirates are getting more devi ous every day I received a suspicious E mail afew weeks ago from Hallmark Cards that told me that a card was waiting for me and all I had to do to view it was click on a button When I clicked on the button to view it a box came up asking me where to download the exe file I quickly shut it d
21. ize is 71 2 10 inches All other page sizes are based on a 7 x 10 inch page in order to conform to editorial style Half page ads may be 7 x 5 inches or 3 x 10 inches Quarter page ads are 35 x 5 inches Business card ads 3 x 2 inches Classified Advertising Utah Blue Chips members may place personal classified ads at no charge Maximum ad size is 7 lines 35 characters per line Submissions Members are encouraged to submit text articles for publication in ASCII text only Photos in TIF or JPG format only Line graphics tables in almost any vector or TIF format Do not imbed graphics or tables in text files All articles must be received by the 75th of the month preceding the month of publication All articles become the property of the Utah Computer Society and by submitting an article the author gives permission for the Blue Chips Magazine Staff to edit the submission The author also gives permission for republication in other users groups communications Permission to Copy Permission is granted to other nonprofit PC user groups to reproduce any article published in this newsletter provided credit is given Blue Chips Magazine and the author s of the reproduced materials Reprinted articles are subject to the terms of their respective copyright holders MONTHLY MEETING LOCATION 2nd Wedn CENE University of Utah Union Building 7 00 p m apcug Charter Member of the Association of PC User Grou
22. l Software for now thank you very much However a couple of pertinent Talkback s concerning Harris blog do beg repeating here for some very obvious reasons They are First When Pioneer first came out with their CDRW drives 1998 the price was 50k These new holographic devices are cheap in comparison In 5 years there ll probably be a bigger better and faster solid state no mov ing parts drive on the market though making this one obsolete Second The problem with storage technology is that it becomes obsolete too soon for one reason or another storage provider goes out of business competing formats confuse the market place a newer better format takes its place Psst That may be well and good but I have all of that old stuff lying around still being a first adapter reviewer you know J ust to prove it to you I ve scanned in two 2 old boxes the first of which is possibly the first of the laser based technology storage devices Imation s 120MB Super Disk It still works of course Note It s the same size as the old 3 and 1 2 floppy Y NATION LEM r Carpztible disk remember those BOH Bit of History Back on 2 13 94 Donna and I bought 300 recycled WordPerfect 3 5 Floppy disks For a UCS Fund Raiser for the unheard of price of 0 15 each And to this very day I m still playing QOP s fantastic Solitaire s J ourney on my Windows XP Pro ev
23. les audio files and documents A keyword search by genre is included while the built in slide show viewer enables us ers to move manually or automatically quickly between files within a directory and 2 Automatically searches internal and external storage devices including hard disks memory drives flash cards CD DVDs digital cameras and MP 3 players as well as other removable storage devices to find and present Multi Media files Thanks to a single screen format and an intuitive layout using the program and backing files up is a snap Multimedia Management with Because of the explosive growth of irreplaceable digital photos video music and documents stored on com puters today we developed Copy2Go as a media management tool ex plained Ken Burke president CMS Products Copy2Go Professional allows people to quickly and easily find their valuable photos and other data on their computer s internal hard drive and then back that data up to the external Copy2Go Storage Solution USB drive for safe keeping He continued no one wants to turn his or her com The Ultimate Multi Media Manager EMS Produc perita fessional MultiMedia Xplorer is the ubimate tocd for managing eur important Mul files Wish Biene an hn a WH e transier and nm idem Mu pus dia ludin image fles video files audio files E mad r internal and external storage
24. likely at any other public place either You both are targets of highly organized absolutely diabolical thoroughly unethical illegal and debaucherous and totally dedicated thievery If you are careless about your activities in public yes even at home you have a target on you back that says Money And in the end that s what it s all about M O N E Y It is under stood that the business aka 1 mobile worker 3 is pounded on daily while at work to strictly adhere to in house business safety and security procedures at all times repeat all times However most of us naive End users don t have that constant reminder to be ever alert and safe in our day to day computing ac tivities Mobile workers fall into that identical rut the very instant they leave the confines of work They in effect become just like us the every day End user They relax their vigilance because Big Brother isn t watching any longer orso they seem to think However other creeps immediately take their place outside in the Watch Zone You may recall the old B W TV series Twilight Zone with Rod Sterling Same difference same results Boo They Got You The mobile threat landscape is far and wide writes Christian Perry Securing The Mobile Worker Don t Let Company Data Escape Through Em Page 16 Blue Chips Magazine 2008 ployees Processor Magazine 4 18 08 p 10 See the full a
25. nt the ways Ugh 1 However you can actually see C2GP in operation for yourself by watching the CMS Adobe Captivate Video Demonstration of C2GP at http www cmsproducts com products copy2go demo html gt at http www cmsproducts com copy2go Default html gt ih E ue E Ld ul Simple Intuitive Interface timp Literas yee had b Perg bo erie Bed naycate of prag Inm phe pps Wm rare ies QA ama phptoB B6 hgfa Pee pf rigged ad Freer LOGY Dg Pend Her pow wet Eg et Cay deo Sheet dq Ir males pe FRG atu OE phebza muse veces Cer Gurr Many nm quek scd FEET shep Inge Pao end Document Berea ape nr a ge Dodqe eee Pe De Dor Wm ee 08 change Caries devises ane dee posce han HPJ Hai gold doran petes pema anc reach mersa Do ey rel peter debida ara copy dq phorizi Cede mae ceed we deocaman r Fle lypru m Be os QT TIF 2 2 P PL WEA bow d redd pep mp d
26. oad You Travel With Digital Data You ll Always Need Security Naturally we ll be discussing more on that subject of security all throughout Parts 1 2 of this month s review J j m ns N 4 ic ks e le 7 ho ks No Matter What Road You Travel Thomas Huxley who was instru mental in developing scientific educa tion in Britain is quoted as saying If a little knowledge is dangerous where is the man who has so much as to be out of danger My experi ence to date dictates that this State of Being will never happen again in our lifetime until repeat until we can eradicate the extreme Islamist terrorist subversive radical hacker malware writer ID thief and that ilk elements in our society Which is never As longas any peace loving individual has to live in mortal terror for his her life limb family and property we must be proactive against and ever vigilant for wrongdoing everywhere The noted US radio announcer and news commentator Elmer Holmes Davis 1890 1958 counsels us The first and great commandment is Don t let them scare you Security 1 2 Google search lose laptop Everyone surely knows that if you do a Google search on lose laptop you ll get a pretty good response Ha Little did I know Please note that although this portion of the review is being written on April Fool s Day I assure y ou this is not a joke With 581 000 hits
27. of a possible 100 UFD s I have to choose from to see how they all worked together They were 1 Naturally the host product reviewed herein the CMS 60GB Copy2Go Storage Solution USB HD 2 The USModular 8GB USB Mon stor Removable USB drive See my October 2006 BCM review at lt www ucs org gt remember to choose the pdf version for its beauty and 3 Ihe Sandisk 1GB U3 Cruzer Micro USB Flash Drive See my December 2005 BCM review at www ucs org gt again pdf version please Which means bottom line I checked out two 2 different security related storage products devices out of the three 3 mentioned above with my DYCRAV tm Security Suite which gave it an added layer of obfusca tion i e security and stealthiness See my August 2006 BCM review at lt www ucs org gt again pdf version please Naturally of course they all worked perfectly I couldn t be any happier thank you very much Kudos all around Hoo aah Page 10 Blue Chips Magazine 2008 sUPPORT OUR TROOPS In Conclusion See you next month with CMS Part 2 CE Secure Vault Edition Pro Data Encryption the perfect comple ment to C2GP and C2GSS the coup de grace to all other Security Storage solutions It is then and there that we will really get deep into Security my best suit And with a near perfect segue as we eagerly anticipate that significant Security review as well as the follow
28. olution Reviewed by Don Nendell CMS Products Inc 3095 Redhill Avenue Costa Mesa CA 92626 Ph 714 424 5520 CMS Web Site lt www cmsproducts com gt Sales Department Hours Open between Monday amp Friday 8am 5pm PST Toll free phone 800 327 5773 Ph 714 424 5520 Option 2 N American Reseller Partners lt http www cmsproducts com resellers asp gt CMS Support Hours Open between Monday amp Friday 8am 5pm PST Phone 714 424 5520 Customer Service Option 3 Technical Support Option 2 Fax 714 435 9411 Online lt www cmsproducts com support gt Email support www cmsproducts com Allow one business day for support inquiries excluding weekends Copy2Go Professional Software Sys tem Requirements Intel Pentium or compatible processor 256MB RAM 35MB Available Hard Disk Space Windows XP Vista Ready Supported Image Formats PNG J PG GIF amp CRW image files Supported Audio Formats MP3 M4P ATRAC SNG WMA amp RAM audio files Supported Video Formats AVI MP4 WMV MPG amp QuickTime QT video files Supported Doc Formats XLS PPT TXT WDB VSD DXF MDE DOC PDF SWF GRF AI PST WPS ZIP MPP amp PUB MSRP The Copy2Go Storage Solution USB storage drive is offered in 60 159 and 100GB 219 capacities and includes not only an Installation CDROM of Copy2Go Professional Software and its User Manual they are pre loaded on the Drive it
29. ome exotic costly beast Rather than just encrypting single files some applications are able to create vir tual disks either within a file or directly on a partition where everything written to the disk is automatically encrypted On modern hardware the overhead for encryption is minimal you no longer need dedicated hardware to make this happen See Part 2 Article Comments Disgruntled Worker with an Axe commented on Apr 2 2008 They are ALL vulnerable be cause they are all Protected by Passwords which can be cracked and have been since PK Zip switched encryption schemes years ago But I guess I can t prove that without violat ing National Security now can I Get The Picture Passwords are like Dinosaurs Security 1 6 So What Can We Do About This GOD created the world but it is the Devil who keeps it going Tristan Bernard As for me this is my 46th Security related review Each one of those reviews in one way or another is aimed in that direction i e Security Problem Solution s I know that no one person has the Final solution but I can at least Start with the miscreants prime target the Security chain s absolute weakest link Static Passwords Passwords come in two 2 distinct flavors Black and White Cut and Dried Frick and Frack etc and both are the weak links in Security More specifi cally they are 1 The prime culprits of Identity
30. ot Least Robert Siciliano Identity Theft Expert and CEO IDTheftSecurity com http www realtysecurity com index php says Most people think that it can t happen to them Having this It can t happen to me syndrom is what invites thieves and predator into your place of business and your life Security is a journey It is not a destina tion a place you arrive to So the need for security continues Call to Action Therefore I feel the time has come once and for all to answer the Call to Action As my positive response to that call I invite you all to view the video I have posted on Screencast com To do so merely the following URL and paste it into your browser s Address Win dow lt http www screencast com 1 7S8lysDSR gt My story is told in part in this informative 13 minute video As you will see it pertains in a large part to stopping ID Theft with a US patented paradigm shifting security protocol en titled Dynamic Challenge Response Identity Authentication and Veri fication DYCRAV The protocol can augment or completely replace Static Passwords PIN s and User names each in their own right the weak link in digital data security the very bane of ID Theft EZ as 1 2 3 Automated Encryption AutoEnc AE A Brand New Security Technology Paradigm Shift AutoEnc Dynamic USB 2 Factor Auth AM amp Enc
31. own with I hope no ill results I immediately ran my virus scanner spybot etc and was told I was clean The E mail looked very official and real Hallmark logos good graphics etc Let this be a lesson to you and me BE VERY CAUTIOUS WHEN IN DOUBT DON T Insect Instructions The latest science fiction movie has nothing on the latest device for fighting on the front lines It is a bug It is a robot that looks like a bug and is as small as a bug It has a small camera and sensors able to detect chemical biological or radioactive weapons They can be thrown in a building cave etc and send back information to the troops Sort of gives new meaning to the phrase don t bug me Fine Page2 Blue Chips Magazine May 2006 Blue Chips Magazine Utah s Award Winning Publication i 5 d nis _ Magazine Staff Editor Cliff Millward Review Program Liaison James Alexander Review Product Editor Donna Nendell Review Editor Product Recruiter Don Nendell Photography LeRoy Johnson Proof Reader Larry Lamph Doug Jackson 955 9633 290 2269 965 9594 965 9594 Advertising Rates 12 months 1200 900 450 225 120 6 months 700 500 3 months 400 Ad costs 1 month 2 Page Spread 150 Full Page 100 275 Half Page 50 130 250 Quarter Page 25 70 130 Business Card 15 30 60 Full page s
32. ps Officers and Trustees Eve Phone E mail President Stuart Gygi 576 1891 sgygi xmission com V Pres Larry Lamph 571 2908 larry lamph gmail com Secretary Lowell Kenedy 278 3035 Ikenedyconetworld com Treasurer John Witzel 296 1390 witzeljconetscape net Rick Gregory 582 7783 rfg csolutions net Doug Jackson 322 2337 cjackson104 hotmail com Information Persons or companies may join or renew at the meeting or by sending a check payable to the Utah Computer Society to Utah Computer Society Membership Secretary PO Box 510811 Salt Lake City UT 84151 Individual memberships are 25 year Business Memberships are 35 00 a year Corporate sponsorships are available at two levels Corporate Sponsors enjoy all benefits of membership including multiple individual membership and prepaid advertising coverage Contact a Board Member for more information 10 year memberships withoutthe magazine are available for students other family and Senior Citizen Center members Other important information Meeting Information http www ucs org Group Business James Alexander 200 2269 Magazine Cliff Millward 955 9633 Program Coordinator James Alexander 200 2269 Web Site http www ucs org WebMaster 272 8949 Membership evenings Bob 262 6045 May Renewals Bob Beaudoin Douglas C Davis Larry W Hirschi Glen J Parker Norm Peterson Page 3 Blue Chips Magazine May 2008 CMS Part 1 Copy2Go Professional Software amp Storage S
33. re than four million complete storage solutions in 90 plus countries The complete line of product offerings includes automatic backup solutions for both portable and desktop computers RAID systems backup and disaster recovery software media management software laptop notebook hard drive upgrades and data transfer kits and high capacity desktop hard drives Update The latest News From Lake Woe Be Gone Seems I m writing this review just in the nick of time CMS just got some competition NOW HEAR THIS This from a blog posted by Robin Harris 04 18 08 on ZDNet Holographic storage ships next month lt http blogs zdnet com storage p 313 amp tag nl e550 gt also there s an interesting accompanying 110 second video FYI as well Even r since astronaut Dave Bowman discon nected the HAL 9000 s holographic memory in 2001 A Space Odyssey techies have been wondering when we could buy real holographic storage Now we know 2008 It is that value InPhase Technologies spec d the opti cal media they use a 5 25inch clear disk in a cartridge at 50 years that justifies aprice 18 000 that will keep most of us from buying ourselves an early Xmas gift Perhaps in 15 years holographic burners will be 50 and the media less than a 1 4 Blue Chips Magazine 2008 Windows Review Whew I ll stick with CMS Copy 2Go Storage Solution USB Drive and their Copy2Go Professiona
34. rticle at lt www pro cessor com gt In a Key Points Side bar Perry stresses 1 Protect devices Mobile devices are easy to steal and serve as a gateway to confidential com pany and your End user information 2 Secure the home office Telecom muters must remain as vigilant about data security at home as they do in the business office The use of firewalls and regularly updated security software is a must nuff said End users Avoid eavesdroppers Business travelers are easy prey for eavesdroppers who can steal information from phone calls or device displays like at the ATM Supermarket et al with little effort Teach employees this applies to all of us End users to keep displays away from roaming eyes and limit telephone conversations and 4 Be careful with public terminals If they must use public computer terminals employees this means everybody must log out of Web email and other login mandatory programs before leaving the station public libraries Starbucks et al So how does all this fit in with CMS s review products which are CMS s Copy2Go Pro USB Hard Drive and CE Secure Vault Edition Pro Data Encryption Software AES 256 Bit Protection That s Easy These two 2 fit into the mobile computing arena ab solutely perfectly like a rich tailor made pair of leather gloves Security 1 1 Digital Data Security More to our point here From here on out now and forever No Matter What R
35. ryption KTDOOGSBYI MWAGDGBDRECL POTVDUOMESLZI QZPBTDUNCFYKE RODNGAZLCEBYN urTOMPYOSBGWI TI XTRJLAYNGATIO IBYMTORASKVEP EHS J YOBRSACKLDOEKE LOGPOSBIEYHFLTE RKRAHGATITDIU HMEBSXECBMURX Dual Layer Automated Encryption T mi i niam erae m roto ee KISS The Fastest Highest and Safest Level of DnD Dynamic Digital Data Management Stor Secure Handling amp Transportation My Hat s in The Ring DYCRAV tm is my Hat Thrown into the Security Ring I havea solution to the ID Theft prob lem I merely need a Champion to help me virtually save all of us you and I once and for all We can win this fight that is if we all stand up and shout in unison loudly enough I m Mad Stop This Insanity Right Now Then it would be stopped FYI I have reviewed the full DYCRAV Security Suite i e DY CRAV AutoEnc Drag Drop Security As Easy As 1 2 3 on page 8 in the August 2006 issue of Blue Chips Magazine BTW I shall be talking with CMS about bundling these same DYCRAV Security protocols in with their won derful products Security 1 8 I think it is about time we all did something about all digital data communication security weaknesses but ID Theft most speci
36. s C2GP even displays how many files you have selected in each folder and offers the option of viewing all of the selected files at one time 6 EDIT your Multi Media files us ing whatever current application you are already using and are familiar with With C2GP there is no need to learn new editing programs You can even Delete a file s as needed or desired from any selectable location Use C2GP s bulk Rename feature to quickly and easily change multiple file names at the same time Thisis an especially important and extremely useful feature when dealing with sequentially numbered photos cre ated by your digital camera 7 BACKUP amp RESTORE your Multi Media files to almost any stor age device attached to your system C2GP supports transfers to hard drives memory disks flash cards and other removable storage devices including C2GSS C2GP incorporates a single backup button making it easy to pre serve your precious and irreplaceable photos and video as well as music or document files and 8 GROUP your Multi Media files to create related collections of your favorite files in C2GP s relational data base which can even include different types of Multi Media files within the same group In C2GP a Multi Media file can exist in any number of groups Note With apologizes to Ms Browning but I really do like this captivating colorful and highly useful C2GP product very much How do I er show thee Let me cou
37. self Handy Copy2Go Professional Software is also offered as a standalone product in three 3 different flavors versions 1 CD 39 00 2 Windows Download 29 00 and 3 Windows U3 Download 29 00 Insert graphic 01a CMS Prod ucts gt About CMS CMS Products Inc CMS a world leader in content management and data backup tech PRODUCTS nologies since 1983 has provided innovative backup restore and storage systems for laptop and desktop computer users in more than 90 countries They are a leading innovator in data backup encryption and security In addition to their extensive line of laptop hard drive upgrades CMS recently introduced a full suite of data security products for business and con sumer users Their offering includes CE Secure Vault Edition Pro data encryption software See the CMS Part 2 Review in the J une BCM and the innovative ABS Secure line of fully encrypted portable backup secure solutions By developing leading edge easy to use products revolutionizing the laptop notebook and desk top data backup restore and storage industry CMS has received global recognition because of its high quality user friendly product offerings CMS Products supplies enterprise government agency and educational institutions as well as SOHO consumers through national and inter national distributors and resellers About CMS Products CMS has sold more than two million units of software while installing mo
38. sical harm My emphasis here on the victims began on March 22 2008 when hackers inserted scripts into hundreds of messages embedded with flashing animated gif images The hack ers increase d their efforts and turned to a more effective tactic on Sunday injecting JavaScript into some posts that redirected users web browser to an alternate page with a complex im age that was specifically designed to trigger seizures in both photosensi tive and pattern sensitive epileptics Date Tuesday April 08 2008 Title New Internet Threat s Explode Briefs Symantec reported new internet threats rose over 460 in 2007 They also reported how cheap stolen account information is being sold See http news yahoo com s ap 20080408 _ on hi te internet security threats This plus the article on terrorist 5 using stolen credit cards on Defensetech org See lt http www de fensetech org archives 004105 html gt paints a grim picture Date Monday March 10 2008 Title Over20terabytesofdatastolen Briefs The U S Director of National Intel ligencein his testimony before the Con gressional Armed Services Committee disclosed that approximately 20 tera bytes of data was stolen by cyber attacks last year Some of this data was from the Department of Defense We seem to be firmly ensconced on the Wide Road to Now Here Now here a Date Sunday January 20 2008 Title The Attack Has Started Briefs The Def
39. umbnail view of ev graphic I ve ever put on my PC I can even Group them Pretty neat Ha I ll bet I ve got thousands of the suckers I have at least 200 or more just for this month s reviews alone The buggers are really piling up on me it seems lately For instance I must have had at least that many graphics for last month s review April of Nero 8 Ultra Edition And most likely there were that many for Comic Book Creator 2 0 the month before that March And I fully intend putting all of CMS s prod ucts on the C2GSS plus other UFD s as well so that I can be entirely mobile like when I go to Cliff s to put these re views to bed for instance 60GB may just may handle all my review graphic stuff but we ll just have to wait and see about that Then too I m getting a little ahead of myself here I should be sharing the following summary with you at the Con dusion of the CMS Part 2 CE Secure Vault Encryption Software review which of course comes next month Say a little prayer for me in the meantime explain that one next month GOD willing and the creek don t rise 4 paw E j L1 1 I i To continue It s a little prema ture however here goes anyway it s certainly worth telling The acid Lests yes I said tests came when I installed both Copy2Go Profes sional Software and CE Secure Vault Pro Encryption software on three 3 different storage modali ties out
Download Pdf Manuals
Related Search
Related Contents
CNC 8035 - Manual de programação User Manual - Affordable Scales & Balances ficha de aplicación Vesmatic 10/20 Manager - Micro Frigidaire FFRH0822Q1 Wiring diagram LG WM2250CW Energy Guide ang. キャメロット 取扱説明書 Copyright © All rights reserved.
Failed to retrieve file