Deciphering Bitcoin

Chances are, if you have a technically-minded teenager, you’ve heard of Bitcoin. Here in the Geek homestead, it started casually, over dinner, with something like the following:

Hey Dad (for some reason, it ALWAYS starts with that)… can I mine Bitcoin?


Don’t sit on me!

And here we are. Maybe you’ve gotten similar questions from your teenager, drunk on the prospect of fabulous riches with no effort. Or perhaps you’ve heard about Bitcoin, but have no idea what it is. Or perhaps you’re a New York Times best-selling author, looking for a little research for your next project. Or maybe you accidentally found this page while searching for a babysitter for your pet hedgehog. Well, this blog is for you. No, I won’t watch your hedgehog.

What is Bitcoin?

Glad you asked. Bitcoin is an open source, Peer-to-Peer (P2P) digital currency. I could end there, but the blank look on your face tells me that didn’t help. Let’s break it down.

Open Source


Software that is open source simply means that the lines of code that act as the building blocks for the software program are available for other people to read, analyze, tweak, and re-distribute. The key word for open source software is “collaborate” – you are encouraged to work together with others to find new and creative ways of using the software. By comparison, an example of closed source software would be your Windows Operating System. The lines of Windows source code are the closely guarded secret sauce that no one else should ever discover, out of fear that Bill Gates’ gang of rowdy stormtrooper lawyers might drag you into court and sue you into oblivion.

Peer-to-Peer (P2P)

napsterSomething that is P2P means that its job or function is distributed across multiple devices. Remember the hullabaloo a few years back about Napster and Limewire and all those P2P file sharing applications? If I had Wham’s Greatest Hits sitting on my computer hard drive, I could share those MP3 files with anyone, anywhere, and they could access them using a P2P program. Likewise, I could access any other P2P user’s Wham music, should they choose to share it. Other computers (peers) could access my computer files, and vise versa. That is file-based P2P sharing, though there are other applications. A few years back, there was a program called the SETI@Home Project. This program was a P2P distributed computing platform that allowed other peers (computers) to utilize your computer’s processing power to help search for extraterrestial life. The big word for P2P is “de-centralized”, meaning the whole is made up of many individual parts, spread all over the place. The copyright lawyers had a challenge in cracking down on P2P file sharing because there was not a single place all the files were shared from. They had to identify the individual peers, then encourage those peers to cease and desist. I worked for an Internet Service Provider back in the hayday of P2P File Sharing, and had to send out lots of nasty legal letters to home users to scare them into stop sharing their stuff.

currencyDigital Currency

This is the easy one. Were I to look inside your wallet right now, I might find a few dollar bills. Those are examples of physical currency – you can touch it and feel it and spend it or hoard it. By comparison, digital currency does not have a physical form – it only exists, digitally. You can find a cool looking round Bitcoin chip, with the Bitcoin B on it, and even transfer some digital Bitcoin onto it (via an onboard chip)… but that would be like moving Wham’s Careless Whisper MP3 onto an ipod, and thinking the ipod now was Wham. The coin isn’t a Bitcoin – it’s a cute shell, on which you placed some Bitcoin, because Bitcoins are digital currency, not physical. Make sense?


The concept of Bitcoin came about in 2008 through the release of a technical research article (called a Whitepaper) published by a person or group of persons named Satoshi Nakamoto. Much speculation abounds on who Satoshi Nakamoto is, and while some people believe they cracked the mystery, no one knows for sure. A few months after the whitepaper was released, Nakamoto bought the domain and released the software source code there. The very first blockchain was created using this sourcecode, with an embedded note from the creator of ‘The Times 3 January 2009 Chancellor on brink of second bailout for banks’. This provided a clue as to the reason why Bitcoin was created, as it references the British government’s bailout of the centralized banking system. This is quite significant, as Bitcoin was created as a reaction to the perceived shortcomings of centralized currency-

You may say I’m dreaming about cryptocurrency, but I’m not the only one..

namely, shoddy government oversight, stock market crashes, the Great Depression, the transfer of bank debt onto the public taxpayer through bailouts. All of this could be remedied by creating a global digital currency that had no central bank, no government oversight, no middleman that could corrupt it. By utilizing strong encryption (hence the term Crypto-currency), creation and transactions could remain safe and secure. The classic utopian society, enabled by cryptocurrency… Lennon would have been so proud…


I See What You Did There

I mentioned a word in the previous paragraph, “blockchain“. Forgive me for getting ahead of myself, and let me explain. The magic of Bitcoin involves the use of blockchains, which are the transactional Bitcoin records that are linked and encrypted for increased security. Think of it like a ledger of all transactions. Each time someone buys something using Bitcoin, that transaction is written in the ledger. Each time a new Bitcoin is born (more on that, later), that transaction is written in the ledger. All Bitcoin transactions are recorded in the blockchain, going back to the very first transaction in January of 2009. Each block of information that is created lists any Bitcoin transactions that have occurred since the creation of the LAST block. In addition, each block records a hash of the previous block, to ensure the block’s integrity (to ensure no one tinkered with it).


Hash? Like that funky meat-and-potato stuff my Mom used to make me eat?

No, not that. A hash is a method for taking information and boiling it down into a simple fixed-length fingerprint. Hashing is used most commonly in password security. What I mean by that is your Windows computer doesn’t know what your password is. Strange, right? How does it know whether or not to let you log in? The first time you set up a password, your computer takes that password and creates a fixed length hash output. That hash is one-directional, meaning you can not determine the password by looking at, or modifying the hash. Your computer stores that one-way hash on your computer, and when you log in, it looks for your user ID, then when you enter your password, it runs hashingthat password through the one-way hashing mechanism, then compares the output with the hash value that is stored on your computer. You can play around with creating hashes of words and phrases here, to see what a hash looks like. Note that changing even one single character in your word or phrase drastically changes the output hash. Because the one-way hashing output must always be the same, a match means you can get in. It is statistically improbable that two different passwords could ever result in the same hash. So now you know what a hash is, and why your computer doesn’t actually know your password. If it did, a hacker could easily steal it. As it stands, a hacker could get the hash, but could not easily reverse engineer it and figure out the password. If your password is something simple like a dictionary word, a hacker could run all the dictionary words through a hashing program, then compare your hash with the list of dictionary hashes, looking for a match. There are hacking tools called Rainbow Tables that do precisely that. But staying on target…


the creators of Bitcoin?

Each blockchain contains all the Bitcoin transactions since the last block was created. Each blockchain also contains the hash for the previous block. Hence, each block is chained to the previous block, and ensures that no one tinkered with it because the hash is recorded and can be verified. So what about the very first block? What was it chained to? Answer = nothing. The author of the Bitcoin software created it when the first Bitcoins were created. The second block contained a hash of the first, then listed all the transactions since that first transaction, and so on until today. If you’re ever asked on a game of Jeopardy, the very first blockchain was called the Genesis Block, and was created on 18:15:05 GMT on 3 January 2009. It’s the only blockchain that does not reference the blockchain before it – because no blockchain came before it.

OK so that’s the basic introduction of Bitcoin. I’ve left a ton of questions unanswered – how do I buy a Bitcoin? Where do baby Bitcoins come from? And why is my teenager asking to mine Bitcoins? I thought they were digital and not made of metal? And how are Bitcoin transactions anonymous, if their records are stored in the blockchain? Look for a second installment on Bitcoin, coming soon…


The Different Webs

Hello, friends and strangers! It’s been quite a while since I’ve blogged, I hope you will forgive me. I’ve been rather busy working on my Masters Degree in IT, but now… at long last… all is done, and I’ve walked the aisle. Now that my brain is a little fuller, and my calendar is a little less complex, I’m hoping to get back on the blogging horse.

Today’s topic is something I’ve been doing some independent research on, and found rather interesting. Hopefully you’ll find it informative, or at least mildly amusing. The Internet is frequently called the World Wide Web – but in actuality, it is made up of three different types, or levels, of Web.

The Clearweb

Chances are, you are reading this blog on what is called the Clearweb. This is what we commonly consider the Internet that we know and love. Th


e Clearweb is also called the Openweb or Surfaceweb. The most notable characteristic of the Clearweb is that it is Indexed. That’s a fancy way of saying that Google (or Bing or any number of  other search engines) routinely read through the Clearweb and index it, so you can find information more easily. If you fire up a new tab right now, and search for “Hagrid’s Rock Cakes”, you will get a list of hits, or web pages that match your search description. Those results appear because Google routinely reads through and catalogs (Indexes) portions of the Internet with a Web Spider (huh… a Spider on the web? Go figure!). Google uses a complex algorithm to determine what search results show up at the top (usually those come from the highest paying advertiser). Within minutes, you are reading up on recipes for Hagrid’s cakes. A Spider (or Crawler) goes through web pages and indexes them based on key words and metadata (embedded key words) within a web page. Though we are the most familiar with web pages on the Clearweb, research indicates that these pages make up only about 4% of the Internet.

rock cakes

Examples of the Clearweb are pretty obvious: Google and its search results, entertainment websites such as Starwars dot com, church websites such as Liberti church dot org, and the Pennsylvania Department of Motor Vehicles website. All of these sites will turn up from a basic Google search, as they are indexed.

The-Deep-Web1The Deepweb

The second Web I want to discuss is the Deepweb. This web is not Indexed, though it is readily available from a Web Browser, if you know where to look. And that is the key here – because these pages are not indexed, you can’t find them directly from a search engine. These pages are still hosted on the main Public Internet, but their contents aren’t there for everyone to see from a search engine. Pages on the Deepweb are deliberately not indexed, so as to remain private and secure. The fancy security word for this is Confidentiality – the information on a Deepweb page is only shared with those who SHOULD have access to it, whereas the information on a Clearweb page is indexed and searchable by anyone. Research indicates that Web Pages on the Deepweb make up approximately 96% of the pages on the Internet. That’s a lot that you don’t see – but it’s there. If the Internet is an iceberg, the Deepweb is what’s below the surface. Typically, there is a public facing page that acts as a login portal to an un-indexed Deepweb.

portalExamples of the Deepweb are: Government web pages. A company Intranet page. For example, if you log into your company’s Outlook Webmail page, the main login page may be indexed and found from a search engine – but the actual page where you view your mail is private and not indexed. It is on the Deepweb. When you log into your bank’s website, you typically hit their main Indexed page. But once you log in, you enter a private Deepweb that is not indexed. Private, or subscription web pages. When you log into Facebook, you are entering the realm of the private Deepweb that are hidden from public view – but only if you lock it down and choose not to share your page with everyone. People may search for your name followed by Facebook, and see your public profile – but they won’t necessarily see the photos you took of your kids, unless you allow that. You’re cloaking that information on the Deepweb.

The Darkweb

The Darkweb (also called Darknet) is a small portion of the Deepweb that is not indexed. In addition, web sites hosted on the Darkweb are encrypted and are not available using a normal web browser. These sites must be accessed using a special encrypted browser, such as TOR. TOR, short for The Onion Router, is a program that uses several cloaking and encryption techniques to attempt confidentiality and secure access. This small portion of the Deepweb makes up about 6% of the entire Internet. The Darkweb is of particular interest to us, as parents, as most of the really bad stuff on the Internet is hosted here. underrockIf the Internet were a large flat rock, the Darkweb is the gruesome underside of that rock. As parents, our goal should be to keep our children off the Darkweb as much as possible. Because you need special software such as TOR to even access the Darkweb, it should be rather obvious that we don’t allow little Johnny to install any software he wants onto a computer. The Darkweb is one of the biggest threats to a company’s information, which explains why many companies lock down their employee resources (ie. computers) and don’t allow employees to install their own software.

Examples of the Darkweb are: The Darkweb is host to many DNMs (Darknet Marketplaces) that buy and sell things so horrific, I won’t speak of them. They are the Internet Voldemort – and must not be named. Traffic is made possible on DNMs through Voldemortthe use of Cryptocurrencies such as Bitcoin, with the goal to ensure a truly anonymous buying and selling environment. It is worth noting here that using TOR on the Darkweb is not a guarantee of anonymity and privacy. DNMs such as the Silk Road are proof that the Government is highly interested in what happens on the Darkweb, and can indeed find out who and where you are.Truth be told, some legitimate companies such as Facebook host a .onion web page on the Darkweb. They do this to cater to proponents of Internet Freedom and privacy advocates. Some in this camp argue that it’s more dangerous to surf the Clearweb than it is to surf the Darkweb, and have a valid point in light of all the malware, adware, metadata, tracking cookies, and so on.

Nietzsche says…

Remember the old quote by Nietzsche? And if you gaze long into an abyss, the abyss also gazes into you. A large risk to connecting onto the Darkweb is that you are now connected to the filthy underbelly of the Internet – and while you are connected, you have in essence created a bridge between your computer and the underbelly. Using the Nietzsche reference, you can see them, and it stands to reason that they could see you. Don’t ever connect to the Darkweb from a computer that you aren’t completely comfortable with it becoming compromised, infected, wiped, locked with Ransomware, darknessand so on. Better yet, just don’t connect to the Darkweb. In the Information Security realm, much of the world is framed by risk. If the benefit far outweighs the potential risk, it may be a good idea. In this specific case, that is rarely the case for a casual user. I highly recommend that – as a parent – you do everything within your power to keep your children off the Darkweb. Prevent your kids from the ability to install software such as TOR. Also consider locking down your computer’s BIOS so that kids cannot boot from a bootable CD, thus circumventing your computer’s security settings. These parasite drives can load a version of Linux such as TAILS, which is designed for confidentiality and secrecy. You don’t want your kids operating in such an environment, so follow the direction most companies have already gone, and lock the computers down.

On The Value of Metadata

I’m going to put on my privacy advocate hat for a moment, and indulge the argument that we are all large fat fruit shrubs on the Clearweb. Our surfing habits are being watched and farmed to other companies for a profit – often without our knowledge. Many privacy advocates would argue that we should have the choice, that this information that makes up our online footprint should be ours to choose to share, as we wish.

This idealistic approach is – in this day and age – not reasonable. When you choose to log into Facebook, you typically sign an agreement to give away some of your privacy. Facebook makes money by farming your metadata, and you get to share pictures of lolcats, or rant about politics, or click a thumbs up that your niece is pregnant. It’s an exchange of sorts. Everything you do on the Clearweb is being gathered, analyzed, and sold. There is no guaranteed confidentiality here. As a consumer, your goal is to strike that balance between what you receive, and what you provide. If you find enough value in a service, you will be more likely to willingly provide sell-able metadata.


Probably the best example of that balance is the streaming music service, Pandora. When you sign up for Pandora, you provide some basic information. For example, you name a band or musician that you like (metadata). Pandora then lets you listen to music that is either identical to, or similar to, the metadata you provide. In exchange for your clicking a thumbs up for a song you like, Pandora gathers more metadata, and rewards you by providing a more accurate customer experience – it will then shape your musical experience towards songs that you like. If you hear a song you really don’t like, clicking the thumbs down button gives them more metadata, and as a result, avoids playing songs similar to that one. Pandora provides you with a “free” customized music streaming service, and you provide them with metadata about your favorite musical styles. It’s the modern Internet equivalent of a Plover Bird and Crocodile symbiotic relationship.

The Geek’s Guide to Creepy Stuff, Part Two: Denial of Service

Story Time, Chapter One
There was an old woman who lived in a shoe.
She had so many children, she didn’t know what to do.
And I’ll stop there, lest we dissolve into a heated debate about the dietary merits of broth without bread, and sparing the rod and spoiling the child, and all that stuff.
Let’s take a moment to imagine what her days would be like.
Setting: Inside the shoe.
<The telephone rings>
She reaches for the phone, and like a flock of kittens after a red laser pointer, they descend upon her.
And on it goes. The poor woman quickly becomes incapacitated under a deluge of little voices, all demanding her undivided attention.
Story Time, Chapter Two
Setting: inside the Super Grover Diner.
Time: 12:17, peak lunchtime rush.
Super Grover (here, just mild mannered Grover in disguise) heads to the kitchen. Moments later, out he comes, seven glasses of ice water (and lemon wedges) balanced precariously on a flat round tray.
Super Grover (here, just mild mannered Grover in disguise) heads to the kitchen. Moments later, out he comes, six glasses of ice water (and lemon wedges) and one glass of iced tea (with a lemon wedge) balanced precariously on a flat round tray.
Super Grover (here, just mild mannered Grover in disguise) heads to the kitchen. Moments later, out he comes, two to-go boxes and a steaming plate of hasenpfeffer balanced precariously on a flat round tray.
And on it goes. Zoey called off at the last minute with some pathetic excuse or other. Bert is seating people as fast as he can, but the crowd is building. Tempers flaring. Hungry muppets everywhere.
Super Grover – super though he may be – can not keep up…
Cute, Geek. Now What’s Your Point?
Today we are going to talk about Denial of Service (or DoS) attacks. Like the Ransomware attack, a DoS attack denies the Accessibility of a resource. But while a Ransomware attack prevents access with the purpose to hold it ransom (financial gain), the DoS attack is designed to merely prevent access. End of story. The end.
How the DoS attack works, is the bad guy finds a target (usually a website), then launches a barrage of requests to the target. Like our little old lady in the shoe, and super grover, our target is overwhelmed and cannot keep up with the flood of demands. The target slows down, becoming more and more overwhelmed, until it crashes.
There are several different types of DoS attack, though they all have the same purpose. A standard DoS attack is usually launched by a single bad guy. In my Ethical Hacking class, I was stunned to see the large number of out-of-the-box tools that were designed to flood a target and cause a DoS attack. It’s remarkably easy to do this – you pick your target, press the fire button, and BOOM. They drop. My particular favorite tool was the HOIC, short for High Orbit Ion Cannon. My preference for the tool was rather simple – the button to fire said FIRE TEH LAZER! in a classic nod to the lolcats (of which I have a soft spot for).
Another type of DoS attack is the Distributed Denial of Service attack (DDoS). This attack differs in that an army of devices (usually called a botnet) are under the control of a bad guy (or group of bad guys), and all of the devices attack a single target at once. The hacking collective known as Anonymous has used this DDoS trick repeatedly in the past. One of the most severe DDoS attacks in recent history used a botnet of IoT devices to bring down core DNS servers on the Internet. Computers across the globe couldn’t correlate GOOGLE.COM to its Layer 3 IP Address, and the Internet blew up.
IoT stands for Internet of Things. These devices (things) are network-accessible devices, such as webcams, baby monitors, smart televisions, smart refridgerators, washing machines, and so on. Remember this – if you buy a webcam for home security, and you can access it from the Internet to check on the babysitter, other people can also – in theory – access that webcam.
So a crafty hacker found that many of the IoT devices that were on the Internet were using either the default (out of the box) password, or had no password at all. The hacker did some basic coding to hijack these devices into a personal army (botnet), then pointed them all towards a target in a DoS attack. Because the devices were distributed across the world, it was difficult to identify the attacker and shut them down.
ddos-attackAnother type of DoS attack is the TDOS attack. This is a fairly new type of DoS attack that targets voice devices and infrastructure. This attack was used to great effect recently to bring down the entire 911 service for Dallas, Texas. We’ve all suffered from irritating robotic telemarketers and voice spammers – it seems I get more phone calls from recorded devices than I do from actual people. Now imagine a hacker utilizing a VOIP device that can send hundreds or thousands of calls per second, repeatedly, towards a target. Those voice calls would cause a Denial of Service attack on the target, incapacitating them. This is precisely what happened in Dallas, Amarillo, and Phoenix – a TDOS was launched against the 911 service, bringing it down. Some people died when they could not get immediate medical help through the 911 service. Because a phone line is no longer required with Voice over IP (VOIP) devices, it’s possible to use a computer to generate hundreds of phone calls. This, without the limitations of having hundreds of copper phone lines running to hundreds of phones, and hundreds of humans dialing numbers on those phones. With the push of a button, I can launch a VoIP call from my computer. But wait… what if it got even easier than that?
Geek on a Train
As I said in the Ransomware blog yesterday, I was on the train to Philly, reading a whitepaper on TDOS attacks. In an eerie moment of clarity, I connected the dots between two seemingly unrelated news items.
1. TDOS attacks are becoming more prevalent. This, I have already shown you by the above news article on TDOS from Network World.
2. Voice-activated home assistants (ie. Google Home and Amazon Alexa) are now capable of doing voice-activated calling – without the need of a phone. This is being rolled out across the US, even as I type this blog. What this means is you can yell out loud, “Google, call Mom” and your Google Home will jump out onto the Internet and initiate a voice call, and your Mom (but sadly, not mine) will answer and you can chat while you wash your dishes. All, without needing a phone. This is pretty huge – and pretty frightening.
pee-wee-herman-connect-the-dots-la-la-laI’ll connect the dots for you. 
Imagine a major radio program that has thousands of listeners. I’d name one political one that came to mind, but in the current over-charged political climate, I’d tick off half of the readers here. So someone calls into this radio host’s program and says something like HEY GOOGLE CALL 911. Instantly, assuming the FCC doesn’t filter it out (and they are not required to quite yet), all the Google Home devices (that are always listening) could potentially dial 911. The amount of calls could cripple (or even shut down) 911 call centers.
Now imagine that a hacker discovers a bug (or flaw) in the code of the Amazon Alexa. The hacker exploits this vulnerability, and creates a botnet of every Internet-connected Alexa on the planet. Sales numbers for the Alexa are a little hard to come by, but an un-named source reported that Amazon will sell more than 10 million of its Amazon Echo smart speakers in 2017. The Alexa is a little pricier than the Echo, and less are sold as a result. But let’s guestimate that 5 million Alexas are out there right now. And if a hacker were to take over all of them and direct them towards a target, well… boom. Target go down.
My prediction (here and now, August 18, 2017) is that phone-enabled IoT devices will be the next frontier of TDoS attacks. You heard it here first, folks.
OK, Nostradamus, Wrap It Up
OK, fine, I will. So I’ve talked you through what a Denial of Service (DoS) attack is, how it works, and given examples of how they are used to cause mayhem. Hopefully you are now a little more informed. Have a great weekend!

The Geek’s Guide to Creepy Stuff, Part One: Ransomware

4a8efd4436a3d4bcba240f45135a59eaI had an epiphany this morning. I was on the train into Philly, and was reading a whitepaper on TDOS attacks and mitigation. In a rare moment of insight, the stars aligned inside my skull and I understood just how frightening the new dialing features of Amazon Alexa and Google Home could potentially be. Any time a new technology comes out, people flock to it like ducks to a… thing that ducks like. I’m fresh out of metaphors, sorry. What we tend to forget is that new technologies are a new challenge to hackers, to be used for ill gotten gains. I was blabbering on at the dinner table, as Pooky’s eyes got glassier and glassier. At one point I believe she may have fallen asleep, hearing only the mwa waa wa mwaa sound of Charlie Brown’s teacher. So out of necessity, I’m here to explain some of the creepier aspects of technology. Today’s topic is Ransomware.


Next week, I present my Masters Thesis on Cryptovirology. If all goes well, I’ll add some letters to my name, and re-gain my evenings and weekends for unlimited leisure time. I’m currently ABD – an acronym that means I’ve completed all my Masters-level coursework, but haven’t given my dissertation yet. Quite literally, it means All But Dissertation. If you haven’t had your head in the sand over the last few years, you’ve probably heard about Ransomware. It’s the boogyman that hides under our beds, jumping out to steal our digital vacation pics and lock them up. Here’s a Geek Guide to Ransomware.

RansomwareRansomware is a newer type of virus that affects the Availability of your stuff. That’s a fancy way of saying, it prevents you from getting at, or using, your stuff. Ransomware typically gets on your system when you click on a URL link, and it directs you to an infected web page, which runs some code and pushes the virus onto your computer – the classic Drive By Download approach to getting a virus. Once the virus gets onto your machine, it prevents you from accessing something, and demands a ransom. There are two types of Ransomware – the locker (which locks your computer, demanding a ransom to unlock it), and the crypto ransomware. Crypto Ransomware is the newest threat. It encrypts your files, deletes the original files, and then pops up a nasty message.


Typically, the message will tell you that your stuff is being held for ransom (hence the term RANSOMware). If you want your stuff back, you have to pay them some money – typically in the form of Bitcoin, a type of online currency. The Ransomware popup messages are usually very creative, using fear tactics to get you to pay up. No, it’s not REALLY the FBI or CIA who is demanding payment, it’s just a crafty hacker.

Ransomware has been running rampant across the world over the past year. Different types of Ransomware have grown from just a hand full in 2013, to several hundred in 2016. 2017 is quite possibly the year of Ransomware, with the latest strain (Wannacry) pounding computer systems across the globe. Ransomware is really a bad guy’s dream. It’s easy to seed – you just dump it on some websites, then trick people into hitting that site. Once infected, users have two choices – kiss their goodies goodbye, or pay up. And if you pay up, there is no guarantee that the nasty hacker will actually give your goodies back.

You-said-it-was-peanut-butterRansomware was invented back in 1989, when a gentleman handed out floppy disks at an AIDS conference that had a virus on it. The virus, when executed, attacked the victim’s computer and renamed files. To put things back, it demanded that the victim donate money to AIDS research. The strategy and technology was incredibly basic, and easy to thwart. It used a Symmetric key, meaning all you needed to put things back was a single password (key). In 1996, the team of Young and Yung wrote an excellent paper about cryptovirology – that is, utilizing cryptology as an offensive weapon in a virus. They determined that the peanut butter and jelly of viruses would utilize more complex keys (Asymmetric keys), along with an untraceable currency (Bitcoin). It took a few years for creative virus writers to take note – but soon enough, modern Ransomware followed their advice, and the rest is history.

A Note on Keys

I’ve used two terms here that are worth discussing. Symmetric keys are a simple way to encrypt, or lock up, files. This is also called shared key technology, because a single key is used to lock up stuff. That same single key is then used to unlock stuff. Because there is only one key, it’s typically shared with the sender and the receiver. Otherwise, the receiver couldn’t unlock the stuff. And as a result, it’s easier to guess the key and unlock the stuff. If I wanted to send you a secret message, and used a symmetric key on it, I’d have to share the key with you so you could unlock the message and read it.


Asymmetric keys are different. In this case, there are two keys – a private key (that only the owner knows) and a public key (that everyone knows). If I want to share a secret message with you, you would give me your public key. I’d lock up the message with that key, in a one-way process. I could not unlock it, once I did this. The only way to unlock the message would be by using the private key, which only you know, and won’t share with anyone. This type of encryption is the foundation of modern cryptology. You’ll see this technology a lot with email encryption, such as PGP. If I want to keep my goodies secret from prying eyes, I’ll give everyone who I want to communicate with my PUBLIC KEY. They can then send me messages that are locked up with that key. To unlock the message, I use my PRIVATE KEY. Botta bing – my stuff is secure (assuming no one gets my private key). Ok, enough on keys and encryption.


Ransomware locks your stuff up with a public key – and the only way you can get it back is for the bad guy to use the private key, that only they know. It adds complexity and security to the process.

Bitcoin is an online currency that is pretty much untraceable. Because of the high degree of anonymity it offers, it’s the currency of choice on the Darkweb (the seedy underbelly of the Internet). Bitcoin transactions make it possible for the bad guy to get paid, without you being able to (easily) catch or stop them.

OK, Professor, Now What?

For the average home user, your strategy to preventing Ransomware should consist of a few key tools.

  1. why-backupBackups – back your data up. Do this frequently, and in several different ways. I back my data up to the cloud (using Carbonite). I also back my data up to an external hard drive, which is disconnected unless it’s backing my data up. If I were to get Ransomware, my encrypted files would automatically get backed up to Carbonite, and replace my good files. That’s why I need an external hard drive backup that is not connected to my computer. If it were connected to my computer, it would get encrypted when Ransomware hit. This is the number one way to protect yourself against Ransomware – it can’t hurt you if you have your data backed up.
  2. squirrel-240x300Patches and Updates – frequently install the latest security and operating system patches on your computer. This also goes for your programs and apps (tablets / phones). Hackers use bugs in the code to install their viruses on your computer / tablet / phone. Make it harder for them – update your programs and operating systems frequently. Think of it like you’re covering holes in the side of your house – holes that mice and squirrels and bats could come in, should they so choose. You want to keep them out, so patch the holes.
  3. Awareness – users are typically click-happy on the Internet. Don’t be that person. Don’t click on links unless you know what they are. If you get a strange email that baits you to click on a link, don’t do it. This is known as a Phishing attempt. Threatening emails or popups or texts or chats are phishing attempts to get you to click on their links – which leads to an infected website – which leads to an automatic installation of a virus. Chances are, these days, that will be Ransomware. Also – never plug in a thumb drive that isn’t yours. If you find a thumb drive laying on the ground, leave it be. Leaving an infected thumb drive laying around is a very common way for hackers to infect computers. This tactic was used to great effect in the infamous Stuxnet virus campaign.thumbdrive
  4. Protect your resources – use antivirus software and antimalware software. I’m always asked to recommend one, which is difficult. They all have strengths and weaknesses. It is worth noting that there is no one single tool in this area that will catch everything. Pick a good one that is highly rated (from a reputable site like PC World or similar), and go. Let it run and scan and protect. It’s not going to be perfect, but it’s better than no protection at all.

I hope this helps you in understanding Ransomware attacks, and how to protect yourself.

If time permits, I’ll tackle other bad guy stuff in the near future. Since I mentioned TDOS attacks, it’s worth a discussion on DOS attacks.

It’s OK to Lie!

OK, so now that I have your attention, let’s break this one down.

questionMFA for Fun and Profit

There is a trend in information security (or InfoSec if you’d rather) towards Multi-Factor Authentication (MFA for short). What MFA means is that to authenticate (log in), you need Multiple (Multi-) forms (Factors) to gain access.

The most common types of MFA revolve around three pieces of information:

  1. What you know. This is most commonly a username or password or pin number. To log into a site like Facebook, you typically need to provide your username (often an email address) and your password. Both of these pieces of information are things you know.
  2. What you have. This is most commonly provided by a card or chip or (in many cases nowadays) a cell phone. As an example, if I swipe a badge to enter a parking garage, that is something I need to have, in order to gain access.
  3. What you are. This typically encompasses what is known as biometrics. Fingerprins, the iris of an eye, hand geometry, and so on. Remember the movie National Treasure with Nicholas Cage? Of course you do – great movie. In that movie, he pulled a fingerprint off a champagne glass, and used that fingerprint to get past a fingerprint scanner. He hacked this form of authentication.

Screen-Shot-2013-02-07-at-12.14.39-PMSo the golden rule of security, in this regard, is the more different types of authentication, the better (or more secure) it is. It’s great for me to have a bank card (something I have). It’s better, yet, to require a pin number along with that card, in order to do a transaction. If you have a newer credit card with a chip onboard, that is the direction we’re (hopefully) headed. You put in the chip, then enter a pin, and botta bing – you just bought groceries with MFA. We’re not quite there yet, and credit card numbers are bought and sold on the darkweb all the time. They are crazy easy to steal because you only need the one factor of authentication.

201612278172e086-59df-4eea-9ab7-14e04551c5e4OK Sherlock, but why do I care?

Hey glad you asked. For some sites (most notably, banking and financial sites), you are now being required to set up security questions. These security questions cover a deeper level of only one factor – something we know. As an example, to log into my bank account online, I provide my username and password, and then I’m asked a security question that I have to answer. I set those questions up beforehand, and simply regurgitate an answer to log in.

Security-Question-Shield-iconThese Security Questions are Not Very Secure

There are many websites out there that provide lists of the most common security questions. Here are a few examples I dug up, with a very quick and basic Google search:

  • What is the first and last name of your first boyfriend or girlfriend?
  • Which phone number do you remember most from your childhood?
  • What was your favorite place to visit as a child?
  • Who is your favorite actor, musician, or artist?
  • What is the name of your favorite pet?
  • In what city were you born?
  • What high school did you attend?
  • What is the name of your first school?
  • What is your favorite movie?
  • What is your mother’s maiden name?
  • What street did you grow up on?
  • What was the make of your first car?
  • When is your anniversary?
  • What is your favorite color?
  • What is your father’s middle name?
  • What is the name of your first grade teacher?
  • What was your high school mascot?
  • Which is your favorite web browser?

Angry Sarah is Angry!

Understand, this is just a basic list – and it provides more of the one single factor of “What You Know”. While it seems on the surface to be a deeper level of security, it’s actually not. In September of 2008, the personal email account of Sarah Palin was hacked by guessing the answer to a few of these basic questions. The answers were possible through just a little bit of detective work, and once provided, gave the hacker complete access in to her email. This is just one example – and there are myriad others. Using this type of “security” doesn’t really help all that much.

phishing-1Facebook Polls for the Phisher

Hey did you know that when you fill out those cute little Facebook top ten posts about yourself that you are potentially providing a hacker information about yourself? They can then use that information to potentially hack your account. The information you provide about yourself online is often etched into eternity, and publicly accessible. Palin’s hacker learned the answers to her email security questions by doing a little bit of Google work. Single Factor Authentication is not that secure.


fe6y34ba_3810So that brings me to the point of my rather sensational Blog title. While there are exceptions, it is generally against our nature to lie to other people. But I encourage you to lie – openly and completely – when you set these security questions. That way, when someone does try to hack your account, and has access to your history and background and life story (by sifting through your online footprint), they cannot simply guess the answers to your security questions. The trick is to remember the answer to your questions. If you can pull that off, you’re home free. This trick is recommended by Kevin Mitnick in his awesome book, The Art of Invisibility.

For example, let’s take a few of these common questions.


What is the first and last name of your first boyfriend or girlfriend?

Well, that one would be pretty easy to find out, right? Chances are, you have that person as a friend on Facebook. Someone else out there knows this information – perhaps even your first boyfriend or girlfriend. You just gave that person potential access to your account. But what if you chose a different answer – such as the school bully who you despised? What if you chose for all of these questions, the most blatant lie you could think of?


Who is your favorite actor, musician, or artist?

Who is your LEAST FAVORITE actor or actress? Who is the least musical person you know? All potential answers here.


What high school did you attend? Or what was your high school mascot?

Very easy to guess, and I think one of the questions that got Palin hacked. But what about instead picking your high school rival school? Or decide to instead pick the name of a fictional school like Hogwarts? Be creative in your lies.

OK so I could go on all day long with these, and I imagine by now you get the point. I strongly encourage you (as does Kevin Mitnick) to think outside the box here, and fabricate answers that are not easy to guess.

Well That’s Simply Spiffy

It is. But that covers only one Factor or Type of Authentication – what you know. It is highly advisable to layer in more forms of security authentication. Adding what you know with what you have drastically increases your level of security. It’s no secret that my Steam account username and password were recently hacked. The good news is I had MFA set up, and to log in you also had to provide the randomly generated pin number that Steam texted to my phone. That, my friends, is MFA. Consider adding more layers of authentication to your online accounts – Facebook, Gmail, Twitter and Steam all support MFA. In fact, many online accounts do. My friend (who I don’t know in real life but I’m sure I’d get along with fantastically) over at Lifehacker released this article which delves a little deeper on enabling MFA for online accounts.

Don’t Be Sad – Two Out of Three Aint’ Bad!

0bc236512dda9b2f076cc04359b1dc6b55596abd.jpgYeah I know – now you have that song in your head. If you’re paying attention, we’ve talked about using two out of the three main factors (or types) of authentication. That is, what we know, and what we have. We’ve left off what you are – biometrics. I’ll be honest with you, at this point. I am not aware of any consumer-level sites or services that offer biometric authentication. Because of the high cost, this factor is typically reserved for higher security areas within companies and government agencies. I’ve used three factors, simultaneously, to access some computer data centers in my line of work. Big Brother is indeed watching, and protecting his stuff.

So anyway, I hope you will head out to your favorite online sites and sign up for their MFA services as soon as possible. Remember – even the most trivial things like Facebook can be a gold mine to a hacker. Lock your stuff down. Do it now!

Content Filtering – Where to Start?

In the many posts of this blog, I’ve covered a lot of ground. I’ve attempted to explain content filtering, and its many types. I’ve tried to explain some of the background technologies involved in networking, security, and computing that would help you ultimately understand content filtering. And I’ve blathered on about stuff that I find fascinating. Today’s post will be rather simple, and rather specific. It will answer a question that came in as a result of the last post.


Where do I begin? How do I start? Help!

Sometimes people describe things in avid and lurid detail, because that’s how they see the world. A lot of time, this is referred to not seeing the forest for the trees. As a supreme nerd dork dweeb, I am particularly guilty of this. This post is a departing from this trend, and will be highly practical.

The question that came across my path was from a mother who basically asked where to start. This post is for you.


First, the Disclaimers

I am targeting Windows-based computers with this post. All you IOS / Macintosh / Android users are out of luck. Take what you can from this.

I am going to focus on one specific technology, or approach to filtering. You know from previous posts (if you’ve been reading them, that is) that there are many different ways to protect a computer. I will focus on one technology – that being client-based filtering. This solution involved installing a program on a computer.

There are also myriad products out there. PC Magazine has a rather excellent article out there that lists many of the most common products on the market, with a review, pros and cons for each. For this post, I am focusing on the Symantec product.


Why I chose Symantec is rather simple – I needed antivirus on several of my home computers, and Symantec offered this, along with content filtering, at a flat cost. There are pros to this solution, as well as cons. In the interest of time, I won’t dig into these. I chose this product. Do with this information what you will.

Defense In Depth

Another disclaimer, here. It is worth noting that there is no one single foolproof method for content filtering. Each product, technology and solution has its strengths and weaknesses – ways around them. That is why security professionals recommend a fancy term called Defense in Depth, which means implementing multiple layers of defense within your computer systems. With enough different security (or content filtering) controls in place, you greatly enhance your chances of success. I personally implement several different technologies in this regard – but everyone starts somewhere, and that first step usually involves a client-based solution like the one we’re discussing.

70080750Drop the Cash

First, you obviously have to choose and buy a product. Let’s assume  you have done so, and are ready to install and configure. Symantec makes this a breeze, with this article. A summary includes creating a master account, and tying it to your email address. Once that is done, you log into their portal, and create user profiles (called “children”). Each of these profiles / users / children have their own specific settings and filters. In my household, I have a separate account for each of my teenagers, a generic account for the rest of the kids (called “Littles”, in a nod to the 80’s cartoon of which I have fond memories), and an account for us adults. You really need a profile for everyone in your household – either shared, or individual.

Access Control 101

The technical term here is called Access Control. Wikipedia defines this as such:


fingerprint-door-access-controlAccess control is a fancy word for allowing (or controlling) access to something. In this case, we want Access Control for the Internet. It is worth noting here that Access Control can become as complex or simple as you want it to. You may have a computer in the living room that has one user account, and is always on, and is always logged in. In this scenario, one profile may suffice. Or you may have three computers – one in the living room that auto logs on for everyone to use, and a laptop for your teenager, and an old clunky machine in the basement that is used for gaming. You could use one profile and apply it to all three machines, meaning that it’s one set of rules for all computers. Or you could have one computer in the house, and on that computer there are three different computer accounts – one for Grandpa, one for Mommy, and one for Little Junior. If you created one profile in Symantec, the same rule set would apply to all the users who log on. Or you could create three separate user profiles, and assign those profiles to different logins.

Does this make sense? When you create a profile, or child in Symantec terms, you are creating a set of rules. You will apply that set of rules to someone, on something. I’ll shut up and move on.

Installing the Software

004Well this is pretty simple. Install it. Botta bing. It’s worth noting that if you want to use the service on a device, you have to download and install the software on that device. Right? The Symantec “getting started” guide helps with this. Options for this product are to install on a Windows computer, install on an Android device (phone or tablet), or install on an IOS device (ipad, iphone, etc.).

When you install the software on your computer, it will want you to log into the service with your username and password. It will then list specific user accounts that exist on this computer / device, and ask you to tie each user to a profile. This goes back to access control. In my case, the grownups get tied to the adults profile. Teenager One’s user account gets tied to their specific profile. Teenager Two’s user account gets tied to their specific profile.

Important Notes

Access Control is pointless if you don’t enforce it. What I mean by this is if you create a profile for the kids, and block all the naughty stuff on that profile, and tie that profile to the kid’s computer account, it will do you no good at all if you leave the unprotected grownup user account logged on all the time. It’s specific here. If you have different profiles / rule sets, you must be disciplined to log on and off when you are at the computer. Otherwise, there is no guarantee that the kids are actually using the Kids profile. Does that make sense? The way around this is simple – create one profile, used by everyone, on all devices. But if you want your teenagers to have access to gaming sites, and the little ones to NOT have access to those sites, you would have two different profiles, and make sure the older kids actually log off – or the little ones may access those gaming sites.

I’ll also be clear here – EVERYONE IN THE HOUSE NEEDS A PROFILE. This goes for the parents, too. Don’t leave any device in the house free from a profile and protection. It’s worth noting that if you are accessing smut on a computer, it leaves residue behind that could (and often does) reach other people. When you partake of the dark side of the Internet, you are at a much higher risk for getting malware / viruses that can provide smutty popups for anyone on that machine. There are also cookies, cached pictures, etc. that are left behind each time you dip your toe into the smut pool. Not even anonymous browsing is a guarantee of safety in this regard. Own up here – block the smut for everyone, parents included. ‘Nuff said.

002So once you have installed the software on a device, and tied the logins to your profiles, you can configure the settings for each profile, from the Symantec web portal that you are logged into. This is a two-part process. First you define the services you want to use for each profile. Web Supervision (content filtering) is a no brainer for everyone. Also, Search Supervision (which prevents limits things such as Google Image Search). Other features may (or may not) be available, depending on the type of device you have installed the software on. For example, you can’t limit text messages on a computer – but could, on an Android phone.

And finally, you can drill into specific details for each of the services. This is where you can define web search categories that are off limits. I used the example of gaming, but it could really cover just about anything. The older kid profiles may need access to gaming sites that are off limits to the younger kids. Again, I’ll reiterate that you should block certain categories such as Porn and Web Proxies (a method for getting around your security measures) for everyone. But knock yourself out here.


And Finally

51NA2VEA4BLSymantec recommends in their tutorial (and I highly agree) that you need to discuss this with your family. How about a nice family meeting, where you talk to the kids about what you’ve implemented, and why? They should understand why you are doing this. This would also be an excellent time to discuss with your younger kids what to do when (not if) they ever come across junk on the Internet. Remember – you are responsible for your kids, but don’t have total control over other kids. This is a sad reality. A good book to go through with your kids is Good Pictures Bad Pictures by Kristen Jenson. In this sensitive area, you need to have open lines of communications within your family. Don’t let anyone in your home feel trapped alone in the confusion, guilt and shame of hidden porn addiction.

I hope that you have found this article helpful. Note that I don’t work for, or benefit from, Symantec. I chose this product – with its limitations and benefits – for reasons that are my own. Choose whatever product you wish. And as always, feel free to reach out to me with any questions, corrections, etc.

A Year Later…

Yikes, has it really been almost a year since I last posted? Very sad…


My confession is thus: I’ve been dialing back my online footprint for a while now. In this volatile day and age, it’s a wise decision. And already, I see the confused look on your face. I’m moving too fast, please forgive me.

First, we need to define an online footprint (or digital footprint):

1. one’s unique set of digital activities, actions, and communications that leave a data trace on the Internet or on a computer or other digital device and can identify the particular user or device:
Our online browsing habits are part of our passive digital footprint, created without our consent or knowledge, but our active digital footprint, especially on social media, can more easily be managed.
2. one’s overall impact, impression, or effect as manifested on the Internet; online presence or visibility, as of a person or company: a celebrity with a large digital footprint;

Your online footprint is, in essence, the sum of your online persona. It’s everything you have ever done, online. It consists of what you post, what you say. Where you’ve been, what you’ve shared, what you’ve bought. Every photo and Twitter and comment and like. Each little piece is a cell in this organism called your digital footprint – and it’s much larger than you could imagine.

This information – this persona – can be a very significant liability.

People lose their jobs and livelihoods as a direct result of their online personas. People don’t get the jobs they want as a direct result of their online personas. People kill themselves as a direct result of their online personas. Marriages end as a direct result of their online personas. Entire fortunes have been made and lost as a direct result of online personas. The list goes on, and on, and on.

Online personas are a profitable source of revenue.

3334265390_98dfa5c78aMy darling Pooky claims that her phone listens to her. And while I playfully say she is crazy, there are many documented instances of this actually happening. Let me elaborate. Things that you say in the privacy of your own home have been picked up by listening devices, and used to turn a profit. This information has been sold to marketing firms, who send specific advertisements to you, based on what they believe will sell more of their widgets. There are myriad documented cases of this happening – this isn’t tinfoil hat stuff. Cell phones are the most common culprit, though devices like Amazon Alexa are making it even easier. These devices have tossed off all pretense, and are advertised as devices that sit in your home, and listen to everything that goes on, waiting for you to need something from them. All you have to say is something like “hey Alexa – what is the capital of Nigeria?” and it responds with an answer. The privacy concerns over such a device came to the front in a court case out of Arkansas, where Amazon was coerced to turn over the recorded audio (gathered without the homeowner’s knowledge) during a murder trial where an Alexa was in the home. Amazon provided a pile of information that they had about the homeowner’s smart device data, including the smart water meter readings that indicated the person on trial had used a boat load of water to fill a hot tub AFTER the victim had supposedly drowned in said hot tub. But Amazon refused to turn over audio data gathered by Alexa – and it’s unclear just how much they are actually gathering, analyzing, and churning for a profit.

This may well be the more nefarious end of the story – but similar events happen all the time. For example, if I search for a Martin guitar on Amazon, my Facebook feed immediately changes as a direct result, and serves me up advertisements for guitars. News feeds immediately change to more musically themed stories. Friend suggestions of other musicians pop up. And this behavior follows me across all of my connected devices – computers, phones, ipads, etc. All of these sites are connected in an attempt to harvest information from me (with or without my consent) and churn that data over in a quest to make money. Advertisements abound. Everything is connected. Nothing is secure.

chick-fil-aThere are numerous cases of people losing their jobs as a result of their private online activity. On June 18, 2016, Lydia Price wrote an article for People magazine entitled “20 Tales of Employees Who Were Fired Because of Social Media Posts” that provides further evidence that your online footprint can have negative repercussions. I’m sure we all remember the guy who recorded his trip through the Chic-Fil-A drive thru, with the intent to harass the young employee there about the corporate values with which he disagreed with. His attempt to grab his Warhol 15 minutes of fame backfired spectacularly.64e3f8d917167dcd6ab8351e5e0e1d07

Side Note: Andy Warhol, the famous artist, said that “In the future, everyone will be world-famous for 15 minutes”. The Internet is a bloated market where many people seek to cash in on this goal.


So anyhow, this guy harassed the girl working at Chick-Fil-A, and published the video on Youtube. Later that day, he lost his job, and to date still can’t get hired anywhere. He has since then battled depression and thoughts of suicide. The mob mentality of the public Internet is a harsh and unforgiving master. Understand – I do not at all condone what he did. But there is much debate from free speech advocates (and just about everyone else) whether or not his punishment fit the crime. Either free speech is always free – even for those with whom we disagree – or it’s not free at all, and we are slaves to mob rule. Ah that’s an entirely different topic, I digress. The key takeaway here is that whatever you say online can cause you permanent harm. This extends to the pictures you take on your phone. Your phone is connected to the cloud (a fancy term for “someone else’s computer”). A photo you take on your phone is often backed up automatically to the cloud, where it is fair game (albeit illegal fair game) for others to access. The list of people who  have suffered when their personal photos were smeared across the Internet is longer than we could imagine. As part of your digital footprint, photos can (and often do) harm you.

And now we arrive at the most obvious threat: teh h@x0r.

anonymous-message-to-leafyishere-1-1000x600-300x180The last little bit about photos getting leaked was a sequeway into this topic. Plenty of your information is being leaked out through legitimate (albeit frightening) ways. Your search history, your browsing habits, your Facebook and Twitter posts, even the words you speak in the privacy of your own home – all this information is most likely covered by some sort of Acceptable Use policy that you signed off on. To say it differently, you are willingly GIVING this information away. But there are other methods of accessing your information without your consent.

In 2016, a Lancaster, PA man hacked about 50 Apple iCloud accounts of many celebrities. This man then accessed (and posted online) the personal photos of many celebrities from their iCloud accounts, without their consent. In 2008 the personal email of then Vice Presidential candidate Sarah Palin was hacked by the son of a politician from the other side of the aisle. The stolen emails were then leaked online, a term called DOXING. Bringing the discussion into 2017, the news is flooded every day with information about Russian hackers and Democratic emails and Wikileaks.

Bear Hacker

fear the russian hacker bear!

If the allegations against Russia are somehow proven beyond all doubt (a monumental task), they are pretty severe allegations. But let’s not forget that Iran, China and Syria also have sophisticated cyberwar capabilities that include hacking. And lest I be guilty of patriotic tunnel vision, the United States also has highly sophisticated offensive cyberwar capabilities that it employs across the globe. The targets of this elite government-sanctioned hacker group (can I use the term TAO out loud?) includes private citizens, foreign governments, friends, foes, and all points in between. Thanks to the Patriot Act and 9/11, nothing is off limits for the elite cyberwar arm of Murrica. I imagine the chances of Russia coming clean on its election shenanigans is about as likely as our government coming clean on the existence and use of the Stuxnet virus against Iran.

Think Like The Bad Guy.

How do the bad guys get our stuff? Why I’m glad you asked. Studies show that most hacking attacks generally begin with a phishing campaign.


The more information we provide online, the more of an advantage we provide to a hacker. I’d be willing to bet that if you’re on Facebook, you have already been approached by someone you thought was a “friend” but who actually turned out to be a hacker or phisher. Why this just happened to me not long ago. I got a friend request from my oldest brother, and it looked legit, as the profile picture was of him (which the hacker got by looking at his public profile). So I accepted the request, and within seconds, my “brother” had initiated a chat window with me. What was the hacker’s goal? To get me to click on a link he sent me. And have no doubt – that link (should I have been foolish enough to click on it) had a virus attached to it. A virus that could have given the hacker complete access to my computer. From there, they could suck out my passwords, bank account information, or *shudder* dump ransomware that could encrypt my hard drive, demanding money as a ransom.

phishing-1I’ve seen so many of these phishing attacks over the years. I’ve gotten calls from “Microsoft” who said I had a virus and I needed to let their technician into my computer. I’ve had popups from websites that declared that I had won something, and needed to click on a link to claim my prize. I’ve gotten texts from people claiming that my account for ABC was locked, and I needed to tap on their link to unlock it. All over the Internet, hackers are after our stuff. Any information we give them via our online footprint can (and often is) used against us in pursuit of our stuff.

So now that I have you thoroughly freaked out, what can you do?


  1. Back your stuff up. Back up your documents and photos weekly to an external USB hard drive. And after each backup, unplug the drive from your computer.
  2. Minimize your online footprint. Don’t share information that could be used against you by a hacker. Do you really think the whole world really needs to know where you eat or when you’re at the pool? Think like a bad guy – you’ve just told me valuable information that I can use against you.
  3. Maximize your privacy and security settings. On sites like Facebook, disable features that allow strangers to see any of your information.
  4. Question the motives of everyone who asks you for information online. And don’t share it.
  5. Never take photos of yourself that you wouldn’t want your parents or children to see. Yeah you know what I’m talking about. Just don’t do it.
  6. Search for yourself online. Searching for your name, in quotes, in Google is a nice way to start. Or use a site like PIPL to really get freaked out.
  7. Don’t click on links unless you are confident that they are legit. Especially via chats, via emails, via message boards, via social networking sites, etc. Clicking on a bad link can cause you immense pain and suffering. You will get viruses. You will get hacked. You will get ransomware.
  8. nintchdbpict000279133761If you have children, keep tabs on their activity. I cannot in good conscience recommend that any parent buy their child a smartphone, ever. You can easily control what happens on your home computers. Not so much, on a smartphone (ie. Android, iPhone, etc.). I know this is unpopular – but I’m serious. If you want your kid to have a phone, get them an old school flip phone, or something without a data plan and web browser. The social, mental and emotional drawbacks to smartphones are myriad and well documented. Resist the urge to give them any device that you can’t easily control or monitor. Protect them from sexting and cyber bullying and porn and cyber stalkers.

OK so a hearty welcome back to me. I can’t guarantee I’ll be posting again soon, my apologies. But if you have any questions about anything I’ve said, feel free to send me a comment. I do read them. I do respond. I do care.

Setting Up OpenDNS for Home Content Filtering

I’ve talked at great length about using OpenDNS to filter in the cloud. You’re dying to know more, I can tell. Here you go. But first, the theory.

How Open DNS works

I’m sure you read my blog, right? Surely, you already know this!? Don’t call me Shirley.

At the very least, you should understand what DNS is. A good primer is here:

Yeah I’ve resorted to a shameless plug for my own blog.

First, the cliff notes. I know a guy named Cliff, he’s a swell guy. And he’d approve of these notes.cliffsnotes

1. To connect to the Internet, your computer uses an IP Address, not a website address (or for the more technical of you, the DNS name).

2. To translate a website address like to its IP Address, your computer uses DNS.

3. To see DNS in action on a Windows PC, click the start button, then type CMD and press enter. This opens a command prompt.


4. From within the command prompt, send some ICMP Packets (think of it like tossing a ping pong ball at something to see if it responds) to a website. You can do this by typing PING, followed by the name of the website. For example, in my screen shot, I’m pinging by typing PING STARWARS.COM followed by pressing enter on the keyboard. Watch the magic.


Your computer uses DNS to determine that at this point in time, can bestormtroopers reached at the IP Address of Yeah, with a Star Wars marathon going on right now on the TNT channel, I’m kind of biased here. Sorry.

So your computer now knows that if it wants to go to, behind the scenes it connects to that IP Address and botta bing. Stormtroopers.


That’s the magic of DNS. There are many DNS servers in use throughout the Internet. Typically, our Internet Service Provider assigns one to us and we don’t even know it’s there. But because we’re uber l33t, we want to have our computer use OpenDNS servers so the folks at OpenDNS can do some content filtering for us. How? Let me explain. Once again, cliff notes.hulk-computer

  1. The Incredible Hulk wants to purchase illegal performance enhancing green drugs off the Internet and roid out while playing virtual poker on an online gambling site. Captain America is aware of this terrible behavior taking place from the Avengers base, and as the network guy, decides to block him.
  2. He sets up an OpenDNS account and blocks the category for Drugs and Gambling.
  3. Hulk tries to access a gambling site. He types in the website name and attempts to connect.
  4. The computer connects to an OpenDNS server to translate the website name to an IP Address.
  5. The OpenDNS server sees the request coming from the Avengers base, and recognizes that traffic coming from that network shouldn’t be accessing a gambling site, based on the OpenDNS category block settings.
  6. The OpenDNS server sends Hulk an IP Address to an OpenDNS block page, instead of the gambling page.
  7. An OpenDNS block page appears in Hulk’s web browser.
  8. Hulk realizes he shouldn’t gamble, and decides to change his wayward ways. No more smash.

So now that you understand the high level, let’s get more specific.

Take note that there are a lot of numbered lists in this blog. That means I’m serious here.

I’m stepping on the toes of the setup guide OpenDNS provides, which is actually quite good. Their directions, which are much more better than mine, is here:

  1. Go to and Sign Up for a free Personal account.
  2. captainYou’ll have to provide, at the very least, a valid email address. I highly recommend creating a generic email account for all your Spam-related sign up stuff. For example, if your normal email address is, consider creating a new account called and only use this account for signing up for junk on the Internet. You know, deep down, that they will send you tons of junk emails if you sign up for stuff.
  3. Log into your newly created account, and set up a network to monitor. For our sample Captain America, he wants to block the Hulk from purchasing illegal performance enhancing drugs at the Avengers base. With that goal in mind, he creates a network called TheAvengersBase.
  4. Enter the settings for your network, and you can set up your categories for Web Content Filtering.
  5. blockdrugsCaptain checks off Drugs and Gambling. The Hulk better behave now. Making and saving the changes generally takes a few minutes to take effect.
  6. Download the OpenDNS updater client. This needs to run on a computer inside your home all the time, so OpenDNS knows who you are and where you’re coming from when on the Internet. Download it here:
  7. updaterInstall and run the updater client. It will ask you for your OpenDNS login credentials.
  8. Once you have it set up, it will periodically check in with the OpenDNS servers to make sure they know who you are, and where you are coming from.
  9. Configure your computer to use the OpenDNS servers of and There are several ways to do this – either on a single computer by tweaking its IP Address settings, or (better yet) by tweaking the DHCP options on your router for every computer that connects to your house and wants to hit the Internet.routerdnssettings
  10. Remember my blog post on taming your router with style and grace? Of course you do.
  11. For my home DHCP server, I forced it to use the OpenDNS servers. Now everyone who connects to my network or wireless goes through OpenDNS.
  12. Test everything to make sure it works.

An added step that OpenDNS doesn’t think about is you may want to create an Access List on your router to only allow access to the OpenDNS servers and block all other DNS traffic. This is called egress filtering (a big twelve dollar word) and prevents the Hulk from sneakily modifying his DNS Server settings to try and get around OpenDNS. Boom. Hulk smashed. Egress filtering is a topic for another post, as I haven’t done it justice at all. This basic approach above will keep most users at bay.

Something doesn’t work? Ping me. I’m here to help.

The Pokemon Go Blog, Part One

Today I’m going to talk about the latest gaming phenomenon called Pokemon Go. Chances are you just returned from your month-long vacation on the not-planet Pluto and haven’t noticed people of all ages, sizes, shapes and colors walking around like mindless zombies, drooling on themselves as they hold their cell phones out in front of them. Those are common side effects from Pokemon Go Syndrome (PGS), a potentially fatal illness sweeping the planet. Meandering mindless miscreants, holding their phones out in front of their faces, shall henceforth be called Pokemon Go Zombies (PGZ). PokemonGoZombieConsider this blog your immunization against the sickness. I guarantee this blog won’t cause Autism or contain tiny microchips supplied by the shady and top secret Government tracking program. I’ll cover the history of Pokemon, what the game is about, and then turn it about in my hand like a multifaceted Charizard, covering many of the related features of the game. This will touch on technology, information security, psychology, physical security, exercise, and cultural gaming trends. That’s a lot to pack into one blog, so this is Part One of the series, until I’ve milked the proverbial Pokemon of all its Go. Corny puns and frequent use of the word “squirtle” and “charizard” are forthcoming, mainly because I just like to say them. You have been warned.smock

The History of Pokemon

Pokemon, the merging together of the words Pocket and Monster, was introduced on February 27, 1996 on the Nintendo Game Boy system. The goal of the game was to catch, train and trade creatures to become a Pokemon Master. The first few games led to the release of Pokemon trading cards, which led to a very fast rise in popularity. This, in turn, led to an anime series, manga book series, toys, more games, more toys, more cards, large creepy marching stuffed yellow animals, a healthy dose of more toys and cards and games and movies, and then… Pokemon Go.

ashcanThough I didn’t participate or collect or even care, I vividly remember back in the day the
huge rise in popularity of the card game. There was a resultant wave of anti-Pokemon sentiment from parents, teachers and the church who didn’t understand the popularity, and who mostly likely forgot those fad crazes from their childhood. I remember pestering my Dad to drive me 45 minutes to Hughesville, PA because they received a new shipment of Garbage Pail Kids. I also remember mob scenes as soccer moms fought each other over M.U.S.C.L.E. wrestlers, Cabbage Patch Kids, Tickle Me Elmo, Beanie Babies and Harry Potter books.

As a historical note, I also remember the backlash from churches against Cabbage Patch Kids, Pokemon Cards and Harry Potter. They were all from the devil, right? There is an age old church story of a pagan witch doctor who became a converted Christian, and was presented with a <Cabbage Patch Kid, Pokemon Card, Christian Rock album, Harry Potter book, etc.>. In every story, the converted pagan frantically exclaimed that this object was used in their own pagan rituals! Oh no! The story has conveniently been recycled throughout the years to cover the latest fad or trend of society. Because it is completely unverifiable, and includes an authoritative source (the converted pagan witch doctor), it is of course believed and circulated. But I’m getting ahead of myself here – first, let’s cover what Pokemon Go is, and some of the various aspects of it, before we head into the territory of making any sort of value judgement.

What is Pokemon Go?pokemon-go-vector-logo

Pokemon Go is the latest Pokemon game to hit the swarming masses. It was created by the California game making company Niantic, who creatively combined the real world of Google Maps with an imaginary virtual overlay realm of Pokemon creatures. As Niantic is owned by Google, it’s the perfect strawberry jam to Google’s monstrous peanut butter sandwich. The game is free to download on your mobile phone (either Android or iPhone). The interface is a colorful dumbed down rendition of Google Maps, where occasional Pokemon creatures randomly appear for you to capture. To capture a Pokemon, you must toss a Pokeball at the creature, much in the same way you would toss a ball to knock down bottles in a carnival game. Once captured, the monsters are yours to level up, evolve, power up, and send into battle against other owners’ monsters. This epic battle takes place in Pokemon gyms, which appear on the map as landmarks pulled from Google Maps. There are also Pokestops where you can periodically get free stuff, which are also landmarks found on Google Maps. These gyms and stops are typically Churches, restaurants, historical landmarks, post offices, art statues, and so on.

You gain experience points and loot by capturing Pokemon, visiting Pokestops, and winning battles against other trainers’ Pokemons. As you level up, you are able to capture more powerful Pokemon, and use more powerful loot. This loot can also be purchased with coins which can, naturally, be purchased with real world money. Thus far, about 50% of Pokemon Go players are dumping real world cash to buy loot. pikachu dollarAnd thus far, Pokemon Go is raking in between 1 and 2 million dollars a day, which is remarkable for a free game. Companies are lining up to bow before this new golden cash cow, with McDonalds leading the way to request that its restaurants become Pokestops for weary trainers. Oh and while you are there, you can drop some cash for a Pokemon Go Happy Meal toy. Because who doesn’t want a little plastic Pikachu toy? Another method to acquire Pokemon is to hatch an egg in an incubator. To hatch an egg, you of course need to acquire an egg, and deposit it inside an acquired incubator (one is provided to everyone at the start of the game with infinite uses). Once an egg is inside an incubator, you need to Go. That is, you need to move a certain distance (as measured on the map) for the egg to hatch. There are 2k, 5k and 10k eggs. The higher the distance the egg requires to hatch, the more likely it will hatch a rare Pokemon. You can acquire additional incubators as drops or by dropping cash, so at any given time you could be walking your way towards hatching a Pokemon army. Now I hear you chuckling to yourself. Sure, you’ll just jump in the rusted out car and drive around and around to hatch those eggs, right? Not so fast. No, really. Not so fast – if you go faster than 20mph, it stops clocking towards your eggs. It wants to force you to get exercise by walking or biking or roller skating or piggy backing or driving really, really slow. That’s why it’s called Pokemon Go (emphasis on Go).

poke soupThere are lots of other odds and ends tossed in there, such as leveling up your monsters, their attack strength, their life points, healing potions and crystals to heal your Pokemon if they get injured in gym battles. There are lures and bait that can cause Pokemon to come to you, whereas normally you have to use the in-game radar to find the Pokemon. There is lots to this game, and Niantic provided very little documentation or helpful information to explain what on earth you are supposed to actually do. Viva la Internet, there are countless web pages and blog posts that give you tips and tricks. Hey – you’re reading one right now.

So that’s the high level overview of Pokemon Go. All of the myriad pieces and parts are ingredients in a giant pot of addictive soup – and people are lining up in droves to ingest this soup. Their tag line is pretty accurate – Gotta Catch Them All! No, I mean it – you GOT TO catch them all. You are powerless to resist.

Coming up next: Hey! Now my kids are getting exercise!

My Husband Told Me So (An  original  verse of wisdom by Pooky)


Once upon a time my facebook feed was filled with many

Pretty pics of family and witty memes aplenty.

But then I shared a point of view that set my friends afire;

I hardly could conceive the controversy that transpired.

I labored to explain my thoughts and never to offend.

Alas, a few could not decipher what my heart intended.

No matter how I spelled it out, expounded, clarified,

They only heard a hate-filled  bigot shouting, “Crucify!”

So now I must resign myself to gaining their reproval,

A bitter pill to swallow, losing their approval.

But wiser now I come to thee with insight to allot:

‘Tis better  to reflect alone than share your inner thought

If frenemies you do not wish to make along the way,

For frenemies are destined if conviction you display.