Wednesday, November 30, 2005

New Firefox V1.5 Now Available

If you are a Firefox user, or you have been thinking of trying it, be aware Mozilla has released a new version (Version 1.5) of its popular web browser and it is available for free on its website. Understand that this is an all-new version of the software. In fact, it is the first version to be released since Version 1.0 came out a year ago. All the other releases this year were just updates to the first version.

In the year since its initial release, Firefox has become the number two browser behind Microsoft’s Internet Explorer. Firefox currently has about 45 million users worldwide (roughly 9% of the market).

The new Version 1.5 offers performance gains, usability enhancements and support for new Web graphics standards through a beefier version of the Gecko layout engine. On the security front, the update offers a new "safe mode" for enhanced protection against potential threats and daily, automated checks for security updates. These security updates are now automatically uploaded in the background instead of having to be manually updated by the user.

It also has improved its extensions so that add-ons to the program (and there are lots of them) can be downloaded easier and faster than Version 1. Of course, it still has the tabbed browsing feature, and now you can reorder your tabs by “drag and drop.”

If you would like to see PC Magazine’s review of the updated browser, click here. You should find it very informative.

I just downloaded it today and have been playing with it. It is a good browser, although I will have to get used to the way it handles RSS feeds as compared to Maxthon. I have found the documentation to be less-than-helpful. For instance, there is absolutely no reference to “RSS.” I eventually found out they refer to it as “Live Bookmarks.” But I will play some more and see if I will like it better over time. I suspect that there are some useful extensions that can be downloaded to make it better.

To read more about it and to download it, go to:
http://www.mozilla.com/

Monday, November 28, 2005

An Idea Whose Time Has Come

You may have missed this story (I know I almost did), but it is definitely one that is worth knowing about. Last week, online privacy advocate TRUSTe announced the beginning of the Trusted Download Program. TRUSTe is leading the efforts to get the program adopted, but it is also being backed by a number of large tech companies, including CNET, Yahoo, America-on-Line, Verizon, Computer Associates and others.

The program's goal is to certify computer downloads to insure they conform to a strict set of guidelines and practices. While any kind of program can earn certification, the main focus of the Trusted Download Program is to reign in adware vendors by providing them with incentives to make their programs behave in a responsible and noninvasive manner.

Here are some of its most important points. First, any company wishing to obtain certification must allow users to opt out all third-party bundles upon installation. Second, every time a user sees an advertisement, he or she must also see a notice clearly stating what company is delivering the ad, along with instructions for uninstalling the ad-serving product.

It's also worth noting that adware vendors will be responsible for policing all their affiliates and that screening will be conducted on an ongoing basis. The former policy should help cut down on the amount of shady, non-disclosed installations, while the latter will ensure that a company can't just temporarily clean up its act to earn certification. (For more information, visit the official Trusted Download Program's Web site or read Peter Butler's latest Spyware Hunt blog entry.) As you might expect, the Trusted Download Program has its share of critics, most of whom believe that separating the "good" adware vendors from the bad ones will in effect increase the distribution of the bad type of software.

It will be interesting to see how many adware vendors will actually take every step necessary to achieve certification. And even if they do, is it too late in the game to salvage their unsavory reputations after years of doing things the wrong way? (For instance, 180solutions, which has already announced it will apply for certification next year will likely have a very tough time convincing folks that it's now on the up and up.)

As the title of this blog suggests, this is an idea whose time has come, and, in fact, may be long overdue. Unsuspecting users need to be protected from companies who want to put adware and spyware on their computers without their permission.

Sunday, November 27, 2005

Vote for the Best Search Engine

There always seems to be an on-going argument about which is the best search engine on the Web. Over the years, I have settled on Google as my search engine of choice, so that would be my vote. But I must admit I don't use other search engines that often. Now, there is a project underway where everyone can vote to for the search engine they determine is best.

But rather than just vote on your favorite, this one is a "blind taste test" that provides an objective rating system. When you click on their web site, you search on any subject you wish (hopefully something that you know about). You then are shown the top three results from three search engines, identified only as Brand X, Y, and Z. You then click a button to register your vote. After you vote, you are told the results.

You may be quite surprised with your selection. With more than 12,000 testers so far, the figures are Google 42%, Yahoo 32%, and MSN Search 26%. The project just started on Nov. 21 and the results are fairly close, with the lead changing hands several times in the early days. They need more testers and only your first vote counts, so make it good.

I have done it twice...the first time my blind vote was Google. The second time I did it, my choice turned out to be Yahoo. I will say that in both votes, it was very close as to which one I eventually picked. All three engines gave good results. But, you only get the top three results of your search, which I think is far too few to determine the best results.

But it was still fun to do. Give it a try. Click here to play.

Thursday, November 24, 2005

Energy Hogs in your Home

Happy Thanksgiving from beautiful downtown Ephrata! Susan and I hope your Thanksgiving is a special one.

Because of the holiday, I will keep this entry short, but sweet. I came across an interesting article on CNET about how much electricity our electronic gadgets really use. As we enter the season when home electric bills start going up (especially here in Ephrata as we use electric heaters), I thought this article was very timely.

For instance, did you know that our TV's account for 4% of our nation's residential electrical usage? And that the new plasma TV's are huge power hogs! And did you know that most electric adapters that recharge our cell phones and laptops are incredibly inefficient, wasting as much or more electricity than they actually use?

Those are just a few of the interesting tidbits I found in this article. To read it, head over to the CNET web site.

Tuesday, November 22, 2005

Worm Uses Fake FBI E-mail to Spread

Computer Security Company Trend Micro has raised the threat level of a virus/worm known as WORM_SOBER.AG as it is spreading rapidly throughout North America and parts of Europe. Like the phishing scam I wrote about last week, it uses fear to get users to open the infected attachments.

WORM_SOBER.AG spammed e-mails are written in both German and English languages. It checks the user's system for the version of the Microsoft OS that's running ... if it detects GMX as the domain, it installs one of the German versions; otherwise, it installs one of the English versions.

The worm propagates via email messages that are spammed to recipients. However, once a system is infected, it spreads by itself. The worm has no automated capabilities and must therefore be inadvertently executed by the user to install. To entice the user to do this, the author utilizes classic social engineering techniques, such as promising pictures of celebrities, or alerting the user to illicit behavior.

At least two of the English versions of WORM_SOBER.AG spoof the Federal Bureau of Investigation (FBI) or Central Intelligence Agency (CIA), alerting the user that the agency has found evidence of the user visiting "more than 30 illegal Websites", and asks them to complete the attached "questionnaire". Launching the attachment activates the worm. Similarly, one of the German versions spoofs Bundeskriminalamt, and threatens legal action against the users' illicit downloads of films, software, and MP3s. The email promises more details of the case in the attached file.

Another version promises a free download of "video clips, pictures and more" of Paris Hilton and Nicole Richie, stars of "The Simple Life" reality television series in the U.S. Attachments are disguised as zipped files.

WORM_SOBER.AG can download and run executable files from certain Web sites that it points to. However, this worm does not seem to have any backdoor capabilities.

The FBI has also issued warnings not to believe any e-mail that says it is from the FBI.

Monday, November 21, 2005

XBox 360 Debuts Tomorrow

If you are into games, tomorrow is a really big day for you...that is if you have around $300. Microsoft is releasing its newest game machine, the Xbox 360.

Thousands of video game enthusiasts around the country will be breathlessly waiting for stores to open so they he can get their hands on an Xbox 360. The Microsoft game console will finally, after months of hype, go on sale just after midnight Tuesday.

Many retailers say they are expecting walk-up interest to exceed the number of Xboxes for sale on Tuesday. But not all retailers say they expect a problem. Microsoft says they have plenty of boxes in reserve to cover all the demand over the next few weeks. However, some stores will inevitably run out on Tuesday and eager buyers may have to wait a few extra days to get their hands on one.

Lat Friday, retailer Circuit City began taking orders on its web site and and by the afternoon, their Web site was hobbled by a deluge of traffic. A representative for the online counterpart to electronics retailer Circuit City said the company's site saw a "tremendous" traffic spike at 2 p.m. ET, when the company began taking Internet orders for the eagerly awaited Xbox.

Microsoft expects to sell up to 3 million of its new Xbox 360 game consoles in the first three months that the device is on the market

Initially, Microsoft says there are 18 games designed for the Xbox 360, ready to go for tomorrow. Among them are many of the latest iterations in proven franchises, including Electronic Arts' Madden NFL '06, NBA LIVE '06 and Need for Speed Most Wanted, as well as Activision's Call of Duty 2 and Tony Hawk's American Wasteland.

If you would like to read a review of the new gaming box, CNET has posted one in its web site, so you should read it before you spend your hard earned cash. Have fun, gamers!!

Saturday, November 19, 2005

Photography Odds and Ends

I thought I would post a short list of some good reading material to help with your photographic endeavors, especially with the holiday season now upon us. Most of this material is relevant whether you use a digital camera or a film camera. I hope it helps.

Photographing Thanksgiving
This very nice article was posted on the cameraworld.com website. Although they are primarily an online camera store, they do have some interesting articles from time-to-time to help improve your photography. This article is titled, How to Capture Thanksgiving With Your Camera, is short and gives you some good suggestions to make better pictures at your family get-together.

Free Photo Classes
CNET has put together a series of free photography and video classes to help you improve your photographic skills. Their first classes are all centered around the holidays and will teach you not only the basics about taking pictures, but how to enhance them with post processing software and share them with friends and family around the world. Enrolling is easy and free.

Tips from the Top Floor
I know I have mentioned this podcast before, but I think it is worth mentioning again if you are interested in photography. Late last night I drove home from Seattle and my only companion was pre-recorded episodes of Tips from the Top Floor on my MP3 player. It kept me awake and interested all the way (after the Seattle radio stations petered out in the mountains).

Chris Marquardt lives in Southern Germany and records these podcasts three times a week. They are ususally 10-15 minutes in length and most contain some excellent information on digital photography basics. He also has some very interesting interviews from time-to-time with professional photographers. Definitely worth listening to, especially on long, lonely drives. His web site augments the podcasts.

Apogee Photo - a Free Photography Magazine
For a few years now, I have subscribed to a free on-line photography magazine called Apogee Photo. When I say subscribed, I mean that I signed up to have all new editions e-mailed to me. All of their past issues are on their website. Its a good one.

Vivid Light Photography
Here's another free on-line magazine called Vivid Light Photography. I've only just discovered it recently, but it is a good one that apparently has been around a few years. Like Apogee Photo, they will e-mail each edition as it is completed.

Photo.net - The Best Photography Website on the Net
It has been a few years since I mentioned this website, so it's time to do it again. Photo.net has been around for years and it is an in-depth photographic website covering just about every aspect of photography. If nothing else, you should get on to see some of the top-rated photographs submitted by amateur photographers around the world.

BetterPhoto.com
Another fine website that features lots of interesting articles on all aspects of photography, including both film and digital shooting.

That's all for today. I hope you find something that helps you.

Thursday, November 17, 2005

Google's eBay Killer

After months of rumors, speculation, and guesswork, search giant Google has unveiled Google Base, its much-rumored listings service that many people believe is meant to compete against auction and listings sites like eBay or Craigslist.

Google Base is based on submissions from Google users, which Google then organizes and opens up for searching, for free. In a Weblog posting Wednesday, Google said it expects content from individuals and small Web site owners plus larger organizations uploading lots of listings.

With each incremental tip of its hand, it's becoming increasingly clear that Google is creating a service meant to mirror that of any retail Web site, where it could generate revenues by placing advertisements at various stages of the process. Analysts repeatedly say Google's user base, which is in the hundreds of millions of users, would be an instant challenge to eBay, the auction pioneer, or more community-focused sites like Craigslist that pioneered the user-generated listings service that Google Base, in a way, is a mirror copy.

Screen shots of "Google Base," now available on the Google Base website explain that the service-to-be is a database consisting of "your content" that's free to contribute. Items in the database include a party invite or a "listing of your used car for sale." There is also a tie-in mentioned to Google's comparison shopping site Froogle, and Google Local, the combination Google mapping and localized search results.

There is still much that is unclear about it, but if it's listings are free (compared to eBay which is not free), then they have the possibility of being a major success. If much of what I have written seems a little vague, it is because it is so new and I am just learning about it myself. If you would like to know more I suggest you head over to base.google.com and see for yourself. I may do something with Google Base myself and I will let you know what happens.

Wednesday, November 16, 2005

New Phishing Ploy

After my first cup of coffee this morning, I checked my overnight e-mail's, as I usually do. One of them caught my eye immediately.

It was an e-mail, purportedly from Amazon.com, saying they were suspicious of a purchase I supposedly had just made and wanted to check if I had really ordered it. According to the e-mail, it was a $3,900 purchase for aPanasonic HDTV, apparently done through TigerDirect. They wanted me to verify if I had really ordered this product.

Of course, I did not order a TV and this immediately raised a warning flag that someone had obtained my credit card information and was using it for a purchase. In the past, I have ordered from both TigerDirect and Amazon, so it appeared legitimate, at least at first. But, of course my next thought was that this may be a scam to get my personal data.

So I started closely examining the e-mail. It looked legitimate, with all the proper colors and logos that Amazon uses. But, the language of the e-mail made me very suspicious. It appeared to be written in English that was less than perfect, almost obtuse. So I decided to immediately check the link they wanted me to log into to verify my purchase. That is always the dead giveaway for a phony phishing e-mail.

The link look legitimate and was spelled out exactly on the screen, using something like this:
https://www.amazon.com/security/fraudcheck/ect........

But, I learned a long time ago to point at the link with my mouse (not clicking it, of course), then look down at the lower left corner of my e-mail program to see the actual link address. In this case, the real link was not Amazon.com, but some other unsecured website, probably in some foreign country. Now, I knew...this was a phishing scam.

In the past, I have received several phishing scam e-mail's. Most appear to be from banks (including two that I do bank with), asking me to verify my account information. They were obviously frauds. But it appears that phishers have learned to use one of the most motivating factors to up their connect rate...fear.

Who among us is not afraid to have their credit card data stolen? I think most of the phising scams we will receive in the future will use fear as their hook. Just remember, before you panic, use the above trick I mentioned to see if the e-mail is legitimate. If the link doesn't match, you know you have a phishing scam e-mail.

Interestingly, I went to the Amazon.com web site to report this scam. I tried to e-mail them a copy of the e-mail, following their on-screen instructions, but neither time would the e-mail go through, so I just gave up. I suspect they have so much e-mail about phishing scams that they are not accepting any more. Whatever...I tried to be helpful.

Tuesday, November 15, 2005

More Odds and Ends

In my searches for interesting bits to write about in this blog, I always seem to come across some interesting items that deserve mentioning, but are too short for me to write about...or someone else has already written a great article about it and there is no need for me to reinvent the wheel. Hence, these "Odds and Ends" columns that I occasionally write. Here are today's offerings:

More on Free Software

In the last edition, I wrote about some of the places on the Web where you can get free software. In September, PC Magazine wrote an in-depth review of some of the best free software available to you. It is written by categories and is definitely worth a look.

Congress About to Pass a Very Weak ID Theft Bill

As they usually do, our Congress has taken a good idea to protect consumers and let it be weakened by special interests. It has happened again, this time in their attempt to combat identity theft in the United States. Congress is preparing to pass a sweeping, but very weak ID theft law that's a boon for identity thieves, beloved by big business, and an additional burden for you and me. At the same time, a bipartisan bill in the Senate that is modeled on California's tough and successful legislation, seems all but stalled. You need to read Jason Vamosi's hard hitting article on how Congress is about to screw us again.

Microsoft Will Issue Fix for Sony Rootkit

Microsoft will shortly update its security tools to detect and remove part of the copy protection tools installed on PCs when some music CDs are played. The software maker has determined that the "rootkit" piece of the XCP software on some Sony BMG Music Entertainment CDs can pose a security risk to Windows PCs.

To protect Windows users, Microsoft plans to update Windows AntiSpyware and the Malicious Software Removal Tool as well as the online scanner on Windows Live Safety Center to detect and remove the Sony BMG software. Microsoft provides weekly updates for Windows AntiSpyware (soon to be renamed Windows Defender). The Windows Malicious Software Removal Tool is updated monthly and is part of Microsoft's monthly patch releases.

New CNET Service for Your Products

Did you loose a manual for a tech product that you own and need to find it? Or do you want to create a wish list for products you wish to own in the future and learn more about them? CNET has started a new feature called "My Products, " where you can enter a list of products that you now own...or a list of products you may want to buy. The most intriguing part of this concept is that they have manuals on-line for the products you now own, just in case you might have lost them and need to access it.

Weird eBay Auction Items

Hard to believe, but there is a website dedicated to searching out and posting the strangest items up for sale on eBay. And it is updated every day. Go to http://www.bizarrebids.com/

Cheatsheet for Word

If you use Microsoft's Word for your word processing, you might find this little cheatsheet handy. It is available from OfficeLetter.com and is available as (what else), a word document that you can print out. Go to: http://www.officeletter.com/samples/v04/n52wordshortcuts.doc

Sunday, November 13, 2005

Odds and Ends

I thought I would put a few items of interest today in one blog. I hope you find something of use.

Worst Products:

CNET recently put together a list of some of the worst computer products of all time. I had a few of my own to add to the list, but I have long ago put them out of my mind and cannot remember their names (getting older, you know). Anyway, click here to see their list.

Web Sites for Free Software:

Here is a list of some of the best web sites where you can get some great free software and good shareware. But, you know me, I love the free stuff.

  • NoNags - This web site features nothing but free software. Shareware is not allowed here. The term "NoNags" comes from the fact that they accept no software that nags you to buy their product every time you start it.
  • SoftPedia.com - Another great web site with free and shareware software, with news, recommendations and more. Its a fun site to explore and look for products that might be of use to you.
  • DownloadSquad.com - Similar to Softpedia but with a whole different looks. Lots of recommendations and blogs about software. Free and shareware software.
  • Download.com - The most popular software download location on the net. Recently redesigned to give it a great look. Probably more shareware than freeware, but still a good site to explore.

Want to Simplify Your Life?

That is something that Susan and I are trying to do as we get older. We found a great website that helps with our efforts. It is called Flylady.net. Sign up for the Flylady's free email newsletter so you can take the clutter-free challenge, start a control journal, and take part in the 27-fling boogie (throw out all those things you don't need).

An Outlook Replacement

As you may remember from a past blog, I cannot make Outlook 2000 work properly with my desktop computer. And while I have found that Mozilla's Thunderbird is more than an adequate replacement for e-mail, I still miss some some of the other organizational features that Outlook offered such as to-do lists, calendaring, and notes.

I have now found a replacement program that is even better than Outlook and offers most of the same features, only better executed. It is called EssentialPim and it comes in both a free version and a Pro version that sells for $29.95. This program is so much better than Outlook, in my opinion, and in just a few days of use has become almost invaluable. I like it so much I am going to buy the Pro version and also install it on my laptop as it allows multiple users to access the data. Check out their website for more information.

Friday, November 11, 2005

Update on Sony's RootKit Software

The furor and problems caused by Sony’s hidden rootkit installations on unsuspecting user’s computers (see my blog on 11/4/05) continues to grow. As you may recall, the Sony software is installed automatically (without asking or telling) when a user puts one of their recently recorded music CD’s in his or her computer to play. It hides itself on hard drives using a powerful programming tool called a "rootkit." Sony did it to prevent music from being copied. But the tool leaves a “back door” open behind it, allowing other software, including viruses, to be deeply hidden behind the rootkit cloak.

Now, the first wave of malicious software written to piggyback on Sony BMG Music Entertainment CD copy protection tools has been spotted online, according to computer security companies. The first version of a Trojan horse spotted yesterday, aims to give an attacker complete remote control over an infected computer, but didn’t work well. But over the course of the day, several others emerged that apparently fixed the early flaws.

As one security analyst put it, "This is no longer about digital rights management or content protection, this is about people having their PCs taken over."

Sony's use of the rootkit software has sparked a firestorm of criticism online and off over the company's techniques, highlighting concerns that remain over record labels' increasingly ambitious attempts to control the ways consumers can use purchased music.

Last week, a legal firm in Los Angeles filed a class action suit against Sony BMG in Los Angeles federal court, asserting that the company had violated state and federal statues on unauthorized computer tampering. The company's actions also constituted fraud, trespass and false advertising, the suit contends. Similar suits are also being contemplated both nationally and internationally.

Meanwhile, several antivirus companies are releasing tools to identify, and in some cases remove, copy protection software contained on recent Sony BMG Music Entertainment CDs. Symantec said its antivirus software update will identify the Sony software, but would not remove it. Instead, it will point to Sony's own Web site, where users can get instructions for uninstalling the software or download a patch that will expose the hidden components.

However, Computer Associates, which has a security division, said it had found further security risks in the Sony software and was releasing a tool to uninstall it directly.

In other related news, The Electronic Frontier Foundation (EFF), a cyber-rights group, said it has identified 19 Sony CDs containing a rootkit application that disguises the company's invasive copy-restriction technology. They also said there may be more.

If you would like to learn more about how rootkits works, here is some selected reading:

http://en.wikipedia.org/wiki/Rootkit
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci547279,00.html
http://www.vnunet.com/vnunet/news/2144149/rootkits-turn-professional

Update:

Minutes before I sent this blog to be published, Sony BMG Music Entertainment announced that it will suspend production of CDs with copy-protection technology that has been exploited by virus writers to try to hide their malicious code on PCs as outlined above. The company also said it is not halting production of discs that contain other additional copy-protection technologies.








Thursday, November 10, 2005

Backup Strategies - Part Two

In my last blog, I talked about backups and how I do mine. This time, I am going to give you some additional ideas, backup strategies from other sources, and software suggestions to help you along.

One of my readers wrote me and said he has a huge hard drive and wanted to know if he could back up his data to an unused portion of his drive. The answer is, of course, no. The reason is that if your hard drive stops working (and they all will, sooner or later), he would loose both his original data and his backup. You must use a separate storage entity, such as a separate hard drive, a CD-RW, a DVD-RW, a ZIP drive, or a tape backup. Which one you use depends on how much data you have to backup.

As I suggested in the last blog, you need to move your all your data to a separate area...like a separate hard drive, or, if you have only one drive, a separate folder such as c:\data and the appropriate folder listings below that. Or under the My Documents section in Windows. Having all your data in one location makes backups so much easier.

Obviously, with all my data, I prefer to back up using a separate hard drive. I have seen external 250 Gb hard drives with a USB2 connection for as low as $125 (Make sure it is USB2 (or Firewire) as USB 1.1 is way too slow). Many of these backup drives include all the backup software you need. You also might want to look for the so-called “One Touch” external backup hard drives as they are made specifically for this purpose.

If you have all the hardware you need, but are looking for some good backup software, I can help you. One of the better software packages you can get is Cobian Backup. And, it is free. It is as complete a backup software program as those you pay a lot of money for. It is heartily recommended by me and the folks at the “Call for Help” TV program. The author of the program is apparently quite wealthy and does it for fun.

As I mentioned yesterday, another free program that I use to sync up the data for my two computers is Syncback from 2BrightSparks. You can use this program for either synchronization or backups. Please be aware that there is a paid version and a freeware version. I, of course, use the freeware version and it works just great for me.

Here is a short list of additional readings to help you formulate your own backup strategy:


These articles should get you started in the right direction. I hope you will consider a personal backup strategy soon if you don’t have one already.

Tuesday, November 08, 2005

Backup Strategies - Part One

Backing up your personal and business data is something everyone should think about. If you don't believe me, sit back and think about what would happen right now if your computer's hard drive stopped working right now. How much data that is really important to you would be gone forever if it wasn't backed up and how would it affect your life?

In my case, it would be a disaster of epic proportions. All of my art and photographs that I created over the years would be gone forever. I couldn't make any prints of my best selling works. Lots of work that I do for clients would be gone and how do I explain that? Moreover, all my financial data would be gone forever, not to mention important spread sheets and letters. Just the thought of this makes me shiver.

So, with that in mind, I thought I would share with you some possible backup strategies and suggest some additional reading material and some quality backup software.

In today's blog, I will tell you about my personal strategies that are working pretty well.

Inside my computer are two hard drives (one for programs, the other for data), one CD player, and one CD/DVD burner. Outside the computer are a 200 GB Western Digital external hard drive connected by USB2; and an additional CD/DVD burner, also connected by USB2.

All the software that run my programs are on drive C:. I do not backup this drive as I have all the original program CD's. If this hard drive crashed, I would just install a new hard drive and reinstall all the software from scratch. Having done this a couple of times, I know there is a better way.

If you have a little extra cash lying about, you could get an external hard drive of the same size, attach it via USB2 to your computer, and make an exact replica of your C: drive using a program like Norton's Ghost. When done, you turn off the external drive, disconnect it from the system, and store it away in case of emergency. You should update this drive every so often since you will probably add some additional software from time-to-time.

The second drive inside my computer is used almost exclusively for storing data that I create, such as accounting and other business data, photographs, final artworks, art works in progress, my web site data, and much more. I make sure that all my programs point to this data drive when creating files.

Every morning, around 2:00 AM, all the data on this drive is automatically transferred over to the external Western Digital hard drive. I use a program called, "Retrospect" that came with the external hard drive when I bought it. I simply programmed the software to do a backup of the data hard drive every night. In actuality, Retrospect doesn't copy the same files over and over. Rather, it checks for new files and only copies them over to the external drive. Much faster that way.

While I use Retropect for this one function, I don't recommend going out and buying a copy of it as it is expensive and really meant for tape backups. I have tried it for other backups and found it wanting, at least for the way I do my backups.

As for my original photos and art works, I use some additional back up routines. As I create new works, I back them up on CD's, usually make two separate copies of the CD's. One stays here at the house, while the other copy is stored offsite in case of fire or burglary. I use only the highest quality CD's as some cheap CD's will break down in a few years and lose all the data that was on them. For these backups I use CD-R's.

For my RAW-based original photos, I back them up on DVD's, again using only the highest quality DVD-R, such as TDK DVD-R or Tayo Yuden DVD-R. Again, 2 copies are made. So, for my artwork and photos, I may have as many as four copies of the same picture, just to be on the safe side.

Before I purchased my external hard drives and got into digital photography, I used to make all my backups on CD-RW disks. I would buy a box of 5 CD-RW's then use them in rotation for my data backups. The CD-RW are erasable and rewritable, so something like this might work for you. Most CD burning software like Nero can help you do these backups.

I do most of my work on my home computer, but as I am on the road continuously for six months out of the year, I take my laptop along and use it quite heavily in the field. At a show, I usually record my sales in a database and do other types of data that I want to save. I also want to have much of this data put on my home machine so I can work on it there.

For that, I use a backup/synchronization software program called Syncback. As I have all my computers networked, I can do this quite easily and painlessly. Before I leave the house, I "sync up" the data between my main computer and my laptop so that both have the exact same, up-to-date data. When I get back, I do this again so that both machines again are in sync. It works very well for me.

In the next installment, I will talk about some of the software available to help you backup your data and suggest some additional reading materials on the web that will help you formulate your own backup strategy.

Monday, November 07, 2005

Digital Camera Storage Choices

As I mentioned in an earlier blog, I have moved to digital photography after many, many years of using film. It is a big change in so many ways and I am still learning the fine points.

One of the most important things about digital photography is the image types that are available to you. Using a film camera, I had to first choose between black and white film, color negative film, or color slide film. When I chose one of the three, I had to choose among many choices for each type of film; i.e. Kodak Ektachrome, Fuji Sensia, Fuji Provia, etc. (these being a few of the choices in color slide film). Each had their specific qualities and idiosyncrasies.

In digital photography, you don’t choose film type. Rather, you choose the image type you wish to use to store your images (there are other choices you must make like ISO speed, but we will talk about that in the future). In digital photography, your basic three choices of image types are: JPEG (JPG), TIFF (TIF), and RAW.

In lesser expensive digital cameras, you don’t have a choice: there is only JPG. As you move up in price and quality, one or both of the other two types will also become available in the camera. Each has their advantages and disadvantages. Here is a quick, down-and-dirty look at each type.

JPEG – The biggest advantage of JPEG is that it is a very small file sizes, therefore you can store more images inside the camera. And most cameras give you a choice as to what size of an image you wish to shoot (i.e. 640x480, 1024x768, 2560x1920, etc.).

JPEG is also the default type used on the Internet, making it much easier to share photos among friends and family.

The disadvantages of JPEG are many. Primarily, in order to make the file size so small, much of the information contained in an image is discarded and the remaining data is compressed. While it may not be obvious in most pictures that pixel data is missing, you will become aware of it if you do post-processing of a JPEG image in software such as Photoshop, Elements, Paint Shop Pro, PhotoImpact, or any other image processing software.

You see, if you make any kind of changes to an image and save it, the software will try to recompress the JPEG image again, throwing out more image information. So the more times you save it, the more of the image is lost each time. So, if you must work on your images to make them better, do all the work before saving it so that you do only one additional save.

TIFF – This is probably the best way to save an image. Unlike JPEG, you can save a TIFF many times and never loose a pixel. I do almost all my post-processing work in TIFF. When I scan my slides into the computer, I always saved them as a TIFF. It is arguably the best way to save images when doing post-processing.

The disadvantage of TIFF is that it is probably the largest size of all image types. For instance, using my 8-megapixel camera as an example, setting it for the largest, highest quality, lowest compression JPEG image file, the file size would be 6.1 Mb. Using TIFF, the same size image would be 23.3 Mb, almost four times larger. If you decrease the size of your JPG image, the size difference will become even greater. This file size affects how many images you can store in your camera’s memory card before it becomes full.

So, while TIFF may be the best quality image-of-choice, you shouldn’t use it unless you have a huge capacity memory card in your camera, or you use it only on selected pictures at the time you take them.

RAW – This is the most interesting of the three file types. A RAW image isn’t so much an image type as it is a way to store original, unprocessed data. Even more interesting (and maybe confusing) is that RAW differs between each camera manufacturer. An Olympus RAW file is totally different than a Nikon RAW file or a Canon RAW file, unlike JPEG or TIFF, which is the same for all cameras.

The best way to understand RAW is to compare it to a piece of film that hasn’t been developed yet. The first thing I must do when processing the RAW image in Photoshop is “develop” the image. If I like the original exposure, I may develop it exactly as-is. If it is slightly underexposed or overexposed, I can play with it until I achieve the right exposure. Then I can adjust the white balance, sharpness, saturation, contrast, brightness, shadow detail, and more. In other words, I can make the “perfect picture” long after I have taken it with the camera.

After adjusting all these details, I then develop and save the image as a TIFF or any file type I choose in my computer and continue with post-processing. For a professional or serious amateur photographer, using RAW only makes good sense. And RAW is definitely my image type of choice, since I post-process all of my photos, usually in Photoshop.

The disadvantage of RAW is that it requires more work on your part and the file size is still fairly large. But it is a lot smaller than TIFF. Using the same example I gave above, a TIFF in my camera is 23.3 Mb., while the same size RAW image in only 13.3 Mb. As I use mostly a 1Gb memory card, I can store 72 RAW images in my camera before having to change cards. That is a lot, compares to the number of images I could get on a roll of film.

One other choice that I have with my camera is that I can also set it to take a RAW image and a JPEG image at the same time. I also have the choice of which size JPEG I want to shoot with the RAW image. If I am shooting a wedding for instance, I will set the camera take both a RAW image and a 640x480 JPEG image at the same time. I will use the smaller JPEG images for proofs for the customer, then process the RAW image for high quality larger prints for the images they eventually choose.

I hope this not-so-short explanation of image types has been of help, whether you have a digital camera already or are contemplating buying one in the future. If you have questions, just drop me an e-mail and I will do my best to answer you.

Friday, November 04, 2005

Sony Caught Installing Hidden Software on Computers

Did you know that if you have played a new Sony music CD in your computer within the last year, your computer is probably infected with a malicious software program that allows Sony to change the way you use your computer? All to true, as we have been finding out this week.

Sony, in its attempt to enforce it digital rights management system (DRM), has put a software program on its music CD's that installs itself into your computer, whether you want it or not and without asking your permission. It is written in the form of a rootkit, a malicious code that is nearly impossible to detect and can sometimes give its creator a "backdoor" into your computer whenever he wants. (I will be writing more about rootkits and their threat in an upcoming blog.)
Sony's digital rights management technology, now shipping on CD's by Sony Corp. and BMG Music, employs stealthy, rootkit-style techniques to hide from users, according to security experts. The new technology, which Sony has dubbed "sterile burning," manipulates the Windows core processing center, or "kernel," to make the DRM almost totally undetectable on Windows systems. It can also prevent you from burning music on your CD's or computer's hard drive.

These kind of files are almost impossible to remove without fouling Windows systems and could be used by malicious hackers to hide their own programs. The security expert who discovered the hidden Sony software found that if he removed it, it wrecked his Windows software and prevented him from accessing his CD player completely.

Sony BMG has acknowledged that the rootkit-style features are part of DRM technology that began shippCD's with CDs in 2005. The company claims that it is issuing a fix, so the software can be neutralized. However, early reports from users who have run the software say it does not remove the rootkit software; it only changes it so it is not hidden.

Despite Sony's assertions to the contrary (Sony says, "This component is not malicious and does not compromise security"), analysis from two Windows expert authorities show clearly that any other attacker could take advantage of the rootkit functionality to hide their own files and registry entries, and that techniques used by the software run the risk of making the system unusable.

Rather than go on and on about this, I strongly recommend you read this excellent editorial by Molly Wood of CNET. She explains how it happened, what it can do to your computer, how it changes the way you can use your computer, and how outraged we should all feel.

Thursday, November 03, 2005

Links to Information on Bird Flu

As we hear more and more about the fears of a major outbreak of Bird Flu, (also known as Avian Influenza) in this country, I thought I should give you Web links to various sites to help you understand the situation.

President Bush really helped raise the level of awareness this week with his appeal to Congress for over $7 billion dollars for more research on this and other highly dangerous viruses. His concern has been raised by expert’s fears that an epidemic (or global pandemic, as some are calling it) of bird flu could easily result in the deaths of millions of people.

If you would like a simple overview of what the bird flu story is all about, I suggest you read this very interesting and easily understood article published by CNET news.

Here are some other in-depth web sites where you can learn more:

Tuesday, November 01, 2005

More on the WebWatch Survey

Yesterday, I shared with you some of the findings of a recently completed survey by Consumer Reports WebWatch that indicated many Internet users are spending less time on the net because of all the security threats. Today, I want to tell you about some of the other interesting results in this 1,500-person survey.

Among the other findings of the study was indication that Americans are increasingly turning to the Web to get their news, with the percentage of adults reporting that they get the bulk their coverage from the Internet doubling to 11 percent, compared to only 5 percent in 2002. Some 69 percent of those surveyed said that sites that maintain a clear distinction between advertising and news content are more reliable, with 31 percent agreeing that it is very important for news sites to reveal the financial relationships they maintain with other businesses.

While Weblogs, or blogs, have caused a major upheaval in the news business as companies look at ways to keep up with citizen reporters, those surveyed by WebWatch were clearly less enthralled with the movement, with 57 percent distrusting blog-generated news, 21 percent saying that blogs are usually incorrect, and only 12 percent expressing a belief that the online journals are accurate most of the time. Roughly 27 percent of those interviewed said they had visited a blog in the past several months.

(Personally, I distrust most citizen-based news blogs as they can basically say anything they want and pass it off as fact. Most blogs should be clearly identified as opinions based on facts such as this blog.)

While 48 percent of respondents said that knowing exactly who owns a Web site is an important factor in their usage, and 76 percent said it was vital to be able to identify where the information on a site is coming from.

Regarding pictures or images, many Americans are also increasingly skeptical regarding images they find on the Web, with 47 percent reporting that they have viewed what they believed to be manipulated pictures online. Despite that trend, 67 percent said they trust online news sites to use genuine photographs.

In relation to children's Web usage, opinions remain largely negative, with 86 percent of those surveyed identifying adults' continued pursuit of kids in chat rooms as a serious problem on the Internet today, with 61 percent labeling violent online games as a major issue. Some 82 percent believe it is too easy for minors to view sexually explicit content.

Among the few bright spots revealed by the research was growing trust in auction and financial services sites, despite the growth of online phishing schemes, which have largely spoofed such pages in the name of committing identity theft.

WebWatch also reported that 61 percent of its respondents feel auction sites are safe, with 68 percent confident in their use of online banking sites, and 55 percent comfortable enough to use online bill payment systems.

What do you think of this survey? I found it very interesting, to say the least.