Windows 7 Nears

Microsoft has been cleverly trying to turn the subject away from Vista and toward...well, toward just about anything else! Vista TV commercials mention Mojave more than the V-word, and the new, big Redmond word is "cloud."

On the desktop, Microsoft isn't shy about promoting Windows 7 and making it seem this OS is right around the corner. And it is -- at least in beta form. It looks like the first beta will be out this January. An alpha (I call it that, even though Microsoft has its own odd nomenclature) is already in the hands of developers who find it pretty solid.

One thing is pretty clear: Windows 7 is an extension of Vista. This means the hardware makers must build super-fast machines to give proper performance, that peripheral vendors must work with Microsoft on good drivers, and that Microsoft must clean up its code. If all three happen, Windows 7 could be a big success. Now, let's see how they all do!

Malware Messes with the Military
I avoid fighting people that are bigger and better trained than me (which means I'll have to stop fighting my two sons pretty soon). So I would certainly never want to irritate an organization with 3 million people, many of whom are armed, and a huge complement of planes, bombs, tanks and guns.

But that's just what some idiotic hackers are doing by releasing malware aimed at U.S. Defense Department computers.

Fortunately, military defenses kept the attacks from reaching deep into the network, but the malware did infect a range of computers in Afghanistan and elsewhere. If they found the source of these attacks, a little shock and awe is clearly in order.

2009: Tough for the Economy, Tough for Security
Symantec just released a study claiming that as of now, software authors are writing more malware apps than legitimate, useful programs. And the company says next year will be even worse.

First, a little caveat. Symantec sells security software, so it's in the company's interest to scare us. That said, Symantec has always been honest with me so I must take it at its word.

Here's what Symantec thinks we're in for in 2009: There will be more malware spread through social networking, more attacks on virtual machines and more spam.

What are your biggest security headaches? Send 'em to [email protected].

Mailbag: How Safe Is Wi-Fi?, IE 8, More
On Tuesday, Fred posed a question to fellow Redmond Report readers -- what should he do to keep his home WEP Wi-Fi connection secure? Here are your responses:

Regarding Fred's question on wireless: WEP is commonly defeated in under 10 minutes, so if someone decides to target your network, any available resource will be open to them. I'd worry less about the man next door than I would about the boy next door, who might try to break into your network just for the 'fun' of doing so. Another worry with WEP is having a stranger gain Internet access through your network and then use it for criminal activity, which would trace back to your IP address.

If you don't share anything on your computer, including hidden shares, a hacker can get access to the Internet only. The harm here is that they can capture your Internet traffic, but this would be very unlikely in a home environment. Even if they do capture Internet traffic, https sites are safe because of encryption. For example, your username and password for most Web-based e-mail is safe because it is encrypted; the log in page is usually https://something. However, the e-mail packets themselves are probably not encrypted and can be captured. You can configure Firefox to encrypt all Gmail traffic, but this is an exception. If you use e-mail handlers like Outlook or Thunderbird, your SMTP port is 25 and your POP port is 110, your mail transmissions can be easily captured. Hackers can also use peer-to-peer file transfers and slow down your Internet connection (the odds against this happening are astronomical).

I can hack 128-bit WEP encryption in 10 minutes if I am close enough to the access point, usually within 100 feet. The farther away, the more time-consuming the hack. Right now, the average hacker would not bother with any WPA because WEP is easy and plentiful. Almost all wireless routers and network cards can be configured with WPA. If you really want to be safe, use WPA-2 with AES and more than 20 characters in the encryption key. Also, keep potential hackers more than 300 feet away. This is almost as safe as a wired network.

Once again, if you don't have anything shared, including hidden shares, and you don't have sensitive e-mails, there is not much to worry about from Wi-Fi.

Have you tried the IE 8 beta? A few of our readers have and their responses are mixed:

I have used IE 8 on Vista SP1 for four or five months without any issues.

One problem I've had with the IE 8 beta is when I tried to uninstall it, it completely hosed my system, basically reverting it back to the factory default programs and settings. I had to use System Restore to restore my system the way it had been, including the beta version of IE 8. I'm using Window Vista Ultimate with 4GB RAM and a 2.20 gigahertz Intel Core2 Duo processor.

Joseph thinks the open source business model isn't necessarily "broken," as one analyst said; it might just be suffering from a perception problem:

Making money from 'free' software is not anything new. There are hundreds of VARs out there that sell products at near-cost to get the implementation contract. The problem is marketing -- when I had my own consulting business, I put on a "free" seminar at a local community college and hardly anyone showed up. I raised the "price" to $99 for the same seminar and got an overwhelming response from businesses. There is a price-point at which people perceive "cheap" to be valueless.

And finally, "cloud" might be Microsoft's new buzzword, but Alan isn't buying into it:

I do not need the cloud, and I do not care about it. It is insecure at best.

Tell us what you think! Leave a comment below or send an e-mail to [email protected].

About the Author

Doug Barney is editor in chief of Redmond magazine and the VP, editorial director of Redmond Media Group.


comments powered by Disqus

Subscribe on YouTube