Home
In this issue
April 9, 2014

Jonathan Tobin: Why Did Kerry Lie About Israeli Blame?

Samuel G. Freedman: A resolution 70 years later for a father's unsettling legacy of ashes from Dachau

Jessica Ivins: A resolution 70 years later for a father's unsettling legacy of ashes from Dachau

Kim Giles: Asking for help is not weakness

Kathy Kristof and Barbara Hoch Marcus: 7 Great Growth Israeli Stocks

Matthew Mientka: How Beans, Peas, And Chickpeas Cleanse Bad Cholesterol and Lowers Risk of Heart Disease

Sabrina Bachai: 5 At-Home Treatments For Headaches

The Kosher Gourmet by Daniel Neman Have yourself a matzo ball: The secrets bubby never told you and recipes she could have never imagined

April 8, 2014

Lori Nawyn: At Your Wit's End and Back: Finding Peace

Susan B. Garland and Rachel L. Sheedy: Strategies Married Couples Can Use to Boost Benefits

David Muhlbaum: Smart Tax Deductions Non-Itemizers Can Claim

Jill Weisenberger, M.S., R.D.N., C.D.E : Before You Lose Your Mental Edge

Dana Dovey: Coffee Drinkers Rejoice! Your Cup Of Joe Can Prevent Death From Liver Disease

Chris Weller: Electric 'Thinking Cap' Puts Your Brain Power Into High Gear

The Kosher Gourmet by Marlene Parrish A gift of hazelnuts keeps giving --- for a variety of nutty recipes: Entree, side, soup, dessert

April 4, 2014

Rabbi David Gutterman: The Word for Nothing Means Everything

Charles Krauthammer: Kerry's folly, Chapter 3

Amy Peterson: A life of love: How to build lasting relationships with your children

John Ericson: Older Women: Save Your Heart, Prevent Stroke Don't Drink Diet

John Ericson: Why 50 million Americans will still have spring allergies after taking meds

Cameron Huddleston: Best and Worst Buys of April 2014

Stacy Rapacon: Great Mutual Funds for Young Investors

Sarah Boesveld: Teacher keeps promise to mail thousands of former students letters written by their past selves

The Kosher Gourmet by Sharon Thompson Anyone can make a salad, you say. But can they make a great salad? (SECRETS, TESTED TECHNIQUES + 4 RECIPES, INCLUDING DRESSINGS)

April 2, 2014

Paul Greenberg: Death and joy in the spring

Dan Barry: Should South Carolina Jews be forced to maintain this chimney built by Germans serving the Nazis?

Mayra Bitsko: Save me! An alien took over my child's personality

Frank Clayton: Get happy: 20 scientifically proven happiness activities

Susan Scutti: It's Genetic! Obesity and the 'Carb Breakdown' Gene

Lecia Bushak: Why Hand Sanitizer May Actually Harm Your Health

Stacy Rapacon: Great Funds You Can Own for $500 or Less

Cameron Huddleston: 7 Ways to Save on Home Decor

The Kosher Gourmet by Steve Petusevsky Exploring ingredients as edible-stuffed containers (TWO RECIPES + TIPS & TECHINQUES)

Jewish World Review July 7, 2006 / 11 Tamuz, 5766

Notebook Data May Not Be Safe, Expert Warns

By Mark Kellner

Printer Friendly Version
Email this article

http://www.JewishWorldReview.com | It's entirely possible, computer security expert Paul Henry said Jun. 30, that the data on a laptop stolen May 3 from the Montgomery County, Maryland ,home of a Veteran's Administration employee was compromised - and the federal government may not know the data was taken until all you-know-what breaks loose.


Here's what might have happened according to Mr. Henry, a senior vice president of Secure Computing Corp., who is based in Ocala, Florida. The thieves could have hooked up the hard drive to a Linux machine or other system and made a bit-by-bit image - a digital "photocopy" - of the data, without the trouble of copying specific files from the hard drive, something that would have shown up as part of the disc's MAC time records, the times of latest modification, access and change of status or creation of a file.


"The statement that the data had not been accessed on the [hard disc] from the recovered stolen laptop is a very 'convenient' [one]," Mr. Henry said Friday. " There are multiple ways to have create an image of the HD without modifying a single bit on it; further there is freely downloadable software that can modify the MAC times for a file such that it appears not to have been accessed even though it had been... it is a trivial matter to have copied and accessed this data without leaving a trace."


Though there is no way - yet - to know whether or not the thief or thieves have actually done this, my chat with Mr. Henry revealed a bunch of ways the bad guys can try to get away with sensitive data. Yes, the pros know about most of them, but with so many notebook computers around out there - not to mention older computers and their less-than-perfectly-if-at-all erased hard discs available secondhand or at scrap prices - there's more than enough reason to worry.


The portability of laptop computers is one factor: what's easy for us to carry to work is also easy for a thief to steal. Many notebooks offer easily removed hard discs; almost every notebook has a Universal Serial Bus, or USB, port.


"We have enough trouble alone with the fact that laptops automatically come with multiple USB ports," Mr. Henry said. "While it may be convenient, it's also an inherently insecure way for a malicious person to gain access to that information."


His answer: IT managers can either password-protect or disable the USB ports by reprogramming the portable's basic input/output, or BIOS, chip. Some KrazyGlue in a USB port - carefully applied - might also be a good idea.


If there's "any corporate intellectual property, health care records or personal data" on a notebook, it should be encrypted using software that isn't easy to break or hack. Forget about PrettyGoodPrivacy , or PGP as it's known. Use the full-disc encryption found in Microsoft Windows Vista, due later this year, or PointSec, a Windows full-disc encryption program from the firm of the same name (http://www.pointsec.com), is another good choice, Mr. Henry said.


"When you're home, you're not protected by a corporate firewall. Be careful about where you go on the public Internet," Mr. Henry warns. Looking for illicit "keys" to unlock major software programs such as Microsoft Word, or downloading "free" music and other programs, can leave a computer open to "malware" such as keystroke loggers, which are great for figuring out network destinations, IDs and passwords.


Mr. Henry's firm sells software to protect corporate systems, not laptops. But his advice seems very sound, and may let you sleep more easily. More on physical laptop security next week.

Every weekday JewishWorldReview.com publishes what many in in the media and Washington consider "must-reading". Sign up for the daily JWR update. It's free. Just click here.

JWR contributor Mark Kellner has reported on technology for industry newspapers and magazines since 1983, and has been the computer columnist for The Washington Times since 1991.Comment by clicking here.

Archives

© 2006, News World Communications, Inc. Reprinted with permission of The Washington Times. Visit the paper at http://www.washingtontimes.com

Columnists

Toons

Lifestyles