Yellowstone Computing
(715)-669-6136
  • Home
  • Services
  • Support
  • Contact
  • Blog
  • About
  • Reviews
  • Repairs

VPNs: Your Personal Tunnel to Privacy, Part 1

6/29/2017

 

​This week, we are featuring a guest article about Virtual Private Networks (VPNs) by Emsisoft. In this first part, we look at what a VPN is and why you should consider using one. Next week, we’ll explain how a VPN works and what features to look for when shopping for a VPN service.
As always, if you have any questions, give us a call at 715-255-0325!

VPNs: Your Personal Tunnel to Privacy
In Security Knowledge by Haylee on June 15, 2017
http://blog.emsisoft.com/2017/06/15/vpn-privacy/

The idea that the government collects data on everything you do online is no longer stuff of dystopian fiction. When we consider the Vault 7 revelations, Edward Snowden’s ongoing leak of NSA documents and privacy changes that allow Internet Service Providers to sell the data of their users, we can no longer plead ignorance when it comes to our privacy. Everything you do online is available to anyone with the will and means to access it. Whether it’s cyber criminals or your own government. Yet there are ways to protect your activity online without disconnecting entirely.
A Virtual Private Network, or VPN for short, creates private tunnels for your online activity to pass through. Cost-effective and easy to setup, taking control of your privacy can be as simple as a software download. Stick around as we will explore why a VPN can be an important tool to protect your privacy and show the easiest way to set it up.

What is a VPN?
To explain this it may be simpler to first explain how a computer transmits data between itself and a website. Usually, traffic between a computer and a website involves the transfer of packets. A little like mail in real life, these packets transfer information from the sender (your computer) to the recipient (the website you are trying to reach) and vice versa.
The problem with these unsecured packets is that they can be intercepted (be it via WiFi, mobile radio signals or your router), exposing your traffic which contains information on which websites you were visiting and what you were doing there. This is known as a man-in-the middle attack and is a big reason why public wifi is so risky.

When you sit down for a coffee and connect to public WiFi, you are vulnerable to having your traffic sniffed. This is where a VPN comes in handy. Connecting to a VPN is like having a loud, private conversation with a friend in that same cafe, but in a language only known to the two of you. The role of a VPN, therefore, is to mask traffic in such a way that even if it is intercepted, it cannot be read.

Why you need a VPN
Eric Hughes, the original cypherpunk and online privacy advocate perhaps put it best:
“Privacy is necessary for an open society in the electronic age. Privacy is not secrecy.
A private matter is something one doesn’t want the whole world to know, but a secret matter is something one doesn’t want anybody to know. Privacy is the power to selectively reveal oneself to the world.”

An observed life is not a truly free life. To what extent should a government, or other entities for that matter, monitor your actions, browsing habits, or online accounts? Taking control of your privacy is necessary but it is only one reason for using a VPN.
The three main reasons for using a VPN are as follows:

Security on public WiFi
We’ve already briefly touched on public WiFi and the dangers it poses to your security. A VPN masks your traffic and activities adding an extra layer of protection when in airports, cafes, libraries or anywhere else you choose to connect your device to an open access point. Though nothing is 100% impenetrable, while connected to public hotspots your traffic will be much safer with a VPN than without one.

Location anonymity
Some streaming services restrict their content to specific regions, such as Hulu, HBO on demand and many others. A VPN grants your location anonymity, allowing you to access content when outside of your country. This can be particularly useful if you are travelling away from home and want to keep up with your local TV shows and news programs.
However, some television networks have begun blocking access to users if they detect that you are using a VPN.

Surveillance concerns
With the ongoing US privacy controversy centred around the ISPs ability to sell-on your data or share it with government surveillance programs, a VPN is a solid choice to keep sniffers out. This is not to say you have anything to hide. But with a VPN, you alone can choose what is available for companies and government programs to access.  

Let’s also not forget that the above points have significant humanitarian applications.
By masking the geolocation of a user, citizens can access news and other sites from outside of their silenced countries. Where information is controlled and altered by a government, residents in restrictive regimes have the ability to share what is happening in their country to an extent. This is particularly important for journalists and their sources.
VPNs offer many benefits to protecting your privacy or simply letting you watch your favourite shows directly out of the US before they become available in your country. However, like any technology, if someone is willing to put in the time and effort to get in, they can.

Why Windows Updates Are More Important Than Ever

6/19/2017

 
Stories about hackers and virus attacks seem to be making the news almost every day, and many of these news stories include tips on how you can avoid becoming a victim. One common theme among these tips is making sure your Windows operating system is up to date.
Every day hackers are trying to figure out new ways to break into Microsoft Windows and once they do find a weakness, they try and find a way to spread it. This could be through a malicious email attachment or even something that spreads without your involvement.
​
Updates Explained
Whenever Microsoft discovers a potential flaw, they push out a small piece of software to all Windows computers running a supported version. If set correctly, your computer will check for any updates or patches and install them automatically. In new versions, this usually happens when you’re shutting down or starting up, and doesn’t impact your experience at all. Unfortunately, some users will manually disable or delay their updates, creating a risky situation.
The updates may include security patches, drivers or simple tweaks to address bugs or issues with Windows. Sometimes, they even include new features or applications to improve the stability of your operating system. They’re a good thing!

Not All Versions Get Updates
Some older operating systems are no longer supported, which means unless there are extenuating circumstances (such as the recent WannaCry outbreak), Microsoft won’t issue any new updates. Generally, if cyber criminals discover a flaw after support to the operating system ends, they’re free to exploit it.  For example, Windows XP support ended in 2014, and Windows Vista just ended in April this year. The moment an operating system is retired it becomes a playground for cyber-criminals. This is because they know that many people will continue to run these outdated systems, giving cyber criminals easy prey.
It’s not just Microsoft walking away from these old versions either. Third party software like the Google Chrome browser will still work, but they’ve also stopped supporting old versions with crucial updates and patches. Although it might seem like everything is working fine because your anti-virus isn’t pinging in alarm, the reality is that you are piling risk atop risk. Speaking of anti-virus software, most of these products that are running on older versions of Windows are also either unsupported or given only definition updates. These editions leave your system even less protected due to their lack of advanced support and new features.

What to Do With Unsupported Systems
As much as you’re comfortable with your older version of Windows, each time you boot up you’re exposing your system, important files and entire network. It only takes one weak entry point in the chain to allow malware into all connected devices. That could mean your photo storage, media center or even smart appliances will be vulnerable. The risk posed by unsupported and unprotected systems is not worth risk. If you’re running Windows XP or Vista, you need to update to a more modern operating system ASAP. Give us a call to upgrade your computer, and get the protection you need!

We can also monitor your system remotely and apply your Windows updates with our Managed Services packages, ensuring you are always up to date and protected. Give us a call!

How to Keep Your  Technology Squeaky Clean

6/9/2017

 

Our technology is something we use every day, but did you know it’s also the most disgusting? Your screen may look clean, but studies show that a mobile phone can be 18x dirtier than a public restroom – ew! It gets worse (sorry)…that keyboard you tap at while eating your morning toast? It’s probably the biggest bacterial threat in your house, with about 20,000 times more germs than a toilet seat, more if you share it with children.
It’s not just sickness we’re up against, because as dust builds up inside gadgets, they also slow down, malfunction or overheat. Your device essentially chokes on ick, as vents and filters are clogged by sucking in pet hair and floating debris. Here’s how to clean your essential tech items without damaging them:

1. Skip the household cleaners: Most cleaning products are too harsh for our technology and can end up causing permanent damage. You want something that can kill germs and remove everyday grime, without scratching or leaving behind a scented residue. Your best bet is Isopropyl (Rubbing) Alcohol. You’ll find it in the first aid section of supermarkets and pharmacies, or at the hardware store.

2. Power down completely: Turn your tech off all the way, not just sleeping, and unplug from any power sources. Switch wireless keyboards, mice, etc off underneath or remove the batteries.

3. Remove any cases or covers: Undress your device as much as you can, but leave screen protectors on (unless there’s grime underneath). If your screen protector needs replacing, have a new one ready to apply.

4. Grab a microfiber cloth: Dampen the cloth with Isopropyl Alcohol and wipe screens and external surfaces gently. Older build-up may require extra effort.

5. Go deep: You can use a toothbrush or cotton tip to clean between most crevices, but some areas will need a bit more ‘oomph’ to clear. You’ve probably seen people use vacuum cleaners on their keyboard, but these are often TOO powerful and may suck keys or internal parts loose. They also generate damaging static electricity. Another option is to use a tech-specific vacuum, but these are usually under-powered.

Insider tip: Use a can of compressed air to blow the dust out. You can get these from many stores and they come with a long nozzle so you can really get in and direct the pressure. You’ll be surprised what flies out, so it’s best to do this outside! We don’t recommend using compressed air on your computer’s internal fans though, as this can make them spin too fast and damage them.
​
How often you clean your tech is up to you and your lifestyle. But it’s a good idea to blow out computer internal dust at least twice a year and wiping your tech down 1-2 times per week will definitely reduce germs and grime.

Using Email, Part 3

6/5/2017

 
Email Etiquette
Did you know that there are manners in the email world? Being mannerly in your emails conveys respect, clarity, and helps you to communicate better. So, let’s get started:

CAPS
Don’t use ALL CAPS. It’s generally considered to be “shouting” in email, text messages, etc. Of course, if it’s an exciting event like “IT’S A BOY!” or “I’M ENGAGED!” then “shouting” is appropriate.

Fonts & Colors
Don’t use multiple fonts and colors. The more fonts or colors you use, the harder it is to read. Unless you’re a graphic artist and you know how to properly combine more than a couple fonts or colors in a complementary way, excessive use will distract from your message, not enhance it.

Use Proper English
Don’t use texting-type word shortenings. Spell your words out. Can you imagine the Declaration of Independence being written this way: “Whn n th cors of humn evntz it bcoms necsy 4 a peep 2 dis th poltcl bonds whch hv…"? While you may think you’re saving time writing, what you really do is make it harder to read and comprehend your message. Besides, proficient writing is fast becoming a lost art. The more frequently we use poorly spelled, abbreviated, or grammatically incorrect writing on a daily basis, the more we’re going to forget how to truly write.

Email Forwarding
Be slow to forward “junk” emails to a bunch of people. By junk emails we mean those non-personal ones that share jokes, pictures, touching or humorous stories or news.
Take a moment to consider if your friends life will truly be enhanced or helped by the tidbit of information you’re about to send them. If they live a busy life, they may appreciate you spared them from seeing yet another forwarded email from you.
Along this vein, be wary as well that you could be spreading false information or malware. There are many email scams going around. “XYZ political leader is about to sign a bill to change the National Anthem,” or “I made $80,000 working from home.” Remember as well that even having a photo “proving” the information means very little. Photography has been manipulated since its inception and it’s relatively easy to do. Perhaps you think you’re being helpful to share all this “vital info” with your friends, but it’s not helpful if the information is false, in which case you’re helping the “bad guys.”
If you’re the recipient of a constant stream of unwanted emails from a friend or relative, there are several ways to deal with this. First, it’s usually best to be tactful, but up front that you’d prefer to be sent fewer emails of that nature. But if that doesn't work, you can create a filter to conveniently send all those emails directly into a folder that skips your inbox.
In the event of cyber miscommunication where you might have an upset friend, it’s best to put email aside and give them a call or visit in person. Tone is so easily misconstrued when it’s in print.
 
Sending Photos
Most email providers place limits on the size of email messages. When you want to send pictures, you might need to re-size them first. Windows 7 and 10 can do this if you use an email program like Outlook or Windows Mail. Select the picture or pictures you want to send, click on the Share tab, then Email. A window will open where you can choose what size to use. Click Attach and the pictures will be placed in a new message. If you use an online service such as Gmail, simply drag the photo onto the message and click on the size you want.
​
Handwritten Notes
Finally, when communicating with a special friend or loved one, consider the value of a good, old-fashioned, hand-written note. There’s something to be said for communicating via letters and cards. They are always in style and show that you care enough about the person to spend your valuable time in writing to them.

    Yellowstone Computing

    To read about us, click here!

    Archives

    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    November 2016
    October 2016
    December 2015
    September 2015
    July 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014

    Categories

    All

    RSS Feed

Visit Us!

What Our Clients Are Saying

Joe is really in tune with what our business needs are... what a great guy with amazing skills... - Grassland Veterinary Service

Yellowstone Computing goes above and beyond for their customers! Joe is very knowledgeable and will go the extra mile to make sure his customers not only get what they asked for but also makes sure they are taken care of for many years to come! Between the great business services they provide and their involvement in the Thorp Chamber I'd highly recommend doing business with Yellowstone Computing! Whether you are an individual looking for computer or other technology help or a large employer who needs to either supplement your current IT support or completely outsource it Yellowstone Computing should be one of your first calls! - Justin Z.