There is an old adage that says “If you are good at technology, you can be good at anything” … and that includes darts. All it takes is an engineering degree, a lot of free time, and some seriously inspired design. Presenting the Automatic Bullseye Dartboard!
Archive for World o’ Web
Yup. That’s all-caps in the title. And for good reason … actually, two good reasons. One, over the course of 2016 WordPress installations became the number one target of professional cyber-attacks. WordPress had long been the favourite target of the script kiddies, basement crackers, and other sorts of amateur slime but over the past 12 months the big players started turning their attention to the platform as well. Two, WordFence is the shit.
If you have an installation that runs WordPress in any shape or form – whether it’s the platform for your entire web presence, just the blogging component of a larger site, or anywhere in between – you need to harden it now. Not tomorrow, not this weekend when you are taking a break from surfing porn, not next week after you run it by yet another committee. It’s free* (as in beer), it works, and it’s stupidly easy to use … either start it up and forget about it until it tells you that you need to do something, sit down and tweak the crap out of it, or split the difference and get it started as is for now and tweak it later. The choice is yours.
You can download it for manual installation here, or you can look under the Plugins – Add New section of your WordPress dashboard for an automated install. Just get it. You’ll thank me later.
*NOTE: There IS a “pro” version that requires a subscription. And if you are an enterprise user of WordPress it is money well spent – I would encourage you to upgrade to the pro version right away. But for everyday “hobby” bloggers, the free version works extremely well, and is probably all you need.
Yesterday a rather worrisome exploit was found in the Firefox browser and all products that use the underlying Mozilla engine – Thunderbird, Tor Browser – that allowed otherwise safe and trusted web sites to inject malicious code into computers using the Windows operating system. You can read about it (and get links to updated versions of the software that correct the problem) here.
Now an even more startling development reveals that the exploit may have been added to the Firefox/Mozilla codebase by law enforcement officials, specifically the FBI. Since James Comey assumed the leadership of the FBI they have constantly targeted the Tor Browser, ostensibly as a way to investigate and prosecute offences in child pornography but with a quietly stated endgame of adding to their toolbox for mass surveillance upon all citizens of the United States. It’s not out of the realm of possibility to assume that they will be ramping up these efforts with an incoming president who is publicly committed to destroying personal privacy and free speech rights, and this is the first stage in surreptitiously broadening their listening powers. The widespread fallout that compromises the computer security of millions of innocent “cyber bystanders” would likely be considered acceptable collateral damage in the current political climate.
A full update has been added to the original post on the WordFence blog. It’s definitely worth a perusal – if you only have the time to read one article today, this is definitely the one.
And remember – UPDATE YOUR FIREFOX/MOZILLA PRODUCTS NOW.
A freshly discovered “zero day” vulnerability in the Firefox browser is currently being exploited and – if you are using Windows – can compromise your computer simply by visiting otherwise benign web sites. Fortunately, the exploit was published rather quickly and the Firefox team was able to issue a security patch within a few hours.
However – the exploit uses benign websites (especially ones that are commonly used as starting pages for browser sessions) as “watering holes” and any use at all of previous versions of Firefox is contraindicated until you download and install the newest release. If you use Firefox you need to immediately switch to another browser such as Safari or Chrome until you update Firefox. You can get the update here:
If you use Thunderbird for your email you also need to update as it uses the same Mozilla engine for parsing HTML within email messages. This is only a concern if you have Thunderbird set to allow inline content to be displayed automatically or you manually select content to load, but it would be in your best interest to update regardless:
Finally, if you use the Tor browser and security package, you also need to update as it contains a discrete version of the Mozilla engine that is affected by the same exploit:
Remember – you should not use either Firefox or Tor for any reason, even to download the updates, until you have the newest versions installed. Kudos to the Firefox/Mozilla team for getting these updates out so quickly. If you are interested in how the nuts and bolts of this works, there is an excellent write-up along with some pro analysis at the Wordfence Blog.
Unless you live in some sort of odd 1998 time bubble, or are inexplicably using Internet Explorer for something other than demonstration how not to write a browser, you probably use browser tabs pretty much all the time. Listen: As positive developments go, browser tabs are right up there with sliced pizza and the polio vaccine.
Being a clever tab user you are probably also familiar with – and beholding to – the “Undo Close Tab” function. As an extension to that familiarity you have probably cursed out Mobile Safari more than a few times for not having the same function. Sure, you can bring up your history and swipe down to the tab you just closed, and hope like hell you didn’t open it three days ago because now it is about 1,437 items down the list, and … stop. Just stop. Calm down. Mobile Safari does have a “reopen closed tabs” function; you just haven’t found it yet.
Let’s do some finding.
Life, as the kids say, is good. You’re welcome.
You may be aware that the latest generation of Apple TV went on sale yesterday. You may also be aware that the new box features some absolutely eye-popping screen savers – slow-motion hi-def flyovers of locations from around the globe, tuned to your current time of day.
What you might not be particularly aware of is the work of an exceptionally talented Swift programmer named John Coates who has crafted an OS X screensaver that brings these exact same flyovers to your computer desktop. Aerial is free, completely open source, and ready for your downloading pleasure right now. If you have one of the new 4K iMacs, this will blow your mind. If you have any other machine, well, it will still blow your mind, just not as much.
Those 4K iMacs are the bomb.
A couple of notes:
This is written in Swift, so you have to be running at least OS X Mavericks to enjoy it.
It is truly open source so you can use it to learn a little bit about Swift, or – if you are already a Swift guru – you can help contribute to or collaborate on the project.
If you aren’t familiar with GitHub and the downloading and building process here is an easy shortcut: Scroll down on John’s page to the section headed “Download” and then click on the link where it says “Download from GitHub”. Then just unzip the downloaded file, double-click on the file called “Aerial.saver” and allow OS X to install it. After that you can use it like any other OS X screen saver.
Finally, if you are planning on selecting only a few of the choices and would like to see a large (and gorgeous!) preview of all of the different locations and times, head over to Benjamin Mayo’s page for a complete set of views and browse away.
Well, well. As mentioned here last week, Apple is hosting a September media event to launch a new crop of phones, along with the somewhat-delayed reboot of the Apple TV box and the official releases of iOS 9, OS X “El Capitan” and the beginning of the end of Apple Watch tethering with Watch OS 2.0. The date and location were made both public and official yesterday via the standard round of colourful email invitations. What’s not standard, however, is the semi-interactive nature of the invite. The theme this time around is “Hey Siri, give us a hint” and if you do indeed ask Siri for a hint you will get … no, that would be telling. Why don’t you ask her yourself?
Better yet, ask her a bunch of times. She’s at her coquettish best on this one. Will the answers change as we get closer to September 9th? Only one way to find out …
By anyone’s estimate, Apple Pay has been a huge success in the U.S.A. Apple’s timing in launching the service was exceptionally fortuitous … while the company touted “ease of use” as the prime selling point, the fact that numerous retailers recently proved that they can’t be trusted with your credit card data is really what put the service on the map in a hurry. Apple still downplays the value of keeping both your personal information and your card number secret from retailers – they do need to keep on good terms with said retailers to roll out the service – but it is undeniable that this is the main reason for the service becoming the single largest electronic payment method in less than a year.
Until now, however, Canada has been left out. The main sticking point was the fact that Canadians love to use debit, not credit, as their point of sale payment option. Down below the 49th, people whip out the Visa or Mastercard to pay for small day-to-day purchases. Canadians? We go for the debit card. Using a secure token for debit purchases hasn’t been as easy to integrate as with credit card accounts, and Apple had no appetite to launch the service here without including the most popular form of payment.
Time to catch up. Apple is now planning to roll out the service across Canada in November, with complete debit card integration. They are working with all six of the largest banks and it will be interesting to see if they manage to launch with all six at one time. It will also be interesting to see how hard they push the “keep your information safe from retailers” angle to security-minded Canadian consumers at the expense of possible retailer relationships. Stay tuned.
Did you read Verne’s classic when you were a kid? Imagined walking through those prehistoric jungles, seeing the first glimpses of battling dinosaurs and man-eating plants? It was cool when you were a kid … but like most sci-fi, especially period sci-fi, it comes off as pretty hokey when you get older and realize that there isn’t very much worth seeing under the surface of the planet.
Or is there?
One way to find out: The BBC’s excellent interactive web feature that lets you delve down to the very core of the planet. They did a bang-up job on this – take a few minutes today and take a look.
What? Yes, Yahoo. That Yahoo. Still in business and everything. Shocking, I know.
Ahem. I was skipping through the Yahoo blog this morning and they are floating an idea that I think has a some serious legs: On-demand one-shot passwords. You set up your account to take advantage of the feature, and instead of using your regular permanent password you can hit a button that will send a single-use disposable password to your verified mobile device.
While the blog post makes it sound like this is a panacea for those people who constantly forget their passwords – I’m looking at you, mom – it is actually a brilliant idea from a security standpoint. We have all heard the horror stories about hotel and airport wireless networks that are compromised with assorted chunks of malware that fish for user credentials when connected users connect back to their personal email or VPN accounts … and if professionally-administered networks can be easily infiltrated, it’s a pretty safe bet that the WiFi at your local coffee shop or library branch is packing some hidden nasties too.
This process is a simple and foolproof way to protect yourself – it doesn’t matter if the bad guys get your password, because it only works once. They can knock themselves out trying it all day long, and get nothing but air for their troubles.
I haven’t been able to try this yet, because the rollout is currently limited to users with a U.S. phone number. If you happen to live in the states and have a few minutes to try this out, follow the link to give it a shot and let me know how you get on. If it works as advertised, this is something I would love to see become widespread across the industry in a hurry. Credential theft is by far the biggest business in the world of cybercrime … being able to protect yourself in one easy step has the potential to be a game-changer.