Technology Corner
WTVN Radio • Columbus, Ohio • Sunday morning from 8 until 9
HomePrevious page
Who's in the corner?

Is this information useful? If so, consider
making a contribution, please.

If you use pop-up blocking software, this site will not work properly.
 
Sunday, July 7, 2002

Random thought:

Dividing line

Recording your own DVDs

DVD is seen as an excellent format for backing up computer data because of the huge amount of space available on the disc. It can also be used to record and play home videos, record and play over-the-air television programs, and to record and play extended amounts of music.

The trouble is that too many formats exist. There's DVD-ROM, DVD-RAM, DVD-RW, DVD+RW, DVD-R and maybe a couple of others. In general, these are not compatible but new DVD recorders and players called DVD Multi are coming to market. These devices will play most existing formats and will record discs.

Saving your home videos

If you have any color photographs from the 1960s, they're probably faded by now. Early color photography processes were none too stable and the result is images that now have serious color shifts. If you're old enough, you might have some 16mm home movies around the house. Have you played them lately? Even if you could find a 16mm projector, you might discover that the film is too brittle to use. Do you have color slides? Their colors may have shifted, too, and the projector is probably in the attic somewhere. What about 8mm movies? They're probably still in good shape even if you can't find the projector.

And what about video tapes? Maybe you've filled up lots of VHS and 8mm video tapes and maybe you think those tapes are permanent -- or at least more permanent than film. Sorry, but no. Magnetic tapes deteriorate. They can become unreliable in as little as 10 to 15 years -- even if you still have a player.

Within the next few years, VHS players will become relics. Likewise High 8 and even digital 8 tape. Set-top recorders will have hard disks in them or they will record to DVD (write once and rewritable formats) instead of to tape. Video cameras will use DVD discs instead of tape.

That's just one reason why a lot of people have been hoping for a way to convert their existing magnetic-tape images to DVD. DVDs aren't permanent, either, but they do offer an expected life of at least 20 to 50 years, by which time some other format will have come along.

Until now, it was virtually impossible to create a reliable DVD at home, though. There were too many incompatible formats and too little software. That has just ceased to be the case.

Home, Home on the DVD

DVD is an initialism for "digital versatile disc" but for people who have wanted to make their own DVDs, it might as well have stood for "darn vexing disaster". Manufacturers came up with DVD ROM, DVD RAM, DVD+RW, DVD-RW, and DVD-R. There may have been others. They weren't compatible. They still aren't compatible, but at least there are now devices that play most of the formats.

Watch for DVD Multi players and recorders. You can find some on the market now and more will follow from virtually every manufacturer. Expect to pay about $400 for a computer-based drive that will play and record DVDs and CDs and around $700 for set-top boxes. The DVD Multi player for your TV will cost more because it will include circuitry not required by computer-based units.

Your new video world will make it possible to do all the things people have waned to do for years. Foremost among those is editing. How many times have you wished for a way to remove bad video from your tapes? Maybe you forgot to turn off the camera and you have 10 minutes of floor pictures between a wedding and the reception. With VHS or Hi8, all you can do is record from one tape to another and hope that you get a reasonably accurate cut. And you have to hope that the quality isn't degraded too much, either.

Digital editing opens up new possibilities. The image isn't degraded by being copied because it's digital and you can select precise in and out points. But that's not all. Now, depending on the software, you can use dozens or hundreds of transition effects -- from basic cuts and wipes to slides and dives that use geometric shapes.

When you're finished editing the video on your computer, you burn a DVD or maybe a lot of DVDs that you can then use to share your videos.

You may be wondering ...

How do I get analog video into the computer? It's easier than you think. Adaptec is one of several companies that have introduced analog to digital converters for video. The Adaptec device comes in 3 configurations: a low-end device that will work with even modest computers and two models for the person who wants the best possible video. One requires an expansion slot (so you have to open the computer) and the other connects via USB so you don't have to open the case. If you don't have USB 2.0 ports, you'll be disappointed with the results, though.

Aren't DVD blank disks expensive? Yes, but not as expensive as they used to be. You can easily find DVD blanks for $2 (write once), which is down from the earlier $20 cost. If you're concerned about the cost, remember that you can record a "video CD" to share images and that a video CD will play in a standard DVD recorder. Video CDs hold a 15-minute video, which is enough to share vacation highlights and such.

Tony Jasonowski works for Panasonic, but he's also the head of the Recordable DVD Council. I spoke with him about the new technologies that are just coming to market ...
Tony Jasonowski (Real Audio) 4:36 q-as well as the consumer side.

Using your computer when you're not there

Being able to use a computer when you're not in the same room with the computer isn't difficult, but it can be expensive if you're in another state or another country. It was possible, but only if your computer had a modem and you were at a computer that could dial in to the home or office computer you wanted to reach. If that computer was on a LAN in a business office, forget it!

Expert City has just launched GoToMyPC.com, a service that allowed me to log on to my home computer while I was in New York City for PC Expo. Before leaving, I'd installed the GoToMyPC software on my home computer and I'd set up a password on that computer. I'd also created an account at GoToMyPC.com with a user ID and a strong password.

My home computer, when it's on, checks in with GoToMyPC so that the service knows my home computer is awake. When I want to use a program on that computer or transfer a file, I log on to GoToMyPC, choose the PC I want to connect to (you can have more than one), and then give the remote computer my password.

Because of the way this works, it will function even if the "host" computer is behind a firewall. It seems to me that the way it operates doesn't compromise system security, but that determination will need to be made by somebody with more networking and firewall smarts than I have.

I do know that it works well and that I like it. For more information, I spoke with Expert City's
Laura McCormick (Real Audio) 1:48 q-corporations and small businesses.

Nerdly News

Keeping your computer secure

Yes, this means HOME USERS, too!

This edition of Technology Corner airs as the Independence Day holiday is ending. The US government warns us to be on the defensive as we celebrate the nation's most patriotic holiday. Computer systems and the Internet are at risk and John Broome, chief technology officer at ServerVault Corporation, has some suggestions for anyone who has an on-line computer.

Last year, there were over 90 million hacking incidents in the United States, according to the US Defense Department. While the vast majority of these were unsuccessful, many caused costly problems for companies, government agencies and individuals. Some sources indicate that up to 40 percent of co-located servers have been breached. On average it takes less than five hours for a server to be compromised if it is attached to the Internet without proper security systems in place.

"It is surprising how many networks have overlooked the most basic safeguards," says Broome, who oversees critical infrastructure, facilities and network engineering at ServerVault. His opinions carry a great deal of weight because he has designed and implemented secure, high-availability network solutions for the highest levels of the US Department of Defense. He gained notoriety in 1999 when he remedied problems exposed by a hacker into the high-profile Pentagon Internet.

Broome's basic recommendations to minimize the danger

Employ strong passwords. As simple as this sounds, it is one of the most overlooked methods of keeping systems safe. There are a number of freely available tools that 'guess' passwords -- a very common technique referred to as 'brute force cracking.' These programs work by repeatedly attempting to log in as a known user and supplying different passwords until successful. Many of these cracking algorithms are very sophisticated and supply the most commonly used passwords first, then start going through dictionary words. Passwords should always be in mixed case and contain at least one number and one special character.

Disable unnecessary applications and services. Malicious users often gain access to systems at unexpected entry points. One common technique is to scan a system for all active applications or ports and use vulnerable applications as an entry point. These applications may not be necessary to the system's operation. In order to minimize the threat against any system, a prudent user should disable all unnecessary applications or services.

Keep software up to date. This is important on all systems. As malicious users discover vulnerabilities in different operating system components or applications, software vendors release patches to these components which mitigate or eliminate these threats. All systems should be regularly updated with vendor patches in order to maintain security. There are a number of services that offer continual update alerts via email.

Beware of e-mail attachments. This is one of the most common methods of causing damage. Many email applications today allow for the execution of code in email attachments. Many 'worms' have been released in this manner over the past few years, with effects ranging from relatively harmless propagation of the worm to massive file damage. Users should disable features of their mail application that allow for indiscriminate execution of active code attachments and use a reliable virus scanner that understands email attachments.

Engage antivirus software. This software has the ability to scan files on a local computer and, in some cases, to monitor inbound and outbound traffic from applications such as email attachments. This software requires constant updating in order to be effective, and the best applications will automatically download updated virus definition files at predetermined intervals.

Maintain proper browser security settings. Today's dynamic Web sites offer rich web experiences, but they have also introduced vulnerabilities. Modern Internet browsers allow the capability to download active programs to local computers for local execution. With improper security settings applied to the local computer browser, some of this code has the potential to investigate or alter the local computer system -- without the knowledge of the user. Users should adopt the most stringent browser security policy possible on their browsers and be wary of visiting some Internet Web sites.

Build strong firewalls. A good firewall system can protect networks from many of the above vulnerabilities -- even when the other best practices are not followed. Firewalls now exist for personal or single-system use as well as the traditional network appliance. These personal firewalls provide a great deal of protection for mobile users or users who do not operate their systems behind an adequate corporate firewall system.

Weigh the importance of convenience vs. security. There are always compromises made among functionality, convenience and security. It is important to find the right balance and the right technologies to meet the overall goal. Let users get the job done in the most convenient way possible while still implementing strong and effective security practices. Educate all users to the threat of cyberattack, and establish minimum requirements for your organization. Regularly audit security practices and periodically release security awareness statements to keep users aware of the constant threat.

Enact and enforce strong policy. Staff members with access to or control over critical information should undergo rigorous background checks and should comply with strong security policy. Verifying users via strong authentication practices and making sure that all activity is logged are keys to prevention and accurate forensics in the event of an attack.

Identify most critical information and host it in the safest possible manner. Not every database or server needs the ultimate level of security. Evaluate the consequences of a breach on a system-by-system basis. Consider outsourcing your most critical systems to a trusted third-party secure hosting company. When considering this option look at network security, physical security and policy security. All three components should be the best of breed to ensure ultimate protection.

Screen savers: Not necessary, but fun

You already know that screen savers aren't necessary and haven't been for 10 years or more. Today's color screens don't suffer the "burn in" that was a problem with early monochrome monitors. Because they consume system resources and can make the system less stable, many purists eschew screen savers.

But ... if you like screen savers Lycos has a collection of Independence Day screen savers. To take a look, hop over to http://shareware.lycos.com/themes/savers/independ.shtml and download your favorites.

Let us know what you think about this program! Write to:
Bill Blinn --
(wtvn@blinn.com still works)
Joe Bradley --

Photo of Joe by Sally
Joe
(Photo by Sally)
Photo of Bill by Scampi
Bill
(Photo by Scampi)
TechByter Update weekly by e-mail:  
Enter your email to join Tech Corner today.
Hosted By Your Mailing List Provider

Privacy Guarantee:

I HATE SPAM and will not sell, rent, loan, auction, trade, or do anything else with your e-mail address. Period.

 

This is the only ad you'll ever see on this site. It's for my website host, BlueHost in Orem, Utah. Over the past several years, they have proven to be honest, reliable, and progressive. If you need to host a website, please click the banner below to see what BlueHost has to offer.

TechByter Worldwide receives a small advertising payment for each new client that signs up with BlueHost but I would make the same recommendation even if the affiliate program didn't exist. (If you don't see a banner ad above and you would like to know more, this link takes you to BlueHost.)

As if you didn't already get enough weather on the radio!
Click for Port Columbus International, Ohio Forecast
If you do not see a Weather Underground banner above and you use ad-blocking software, please set your application to allow images from "www.wunderground.com" to appear.

Annoying legal disclaimer
My attorney says I really need to say this: The Technology Corner website is for informational purposes only. Neither Joe nor I assume any responsibility for its accuracy, although we do our best. The information is subject to change without notice. Any actions you take based on information from the radio program or from this website are entirely at your own risk. Products and services are mentioned for informational purposes only and their various trademarks and service marks are the property of their respective owners. Technology Corner cannot provide technical support for products or services mentioned on the air or on the website.

 

[an error occurred while processing this directive]