582 Followers
227 Following
2.2K Posts

Sole proprietor, FIFO Networks
Cybersecurity - Networks - Wireless – Telecom - VoIP
Most of my money comes from contract work for public utilities around the country, but I also provide remote tech support to small business and SOHO clients, mainly (but not exclusively) in the USA.

I do a fair amount of custom work for people when a loved one dies: unlocking computers, data recovery, and account recovery (Advice: keep paying their cell phone bill until you've got all their data back).

Also, personal cybersecurity for journalists, TV reporters, politicians down to the City Council level, and political candidates. TV stations: contact me for contract pricing for your entire news team.

Use https://fifonetworks.com/contact-us/ for questions or to schedule service. It's just me. You'll be communicating directly with me.

Licensed and Insured.

LinkedInhttps://www.linkedin.com/in/fifonetworks/
Software Developer's Code of Ethicshttps://fifonetworks.com/software-developers-code-of-ethics/

This post isn’t about what you think it is, so take a moment to read the POST, not just the PICTURE, before replying.

The picture of trikcode’s post says, literally, quoted with it’s bad grammar and syntax unmodified:

“the generation that refused to accept cookies.

is now giving AI access to their desktops, files, and bank accounts.”

This post isn’t about AI.
This post isn’t about privacy.
This post isn’t about incorrect grammar and syntax.

So, what am I posting about?

The evolution of language. And how we must embrace it.

The grammar, syntax, spelling, and even the alphabet, of American English in the 1700’s doesn’t apply today. We don’t even write the letter “s” the same way our predecessors did. (Refer to the closeup picture of the Declaration of Independence).

Dictionaries list some words as “archaic” or “obsolete.” And new words are added to the dictionary because they become common and are well-understood.

Capitalization has changed over the centuries. In fact, there was a time when there weren’t upper-case and lower-case letters; there were just letters.

In the early days of the Internet, and in the early days of text messaging (these two time periods are not identical, BTW), I was dismissive of incorrect grammar, newly developed acronyms, lack of punctuation, and so forth.

But. Today. We can now see that these changes are consistent with long-understood and well-articulated principles of language development and morphology.

Such changes don’t happen overnight. Changes to language often occur first in slang and common usage before being accepted into business or formal communications. Also, changes in spoken language and changes in written language occur on two different tracks, and don’t always mirror each other.

In addition to linguistic changes in online written communications, I must at least briefly mention changes to verbal, oral communications that are simultaneously occurring because of the globalization of the English language. For example, in the USA, we traditionally put adjectives before nouns. We say, “cold water,” whereas in many other languages, the noun comes before the adjective. In Spanish, we say, “agua fría,” which in direct English translation would be “water cold.” We’re also not used to hearing the verb at the end of the sentence, unless we’re watching Yoda in Star Wars (“Try you must”), or hearing the verb at the beginning of the sentence unless we’re watching Mr. Miyagi in Karate Kid (“Is no defense”).

It is now common to read technical papers written in English by subject matter experts whose first language is not English. These articles, white papers, technical manuals, textbooks, and blogs contain sentence structures that sound odd to people who have grown up knowing only one language, and yet – AND YET – we completely understand the meaning of the “strangely organized” words.

Now we come to my point.

It is no longer appropriate to criticize differences in written or spoken language, unless it fails to communicate.

Languages evolve, in every way: alphabet, grammar, syntax, words, spelling.

If someone expresses an idea, and you understand the idea, their communication is perfect.

And if you don’t understand what they’re trying to communicate, don’t be too quick to judge. The problem may be on your end.

A company just asked for a brief statement of qualifications for a project with disaster recovery planning and a new off-prem backup system. I don't spend a lot of time creating slick marketing pieces. I answer the questions. This is what I sent:
------------
<name redacted>,

Thank you so much for inquiring about my services for Disaster Recovery planning and off-premise data backup system design. You asked for a brief summary of my experience and qualifications for the project.

• Formerly I was the Technical Director of two companies where I designed and built nationwide (USA) satellite-controlled communications systems. One of those companies had over 50,000 subscribers, and the other company had just under 100,000 subscribers. I designed, built, and managed the system with redundancy to achieve “five 9s” reliability, which means no more than about 5 minutes of downtime per year.
• Next, I was Director of National System Development for Cellular One, where we also had a demonstrated interest in maintaining reliable systems in adverse weather conditions with minimal downtime, and no loss of data.
• I taught cellular systems, information technology, and cybersecurity classes at three colleges for a total of 17 years.
• I still teach cybersecurity and information technology under private contract with public utilities. For example, most recently I taught a cybersecurity class to the engineers at <company name redacted>. This July, I’ll be teaching a week-long class in Windows Server Management.
• I have helped companies develop their Disaster Recovery and Incident Response plans in accordance with US laws in various industries, including construction companies and accounting firms.

Thank you again for your inquiry.
---------------

The value of this simple approach is this: I don't chase clients. I work with clients who want me. From long experience, I can tell you that this simple approach saves you so much grief. It makes your work fun.

#CallMeIfYouNeedMe #FIFONetworks

Cybersecurity - Networks - Wireless – Telecom – VoIP

This spammer has brass balls. I almost admire them for their... honesty?

Screenshot of an email to me from a fake cloud storage operator telling me that my account storage is full. I opened the header information, and it is from "support at spam 8888 dot com."

Last Thursday I was doing a remote tech support call for an elderly gentleman and his wife in Macon, Georgia (I’m in Seattle). He said, “The printer is in another room, and I want to check the status to see if my document is done printing. It takes a lot of steps. Is there an easy way to see when the printer is done?”

SOLUTION
I put a shortcut to the printer queue on his Windows desktop, which was actually on a laptop. They both liked it, so I put another shortcut on the desktop of her laptop.

HOW TO DO IT
If you’d like a shortcut to open your printer queue, here are the steps. If you have more than one printer, you can make one for each of them.

Step 1: In Printer Properties, copy the name of your printer.

Step 2: On the desktop, Right-Click - New - Shortcut.

Step 3: Where it says, "Type the location of the item," write:
C:\Windows\System32\rundll32.exe printui.dll,PrintUIEntry /o /n "YourPrinterName"
Between the quote marks, replace YourPrinterName with the name of your printer, found in Step 1.

Example:
C:\Windows\System32\rundll32.exe printui.dll,PrintUIEntry /o /n "WF-2930 Series(Network)"

Step 4: Give the shortcut a name and save it.

Step 5: While something is printing, double-click the icon to see the current document queue and status.

#CallMeIfYouNeedMe #FIFONetworks

#TechSupport #RemoteSupport #HelpDesk

Cybersecurity - Networks - Wireless – Telecom – VoIP

This mini-PC (in the yellow circle) was shipped to me from Texas. The owner, a man who lived alone, suffered a major medical event and will never be able to use it again. The person with Power of Attorney sent it to me to crack. I recovered email, a rather insecure password list, information on all utility bills, where banking is done, and so forth. Now the family can proceed with handling the person’s financial affairs.

The mini-PC is even easier to ship than a laptop, because it doesn’t have any lithium battery inside. It uses an external AC adapter.

#CallMeIfYouNeedMe #FIFONetworks

Cybersecurity - Networks - Wireless – Telecom – VoIP

It’s time for company’s to change this website notice to, “You may need to download an application to view PDF documents.”

The Portable Document Format (PDF) was originally a proprietary format, but it has been an open standard for many years now.

I sign Non-Disclosure Agreements (NDAs) with several of my clients. Adobe’s constant pressure to incorporate their automatic cloud storage and artificial intelligence analysis of documents that are read, created, or edited with their software make their products not just a security risk, but a legal risk.

I canceled my Adobe subscription and uninstalled all of their products from every computer I use for work-related tasks. (Full disclosure: my wife still has her Adobe subscription and has no interest in changing products).

Opening a PDF file in a web browser is also a security risk if you have an NDA, since many web browser providers are analyzing displayed content. If you have security obligations to your clients, I recommend disabling the viewing of PDF files in the browser, or, better yet, use a less invasive browser for work-related tasks.

I’m not making any recommendations in this post (or in the comments) for PDF viewers or browsers, because that would create the impression that this is a sales pitch. If anyone recommends something in the comments, that’s fine, just understand that I’m not making an endorsement here.

But back to the original point, in my opening sentence: unless Adobe is paying you to recommend their product on your website, you should drop the reference to Adobe in your PDF notice. It’s an open standard, and recommending a particular product when it’s not a requirement is misleading at best.

#CallMeIfYouNeedMe #FIFONetworks

Cybersecurity - Networks - Wireless – Telecom – VoIP

Are QR codes for restaurant menus safe? Why yes, as a matter of act, they are. And before you start with the “But Bob,” read the whole post.

There’s this concept in cybersecurity called a risk assessment. When the restaurant puts an official, restaurant-sponsored QR code linking to their menu on your table, the risk is very low. Click on the link and pick your favorite food and beverage.

Did someone tape a new QR code over the original QR code? The risk went up. Ask your server if the restaurant changed the QR code. If they did, the risk is back down.

QR codes are a nice benefit in the age of smartphones. They make it much easier to get a complex URL into your browser, and to identify valid concert ticket holders, and many other things.

THE LESSON
Instead of parroting negative rules (“Don’t do this!” “Don’t do that!”), use your skills and do the analysis.

(About the picture: someone on Threads complained about QR codes for restaurant menus. They don’t like them. Fine. Me neither. But then someone posted in the comments, “You should never scan random QR codes this is a huge cybersecurity issue.” And that’s just a gross oversimplification).

This directional antenna is on the roof of a hotel in Springfield, Oregon. It is mounted behind a concrete screen to keep it from being visible from the street. It also ruins the antenna's effectiveness for anything but very short range communication. I can't make this stuff up.

There’s a lot of misleading advertising about residential (consumer grade) VPNs. The purpose of this post is to clarify the difference between IP Masking and Virtual Private Networks.

WHAT IS A VPN?
From the official IETF documentation:
RFC 4026, Paragraph 3.10. Virtual Private Network (VPN)
“VPN is a generic term that covers the use of public or private networks to create groups of users that are separated from other network users and that may communicate among them as if they were on a private network. It is possible to enhance the level of separation (e.g., by end-to-end encryption), but this is outside the scope of IETF VPN working group charters.”

What does that mean in non-technical terms? It has two parts:
1) A VPN is a private link between two endpoints connected to each other over a network that is also used by others.
2) The private link may be encrypted (and often is), but that’s not a requirement to be classified as a VPN. (For those who are trying to wrap their head around the idea of an unencrypted VPN, I’ll give one example without going into any technical explanation: an unencrypted GRE tunnel is a VPN).

WHAT IS IP MASKING?
Refer to the middle picture. IP masking is when you use a relay service to hide the source IP address, or the destination IP address, from interested third parties.

WHAT’S MISLEADING?
Refer to the bottom picture. You don’t need to pay for a VPN service to do safe online purchasing or banking. Every time you see the padlock in your browser, or the “https” prefix on the address, you’re using an encrypted VPN connection.

THE LESSON
Next time you see an ad for residential VPN service, pay attention to the wording. What are they really trying to sell? The privacy of the VPN is automatic with https. All they’re really offering is IP masking. Do you need it? (Some people really do).

#CallMeIfYouNeedMe #FIFONetworks

Cybersecurity - Networks - Wireless – Telecom – VoIP