loader from loading.io

Welcome! Windows Bug in Storage Spaces plus more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Technology News Commentator

Release Date: 07/25/2020

The Truth Unveiled: Debunking the Top 10 Myths about Digital Data Security show art The Truth Unveiled: Debunking the Top 10 Myths about Digital Data Security

Craig Peterson - America's Leading Technology News Commentator

In this eye-opening podcast episode, we dive into the world of online safety and debunk the top myths that surround it. Join us as we separate fact from fiction and provide practical tips to enhance digital security. Key Points Discussed: The Role of Antivirus Software: Separating Fact from Fiction Discover why antivirus software isn't always necessary, as we delve into the capabilities of Windows Defender and its ability to provide adequate protection. Moving Beyond Caution: Preventing Hacking and Breaches Understand why being cautious alone isn't enough to prevent hacking and learn...

info_outline
Defend Your Digital Kingdom: The Most Powerful PC Protection Tools show art Defend Your Digital Kingdom: The Most Powerful PC Protection Tools

Craig Peterson - America's Leading Technology News Commentator

Are you tired of browsing through endless options for anti-virus software? We've got you covered! In this episode, we're diving into the world of PC protection and revealing our top recommendations to keep your system safe from malware and viruses. Our first choice, and top pick, is Windows Defender. Not only does it offer exceptional protection against threats, but it comes at an unbeatable price—free! Enable it effortlessly and enjoy the peace of mind you get from knowing your system is safeguarded. Plus, lifetime updates and support are included at no additional cost. It's a win-win! If...

info_outline
Social Engineering Attacks: Don't Let Cybercriminals Trick You into Revealing Sensitive Information show art Social Engineering Attacks: Don't Let Cybercriminals Trick You into Revealing Sensitive Information

Craig Peterson - America's Leading Technology News Commentator

Are you aware of the invisible threat of social engineering that can compromise your personal and professional security? Cybercriminals are using cunning manipulations to exploit human vulnerabilities and gain access to sensitive information. But don't worry; there are practical ways to protect yourself from these attacks. We have published a must-read article that provides invaluable insights and guidance on how to avoid social engineering attacks. From phishing scams to physical impersonation, the article delves into the inner workings of these attacks and offers concrete strategies to...

info_outline
The Hand That Protects: How Privacy-Focused Search Engines Are Revolutionizing the Way We Surf the Web show art The Hand That Protects: How Privacy-Focused Search Engines Are Revolutionizing the Way We Surf the Web

Craig Peterson - America's Leading Technology News Commentator

Do you ever feel like someone is watching you as you browse the internet? With so much personal data at stake, it's no wonder that online privacy has become a hot-button issue. Luckily, there's a new player in town: privacy-focused search engines. These search engines are prioritizing user privacy and security by shaking up the online landscape. No longer will your personal information be sold to the highest bidder or your browsing history used against you. With privacy-focused search engines, you can rest easy knowing that your online activities are shielded from prying eyes. But how do they...

info_outline
How Software Makes Everything Vulnerable: Where to Start Protecting Your Network show art How Software Makes Everything Vulnerable: Where to Start Protecting Your Network

Craig Peterson - America's Leading Technology News Commentator

In this episode, we will discuss zero-day vulnerabilities and how they can affect everyone. A zero-day vulnerability is an exploit that has been discovered but not yet fixed by a software vendor. It's essentially a security hole in software that hasn't been patched yet. These vulnerabilities can range from minor to critical, depending on how long the vendor can patch them. These are so dangerous because hackers can take advantage of them before they're patched. They can use these vulnerabilities to infect your computer with malware or ransomware, steal your data, or even take control of your...

info_outline
Exposing the Dark Side of Windows Updates: What You Need to Know Now!  🔍💻🚨 show art Exposing the Dark Side of Windows Updates: What You Need to Know Now! 🔍💻🚨

Craig Peterson - America's Leading Technology News Commentator

In today's fast-paced, technology-driven world, it is crucial for computer users to stay informed about the latest updates and security measures for their systems. For Windows users, automatic updates are a common method of ensuring their devices remain up-to-date and protected against various threats. While these updates are essential for maintaining a secure and smoothly operating system, they can also introduce unexpected problems, such as data loss, system instability, and other unwelcome changes. This podcast aims to shed light on the hidden dangers of automatic Windows updates and...

info_outline
Patch to the Future: The Ultimate Guide to Firewall and IoT Device Security show art Patch to the Future: The Ultimate Guide to Firewall and IoT Device Security

Craig Peterson - America's Leading Technology News Commentator

Which patches are critical? When do they really need to be applied? That’s where our new PatchAware™ features come in. We’re monitoring the thousands of patches that are issued every week, and will tell you which patches are the most critical to install right now. This week’s tip, 9 years after it was discovered, is the “Heartbleed” bug. It is still one of the most significant threats to online security. It gives the bad guys access to sensitive information from affected systems.  This article highlights the importance of upgrading software and keeping it up-to-date with...

info_outline
Learn how to protect yourself online - featuring tips on haveibeenpwned, AI demos and 2FA/MFA authentication. show art Learn how to protect yourself online - featuring tips on haveibeenpwned, AI demos and 2FA/MFA authentication.

Craig Peterson - America's Leading Technology News Commentator

First up, I have some sobering news. Almost all of our personal information has likely been stolen at one point or another. This could include our names, addresses, phone numbers, email addresses, and even passwords. Cybercriminals are constantly searching for vulnerabilities in systems where this information is stored, and unfortunately, they often find them. However, there are steps we can take to protect ourselves. One tool that can help is called "haveibeenpwned." It's a website where you can check if your email address has been compromised in any data breaches. If it has been compromised,...

info_outline
The Truth About ChatGPT and A.I. - Discover the Secrets of Internet Anonymity and Protect Your Privacy show art The Truth About ChatGPT and A.I. - Discover the Secrets of Internet Anonymity and Protect Your Privacy

Craig Peterson - America's Leading Technology News Commentator

Welcome to this week's episode of The AI Revolution! In this episode, join us as we explore the world of Artificial Intelligence and its potential to revolutionize business and life. We'll discuss how to use AI for free, what it can do well, and when and where you should never use it. We'll also talk about how to generate emails, blog posts, and content for Facebook, Twitter, LinkedIn, Instagram, and YouTube live! Tune in now to learn more about how AI is transforming the world. Discover the Secrets of Internet Anonymity and Protect Your Privacy The best way to protect yourself from...

info_outline
Protect Your Business and Home from the Most Dangerous Cyber Threats - Uncover the Risks and Steps You Can Take to Stay Secure show art Protect Your Business and Home from the Most Dangerous Cyber Threats - Uncover the Risks and Steps You Can Take to Stay Secure

Craig Peterson - America's Leading Technology News Commentator

Cyber security is no longer an option for small business owners – it's a necessity. Cyber threats are rising, and small businesses must stay ahead of the curve to protect their data and networks from malicious actors. This show will uncover the most dangerous cyber threats to small businesses and what steps you can take to stay secure. Ransomware Attacks Ransomware attacks are one of the most dangerous cyber threats to small businesses. Ransomware is malicious software (malware) that's typically delivered via malicious links or email attachments. Once installed on a network, the...

info_outline
 
More Episodes

Welcome!

Craig discusses something new - a Bug in Windows -- just kidding. Well, they seem to always have bugs this time it is in Storage Spaces. 

For more tech tips, news, and updates visit - CraigPeterson.com

---

Read More:

Iranian Spies Accidentally Leaked Videos of Themselves Hacking

Twitter breach exposes one of tech's biggest threats: Its own employees

Cybercriminals Turning Bullies; Ransomware the Latest Weapon of Torture

FBI Issues Cybersecurity Warning to Air Travelers

New wave of attacks aiming to rope home routers into IoT botnets

The Streaming Wars: A Cybercriminal’s Perspective

Emotet spam trojan surges back to life after 5 months of silence

Apple's Next MacBook Could Solve the Worst Thing About Working Remotely

---

Automated Machine-Generated Transcript:

Welcome!

Craig discusses collaboration tools for business and reviews his favorite - WebEx Teams

For more tech tips, news, and updates visit - CraigPeterson.com

---

Read More:

Iranian Spies Accidentally Leaked Videos of Themselves Hacking

Twitter breach exposes one of tech's biggest threats: Its own employees

Cybercriminals Turning Bullies; Ransomware the Latest Weapon of Torture

FBI Issues Cybersecurity Warning to Air Travelers

New wave of attacks aiming to rope home routers into IoT botnets

The Streaming Wars: A Cybercriminal’s Perspective

Emotet spam trojan surges back to life after 5 months of silence

Apple's Next MacBook Could Solve the Worst Thing About Working Remotely

---

Automated Machine-Generated Transcript:

[00:00:00] This is probably one of the most requested shows ever. We're going to talk about online collaboration. We'll the stuff that's needed, absolutely needed for working from home. So stick around for the whole show. We got a lot to talk about.

Of course, you're listening to Craig Peterson. I am so glad you're here. Online Craig peterson.com. In fact, that's where I've been getting a lot of feedback from you guys. I want to thank everybody that sent me a note, talking about the types of things you want to learn more about. Today that's precisely what we will be talking about.

We're going to go through the top online collaboration tools that are out there. We'll be talking about WebEx, which is by far my most favorite. It's what we use because of the security, the flexibility. But we're going to get into that. We're going to talk about Zoom and that's what we used for my daughter's wedding couple of weeks ago.

[00:01:00] Why would we use that? What it's so insecure. We're going to get into zoom's biggest features. Microsoft Teams is a fairly new player on the block, but we're going to talk about them and the pros and cons.

Then the granddaddy of them all. We're going to be talking about, Gotomeeting. They've been around a very long time. They have pros, they have cons. We're going to be talking about that as well.

We have a number of articles to get to in this week's news. But we'll see just how far we can get with some of those things. But there are two things we have to get to right now at the top of the show. And one of them is about the latest windows 10 upgrade that they came up with.

Now, the May updates are starting to roll out, in a little bit better speed. Now, if you can believe it here we are the middle of June and the Windows 10th of May. It's starting to roll out to everybody because of all of the problems.  Unfortunately, that's the big problem we're seeing right now with windows 10, version 2004.

[00:02:00] Now, if you have a computer, one of the best things you can do for that computer to. protect your data from a crash, not from the bad guys, but from a crash is to have something called RAID, which stands for redundant array of inexpensive disks. The idea here behind raid is that you can have more multiple disc drives and it will store the data on those multiple disc drives, but it stores it in such a way that if a block goes bad on one of those drives, it can pull that block from another drive because essentially it keeps two copies of all of the data, technically. It's not really two copies, but we don't need to get into that right now.

[00:03:00] So if you lose a whole desk or you lose a part of a desk, even as small as one block, hopefully, it can be recovered. Now there are a lot of different types of raid out there. Many of them are done in hardware and can provide you with some really great defense. Those are the ones I've been using for probably about 30 years now.

Now with my customers, but there's something else that I've been using for almost as long ever since it came out, it was developed by Sun Microsystems and it's a file system called ZFS. Now. It's absolutely amazing. It is continually, every time you read that disc, it is checking the checksums, see if anything might be wrong with it, if there's anything wrong with it, it recovers that block because there's something known as bitrot when we're talking about computers and discs and even memory, frankly, but particularly with disks.

[00:04:00] That is over time mathematically, we can figure out how much of that data you haven't changed that is stored there, the emails, but more importantly, things like your accounting files, et cetera. How just individual bits can decay, literally decay, because remember they're magnetic, remember they're on magnetic media. Nowadays that magnetic media is usually on a piece of glass.

That's sitting inside that disc drive decays, the problem is that the numbers change. So you can have something that says a million dollars and because of bit rot, it changes too. Again, good change to zero, right? because just one bit flips from a one to a zero. That's all it takes. You could lose data storage because a bit flips inside your directory structure. You can lose bits on the disks at any time and they do decay over time.

[00:05:00] I remember there's a French aerospace manufacturer who we put a proposal to, and I did all of the math. I showed all of the research or some great Ph.D. research that I had found that showed how over time, regular raid devices are not going to help them with longterm retention of the data. They made parts for airplane engines and they had to keep all of the data, all of the scans, the X rays, everything they did, they had to keep it for decades. As long as that blade that was in that turbofan for that engine for a plane, as long as that blade was out there in the field, in use, they had to keep all of the original data.

 I showed them all of the studies, cause I knew what they were looking at. They were looking at just standard grade stuff, Hitachi data systems and some others and, pretty high end, very expensive hardware.

[00:06:00] I showed how they, it was impossible for them to keep that data longterm. If they put it into a normal raid system. I proposed, this was some years back, but I proposed a system, where there multiple machines, and each machine had what was called the ZFS, which is a Zelda file system on it. Then on top of all of those machines was another distributed file system and I showed how they would not ever lose any data for decades and decades.

Now they'd have to replace just drives as they went bad and we have the system set up, so it would inform them about a bad drive so they could replace it. They could actually lose three drives with an each one of these data set handlers, just a fantastic system. It is the type of system we've been using for our clients forever, because nowadays just under the federal rules of civil procedure that every business has to follow you have to have plans in place to keep things like the purchase orders, the bills you send out, even emails have to be retained longterm. IRS and others require you to have retention policies in place and to keep that data and you can't do that with raid for longterm.

[00:07:00] I brought all of this up because of what Microsoft is doing right now with windows 10, version 2004. Microsoft introduced something that is patterned after this ZFS that I talked about and ZFS is just phenomenal.

I typically use the Z-two or Z-three, for those of you that are really technical and know what that means, in order to help keep the data safe. And then. Of course, I encrypt it all push it up into cloud storage, which also has raid, but guaranteed, the data will never be lost. So Microsoft said all this is just wonderful. They came up with their own version. Apple came up with a version as well. They started to use ZFS. Then when Sun Microsystems went under basically their technology was acquired, and this particular ZFS technology, I think Oracle that managed to glom onto it.

[00:08:00] There wouldn't be licensing issues. Apple said, okay, we got to do our own thing. So Apple has some very cool advanced file system that is on the SSDs that are in so many of our machines today. So there's a lot of cool stuff.

Microsoft has storage spaces. Now I don't trust it. I never trusted it. I always use ZFS even in the Linux world where they've come up with their own version of the software. That's patterned after ZFS. ZFS has just been around for so long and is just so stable, that's what I use. Cause it's available. Really everything out there. But this particular thing I'm talking about storage spaces, a feature on Windows and Windows server, and it supports systems with multiple drives and lots of users put those drives together into bundles and create a pool of storage that you can then use to store your stuff.

[00:09:00] The idea is if a disc goes bad, just like raid, just like ZFS if a disc goes bad you can recover. Now, one of the beauties of the systems we've designed for our clients over the years on ZFS and you can do this yourself, if you're a little bit more advanced is, as I said. You can guarantee the data never goes bad because every time it's read, it is checked.

Now, if you're using hardware raid or some of these other storage systems that combined disks, it's rare that it's ever checked. Ever checked.

So you can check to make sure that raid array is working properly, but you cannot check that the data in that array has not been damaged. Maybe it was damaged by the raid controller itself, or the disc drive or the cashing function on the disc drive, or it lost the power at the exact wrong time. Now you lost even more of that data.

[00:10:00] Microsoft has come to yet, a new low. Should we call it a new low? Why not? Okay. A new low.  It turns out that their storage spaces software that's designed to keep your data safe. Apparently can mess up all of your data. How's that for fun?

And that's particularly from windows 10, version 2004, Microsoft apparently didn't bother testing it or at least testing it thoroughly enough. According to these articles, I'm seeing online, like right now, I'm looking at one from ZDNet. It's saying, when using some configurations partitioned first storage spaces might show as raw in disk manager. Microsoft has advised against running the check disk command on any device affected by this issue because fixing your desk is going to make things even worse.

[00:11:00] Oh my gosh. So if you're using storage spaces wise up, get something better.  Secondly, don't upgrade yet. It's just the May release. It's not out there yet.

Anyway, stick around guys. We'll be right back. You're listening to Craig Peterson and we've got a whole lot more coming up and yes, we're going to get to collaboration. I guarantee.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553