Create Panoramas with Hugin

Hugin is free open source software for creating panoramas from a series of photos. It is not terribly difficult to use, but you should follow one of the tutorials such as the Lifehacker Hugin tutorial. This explains how to set control points between photos in order for Hugin to know where things line up.

There are downloads for Windows, Mac, and various flavors of Linux. For simplicity, download from the pre-compiled versions.

NY Panorama from Hugin

Windows Phone 7

Surprisingly, Microsoft Announces Cool Phone

While Apple’s iPhone is the leader in smartphones, there is competition from Google’s Android phones, RIM’s Blackberries, and Palm’s Pre. This week’s announcement of Windows Phone 7 Series at the Mobile World Conference in Barcelona should put Microsoft back in the competition.

While Microsoft has made phone software for over 13 years, the phones were never popular outside of business. The phones looked like slimmed down versions of Windows and were clunky. With Windows Phone 7, Microsoft is using the acclaimed user interface from their Zune music players and completely revamping the phones.

Expect to see phones running Windows Phone 7 around November 2010.

Note the first line of this video demo/promo. It says “A different kind of phone…” Reminds me a little of another company with small market share that asked people to “Think Different.”

For more videos, see Microsoft’s YouTube page on Windows Phone 7.

Don’t Use Internet Explorer

Internet ExplorerI used to tell people that the newest Internet Explorer 8 was safe enough. But recent events have changed my mind. The Chinese attacks on Google over Christmas were perpetrated using a vulnerability that exists in all versions of Internet Explorer. Microsoft still hasn’t fixed this.

Because of security concerns, both the German and French governments have officially recommended that people not use Internet Explorer. One could attribute this to the EU’s dislike of Microsoft, but Mircrosoft has a more fundamental problem.

Closed Source

Many people say that Internet Explorer isn’t as safe because it has the largest market share (over 60%). Hackers want to attack the largest market they can. But I think that the real problem is that Internet Explorer is written with closed source code.

Unlike the Gecko engine powering Firefox or the Webkit engine powering Chrome and Safari, Internet Explorer has its own broswer engine that is closed source. This means that people can not look at how it is written. While you might initially think that this makes Internet Explorer more protected, it’s actually the opposite. Open source code can be reviewed and improved by the entire development community. Once a problem is seen, any developer can suggest a solution. The response time of Firefox for fixing exploits is typically days compared to Internet Explorer taking weeks or months.

Other Browsers

The fastest browsers use Webkit as their engine. These include Google’s Chrome and Apple’s Safari browsers.

Mozilla Firefox is slower but remains the current leader among alternative browsers, largely due to its popular add-ons. Google is working on growing out its extensions to compete with Firefox add-ons.

Give one or more of these browsers a try.

12 Tips for Protecting Your Computer from Snoopers

In the DC area especially, there are people who have reason to be concerned about computer espionage, either for work (national or corporate secrets) or personal reasons (divorce or blackmail). Here are 12 tips to guard against intruders snooping on your activities:

  1. Use decent passwords. The easiest way for someone to access your email and other information is if they know or can easily guess your passwords. It is estimated that 1 out of every 9 people use a password on the top 500 worst password list. Most passwords are “cracked” not through problems with the encryption itself, but with the password being poor. Don’t use dictionary words, the names of loved ones, the names of your pets, your birthday, etc.  Longer passwords are better so government institutions often require at least 10-14 characters. Passwords should be random and use letters, numbers, and special characters.
  2. Use different passwords for different things. If someone sees your computer login password over your shoulder, you don’t want them to then have access to your bank account because it has the same password.
  3. Change passwords regularly. Government and corporate security protocols typically require that passwords be changed at least every 3 months.
  4. KeePassUse a password manager. Seeing a theme here about the importance of passwords? If you have different random passwords and change them regularly, then you either have a memory like Rain Man or you keep track of the passwords somewhere. The most popular software tools to manage passwords are LastPass (Free or Premium for PC, Mac, and others), KeePass (Free for PC, Mac, and others) and 1Password ($39.95 for Mac). Password software allows you to keep all your passwords encrypted with one master password. It can autofill site information so that you only have to remember that one master password. It also has a Password Generator to create random strong passwords, a great idea. Without this, most people use passwords that are similar. To the extent that your passwords are similar, an investigator can more easily guess your other passwords. (Tip: use Dropbox to backup/sync KeePass or 1Password encrypted files. LastPass syncs automatically between computers).
  5. Do not use personal information that can be guessed as the answers to your online secret questions. This is how Sarah Palin’s Yahoo email was “hacked” in September 2008 simply by someone guessing the answers to her challenge questions such as where she went to high school.
  6. Tie your Yahoo or other login site to another email account or cell phone number. This will let you know of any attempted password resets and help if tip 5 doesn’t work.
  7. Encrypt files. As we explained in our post Encryption on USB Flash Drive, TrueCrypt can be used to encrypt your important data. Remember that although TrueCrypt can not be cracked, someone could guess your password if you chose it poorly.
  8. Remember that your router is a computer too. Your router manages all the data between your computer and the Internet. If your router software is compromised, you could be sent to a site claiming to be your bank but really being a completely different site due to website misdirection from a bogus DNS system used by your router. The router software should be checked, firmware reloaded, and the password on the router should be changed. Most people unknowingly leave the router login defaults. That is safe enough if your local network is not breached, your WiFi isn’t hacked, and your router is not remotely accessible.
  9. Use strong WPA2 WiFi encryption. WPA2 is not easily cracked like WEP. Tools such as BackTrack and KisMAC can crack WEP in minutes. (See photo of “war driver” below hacking into a WiFi network.)War Driver Hacking into WiFi
  10. Turn down your WiFi antenna strength. Hackers can crack into a WiFi access from over a block away with directional antennas and a good line-of-site to their target. If you don’t need the extra signal strength, turn it down since a weak signal is harder to crack. This isn’t an option on all routers. If you want to take extra control of your router for this and other options, see if you can load the alternative DD-WRT firmware.
  11. Check for keyloggers. Keyloggers will log everything you type. They can be in the form of software or physical devices that are attached to a USB port or between the keyboard and computer.Keylogger
  12. Wipe computer and start fresh. If someone has had physical access to your computer or if the computer is already compromised, all bets are off. Some experts and government institutions will simply decommission a compromised computer and trash it. But most people should be satisfied with wiping everything. The hard drive can be wiped and the operating system reinstalled. The BIOS (seen from the very initial startup) can be reflashed and checked. The computer can be opened and physically checked for modifications.

Let me know if you have other suggestions for keeping your computer information safe from surveillance.