Treating the Internet as a communication tool rather than a “living environment”

In an attempt to raise awareness in treating the Internet as a communication tool rather than a “living environment”.

Hope you’ll find this post informative.

Advertisements

Summer Sale of Windows Server’s e-Books @ Amazon Kindle Store

If you are planning to make the first steps in the Windows Server world, or are currently working professionally with Windows Server, then don’t miss the opportunity to get summer discount on the following Windows Server e-Books:

Hope you’ll find this post informative.

Shkarko falas e-Librin: Sistemi Operativ i Rrjetit (Windows Server 2012) @ Amazon Kindle Store

Nëse keni menduar të bëni hapat e parë në botën e Windows Server, apo aktualisht po merreni profesionalisht me Windows Server, atëherë mos humbisni mundësinë që:

nga 6 Gusht 2017 e deri më 10 Gusht 2016

përmes Amazon Kindle Store ta shkarkoni falas e-Librin:

Sistemi Operativ i Rrjetit: Windows Server 2012

Shpresoj që ky postim të jetë informues për ju të dashur lexues.

paqe dhe shëndet,

Bekimi

Bekim Dauti’s Blog | Bekim Dauti’s Vlog | e-Books @Amazon Kindle Store

 

Get help from Virtual Agent on Windows 10!

On July 13th, 2017 Microsoft has released Windows 10 Insider Preview Build 16241 for PC to Windows Insiders in the Fast ring! As with previous builds, this one too brings up a dozen of new stuff and fixes. However, to me Getting Help from Virtual Agent is an awesome attempt by Microsoft to facilitate the overall process of getting help when things aren’t working the way it should with your computer. Although, it’s still in a Preview Version, the Virtual Agent acts with “courtesy and professionalism” in providing help. More than that, it offers you the option to Talk to a Person.

Here’s the Virtual Agent’s response to my question about pinning an app to Taskbar:

If you opt for the option Talk to a Person then you should select the product and select the issue from the drop down lists. The Virtual Agent will offer you the Call me back, Schedule a call, Chat, or Ask the community. It’s up to you to click the preferred option.

So far, it seems like the Virtual Agent is trying to provide you with the best possible answer along the process of providing help. Cool!

After Cortana, with Virtual Agent on Windows 10 Microsoft is bringing its virtual assistant full circle (Engadget, 2014).

Dear readers, hope you’ll find this post informative.

peace and blessings,

Bekim

Bekim Dauti’s Blog | Bekim Dauti’s Vlog | e-Books @Amazon Kindle Store

Free Microsoft Press eBooks July 2017

by Ed Tittel

From time to time, Microsoft Press offers free eBooks to interested readers for their download and use. Recently, Sales Director Eric Ligman posted a whopper of an offer. It appears in an MSDN blog entitled “Free! Multi-Million eBook Giveaway!” I count a total of 252 titles in this list of free Microsoft Press eBooks July 2017. That’s a LOT of free books, perhaps enough to justify two exclamation points in Ligman’s title.

Perhaps this isn’t pure hyperbole: lots of interesting stuff for FREE!

Here’s how the total list breaks down by category. After that, I’ll recite the Windows Client (mostly Windows 10-related) books on offer:

Like I said, that’s a LOT of books. I know those who read this blog are interested in Windows Client. (“Desktop OS” is mostly what that means.) So, here’s a complete list of those items. It’s reproduced verbatim from the MSDN blog post.(Click on any format ID in the right column for a corresponding download link):

When facing this kind of largesse, I’m reminded of an old rule for eating in a military cafeteria. It goes like this: “Take all you want, but eat all you take.” Or read, as in this case… Enjoy!

Note:

The article was originally written by Ed Tittel and published by IT Knowledge Exchange on July 14th, 2017. It is reproduced on this blog with an author’s permission.

Dear readers, hope you’ll find this post informative.

peace and blessings,

Bekim

Bekim Dauti’s Blog | Bekim Dauti’s Vlog | e-Books @Amazon Kindle Store

MiniTool Power Data Recovery Rocks

by Ed Tittel

In January of this year, I blogged about the MiniTool Partition Wizard. In response to my post, the software’s maker asked me to take a look at their sister product: MiniTool Power Data Recovery. I get a lot of requests like this, so I don’t always get around to using or writing about such products. In this case, I was headed in the same direction but then I shot myself in the foot. And indeed, that’s also what gave me cause to learn that MiniTool Power Data Recovery rocks at its appointed task. Let me explain…

Why say “MiniTool Power Data Recovery Rocks?”

Good question! Thereby hangs a tale: Because of research into mSATA SSDs about three years ago, I have half-a-dozen Samsung EVO 840 256 GB SSDs hanging around my hardware collection. In finding tools to put these drives to work, I’ve purchased a couple of Syba SD-ADA40107 2.5″ SATA 6G/USB 3.0 to Dual mSATA RAID Adapters ($26 from Newegg). Basically, these devices let you drop in a pair of mSATA SSDs and use them as a RAID 0 or RAID 1 array, or as JBOD (just a bunch of disks).

Pop a couple of mSATA SSDs into this card, and plug it in using SATA, and you’ve got a fast and capable 2X capacity RAID0 hard disk (500 GB my case).

My “shot to the foot” came from confusing my primary data drive (!) with my experimental drive. And alas, I ended up wiping the partitions on the data drive thinking I was working on the other drive. Ouch! I found a three-month-old backup that I was able to use to restore about 90% of the contents of the original drive, but I couldn’t find copies of the other 10%, some of which was important stuff I didn’t want to lose. Thus, if ever I was faced with a need for data recovery, this was it.

Recovery is not free, but it works well

That’s when I learned that the free version of MiniTool Power Data Recovery comes with a 1 GB data recovery limit. I needed to restore about 21 GB of data, so there was nothing to do except pony up the $69 fee for a personal license. The expenditure proved worth every penny, because the tool’s “Lost Partition Recovery” facility resuscitated about 99% of the data on the affected drive. Recovery coverage depends on how much data has been overwritten onto new partitions in finding and saving files and folders from previous “lost” partitions. In my case I was luck enough to recognize my mistake quickly, and did no writing to the drive other than what occurred when setting up the partitions and writing the entries necessary to set up NTFS on the volume.

The process was fairly slow, because over 210 GB worth of files were recovered. It ended up taking 2.7 hours to complete, on a fairly fast PC (i7 4770K on a Z97 chipset motherboard), but that’s probably because I had the drive plugged into a USB 3.0 drive caddy rather than a 6 Gbps SATA port. But MiniTool Power Data Recovery proved equal to the task, and paid for itself, IMHO, on its first use.

I’d learned about the program from TenForums.com, where the program gets accolades from many members. See, for example MiniTool Power Data Recovery to the Rescue and Good data recovery tool for deleted files?, among many others. It definitely did the job for me, and may come in handy for admins and power users in need of a capable first line of file/disk recovery software defense. That’s why I assert with some confidence that “MiniTool Power Data Recovery rocks!”

Note:

The article was originally written by Ed Tittel and published by IT Knowledge Exchange on May 15th, 2017. It is reproduced on this blog with an author’s permission.

Dear readers, hope you’ll find this post informative.

peace and blessings,

Bekim

Bekim Dauti’s Blog | Bekim Dauti’s Vlog | e-Books @Amazon Kindle Store

What is Cryptography?

There are a number of terms associated with a cryptosystem. These include cryptology, cryptography, cryptanalysis, and steganography. Cryptology is the study of secure communications, which encompasses cryptography, cryptanalysis, and steganography. Cryptography is the branch of cryptology dealing with the design of algorithms for encryption and decryption. These algorithms are intended to ensure the secrecy and/or authenticity of messages and data. Cryptanalysis is the branch of cryptology dealing with the breaking of a cipher to recover information, or forging encrypted information that will be accepted as authentic. A cipher is an algorithm for encryption and decryption. A cipher replaces a piece of information with another object, with the intent of concealing meaning. Typically, a secret key governs a replacement rule. Lastly, steganography is a method of cryptology that hides the existence of a message. [Newman, 2002, p. 65-66]

Figure 1. Cryptography (SUPINFO International University, 2016)

The word “cryptography“ is derived from Greek and when literally translated, means “secret writing.” Before the advent of digital communications, cryptography was used primarily by the military for the purposes of espionage. With the advances in modern communication, technology has enabled businesses and individuals to transport information at a very low cost via public networks such as the Internet. This development comes at the cost of potentially exposing the data transmitted over such a medium. Therefore, it becomes imperative for businesses to make sure that sensitive data is transferred from one point to another in an airtight, secure manner over public networks. Cryptography can help us achieve this goal by making messages unintelligible to all but the intended recipient. [Atreya, n.d., ¶ 2]

Encryption refers to the transformation of data in “plaintext“ form into a form called “ciphertext,” which renders it almost impossible to read without the knowledge of a “key,” which can be used to reverse this transformation. The recovery of plaintext from the ciphertext requires the key, and this recovery process is known as decryption. This key is meant to be secret information and the privacy of the ciphertext depends on the cryptographic strength of the key. [Atreya, n.d., ¶ 3]

Figure 2. Encryption (Tectrade, 2015)

Cryptography is the study of “mathematical“ systems involving two kinds of security problems: privacy and authentication. A privacy system prevents the extraction information by unauthorized parties from messages transmitted over a public channel, thus assuring the sender of a message that it is being read only by the intended recipient. An authentication system prevents the unauthorized injection of messages into a public channel, assuring the receiver of a message of the legitimacy of its sender. [Diffie & Hellman, n.d.]

Figure 3. Privacy (Cosmos Auto Repair, 2014)

A channel is considered public if its security is inadequate for the needs of its users. A channel such as a telephone line may therefore be considered private by some users and public by others. Any channel may be threatened with eavesdropping or injection or both, depending on its use. In telephone communication, the threat of injection is paramount, since the called party cannot determine which phone is calling. Eavesdropping, which requires the use of a wiretap, is technically more difficult and legally hazardous. In radio, by comparison, the situation is reversed. Eavesdropping is passive and involves no legal hazard, while injection exposes the illegitimate transmitter to discovery and prosecution. [Diffie & Hellman, n.d.]

Reference:

Atreya, Mohan.  “Introduction to Cryptography.”  Retrieved on May 25th, 2017 from URL:  https://web.cs.ship.edu/~cdgira/courses/CSC434/Fall2004/docs/course_docs/IntroToCrypto.pdf

Diffie, Whitfield & Martin E. Hellman, n.d.  “New Directions in Cryptography.”  Retrieved on May 25th, 2017 from URL:  http://crypto.csail.mit.edu/classes/6.857/papers/diffie-hellman.pdf

Newman, C. Robert.  “Enterprise Security 2nd Ed.”  Pearson Education 2003, New Jersey.

Hope you’ll find this post informative.

peace and blessings,

Bekim

Bekim Dauti’s Blog | Bekim Dauti’s Vlog | e-Books @Amazon Kindle Store