Sunday 24 December 2023

What's essential to protect your smartphone, computer and devices?

 Antivirus software is a crucial tool for protecting your devices from malware and other cyber threats. In addition to antivirus and antimalware protection, some other features that antivirus programs may have include:

  • Firewall: A firewall monitors incoming and outgoing network traffic and blocks unauthorized access to your device.
  • Email protection: This feature scans incoming and outgoing emails for malicious attachments and links.
  • Web protection: This feature blocks access to malicious websites and prevents you from downloading malicious files.
  • Parental controls: This feature allows you to restrict access to certain websites and applications, making it ideal for parents who want to protect their children from inappropriate content.
  • Password manager: This feature securely stores your passwords and other sensitive information.
  • VPN: A VPN encrypts your internet traffic and hides your IP address, providing an additional layer of security and privacy.

It’s important to note that not all antivirus programs have all of these features, and some may have additional features not listed here. When choosing an antivirus program, consider your specific needs and look for a program that offers the features that are most important to you123

Friday 15 December 2023

Yonge Dundas Square is now Sankofa

 The city of Toronto is naming a public space Sankofa a word from the Akan language of Ghana.Here are ten beautiful Akan words that convey poetic descriptions of humanity:

  1. Nhyira (pronounced 'n-CHI-rah'): Meaning 'blessing' or 'goodness,' this word reflects the positive essence within individuals.
  2. Owia (pronounced 'oh-WEE-ah'): Signifying 'life' or 'vitality,' it captures the dynamic and vibrant nature of human existence.
  3. Sankɔfa (pronounced 'san-KOH-fah'): Though associated with the idea of learning from the past, it also embodies the concept of resilience and the beauty of learning and evolving.
  4. Nsoromma (pronounced 'en-SO-rahm-mah'): Translating to 'star,' it symbolizes the unique brilliance and potential within every person.
  5. Akoma (pronounced 'ah-KOH-mah'): Representing 'heart,' it embodies emotions, love, and the spiritual essence of humanity.
  6. Nsa (pronounced 'en-SAH'): Meaning 'finger' or 'hand,' it signifies human touch, connection, and the ability to create and shape the world.
  7. Aya (pronounced 'ah-YAH'): Signifying 'fern,' it's a metaphor for endurance, growth, and adaptability—the traits that define human resilience.
  8. Nkɔsoɔ (pronounced 'en-KOH-soh'): Translating to 'wisdom' or 'intelligence,' it represents the intellectual capacity and knowledge embedded in individuals.
  9. Mogya (pronounced 'MOH-djah'): Meaning 'blood,' it symbolizes the familial and communal ties that bind humanity together.
  10. Ɔkra (pronounced 'OH-krah'): Representing 'soul' or 'spirit,' it encompasses the essence of an individual's inner being and identity.
These words not only carry linguistic beauty but also encapsulate profound aspects of human nature and experience.

Tuesday 11 April 2023

The Risk of Plugging Your Devices into Unknown USB Ports: Protecting Your Data Security

In today's modern world, we are heavily reliant on our electronic devices, from smartphones to laptops. We use them for communication, work, entertainment, and more. However, with this reliance comes a risk, especially when it comes to plugging our devices into unknown USB ports. These unknown USB ports can expose our data to security risks such as malware and data theft. Let's explore the risks associated with plugging our devices into unknown USB ports and discuss ways to protect our data security.

Plugging our devices into unknown USB ports can expose our data to security risks such as malware and data theft. This is because these USB ports may be infected with malware or have been tampered with to steal data. For example, a criminal could install a malicious program on the USB port, which would then infect your device when you plug it in. Alternatively, they could tamper with the hardware to steal your data directly. These risks are not just theoretical. In 2019, a security researcher demonstrated how he could hack into a computer by simply plugging a malicious USB stick into the machine. Therefore, it is important to be cautious when plugging our devices into unknown USB ports.
One way to protect our data is to use a USB data blocker or a charging-only cable. These devices prevent data transfer while still allowing your device to charge. This means that even if the USB port is infected with malware, your device will not be infected, as no data will be transferred. USB data blockers are small devices that plug into the USB port, while charging-only cables only have the power pins connected. Both of these options are affordable and easy to use, making them a great way to protect your data when charging your device on the go.

Another way to protect our data is to use a virtual machine or sandbox environment. These allow you to test unknown USB ports and files without risking your actual system. A virtual machine is a software program that emulates a computer system, allowing you to run a separate operating system within your current one. This means that if the USB port is infected with malware, it will only infect the virtual machine and not your actual system. A sandbox environment is similar but is a separate environment within your existing system. Both of these options allow you to test unknown USB ports and files without risking your actual data security.

To sum up - plugging our devices into unknown USB ports can expose our data to security risks such as malware and data theft. However, there are ways to protect our data, such as using a USB data blocker or a charging-only cable or using a virtual machine or sandbox environment. By taking these precautions, we can protect our data and ensure that we can continue to use our electronic devices with confidence.

Wednesday 14 April 2021

Atomium in Motion

Atomium in Motion is a trippy highly filtered afternoon at Brussels most famous 1958 World's Far exhibit.

The Atomium is a landmark building in Brussels (Belgium), originally constructed for the 1958 Brussels World’s Fair (Expo 58). It consists of spheres connected by tubes that represent an iron crystal magnified 165 billion times. It is now a museum. A vintage Herman Miller Marshmallow sofa is among the many period pieces on display.

Friday 4 December 2020

CP Railway crossing Leaside Bridge at West Don over ET Seton park

CP Railway freight train crossing the Leaside Bridge at West Don over ET Seton park. This is the double-tracked CP mainline. These shipping containers could be headed east the Port of Montreal for shipping to Europe or Asia.

Sunday 18 October 2020

Eglise Saint Severin

Eglise Saint Severin
1 Rue des Prêtres Saint-Séverin
75005 Paris, France

Friday 21 August 2020

You’re a hoarder too

Your house is a mausoleum to your own family. Everything in it is a memory of some aspect of your family’s life. And now that you’ve gotten married, had careers, raised the children and retired, that story of life has become history. Your house has gone from a place where life occurred to a place where the next chapter that awaits is death.

Why am I so harsh about this shrine to yourself. Let’s take a tour. We start in the kitchen, with the refrigerator. Oh look, it’s covered in children’s drawings. Today they’re by the grandchildren but the fridge first hosted the work of your children. And where has that work gone? Is it in a box, on a shelf in the basement just off the rec room? Or is it in the attic? Are the mice turning it into nests for their babies?

What of the dining room? I admire your handsome dining room suite. Although it’s more than a little out-of-date. And yet it’s not hip enough to be retro. If you had to sell it you’d be hard-pressed to find anyone to take it. And you’ll never get what it’s worth.

You and your spouse may think that the children will want it. After all, it’s from the mausoleum. It’s part of the archived legacy of how your family became the people we see today. But without even knowing your children, I can tell you that you’re thinking is way off. It stands to reason that if your children are old enough to have careers, spouses a home then they’ve already furnished the dining room with a suite. And it’s up-to-date. Not old and tired.

The living room is next. The TV’s up-to-date. It’s a nice model and has some of the latest features. But your 80+ inches of home cinema would take up two walls in your children’s condos. And besides, they already have a TV. Or they watch Netflix on their laptops.

Then there’s the sofa, and the side chairs, and the coffee table, and the end tables, and the lamps. All worn out and tired. It costs more than it’s worth to have it re-covered. No charity will take it. The grandchildren going off to college can’t fit any of it in their bachelor pads.

Now what really ties the room together is that Persian carpet. Timeless. But if you have one Persian carpet and two children then you have an argument, not a bequest.

Next Up: The bedrooms.