Tips to Keep Your Cloud Storage Safe

For the last few years, cloud storage has become popular as a means to backup an individual’s / business’ files, important documents, photos, digital rolodexes (e.g., people’s names, numbers, email addresses, passwords), projects, etc.

Unfortunately, the masses assume their files are secure just because “a large corporation is running the cloud service” or even because “nothing yet has happened to my files”. There are steps you must take to protect your data, and not just relying upon the cloud service to do this for you.

  1. You must make sure the password to your cloud storage is a good one. Having a bad password that is easily guessed does you no good.
    • It is good practice to use a password manager (preferably offline) and generate passwords with a combination of lowercase, uppercase, numbers, and symbols.
    • Some people will combine words together for their password. This is not as secure as the above method, but is better than nothing.
    • Never write down your password. That is a good way to get it stolen.
  2. Enable 2-step authentication (if available) for logging into your cloud storage account.
    • This is a very good method to stop most hackers dead in their tracks. Most will not have access to your phone or email to receive the 2-step authentication request, so they will not be able to gain unauthorized access to your account.
  3. Always encrypt your files before uploading them to your cloud storage.
    • Several file compression software can encrypt files for you. You just need to provide a password.
    • 7-Zip can create encrypted / compressed archives using the AES-256 algorithm (symmetric encryption; this means you use the same password to both encrypt and decrypt the archive).
      • It can even encrypt the file names inside the archive too, so no one can try to guess what is in the archive by just looking at the file names, even if they cannot access the data.
    • I know cloud storage companies claim to encrypt your files. The problem? They have the encryption keys, so they can decrypt your files whenever and snoop.
    • Even if the storage service does not have a secret policy to snoop through their customers’ files, rogue employees could still do it without the management’s knowledge.
    • Imagine if someone uploaded a text file with their bank information on it (never do that!), and it was not encrypted before being uploaded to the cloud storage? A disaster waiting to happen.
  4. Always have at least two backups of your information. Never rely upon just one cloud storage company to backup all your data.
    • If you must, you may buy a hard drive to backup your data to once a week (or whatever works for you), and place it somewhere for safe keeping (basically, cold storage).

 


Posted in Cloud, Computers, Internet and Servers, Security, Tips & Tutorials

Simple Ways to Get Less Spam in Your Email

We have all been there. Wake up in the morning and find you have a dozen or so spam emails sitting in your inbox, all mixed in with your legitimate emails from family and business. You may have wondered how you can prevent so much spam from hitting your inbox.

The truth is …there really is no “magic formula” when it comes to fighting spam. Some people seem to never get any spam even if they give their email out to everyone they meet. For others, they seem to have been “blessed” with tons of spam, when they have been very careful who they have given their email too.

Here are some ideas that may help you prevent spam from hitting your inbox. Please remember, none of these ideas have any guarantee that you will not receive any spam.

  • (As mentioned above) Be careful who you give your email out to. Never just hand over your email to just anyone (e.g., an online “signup” form to potentially win a prize).
    • There are several places on the Internet where people collect email addresses to put into lists to sell to spammers. Unfortunately, many of these signup forms look legit and people fall for them, not realizing that they are getting setup to be spammed.
    • Many companies that require your email have good intentions, but their systems may get compromised and their customers’ emails get leaked to spammers. In this case, that is not your fault. Life happens.
    • In addition, your friends’ and family’s email accounts may become compromised at a certain point in time. This will undoubtedly cause their address books to become leaked. You can guess what the hacker will do with all the emails he collects.
  • Use a third-party email spam filter (e.g., SpamAssassin).
    • Some examples of third-party spam filters are: SpamAssassin, rspamd, and Gmail.
      • SpamAssassin is a self-hosted software program. When your email server receives an email, it sends the email to SpamAssassin which then tries to determine if the email is legit. However, SpamAssassin also has quite the learning curve. So, unless you have time to learn how to set it up properly, I would opt to using a commercial third-party spam filter.
        • SpamAssassin can be trained what emails are spam and what emails are not spam.
      • rspamd is another self-hosted software program for filtering email. While not as popular as SpamAssassin, there is no reason to disregard the program, if you want an alternative to using SpamAssassin or another email filter.
      • Gmail has an excellent spam filter. There are people (mainly businesses) who purposely forward all mail to a Gmail account they setup to have Gmail’s system filter out the illegitimate emails. They can do this even if they own their own domain name, and are not using a Gmail email address for their business.
        • Since Gmail is not self-hosted, all your email ultimately gets seen by a third-party. Some individuals and businesses may not be comfortable with this idea.
  • Use a “catch-all” anti-spam system.
    • What a “catch-all” system does is redirect all your email to a “bin” of sorts and lets you – later – review all the email you wish to forward to your email.
    • An example of a program that does this is “Tagged Message Delivery Agent (TMDA)”.
      • You can do a Google search to learn more about it.
    • The only downside to this type of anti-spam is you now effectively have two emails to manage instead of one. You must watch and manage the “anti-spam bin” and you still must monitor your real email. For many people, this would not be acceptable or practical.
  • Use an email alias instead of giving out your real email.
    • This is when you have multiple email addresses that all forward to your real (main) email address.
    • This is like having a forwarding address at the US Post Office.
    • For example, you have your personal email: alfred@example.com.  Now you want to sign up for a new online service, but you do not want to give out your personal email. You setup an alias ad130@example.com and give that email to the online service instead of your actual email. Now anytime the service emails you, the email is forwarded from ad130@example.com to alfred@example.com.
      • In the event the service gets compromised and you start getting spam to ad130@example.com, you can create another one ad250@example.com and continue using the service while stopping the spam that started coming to the other email alias.
    • Unfortunately, there are a couple of problems with this idea.
      • 1. With several email aliases, you must now keep up with all these virtual email accounts, instead of just one (your main email).
      • 2. Unless you are self-hosting your email, in which case you can set as many email aliases as you need, some free email services may not allow you to create 20+ emails for the purpose of forwarding to another email address. It would depend upon the email service’s “Terms of Service” …what they allow and do not allow.

Posted in Computers, Internet and Servers, Software, Tips & Tutorials

List of Free and Public DNS Resolvers

Here is a list I compiled of free and public DNS resolvers you can use. Hopefully this will save you some time looking for an alternative DNS resolver.

Last Updated: August 2022

Name IP Address & Notes
Cloudflare

1.1.1.1

1.0.0.1


No DNS filtering; everything allowed

Cloudflare

1.1.1.2


Filters malware domains; useful if you have a public Internet service (e.g., library, coffee shop)

Cloudflare

1.1.1.3


Filters malware & adult content

Google

8.8.8.8

8.8.4.4


Google Public DNS is purely a DNS resolution and caching server; it does not perform any blocking or filtering of any kind, except that it may not resolve certain domains in extraordinary cases if we believe this is necessary to protect Google’s users from security threats.as of August 2022

Quad9

9.9.9.9

149.112.112.112

2620:fe::fe  [IPv6]

2620:fe::9  [IPv6]


Filters malware domains & DNSSEC validation

Quad9

9.9.9.11

149.112.112.11

2620:fe::11  [IPv6]

2620:fe::fe:11  [IPv6]


Filters malware domains & DNSSEC validation + ECS enabled

Quad9

9.9.9.10

149.112.112.10

2620:fe::10  [IPv6]

2620:fe::fe:10  [IPv6]


No malware domain filtering, no DNSSEC validation

OpenDNS

208.67.222.222

208.67.220.220


Without an OpenDNS account, supposedly it blocks some malware and phishing domains; with an account, you can have much more control over what it blocks and does not block

 


Posted in Computers, Internet and Servers, Software, Tips & Tutorials

Test-Connection: How to Ping Computers with PowerShell

You can use the commands below to ping computers with PowerShell.

 

Pinging a Single Computer

Test-Connection google.com

You may add (without the quotes) “-IPv4” to the end of the command to tell PowerShell to only ping the IPv4 address of the specified computer.

 

Pinging Multiple Computers

Use a comma [ , ] to specify multiple computers at once.

Test-Connection google.com, yahoo.com


Posted in Code Snippet, Computers, Internet and Servers, Operating Systems, PowerShell, Tips & Tutorials