A friend of mine just sent me the following, which may be of interest to some of you:

The Academy (http://www.theacademy.ca) officially launches its web site today providing instructional videos for the information security community. For the first time ever, the average user to the most seasoned industry expert will be able to watch instructional videos on how to install popular products, address common configuration issues, and troubleshoot difficult problems. The Academy is a user driven community and videos are created at the request of its members. Vendors can also leverage the site to showcase the features and capabilities of their products. The Academy is an ideal place to find and share knowledge with others practicing or interested in the information security field.

Back when I was knee-deep in Check Point, it would have been nice to make videos of the stuff I was troubleshooting and make them available, much like I did with FAQs and the like. These guys have done just that with Check Point and a number of other security products. You have to register to see the videos, but there's a lot there!

Well that and I generally just don't care for the sound quality of Bluetooth headsets:

http://www.youtube.com/watch?v=A-q-OnUqty0

If you're not using it, keep your bluetooth off. Simple as that.

When I was at the car dealer yesterday giving my car some service love, I hung out at the dealership while the repair was taking place. My dealer is pretty good--they give you a coupon (or two) for a free latte while you wait for your car to be serviced. They offer WiFi throughout their waiting area. They also have a "lounge" where you can either use one of the computers they have or use your own.

Despite the dealer having WiFi, I didn't use it. Why? Their system requires reauthenticating every two hours, which gets old when I know I am going to be there for at least twice that long. Instead, I decided to use my Sprint EVDO dongle.

Unfortunately, I spent a long time fighting with the Sprint Connection Manager software (version 1.10.0023.0) instead of working. When I tried to use it to connect, then started up my VPN to connect to the office, my EVDO connection would unceremoniously disconnect. I don't remember my Verizon card ever doing this.

I eventually figured out how to get this combination working. The hint is in the graphic here. Sprint's software--and presumably Verizon's software--are simply front ends for the standard Windows dial-up networking. Sprint's software also has this NDIS mode in it--make sure it's set to RAS before you do this trick.

In Check Point Secure Client (which us old-timers still call SecuRemote), I told it to use a Dial-up connection, which shows up in the Connection window. In my case, I ticked the Use Dial-up option and used the connection called CDMA. There was another one called 3G Connection that I didn't try. After this, Secure Client properly brought up the EVDO connection and started my VPN. The connection didn't drop once and worked reliably for the rest of the time I was at the dealer.

I left the Sprint Connection Manager software running, but I don't believe it was necessary. It continued to show me signal strength and the like, but I did not see any details about how much data I was sending and receiving. That's ok, just as long as my EVDO worked.

[youtube https://www.youtube.com/watch?v=IH7OEwL629g?feature=oembed&w=459&h=344]

Sue Walsh over at IGotSpam (one of the CW blogs I occasionally write for) notes that another "worm" has hit Nokia phones. From the list, it appears she is talking about S60 2nd Edition handsets and not ones based on the more recent, more secure, S60 3rd Edition.

This is a problem for any highly successful device or computer manufacturer: people will continue to use the devices well past their expiration date. They may not know--or even care--about "flaws" like these worms. Even though Nokia has addressed the issue going forward, there's little that can be done for those legacy handsets other than replacement.  Hopefully that will happen over time.

I know that fingerprints are not exactly foolproof methods of authentication because they are fairly easy to spoof

Bottom line, folks: if you want to be safe, you need to rely on more than one factor of authentication.