Create Panoramas with Hugin

Hugin is free open source software for creating panoramas from a series of photos. It is not terribly difficult to use, but you should follow one of the tutorials such as the Lifehacker Hugin tutorial. This explains how to set control points between photos in order for Hugin to know where things line up.

There are downloads for Windows, Mac, and various flavors of Linux. For simplicity, download from the pre-compiled versions.

NY Panorama from Hugin

Windows Phone 7

Surprisingly, Microsoft Announces Cool Phone

While Apple’s iPhone is the leader in smartphones, there is competition from Google’s Android phones, RIM’s Blackberries, and Palm’s Pre. This week’s announcement of Windows Phone 7 Series at the Mobile World Conference in Barcelona should put Microsoft back in the competition.

While Microsoft has made phone software for over 13 years, the phones were never popular outside of business. The phones looked like slimmed down versions of Windows and were clunky. With Windows Phone 7, Microsoft is using the acclaimed user interface from their Zune music players and completely revamping the phones.

Expect to see phones running Windows Phone 7 around November 2010.

Note the first line of this video demo/promo. It says “A different kind of phone…” Reminds me a little of another company with small market share that asked people to “Think Different.”

For more videos, see Microsoft’s YouTube page on Windows Phone 7.

12 Tips for Protecting Your Computer from Snoopers

In the DC area especially, there are people who have reason to be concerned about computer espionage, either for work (national or corporate secrets) or personal reasons (divorce or blackmail). Here are 12 tips to guard against intruders snooping on your activities:

  1. Use decent passwords. The easiest way for someone to access your email and other information is if they know or can easily guess your passwords. It is estimated that 1 out of every 9 people use a password on the top 500 worst password list. Most passwords are “cracked” not through problems with the encryption itself, but with the password being poor. Don’t use dictionary words, the names of loved ones, the names of your pets, your birthday, etc.  Longer passwords are better so government institutions often require at least 10-14 characters. Passwords should be random and use letters, numbers, and special characters.
  2. Use different passwords for different things. If someone sees your computer login password over your shoulder, you don’t want them to then have access to your bank account because it has the same password.
  3. Change passwords regularly. Government and corporate security protocols typically require that passwords be changed at least every 3 months.
  4. KeePassUse a password manager. Seeing a theme here about the importance of passwords? If you have different random passwords and change them regularly, then you either have a memory like Rain Man or you keep track of the passwords somewhere. The most popular software tools to manage passwords are LastPass (Free or Premium for PC, Mac, and others), KeePass (Free for PC, Mac, and others) and 1Password ($39.95 for Mac). Password software allows you to keep all your passwords encrypted with one master password. It can autofill site information so that you only have to remember that one master password. It also has a Password Generator to create random strong passwords, a great idea. Without this, most people use passwords that are similar. To the extent that your passwords are similar, an investigator can more easily guess your other passwords. (Tip: use Dropbox to backup/sync KeePass or 1Password encrypted files. LastPass syncs automatically between computers).
  5. Do not use personal information that can be guessed as the answers to your online secret questions. This is how Sarah Palin’s Yahoo email was “hacked” in September 2008 simply by someone guessing the answers to her challenge questions such as where she went to high school.
  6. Tie your Yahoo or other login site to another email account or cell phone number. This will let you know of any attempted password resets and help if tip 5 doesn’t work.
  7. Encrypt files. As we explained in our post Encryption on USB Flash Drive, TrueCrypt can be used to encrypt your important data. Remember that although TrueCrypt can not be cracked, someone could guess your password if you chose it poorly.
  8. Remember that your router is a computer too. Your router manages all the data between your computer and the Internet. If your router software is compromised, you could be sent to a site claiming to be your bank but really being a completely different site due to website misdirection from a bogus DNS system used by your router. The router software should be checked, firmware reloaded, and the password on the router should be changed. Most people unknowingly leave the router login defaults. That is safe enough if your local network is not breached, your WiFi isn’t hacked, and your router is not remotely accessible.
  9. Use strong WPA2 WiFi encryption. WPA2 is not easily cracked like WEP. Tools such as BackTrack and KisMAC can crack WEP in minutes. (See photo of “war driver” below hacking into a WiFi network.)War Driver Hacking into WiFi
  10. Turn down your WiFi antenna strength. Hackers can crack into a WiFi access from over a block away with directional antennas and a good line-of-site to their target. If you don’t need the extra signal strength, turn it down since a weak signal is harder to crack. This isn’t an option on all routers. If you want to take extra control of your router for this and other options, see if you can load the alternative DD-WRT firmware.
  11. Check for keyloggers. Keyloggers will log everything you type. They can be in the form of software or physical devices that are attached to a USB port or between the keyboard and computer.Keylogger
  12. Wipe computer and start fresh. If someone has had physical access to your computer or if the computer is already compromised, all bets are off. Some experts and government institutions will simply decommission a compromised computer and trash it. But most people should be satisfied with wiping everything. The hard drive can be wiped and the operating system reinstalled. The BIOS (seen from the very initial startup) can be reflashed and checked. The computer can be opened and physically checked for modifications.

Let me know if you have other suggestions for keeping your computer information safe from surveillance.


Thunderbird Add-ons

ThunderbirdYou might have heard about add-ons for the popular web browser Firefox that give it more capabilities. Well, the folks at Mozilla also make a great email client called Thunderbird (PC, Mac, Linux) that has add-ons too.

I found this out when I needed to send someone hundreds of emails. The Add-on ImportExportTools (which oddly is not part of Thurderbird’s list of Add-ons) was able to take all the emails I wanted and move them into an HTML indexed folder for easy browsing. This powerful add-on also helps in a myriad of cases when migrating or merging email archives, and it performs some import/export feats that are impossible with other email clients such as Outlook and Mac Mail.

ImportExportTools Thunderbird Add-on

Manage Your Podcasts in iTunes

If you use iTunes and need more control of your podcasts, click on the Settings… tab at the bottom of the iTunes Podcasts page. This gives you the ability to choose download and retention settings. You can set a default and per-podcast setting.

Set a default podcast setting that applies to most of your podcasts, by first choosing:

Podcast Defaults

The individual control of podcasts was added a year ago in iTunes 8 but most people didn’t notice the addition. Now you can, for example, automatically keep only the latest of your news programs while keeping all of your story podcasts.

Some podcasts are released in batches. For example, NPR’s Dianne Rehm’s Friday News Roundup podcasts are released two at a time on Friday.  Therefore I set it to Download all instead of the most recent one. If I only downloaded the most recent, I would miss one of the shows.

Podcast Settings

You might also want to Download all if you only sync occasionally and want the most recent files, instead of the most recent podcast and an older podcast from when you last synced.

I find that if you change a podcast to keep only the Last X number of episodes, this does not go into effect immediately, but it eventually goes into effect after a podcast is refreshed.