TechByter Worldwide

Listen to the Podcast


31 Mar 2019 - Podcast #636 - (20:46)

It's Like NPR on the Web

If you find the information TechByter Worldwide provides useful or interesting, please consider a contribution.

PayPal

Subscribe

31 March2019

Better Ways to Work with the Registry

The Registry is a scary topic because it seems mysterious. In fact, it's a carefully ordered collection of information about how parts of the operating system function, settings for the operating system's thousands of options, and information about installed applications. Editing the Registry can render the system unusable if done wrong, but when edits are made with care, they can make the system operate the way you want it to and solve problems.

 Click any of the small images for a full-size view. To dismiss the larger image, press ESC or tap outside the image.

Eliminate or Move Keys on the Keyboard

Keyboards contain keys that you might not ever use intentionally. The Caps Lock key is a prime example for me. Accidentally pressing Caps Lock CONVERTS YOUR WORDS TO SHOUTS. And who wants that? I've described how a relatively simple Registry edit can disable Caps Lock, but many people are understandably reluctant to tread among Registry keys. Well, there's a better way.

TechByter ImageA clever little utility called SharpKeys can handle the Registry edits for you and it doesn't even need to be installed. Instead, you can just download the Zip file, unpack it, and run SharpKeys. There is also an installable version in an MSI file, but there's no reason to install it.

When you start SharpKeys, Windows will display a User Access Control warning because the program will make changes to the Registry. The first time I ran the program, I was happy to see that it already knew about the changes I had made using manual Registry edits. I had previously disabled both Caps Lock and Scroll Lock. If you see an error message after launching SharpKeys, that's probably because Microsoft .NET Framework 4.0 isn't installed. This can be obtained from Microsoft's website. Make sure that you obtain a version that's supported by the operating you have installed. SharpKeys works with Windows NT and later, but not with Windows 95 or Windows 98.

TechByter ImageYou may want to do something that SharpKeys can't do, so let's take a get those out of the way now..

With that warning out of the way, let's see what SharpKeys can do for you.

TechByter ImageThe most common use is probably to eliminate a key that you don't want. For me, those keys are Caps Lock and Scroll Lock because I want to avoid accidentally typing several sentences in ALL CAPS (and I usually don't look at the screen when I'm typing) and because Scroll Lock creates a condition I don't like in spreadsheet applications.

If your computer has two keyboards, it's important to be sure that the key you think you're mapping is the key you're really mapping. Many people who use notebook computers attach full-size keyboards to them and SharpKeys can see both of them. This may result in a bit of confusion. It sees the Pause|Break key on my full keyboard as Num Lock and identifies the Num Lock key as the Euro symbol (€).

TechByter ImageSharpKeys may also report a lot of "unknown" keys. There are hundreds of keyboard models and many of them include extra keys that don't use the standardized scan codes that apply to common keys. The easiest way to identify the key you'd like to change is clicking the Type Key button on the key mapping dialog box and then pressing the key. SharpKeys will select the appropriate value and fill it in. If you want to remap either the Left Alt or Right Alt key, though, pressing the key doesn't work. You'll need to find it in the list of keys. You'll find both in the "Special" section: Left Alt (00_38) and Right Alt (E0_38).

The key you want to map is shown in the left panel and the key you want to map it to is set in the right panel. The top option is Turn Key Off.

After defining all of the mappings you want to use, press the Write to Registry button. You'll then need to reboot the computer so that the Registry will be re-read to enable the new mappings.

If you've created several mappings that you'd like to use on another computer, click Save Keys to write a file. Take that file and the SharpKeys executable to the other machine, run the application, use the Load Keys button to import the settings, and then click Write to Registry on the second machine.

You can download the application from the author's website.

Sometimes You Really Need to Edit the Registry, Though

Windows 10 includes a perfectly usable Registry Editor and the most recent update (version 1809) added some features that make the editor even better. Even so, you might want to take a look at Kurt Zimmerman's RegCool utility.

TechByter ImageRegCool has features that RegEdit (the built-in Registry editor) doesn't have.
The built-in RegEdit is on the left and RegCool is on the right.

The developer is German and sometimes you'll find German words in the program's interface and in the documentation. Usually these are easy to decode -- "und" in place of "and" or Undo and Redo shown as "Strg+Z" and "Strg+Y" instead of "Ctrl-Z" and "Ctrl-Y". "Strg" is the abbreviation for "Steuerung" (SHTY-er-ung) on a German keyboard just as "Ctrl" is the abbreviation for "Control" on a US keyboard.

You can download RegCool from the developer's website.

Short Circuits

Computers with Asus Motherboards Are at Risk

Both Motherboard and TechCrunch are reporting that hundreds of thousands of computers that are powered by Asus motherboards have been compromised by malware pushed out by Asus. Both say that the flaws were discovered by Kaspersky Labs in January. Asus finally acted this week to warn users.

The reports say that the Asus Live Update application was compromised by hackers who used an Asus signing certificate to place a modified version of the tool on Asus update servers. Although hundreds of thousands of computers are affected, it appears that the malware was closely targeted at approximately 600 machines worldwide. The targeting was done by scanning for the computer's MAC (media access control) address.

TechCrunch says that Symantec has confirmed the report by Kaspersky Labs and Motherboard reports that the signing certificates are still in use and notes that at least 13,000 computers operated by Symantec's customers were infected with the malware. The Motherboard article quotes Kaspersky's Costin Raiu, who says the attack is unusual: "The filtering of targets in a surgical manner by their MAC addresses is one of the reasons it stayed undetected for so long. If you are not a target, the malware is virtually silent." So unless you own of the approximately 600 machines targeted in the attack, the malware won't harm you.

So far, there's been no indication from anyone about who owns the targeted computers. Clearly this was a highly sophisticated attack and one that Asus doubtless should have made public when they became aware of it in January or earlier. This week, after the fecal matter made contact with the rotary air impeller, the company shifted into high gear and pushed out an update for the live update application. Asus also sent out a news release that said the new version of Live Update has "multiple security verification mechanisms to prevent any malicious manipulation in the form of software updates or other means." Asus says it is also now using "an enhanced end-to-end encryption mechanism."

There's a utility that users can run to see if their computers are affected. It's available on the Asus website. Asus is based in Taiwan is is the 5th largest PC vendor based on unit sales. In 2008, Asus was found to be shipping laptop computers that contained cracked, unlicensed software. In 2016, the US Federal Trade Commission accused Asus of failing to fix security problems with their routers. Perhaps there is a trend here.

Do You Believe Any of these High-Tech Myths?

Do more pixels mean better pictures? Given the camera industry's emphasis on pixels since the very beginning, it's not surprising that 86% of the people surveyed by HighSpeedInternet.com believe this is true. Some of the other myths that a lot of people believe are more surprising.

The results of the survey are in a blog post on the HighSpeedInternet site and it cites several common myths. As for cameras, the blog post says that "a camera with more megapixels can take pictures with higher resolution, but that doesn't necessarily mean they’re better quality." There's a lot more to it than that. The blog points out that a poor quality lens will result in a bad image no mater how many pixels there are. To that, I would add these considerations: The ability to shoot raw images and the sensor's dynamic range at a minimum. Whether it's a cell phone or an actual camera, it's essential to look beyond pixel count.

More than half of us (52%) seem to think that charging a mobile phone overnight will ruin the battery and a like number believe that smart phone manufacturers deliberately slow older models when they release new ones.

About one third of us think that airport X-ray machines will wipe computer or phone memory (31%) or that computers must be shut down every night to avoid malfunctions (30%). Both are nonsense.

The post says 17% of us think that Macs are immune from malware. That's simply not true and it never has been. Macs still have a much smaller market share than Windows machines, but targeted (spear) phishing attempts are often tailored for Apple computers because they're popular among managers in large businesses.

Sometimes it's a good idea to check the things we know because sometimes what we "know" isn't accurate.

Connecting Paper to a Computer

Adobe and Moleskine have introduced the Moleskine Paper Tablet. It connects to Illustrator, part of Adobe's Creative Cloud. Drawing on the tablet turns sketches on paper into drawings in Illustrator. This requires the Moleskine Pen+ Ellipse.

Why? Not everyone likes drawing on a plastic tablet or screen. Some tablets and nibs have been modified so that they provide an approximation of the tactile sense of drawing on paper, but only a real pen on real paper fully captures the feel of pen on paper. Moleskine says that their research shows that even those who use digital devices often start with pen on paper and then have to re-draw their work on a digital device.

Drawings from the paper tablet become digital files that the artist can enhance, color, and texture in Illustrator. Both the pen and the paper in the notebook are special. Each page has two symbols that trigger actions. One turns on the simultaneous drawing mode within Illustrator and the other triggers the save function that writes the current file to the Adobe Creative Cloud.

Users can work solely on paper and connect their output to Illustrator CC later or they can have marks made on paper be mirrored simultaneously in Illustrator on a Windows PC or Mac.

This isn't the first time Adobe has worked with Moleskine. The first effort was a free Moleskine for Creative Cloud mobile app that used special page markings on companion smart notebooks to process the image as a JPG file before converting it into an SVG file. The new Creative Cloud Connected system creates vector art directly.

The tablets are available in several sizes. The large (5"x8¼") tablet sells for about $30 but is often discounted to less than $10. The pens, however, cost $180. Refills for the pens are less than $1 each. This isn't something that you'll want to buy for doodling, but commercial artists who like to start a project on paper and then have to take the time to re-draw their work digitally are likely to feel that it's a worthwhile expense.

Whether you pronounce Moleskine as "MOLE-skin" or "mol-eh-SKEEN-eh" may depend on your knowledge of Italian. Moleskine ("mol-eh-SKEEN-eh") is the Italian pronunciation, but many in English speaking countries use ("MOLE-skin") an Anglo pronunciation. The company is headquartered in Milan and it manufactures luxury notebooks and stationery.

More information at on the Moleskine website.

Spare Parts

How Much Information Are You Sharing On-Line?

When we use the internet, we share information, sometimes without thinking about it. We use credit cards for on-line purchases, send email messages that may contain proprietary information, and may enter user names and passwords over unencrypted connections.

Abine, which positions itself as an on-line privacy company, has just introduced a privacy service called Blur. The company claims that Blur improved on-line privacy with masked emails, masked phone numbers, and masked credit cards.

The service's $40 annual fee covers the ability to shop on-line without revealing personal info, use Masked Cards to eliminate re-billing without permission, reduce spam calls and email, manage passwords, and block data-collecting web trackers.

Blur's mission is to provide people with the best protection for their on-line identity according to Abine co-founder Rob Shavell. "Customers are telling us they feel like Facebook and Google and the entire internet is watching them and, unfortunately, they're not wrong."

Abine is the creator of DeleteMe, a utility intended to remove information from search engines and data brokers and of Blur. Both are available on Abine's website: Blur for Android, IOS, Chrome, Safari, Firefox, Edge, Opera, and Brave; and DeleteMe.

The Threat Landscape is Changing (Not for the Better)

The Information Security Forum, a cyber security resource for executives, has released Threat Horizon 2021, the latest in its series of annual reports. The report highlights nine major threats in three general classifications and the future looks anything but bright.

By 2021 the world will be heavily digitized, even more so than today, according to ISF managing director Steve Durbin, who says that technology will enable innovative digital business models that may create an impression of stability, security, and reliability. But "it will prove to be an illusion that is shattered by new vulnerabilities, relentless attacks, and disruptive cyber threats."

Threat Horizon 2021 focuses on particularly difficult cyber security challenges in a way that is relevant to senior business managers, information security professionals and other key organizational stakeholders. The three key themes in the latest report include:

  1. DIGITAL CONNECTIVITY EXPOSES HIDDEN DANGERS: Vast webs of intelligent devices, combined with increased speeds, automation and digitization will create possibilities for businesses and consumers that were previously out of reach. The Internet of Things (IoT) will continue to develop at an astonishing rate, with sensors and cameras embedded into a range of devices across critical infrastructure. The resulting nexus of complex digital connectivity will prove to be a weakness as modern life becomes entirely dependent on connected technologies, amplifying existing dangers and creating new ones.
  2. DIGITAL COLD WAR ENGULFS BUSINESS: By 2021, a digital cold war will unfold, causing significant damage to business. The race to develop strategically important, next generation technologies will provoke a period of intense nation state-backed espionage – intellectual property (IP) will be targeted as the battle for economic and military dominance rages on. Cloud services will become a prime target for sabotage by those seeking to cause disruption to society and business. Drones will become both the weapon and target of choice as attackers turn their attention skywards.
  3. DIGITAL COMPETITORS RIP UP THE RULEBOOK: Competing in the digital marketplace will become increasingly difficult, as businesses develop new strategies which challenge existing regulatory frameworks and social norms, enabling threats to grow in speed and precision. Vulnerabilities in software and applications will be frequently disclosed on-line with ever-decreasing time to fix them. Organizations will struggle when one or more of the big tech giants are broken up, plunging those reliant on their products and services into disarray. Organizations will rush to undertake overly ambitious digital transformations in a bid to stay relevant, leaving them less resilient and more vulnerable than ever.

The ISF Threat Radar is a visual aid that accompanies Threat Horizon reports. For more information on the report, and to download a copy of the executive summary, visit the Security Forum website.