About Josh

Posts by Josh:

0

Paid software, what is it good for?

Posted by Josh on September 18, 2012 in Review, Security |

With all the great freeware products I discussed in my last article, it may leave you wondering if paid software is worth the money.  The short answer is “it depends.”  If you are a home user with no intent of doing any commercial activities with the software, then the answer is “likely not”, however if you want to do a small home business or are a full fledge business the answer is “absolutely!” 

If you look at the End User License Agreement or EULA on many of the free applications, they are free for non-commercial use only.  What this means is if you are using it to make money, you need to either pay the freeware company a fee or find another software that allows commercial use.

Commercial or paid soft does offer some advantages.  One of the biggest advantages is in integration.   Now what do I really mean my integration?  Simply put integration is where multiple applications link in with each other and function together.  One of the best examples of this in the Microsoft line of products where the domain management software called Active Directory links in with its email product Exchange to share users and make changes the email user’s account directly from Active Directory.  This gets expanded if the company uses Microsoft’s Office Communicator Server (OCS) instant messaging application that not only hooks in to active directory but in Microsoft’s email client Outlook by natively displaying a user’s chat status and linking that to items on their calendar to show free/busy times.  It further allows you to start a chat instance directly from Outlook without having to pull up the Office Communicator window and conversely, be able to start an email from within the Office Communicator application.    You generally do not get this level of shared functionality out of group of freeware applications produced by various vendors that normally are not working together. 

If you look at things like photo and image editing, the premier application currently is Adobe’s Creative Suite line that includes Photoshop and Illustrator.   While it is a costly suite of software, if you are going to be doing this kind of work as a moneymaking activity, spend the time and invest in the correct tools to do your trade.  While you may be able to do “everything” using a group of disparate applications, you will save yourself time, and as such money, in the long run by buying the right application for the job at hand. 

While everything I have discussed to this point is important, as a businessperson, small home office or large corporation, one of the key things with all of these products is the readily available training for the various software applications.   Companies like Microsoft, Apple, Adobe, and the like have a large ecosystem of training for users and IT professionals.  Most also have some form of certification track so that professionals have the ability to demonstrate levels of competency to their employers.  This is good for a business in that you are not locked with software you cannot hire someone to come in and maintain because it is a little known application with not viable training system.  Even for the home user, this vast training system is beneficial.  Many colleges offer extension and even credit courses on the use of software products that can allow you to maximize the use of the software you have purchased.

 

The final major advantage of paid software is that you have a high degree of confidence that you are going to receive things like patches and hot fixes for the software as security issues become known.  Using a freeware product, you always run the risk of it becoming “abandonware” where the developer has stopped supporting and developing it and now you have a software that is a security risk with no way to fix it or in some cases, move it to a new version of your operating system.  Paid software, especially those from large established companies like Microsoft, Apple and Adobe have teams dedicated to not only patch management, but also have a plan for the next iteration of the software and plans for backwards compatibility.

 

Overall, freeware is not bad, it can be a great bonus to make a home user’s computer a truly functional system, but businesses generally should be using properly licensed commercial software to leverage the most out of their IT assets and comply with the applicable legal requirements.

 

Tags: , , , , , , , , , , , ,

0

Password Theft

Posted by Josh on September 5, 2012 in Uncategorized |

Below is a great infographic that shows some really interesting information on passwords and password theft this year.   Infographic: 2012, the year of password theft   Note: Infographic was produced by Security Coverage; this posting does not consitute an endorsement of their security products, but merely a sharing of their infographic product.

0

You get what you pay for…

Posted by Josh on August 30, 2012 in Review, Security |

“You get what you pay for is an old adage that implies that if something is “free” it likely isn’t “good”.  Nothing could be further from the truth when it comes to applications for your windows computer!   Symantec and MacAfee are the two “leaders” in the anti-virus world but there are other great options […]

0

The Lost Art of Physical Security

Posted by Josh on August 26, 2012 in Security |

  When you read about IT security, you see lots of hype about Operating System security, application security and various types of encryption.  What is often left out is the concept of physical security. You might ask what physical security is and it is a good question!  Physical security, as it applies to Information Technology, […]

Tags: , , , , , , , , , , ,

0

Own the Email, Own the Person

Posted by Josh on August 21, 2012 in Security |

This article by Dennis Fisher is a great piggy back on my Password Security  and Social Engineering articles. For attackers looking to take control of a victim’s online presence, there is no better place to start than the target’s email account. If you own the email, you own the person. That’s never been more true than today, with […]

Tags: , ,

0

Everybody Lies…

Posted by Josh on August 20, 2012 in Security |

  To quote the famous TV doctor Gregory House, “everybody lies”.  Why do I say that, I do not know a single person that actually reads the whole end-user license agreement (EULA) on software products they buy.  They are those things that everyone clicks “ok” to after scrolling through what seems like 100 pages of […]

Tags: , , , , , , , , , ,

0

The Mobile Device Dilemma

Posted by Josh on August 13, 2012 in Security |

Within the US particularly and most “first world” countries, we live in societies of “always on” and “always connected” for both personal and our professional lives.  While this 24×7 connection allows for greater productivity and hyper-connectivity, it is not without its own pitfalls.    From both a personal and professional standpoint we must take a […]

Tags: , , , , , , , , , , , , , ,

0

Certification vs. Experience vs. Degree

Posted by Josh on August 8, 2012 in Review, Security |

Something that comes up often both when organizations are looking to hire a new IT professional as well as within the circle of IT pro’s themselves is how do certifications, experience and an IT related degree stack up against each other.   Long time IT folks tend to have the view that experience trumps and often […]

0

Continuing Education

Posted by Josh on August 7, 2012 in AFCEA |

Below is a nice writeup on the Continuing Education Program that I started for my local Armed Forces Communications and Electronics Association (AFCEA) Chapter. http://www.afcea.org/signal/chapternews/index.cfm?action=details&id=2075

Tags: , , , , , , , ,

0

The WiFi threat is real

Posted by Josh on August 5, 2012 in Security |

One of the most common threats to a computer user’s security is something that has been widely adopted by businesses and home users alike.  Wireless internet connections, also known as Wi-Fi, has made connecting you computing devices to the internet easier in a wide range of locations.  The same technology that allows you to connect […]

Tags: , , ,

Copyright © 2012-2018 All rights reserved.

SiteLock