Author: Aaron Peterson

  • Desktop Linux Wishlist

    Revisions of filesLimit characters in filenames.logging and error messages.version system for documents folder.kiosk mode –integrate into sddm toocaptcha for new HID devices to prevent rubber ducky attacks Parental Controls/organization controls — time limits, filter for firewall, block vpns for user, program restrictions reporting of activities sandboxing of apps apply/cancel alt-space shortcut to get window menu,…

  • Backup and Data Retention Practices

    Your data is important. UPS uninterruptible power supplies can help your computer shut down safely.Computers need to save things to disk, if the power goes out, work WILL be corrupted. UPSes have confusing buttons and someone may turn off the UPS hurting the computer. Filename length, backup folders should have short directory names because the…

  • Security Goals

    Prevent access to data by bad people. Including their queries.Figuring out who the bad people are is difficult. A good policy is to not trust unless one has to. Allow access to people who are supposed to have access, in the appropriate way. Some queries of your data may be allowed/searches for malware.These people should…

  • Eye Diabetes

    Some people like eye candy. Having an organized good looking work environment is nice. But how much do you really care about windows being animated and blurring and whizzing by? Do we care that 95 percent of the computer work is done just to provide entertainment to someone? When I am working off battery, I…

  • Security Camera Overview

    Modern Internet Protocol (IP) cameras allow for: Desired Outcomes Cautions and costs: Mitigating Things that can and will go wrong: Power sources for the cameras: Hard Wired, light fixture: Light-bulb socket Power over Ethernet (PoE) requires a hub and a single ethernet wire to each camera. Power outlet to 12V Power outlet: USB (Battery optional)…