5G Cellular amd its potential impacts

Well darn, now that 5g cellular and 5g ultra-wide-band have been deployed for a while, I had hoped to be able to write a column about the health impacts of exposure to the new RF (radio frequency) radiation that makes 5g possible. Unfortunately, folks growing a third arm or other whatever from spontaneous genetic changes are blaming it on the covid vaccines. Worse yet, running a fever (as a result of exposure to 5g radiation) is being blamed on the covid virus and those diplomats who have been coming down with RF exposure symptoms are being blamed on the Russians and the Chinese (using a new kind of weapon).


On a more serious vein, it is too soon to have any useful data on the impact of long term exposure to the new 5g RF radiation. And we live in an environment where there are too many alternate potential causes for the kind of symptoms that could present this early in the experiment. This does bring up my primary complaint. We did not do the kind of long term exposure testing for these new protocols and the use in public areas of RF radiation of this frequency at this power level that historically was required for Government approval of its general use. This time, we the people are the experimental population (sounds a bit like fast tracked approval of the covid vaccine to me).


On the positive side, 5g is providing the kind of high speed internet alternative (where available) that is needed to carry out some (if not all) of the new video conferencing, distance learning, home office operation, and so forth that our modern times require. It is not just from the tower to your phone (or other 5g device) either, 5g allows the cell towers to carry much more bandwidth more reliably and (soon if not already) at a lower cost (power draw, equipment and maintenance).


So, if you are one of the unlucky that does not have access to good wired internet or “old style” wireless internet but do have a need for reliable, fast (by current standards) internet access, it may be time to contact local providers and see if any provide 5g services to your location and what kind of service they can provide you with at that location.

As an additional tip, while it does take some time, contacting your existing source of internet and asking about improved services they can provide can often prompt them to “upgrading” you to newer more cost-effective, faster service. If they don’t have any such advances available, your asking can help them understand the demand within their service area and speed up their move to provide better service.

New Scam (to me)

Aha, a new scam, well new to me. Support specialists claiming that the version of windows on your computer is a promo version or demo version or for some other reason not a valid version and it will stop working soon or on some fictitious date ( a real date but not one when your version of windows will stop working). With Windows XP, Microsoft learned its lesson and so does not make promo versions of windows available to system builders and refurbishers.

To my knowledge there are 4 kinds of windows 10, OEM Windows (available to small volume Original Equipment Manufacturers), Volume license Windows (available to a variety of large volume system builders, retailers, etc.) and retail Windows (widely available to most everyone). That leaves the type of Windows available to registered refurbishers.

Code wise they are all supposed to be identical, though all 4 are moderately customizable and I have encountered some differences when working with versions provided by Dell and HP. I have also encountered a few counterfeit copies of Windows 10 in the last couple of years; but, they failed licensing and initial updating,a trait my sales training with Microsoft taught me to watch out for.

So, if you have an existing machine that has been licensed and getting updates, you can be fairly certain that any pop-up messages or phone calls “alerting” you that your version of Windows 10 is about to stop being supported are SCAMS. For that matter, any copy of Windows 10 that makes it through the OOBE (original owners beginning experience) which includes activation, is a valid, fully licensed, legal copy of Windows.Ignore the scammers who want to fix your unlicensed copy of Windows (because it is licensed) and do NOT give them your money in any fashion.

What should a retail copy of Windows 10 cost? Home: $135 and Pro: $199 and you will find older copies reduced on occasion to $100 and $170 but Microsoft insists that these are not priced any lower than that for retail copies, copies priced lower may not be legitimate.

When will we see Windows 11? I have not seen any fixed date yet; but, we can hope it will be later this year. Initial word from Microsoft is that Windows 10 users will automatically be updated to the new Windows 11 shortly after the official rollout.

Internet Service in the 2020s

A reminder to read the contract carefully before signing on to an ISP. With users commonly streaming and video conferencing, restrictions on usage can be devastating. QoS (Quality of Service) clauses should promise a certain amount of bandwidth and uptime and while not customary on consumer internet contracts are common and recommended on business service (that is why business service tends to be more expensive).

Six years ago I had a potentially nasty experience with an ISP, at the time I posted the following to Facebook: “Looked at a contract for a local ISP today; I am totally aghast at the restrictions in this contract. The ISP only serves businesses but the contract has no QOS; instead, it has a QoS disclaimer clearly stating they do NOT promise to provide the advertised speed. Further, if you go over 30Gb in any given month, you pay 1cent per 2MB over. Thinking about it, I burn 20-40GB some days when we are home. Just think, no promise of performance and a 2-year contract with a $1000 penalty for an early exit!”

Many ISPs will advertise a specific package for general consumers but you can usually ask for and receive much better service (and at a higher price). If you are working from home and 12Mb/sec down and 2Mb/sec up service just won’t hold a conference call (let alone allow you to host one), call potential ISPs for your location and see about 50/10 or even 50/50 service for your location. ISPs have had a full year to adapt to the new needs of users and should have service plans available to provide whatever they need (some locations may not have all service types available).

It is also important to contact ISPs and request the level of service you need so that the ISPs can get a better idea of where they need to expand their infrastructure in order to provide for the needs of users in that area. Regular reminders that there is demand for more expensive services will help providers decide to build up the infrastructure to provide for those customers.

With 4G and 5G cell services becoming more widespread, it is also possible that internet over cell carriers may be the best option for some folks who are not “in range” of local services provided by ISPs. Products are emerging that can take a cell signal and provide connectivity for up to 100 connections (instant ISP), look to pay $300 or more for the equipment and a nice bit to the cell carrier each month; but, it may be the best service if you are out in the boondocks (internet service wise). Oh, yes there are also the wee jetpacks that cost roughly $100 each for those wanting to supply service for just themselves. Here again, read the contract carefully to avoid limits, costly overage fees, and “throttling” once you consume so much per day or billing period.

System slow?

Three customers this week with the same symptoms and Microsoft AND Google are the cause. Microsoft has some “necessary” updates they are pushing out and seem to not be recognizing customer settings regarding when updating or downloading for updates is preferred; so, the systems appear to come to a crawl with regard to anything internet-based and marginally performing systems come to a crawl regardless of what the user wants. On top of that, some clients using Google services are having some serious performance/lag issues even just picking up email (this goes back 10 days or so).

I confess that I initially took this quite lightly with a “they will fix it soon attitude” and like the Windows issue with printers and the spooler service soon was not forthcoming soon at all. However, these problems do point out some issues with how we use our computers currently. Far too often machines are fired up, used for a few minutes, and then shut down preventing important updates from loading let alone installing. Far too many of us rely on cloud and other types of internet-based services and interfaces and various “forces” prevent good service.

With more folks trying to work online, young folk doing school online, and businesses switching to cloud-based services, the demand on internet access continues to skyrocket causing bottlenecks, lag, and in some cases service blackouts. On top of this, service providers are having to greatly enhance security measures causing even more apparent outages.

So, a few of my hot topics.

1. Do not store important documents of any kind in emails. If it is important, save it to a hard drive, thumb drive, or other local to you storage. Even putting it on your desktop is a better solution than leaving it in your email.

2. If you set your computer to do updates at night or want it to do updates AND maintenance at night, it has to be left on at night. If you turn it off (close the lid) when you are done, it will do updates and maintenance while you are trying to use it and that goes badly.

3. Anything important to you needs to be stored in multiple places and in multiple ways (no, email is a bad idea). Services exist to do this behind the scenes but most use internet bandwidth to accomplish the redundancy so scheduling for after midnight and leaving the computer on gains even more importance.

4. A slow-running computer isn’t just annoying, it is also a really good hint that something is going wrong. It can be the aging of a storage device to failing memory devices to service errors (backup stuck, updates failing, updates, or maintenance running during prime time) to malware or other unintended apps running. Take heed and get it looked into.

System Maintenance

General maintenance of modern computing devices can involve both the hardware and the software (I’ll include data in the software) and is an important part of owning a computer. It can be performed by the user, a designated individual in the company or family, or by a paid professional; but I will reiterate, it is important that it be done and regularly.

Hardware maintenance often consists of cleanliness; both keeping the computer and its functional peripherals clean and cleaning them when they collect dust, grime, fingerprints, etc. Many CPU units use air flow to keep cool during operation and this can lead to dust accumulation which needs to be removed periodically (6 months in some environments, yearly, or even every 2 years in very clean environments). Monitors tend to collect dust and some may build up a haze, glasses cleaner is appropriate for most, some of the early plastic screens have special requirements (check with manufacturer). Keyboards and mice can often be spruced up by inverting and removing any debris, dust, etc. If sticky stuff gets into a keyboard, it is often best to replace but normal surface cleaners may be used in an attempt to clean, again, do so with the keyboard inverted to avoid getting detergents, solvents, and so forth onto the contacts of the keys.

Software maintenance amounts to determining what needs to be updated and getting those apps updated in addition to running storage backups (your files and data) and garbage file removal before finally getting the storage drives defragmented. Some commercial software utilities will perform these tasks for you; but, at least once a month, these operations should be done manually to ensure that they complete and do what is expected of them.

Regularly: keep underside of mouse, surface of keyboard, and touch-pads clean.

Annually: check air intakes and clean if warranted. Check cooling system and clean if necessary. Remove any build up of debris or dust in the interior of the CPU case.

Monthly: perform or verify backup of important data. Remove excess files, temp files, etc. Run a defragment of all storage devices to verify error-free operation and optimize file access speed.

Weekly: verify versions for operating software (check that auto-updates are working as expected) and check on versions of security software (should never be more than 3 days old); manually update as necessary.

Example: Once a week, check that Malwarebytes is up to date and that Microsoft updates have been loading (settings, updates). Have Auslogics defrag set to run weekly and Ccleaner set to run continuously. Once a month, run Ccleaner manually to clean files and the registry; then run Auslogics defrag and have it defrag and optimize. Every six months (at the beginning of summer and winter) visually inspect the case (CPU box) and if any dust buildup is evident anywhere on the outside, open it up for cleaning or contact the person or service responsible for that service to schedule and perform a thorough cleaning.

Warning from Microsoft & Warning about the warning

Ahem, here we go again. Microsoft has published a call for users of all Windows versions from Windows 7 to Windows 10 to allow a new set of security updates that correct a vulnerability in their (Microsoft’s) print spooler service. A third party spotted the vulnerability and then published it along with why they found it to be a serious problem and Microsoft claims that this has lead them to make this plea to users.

How serious is this vulnerability? Folks who have not installed HP printers on their system and thus have the original form of the print spooler may include this vulnerability which can allow a remote agent to authenticate code as being from a supervisor account and initiate its execution (a hacker’s dream situation). So far, none of the mainstream anti-malware, anti-virus packages (Norton, McAfee, Eset, Avast, and more) provide protection against this kind of assault; but a few products do by design (Sophos, Malwarebytes for instance) because they do not look for specific behavior or content but rather activity, propensity, and links + paths in addition to the standard methods of protection.

This event caught my attention because a couple of watchdog services and magazines flagged these updates as buggy or potentially problematic. If you happen to have a printer that uses special features in the driver (HP, Brother, Kyocera, and a few others), these security updates could disable printing or some features of printing or possibly even the normal boot sequence for your system or server. Yet another third party claims to have released a set of tools for correcting the bugs in the security updates; but, I have seen no evidence of the efficacy or safety of those tools thus far.

A second issue is that Microsoft has long since removed the option for users to pick and choose security updates of this level of importance, so they are likely to install with no notice to the user and no opportunity to avoid them. We will know the updates have been installed when something goes wrong, after it is too late to do anything about them.

Unintended tasks for your device?

I have been thinking lately about how to describe (in English) why modern computers don’t feel a thousand times faster than the computers from a decade ago or more (at heart they are more like 10,000 times faster). So, why aren’t these new machines just instantaneous in responding to all of our requests?

To start with, many of us are hooked on these lovely graphic user interfaces which eat oodles of system resources and performance. Add to that all of the really nice little accessories (alarms, calendar features, spell checking, grammar checking, etc.) that we all love and load without a second thought. What? you didn’t load any of that stuff? Well, if you are running an Apple IOS or Microsoft Windows, then they are already there (part of the package).

Does it seem like your computer is real busy at times but not responding to you? You are probably correct, your computer is busy doing “background” tasks. It could be updating, synching a drive, or the cloud, or to another device or two. It could be running a security scan, indexing files, fixing file errors, or searching the web for advertising items to match your interests (inferred from your web activity, searches, etc.).

Much of this is “stuff” that users have little control over, some of it is stuff you can remove from your computer’s to-do lists, and still other stuff can be removed by a good anti-malware program (which may also eat up some performance and resources). Carefully choosing which tools to use and which ones to avoid can make a big difference. In the long run, modern computers are usable by a much wider range of users because of these conveniences (called bloat and other negative terms); but, the price we pay might be well worth noting the next time you wonder why your 6-year-old computer seems incredibly slow.

Another cause for poor performance can be an aging storage device. Yes, hard drives and even SSD’s suffer some performance reduction as they age. A 3-year-old hard drive is likely to show a 30-50% decline in performance compared to a new one of the same type while a 5-year-old SSD may show a 20% reduction in performance when compared to its self when it was new. At some point, you may wish to consider replacing your primary storage device simply to regain that performance level from when the device was new. This will also improve the odds of avoiding catastrophic storage failure or simple data loss.

Updated OS’s from Apple

It may not be news to most; but, Apple has released an updated OS for many of its product lines that may contain a “gotcha” for the owners of older Apple products. Apple has taken a step forward in optimizing their OS’s for the new M1 family of products. Unfortunately, this has been done at the expense of the stability and performance of products using earlier chipsets (like the Intel-based Macs). If you have one of the non-M1 based products, please discuss the pros and cons of upgrading (before you take the leap) with a Mac professional.

This act on the part of Apple highlights the importance of having good backups, keeping installation materials, and remaining vigilant in the face of “newer is better” cultural bias. Apple is doing what they promised to do, providing new and potentially better computing experiences for their customers with their new products. It is our responsibility as consumers to carefully choose what we purchase and how we maintain those products.

FCC Seminar

On Tuesday, February 23 the FCC along with its partners, the Consumer Financial Protection Bureau (CFPB) and the Department of Health and Human Services’(HHS) Administration for Community Living, hosted a webinar highlighting how older adults can protect themselves from current COVID-19 scams.  

The webinar provided tips on how to avoid vaccine-related scams and resources available to older adults. A recording is available on the event page and on YouTube.  

When it comes to the vaccine, you can’t pay to skip the line or reserve your spot. Inbound calls or texts that ask for your Social Security number, financial details, or insurance information to reserve your spot are always a red flag. Learn more about how to protect yourself. 

Vaccination plans will vary across state and local governments. Check with your state or local health department to learn when and how to get the COVID-19 vaccine. You can also talk with your health care provider, pharmacist, or health insurance provider to learn more.   

For additional information about the webinar, please contact FCC Outreach at outreach@fcc.gov.   

Microsoft Ads for Surface Pro 7

Speaking of scams, Microsoft seems to be using an oldie but a goodie, bait, and switch. I followed a sales link to look at the Surface Pro 7 (I had a chance to see one in action a few days ago and learned some things). Advertised at $550 you can get what amounts to a boat anchor worthy device; if you want a usable surface pro you will spend $900 + $150 in insurance (not just extended warranty).

What is the difference? At $550 you get an i3 based tablet (too slow even for word processing or video streaming) add a keyboard at $100 (discounted to $70, less with a coupon) and you are at $620ish. But, the i3 version I used was virtually unusable, so upgrade to the i5 version and choose the version with 256gb ssd (because windows eats up 96gb of the 128gb version) and you find yourself with the $850 version of the surface, add a keyboard and you hit $900 but get free shipping.

Why do I all but insist on the $150 insurance policy? Because the included warranty provides no protection if you drop the unit, spill on it, spit on it, or if the screen fails, and the screens have been routinely failing between the 6 month and 18 month period of ownership. Replace a screen without insurance at $250 + $150 minimum labor and $70 shipping (buy a new unit if you started out with the i3 version). damage a USB port and expect a $375 + $150 minimum labor + $70 shipping repair. Oh, and don’t forget that leaves you without the unit for a minumum of 10 days and the unit you get back will be blank (factory reset).

Other than the above, it looks and feels like a nice, very flexible tool for a variety of uses (windows-based). I have noted that almost all second-time owners sprang for expensive cases to protect these quite fragile devices (well, no more fragile than the ipads they say they are competing with in the recent advertisements).

Historically, I have recommended Surface machines for field devices, backup devices, and for office devices that needed to fill a wide variety of specialized needs. Mostly, these products have been successful in those roles when the appropriate model with appropriate accessories are selected. Because they are low power, battery operated devices and quite small there have been some issues getting them to work reliably with some peripherals (the USB ports do not provide the standard current that a desktop or full laptop does) and there is usually one one port available to attach peripherals to the unit. Using one to drive a projector or large screen requires some careful configuration and often an experienced pc+video technician, suffice to say it is not a non trivial enterprise to setup.

Simple Guidance

Scams on the internet are so frustrating! What can you do? My first recommendation is a simple one. If you get a message, popup, or any other form of indication that you need some piece of software or update AND it is from a manufacturer you know or is very common in the industry, DO NOT click the link! Instead, use your browser and go to the manufacturer’s site and get the update or feature or software directly from the manufacturer’s website.

If there is any doubt in your mind whether you need the update or the software recommended ask someone in the profession (a consultant, geek squad, etc.) for guidance. It may be an indication you are being phished or have malware trying to get established on your computer.

As an additional thought on scams. When I suggest that people go to the manufacturer’s website I am not suggesting that you search for it, I mean type in the address directly in the browser’s address bar. If you don’t know the appropriate website, this is when you should be calling a professional for guidance. Really, most of us would much rather assist you before there is a huge mess to clean up.

Honest, that image is not from your antivirus package, that is a bug in its glory trying to get you to help it get installed.

More Scams

I am preparing to give a seminar on computer basics and it occurred to me that most people never think twice about what they plug their electronics into. It’s a wall outlet and it provides power; but, is it the right power? Just as I was working that out, I get a call and it is someone who has been caught by a browser internet scam.


So, first off, computers come with one of three kinds of plugs. I refer to the 3-prong, the 2-prong polarized, and the 2-prong unpolarized. The 3-prong is a grounded plug and the ground pin provides protection for the user of the device as well as guaranteeing the polarity of power provided is correct (assuming the outlet is correctly wired). The 2-prong polarized is used for equipment that requires correctly polarized power (hot vs common) while the unpolarized plug is usually reserved for devices that work just as well with or without correctly polarized power.


Over the years I have repaired quite a few power supplies that had been operated over time with reversed polarity power. In the early days that meant replacing the diodes and a few capacitors. In the later years, it was simply easier to replace the power supply and not worry about which components failed. That is the way with our society now, a failed component outside warranty doesn’t really concern us, we simply replace and get on with our lives.


Earlier I mentioned a scam. There are so many now and some are quite hard to detect; but, let me offer a few tips to help you recognize a scam. None of the computer manufacturers and none of the operating system providers watch your system to spot viruses, so, if your computer pops up any kind of message (other than one from the anti-virus package you have installed) that is an attempt to infect you and it (the code behind that message) is trying to get you to do things to allow the infection. And, none of the current products will suggest you call in to a “special” number to remove the bug. Microsoft will NOT call you and alert you to an infection. Lenovo will not call you and IBM business services will not call you alerting you to some issue with your computer. All of the manufacturers have automated their update services and switched to passive support of clients.


What do you do? If you suspect a scam or viral activity (or malware of any kind), try updating your anti-virus and then run a full scan. Then, if you are still suspicious, try running a second opinion malware scanner (Microsoft has one on their website as does Sophos and Malwarebytes). Lately, I have had the best luck with the Malwarebytes free version; but, all three are excellent. If the scam has disabled your ability to navigate or get to your anti-virus, turn your computer off and try restarting, this will disable 50% of the browser-born phishing attempts. In all cases, don’t operate on the internet without an up-to-date anti-virus or net-based protection of similar function.

Disposable Society RANT!

Rant on! Apple and Samsung have both re-tuned their warranties and extended warranty plans for their new phones. Depending on how you acquire them, these phones can run from $700 to $1200 to “included in your contract”. However, replacing a lost phone can give you a pretty good idea of the actual cost of the phone ($799 for a Samsung A21). It is clear that both companies have their eye on maximizing profit from these products as they have made it more cost-effective to forgo the extended warranty & replacement plans in favor of simply replacing the product with a newer model.


This is just the tip of the iceberg as they have increased the cost of repairing a damaged phone to the point where replacement is often more attractive than repair. For Apple, the $15 batteries can be replaced for $70 + $7 shipping, and expect it to take 3-5 days to get to Apple and a similar 3-5 days to come back. For Samsung, I haven’t found any real numbers yet for the battery or cost to have it replaced; but, I expect more than $50 for the battery and another $40 or more labor. Why are these procedures so expensive? The batteries are glued in and removal is non-trivial as is the proper installation of the new battery. Fortunately, Samsung has arranged for a lot more sites to be authorized for the replacement and other minor repairs so you may not have to wait a week to get your phone back, depending on where you live.


Still, the cost of common repairs ($249 for an iPhone12 screen + labor) on these new families of products are a significant percentage of the cost to replace the device. And, if you read the list of exclusions in the warranties and extended warranty plans, you can easily pay 30% or 40% of the cost to replace to extend a warranty that may not cover most of the anticipated issues. Given that we see new improved models every 6 months to a year and the rate at which the new rapid charge batteries decay, how badly do you want to pay that much to get your phone repaired?


Okay so Rant off (on our ever increasingly disposable world)!


Even with the foregoing, there are situations when the extended warranty and replacement plans can be cost-effective. If the device will be used in dangerous (for it) environments or by someone who will not take care of it, replacement plans can be attractive. For the rest of us, a screen protector and case are probably a better investment with an eye to replacing the device after 2 years of use. Along these same lines, you can choose devices that are water proof and made to survive considerable rough treatment. There are still some firms that will water proof many of the standard models if that is a risk for your device.


I am careful to choose phone models that have user-replaceable batteries and user-upgradeable memory because I have a history of keeping my phones for 4 years or longer.

iPhone 12 not consumer safe?

Oh my! I read that Apple has acknowledged a potential safety risk surrounding the use of its iPhone 12 series of products. In addition, Apple has also published a workaround for the “damage” caused by the interaction of its MagSafe products and iPhone 12’s. For me, the issue has to do with FCC regulations regarding consumer products and their safety when used in “customary and ordinary ways”.


A quick bit of history about FCC certifications may be called for here. Back in the dawn of consumer electronics, the FCC required that all components undergo safety testing, and radiation testing and that sample units be supplied for verification by the FCC and licensed safety labs. As the volume of products increased, these requirements were gradually relaxed in order to foster innovation and speed new products to market. At that time, commercial products (ones used in non-public exposure) were required to meet Class A certification (the laxest standard) while products aimed at consumers required Class C certification (much more stringent standards and far more testing). Class B certification was in between the two and was to apply to products used by professionals who understood the risks and how to manage them or use products of that type safely. In another move to foster innovation and reduce the cost to bring products to the American consumer market, the requirement for meeting Class C certification was altered to allow Class B devices to be marketed to the masses.


Today, the FCC allows products to be verified as meeting a specific safety class by type matching; that is, if your new product is similar to one that was previously approved or verified by any means, that new product can also be considered as verified as meeting the same safety class. So, the new iPhone 12 series products meet Class B standards by this very process. I see two issues already where this may not be appropriate. First, the magnetic field created by the iPhones may exceed safety standards by a considerable amount, and second, some of the new phone signal types (5g, 5g wideband, etc.) may also not be safe under certain circumstances.


What caught my attention was that Apple came out in response to consumer questions and suggested that folks with certain medical devices like pacemakers or insulin pumps should keep their iPhones at least 6″ distant from any such device at all times. The second point of interest for me regards an issue with the iPhones and the new MagSafe accessories. In a similar warning, Apple warned folks that exposure of the leather cases to the interaction of iPhones and the MagSafe accessories may damage the leather or any similar materials and to keep any such materials 6″ from the phones or accessories (and to replace their phone cases with units made of different materials). Realize that human skin is just one such material and I read that as “keep these products at least 6″ from your skin at all times to reduce the risk of injury to your skin.”


How serious is this? Well, if you feel any warming of skin near where you wear your phone (or any other consumer device), and particularly if the device isn’t itself warm to the touch, you definitely should be concerned for your long term health. If your medical device issues warning beeps when your phone is brought near it, no matter how occasionally, you definitely should be concerned. Neither of this kind of event should be acceptable at any time and should result in Apple products being reduced to Class A certification at best.

Personally, I suspect that this admission by Apple clearly identifies that their new products are NOT appropriately safe for consumer use, that their response is a clear statement of these products not meeting Class B standards, nor meeting any of the FCC’s categories for certifiable products. In particular, where medical devices (wearables or implanted) are concerned, those devices have reason for primary bandwidth and interference protection from all other devices and the Apple products are clearly violating this protection given customary use of these products (ie, wearing them on a hip or in a pocket or tucked into clothing) in my opinion. With luck, the FCC will review its approval of these products and cause some modifications for user safety.

Modern advances for transportation?

Technological advances in automobiles and particularly in aides for the driver have enjoyed some significant advances of late. While many advances may have been aimed at making a driverless car possible; some could also improve the safety and ease of driving. Take, for instance, a cruise control that can be set to follow the car in front of you and a lane maintaining system that can keep your car centered in a specific lane. Combine these two and it sounds like you could get in position, set the controls, and take a nap on your way to a destination.

We may still be a bit away from the time when auto-driving cars are common let alone dominating the morning commute, but the technologies to make that possible are real if not matured. By setting up cars to form a network so they can exchange data: relative position, speed, obstacles, and planned path, the future seems attainable. The fly in the ointment would be older cars in the “pack” that can’t share and agree upon who goes where. Oh! And let us not forget the unanticipated factors of weather, animals, landslides, rocks in the road, etc. All of that will take some serious development to manage.

Back to the current advances. I have seen advertisements for cars that have “following” modes for the cruise control; presumably, that would maintain a preset distance between your vehicle and whichever vehicle happens to be directly in front of you. I have also seen advertisements for cars (same brand and others) that have a lane holding system (keeps the car centered in a given lane). Finally, a system that would let you set your cruise control on your RV and ease back to grab a beverage. I am not certain our current level of sophistication will allow such features to be used safely. Admittedly, both could make driving considerably safer if the driver remains alert and in a position to override the automatic features; but, how alert will a driver remain if their continuous input is not needed?

It looks to me like a lot of computer power and sophisticated programming will be required to take the next steps in semi-automation and full automation of vehicle operation. I believe the computer power is available and can be made small enough and rugged enough to survive vehicle operation; but, getting the software matured sufficiently to hand all (or almost all) possible situations safely is going to take some time and some changes to our highways, streets, and our expectations. I also look forward to improvements in the various sensors, locating devices, and cameras to help bring us through the next steps.

Safety of modern transmitting devices?

It continues to amaze me that supposedly learned folks will vilify comparatively safe modern conveniences when others which have a far greater potential for impacting health are ignored.  For instance, the power meter or water meter that transmit a very short distance (very low power) only occasionally when compared with your cell phone which is in continuous contact with a tower 1-5 miles away (higher transmit power).


Dating back to the 1930’s and 1940’s the Navy was doing research on exposure to high-frequency signals.  They were concerned that putting radar on ships and smaller craft would put crew members in danger or that perhaps RADAR could be used as a weapon against enemies.  Fortunately, they were unable to develop an efficient weapon; but, they also determined that exposure to radiation in the mid bands (700mhz to 1ghz) had little to no impact on skin, internal organs, or brain tissue.  One of their findings (since repeated) was that high power transmissions at close range could warm the skin and, if continued, the internal organs as well.


In order to protect us, the FCC has restricted the amount of power that handheld devices and household devices (cellphones, wifi routers, IOT devices) may transmit with an eye to preventing the type of exposure that could warm the skin even in contact.  The potential for trouble begins when you start to expose living tissue to higher frequency signals like the 2.4ghz, 5ghz (high-performance routers), and the 100ghz and higher used in the newest 5G devices.  Sadly, the further above 1ghz (1000mhz) the signal gets, the more energy it carries, and the less we know about the long-term effects of exposure to it.


The higher energy in the signal (5G wideband for instance) greatly enhances its ability to carry data (speed and reliability) making its use a highly sought-after practice as demands for ever faster and more reliable internet dramatically increase.

The new basics of computing

I was setting up a couple of new computers this last week with an eye towards how I will go about explaining computer basics in the current computer world. Setting up machines from scratch (or from commercially installed windows or Linux, or macOS) has become much more time consuming than I remember it being just 8 years ago when 40 minutes was more than sufficient time to get to the GUI (graphical user interface) and start using the computer. Now, the updates can take forever (1.5 hrs on a fast Debian system to 28 hrs on a fast windows 10 system) and the wait for initial setup simply adds to that (okay, the Linux setup time is very fast if you ignore updates).

So, is the first thing we should discuss when talking about computer basics the need for updates, security, network connectivity, and data security? That could take hours and wouldn’t have the user any closer to typing their first letter; but, they are necessary topics, particularly for those new to using a computer. Perhaps it would be good to back up even further (along the lines of basics) and discuss power sources with an eye to user safety and good long term operation of the computer, protection from power surges, brownouts, and all the other issues that can befall any device connected to the outside world.

Thus let me get on my soapbox and rant a bit. Yes, good clean power and well-grounded data sources are important (some computers do not use a grounded power cord – laptops mostly) and the ground is the preferred route for any high voltage (lightning) events to use instead of the computer or you (so, it might not be a bad idea to disconnect that laptop from everything during a thunderstorm). Yes, updates really are necessary because the threat posed by malware, viruses, hackers, and a host of other sources requires constant improvements in system security. In addition, many new devices coming out on the market require additions to the Operating System in order to work with your computer.

On the topics of malware, viruses, and hacking, a multi-pronged defense is what I currently recommend. First, keep your OS up-to-date (so you are less of a target to known threats). Second, keep a firewall between you and the outside world (either built into a router or running locally on your system). Third, keep and maintain (more updates) an anti-virus product running in the background. And Fourth, choose a “second opinion” malware scanner to use when anything suspicious occurs (because the first target of many hacks is the installed anti-virus)(Malwarebytes, Sophos, and Microsoft all provide reliable such products).It helps to have a very basic understanding of how your network connectivity (access to the internet, wireless printers, scanners, etc.) works. No, I am not suggesting you want to learn about transfer protocols and the like; but, are you connected by wire? Or, are you connected wirelessly by WiFi or Bluetooth? Does the device that connects you to the internet provide an adequate firewall? And, roughly what kind of data speed (bandwidth) does it provide. Generally, your ISP can provide this information either when they connect you up or upon being asked about your LAN (Local Area Network).

Data security, at its basic level, hasn’t changed in 30+ years. Storage devices fail (fact) and when they do, your photos, documents, etc. can be lost if you do not have backups or synchronized copies (perhaps in the cloud), or just plain copies on some other device (a second computer, thumb drive, USB drive, or other backup devices). The same applies when you are working on any project, document, spreadsheet, etc. you need to save early and often and even create multiple copies on occasion. The use of encryption is up to the user in most cases and prevents data recovery attempts in the case of equipment damage or failure while making it very difficult for a successful hacker to get anything useful from you.

Clear as mud? Like operating a vehicle, there is a lot to understand in order to do so safely and efficiently. Various service providers can be quite helpful if asked (they might well assume you don’t need help with the basics). Duplicating important data remains a necessary if inconvenient step.

Alert! Ransomware is making a comeback

Alert, the bad people are back at it again. If all the new scams weren’t enough, ransomware has a new twist and it is booming. Instead of the authors deploying ransomware in its latest incarnation, they have gone to contracting it out, designing it to be custom configured by middlemen and deployed by ghosts, who collect their money and disappear only to reform under new names, identities, you name it.

This new style of ransomware comes with some really clever new techniques to avoid detection and some new approaches to maximizing the income potential of holding someone’s data hostage. And, this new incarnation of ransomware also steals data while encrypting it.

First, a hint of the new techniques. Since the ransomware is sold as a configurable suite of exploitative modules, it isn’t easy for anti-virus software, devices, or even behavior watching protections to recognize. Second, one of the features is a really slick module that can funnel disk requests to the operating system’s cache manager and then use (Windows or Apple) built-in operating system components to encrypt the data while in the file cache, tag it as new, requiring synchronization with physical storage and let the operating system finish the dirty work as part of its normal duties.

Surprisingly, the ransom for most of these attacks is very affordable; because they (the bad people) really want folks to pay the ransom. This identifies for them the people and companies whom they can then apply further (virtual) blackmail upon with an expectation of getting further money. So, you pay the $150 ransom and are contacted by a representative of the ransomers who often sets up and performs the decryption of part of the files only to be told that your data was also stolen and will be publicly posted if you don’t pony up lots more money. And they aren’t bluffing, there have already been a few very embarrassing cases where they did just that (posted the “secret” data, identified the source, and advertised it on the open web).

So, how do you protect yourself against this kind of assault? Keep your operating system up to date, your antivirus and antimalware up to date, do regular “full” scans of the data holding machine, and all machines that have access to that machine. Keep your firewall on and as restrictive as possible (in an office consider an adaptive firewall appliance or gateway server). Honest, if you don’t get occasional firewall violations and refusals, your firewall is not restrictive enough.

Having good, current, and disconnected (not available to be “live” updated and thus also corrupted) backups is the best way to recover from most ransomware attacks and many other forms of exploitation. Also having company-wide policies in effect (no alien machines, no disks or drives introduced without proper verification of safety, no gaming, no use of unsecured email services, etc.) can go a long way to reducing your risk and attractiveness to the bad people.

Finally, if you do become a victim of hackers, or scammers, or ransomers, please do not pay the ransom. Instead, seek the assistance of law enforcement, your data insurance provider, IT security professionals, and other professionals as appropriate (each will likely have important insights to help you get through the event with a minimum of damage and cost).

FCC Notice of Rule

Notice of Effective date for Call Blocking Rules

CG Docket No. 17-59

On July 16, 2020, the Commission adopted the Call Blocking Third Report and Order, which adopted rules for the blocking of calls, including two safe harbors and associated protections for the blocking of certain calls.[1]  The rules become effective 30 days after publication of a summary of the Call Blocking Third Report and Order in the Federal Register.[2]  The Federal Register published that summary on September 14, 2020.[3]  Accordingly, the rules adopted in the Call Blocking Third Report and Order will take effect on October 14, 2020.


[1] Advanced Methods to Target and Eliminate Unlawful Robocalls, CG Docket No. 17-59, Third Report and Order, Order on Reconsideration, and Fourth Further Notice of Proposed Rulemaking, 35 FCC Rcd 7614 (2020) (Call Blocking Third Report and Order) (implementing, in part, the Pallone-Thune Telephone Robocall Abuse Criminal Enforcement and Deterrence Act, Pub. L. No. 116-105, 133 Stat. 3274 (2019) (TRACED Act)).

[2] Call Blocking Third Report and Order, 35 FCC Rcd at7650, para. 125.

[3] Federal Communications Commission, Advanced Methods to Target and Eliminate UnlawfulRobocalls, Final Rule, 85 Fed. Reg. 56530 (Sept. 14, 2020).

Server-based Issues

For those who have had some strange behavior with your Microsoft apps over the last few days (Sept 26 – 29), yes there have been some issues with the Microsoft servers. Microsoft admits to a multi-hour outage over the weekend. I suspect that they were hacked and Microsoft brought the services down to protect users. Evidence? Monday morning I attempted to load MS Edge onto a machine and the antivirus stated that the update was being abandoned because it contained a virus. Also, a number of cloud and email users of 365 and outlook products had the passwords from their products and Microsoft password storage purged during this same period.

If you are one of those impacted, it looks like Microsoft has cleaned up the mess and you can return to using those services. If your password(s) for one or more services was purged, go ahead and supply your passwords manually (as requested by the service in a pop-up) and then look into changing any affected passwords at your earliest opportunity. As always, it is very important to verify which service is requesting a password; if it is for a web service, look carefully at the address and make certain it matches the address for the appropriate service.

There are so many scams in operation out on the world wide web right now that it is likely you have seen or been called by one of the scam operations. There are several places you can look for help recognizing a scam; I can recommend fcc.gov and the many resources they maintain. In addition, a simple google search or bing search will often highlight what others have already encountered and identified. Your favorite neighborhood computer consultant or technician is likely to have already encountered and dealt with any but the very latest of scams and can be an excellent resource before and, sadly after you get involved with a scam.

A few tips, Microsoft is not monitoring your system (well at least not to spot scams or viruses) and will not call you to help you, will not put a full-screen popup on your computer, and will not email warnings to you. Any of these things are evidence that someone is trying to scam you. Generally, these scams are aimed at getting money from you, getting useable information about you or your financial footprint. It is extremely important that none of us give out this information to the scammers, no matter how harmless or helpful it or they may seem, and of course, do not give money in any form to anyone you do not already have a business relationship with.

Another tip, if the nice people who sent you a message or popup or warning offer to install McAffee products for you, or Symantec products, they are quite likely scammers. Why? Symantec owns both families of products and makes them available in bulk for at virtually no cost so they are easy choices for scammers trying to look legit.