Founder & Editor-in-Chief - Christian Computing Magazine

Founder & Editor-in-Chief - Christian Computing Magazine Founder & Editor-in-Chief - Christian Computing Magazine

10.11.2014 Views

very affordable, and we consider it essential on all ministry-owned systems. • Internet Content Filtering. For those with schools or who offer public internet access through wireless cafes, etc, internet content filtering is a must. Again, we recommend SonicWALL’s solution for this. The good news is that it’s all done through the same device as access filtering! Local Workstation Rights An area where many go beyond what’s necessary is local workstation security. We have found that an easy way to empower users is to give each user local administrative authority. This does not mean they have administrative authority on the network; only on their local computer. This eliminates a large percentage of support calls and keeps users from feeling like they’re fenced in. The potential dangers are that users might install something they shouldn’t or that they would do something that requires rebuilding their system. Training can help the first (though that risk never completely goes away), and using a strategy employing software such as Symantec’s Ghost (www. ghost.com) to build local workstations reduces the cost of the second threat. Backup, Backup, Backup! Enough can never be said for the responsibility to ensure the most critical data is backed up daily and a copy stored off-site at least weekly. This may be the network administrator’s most important responsibility because it ensures the ministry’s data will not be lost in a catastrophe. That’s our strategy! And anyone can do it! I hope it helps you and your team to do more for less, and to do it more reliably and without distraction. Nick Nicholaou is president of MBS, a consulting firm specializing in ministry computer networks, operational policies, and CPA services. You can reach Nick via email (nick@mbsinc.com) and may want to check out his firm’s website (www.mbsinc.com) and his unofficial blog at http://ministry-it.blogspot.com. Christian Computing® Magazine August 2008 14

special feature Mobile Computing Breakthroughs: Good News or Raised Concerns? By Steve Hewitt Much is happening in the area of mobile computing. In just a few short weeks, Apple has sold over 3 million iPhone 3G units. This week T- Mobile has announced that they will be the first wireless provider to market a phone with Google’s Android. What do these two phones have in common? First, they have Google Mobile with the “My Location” feature. Having the ability to search the Internet via your smart phone is nice, but adding the ability for the search engine to know WHERE you are, opens many doors, some of them fantastic, some of them a bit scary. What is important to note is that Yahoo has realized the value of what Google pioneered, and has just announced they are adding “Fire Eagle” as one of their latest features. Fire Eagle gives users of Yahoo the ability to report their location. Why would a user of Yahoo want to opt to report their location? First let’s go back and look at what Google Mobile with “My Location” is presently doing on smart phones. I just purchased an iPhone 3G for my wife and myself, knew where I was located at that moment, and where and have been enjoying many of the applications the library was located, I could touch a link to have a that I can download (more on this in a bit). Recently I map display showing me driving directions from where needed access to a book and drove approximately 20 I was at that moment, to the library. It also listed the miles to my local Borders. However, I learned that the phone number, which I could simply touch, and my book I needed was not for sale at that location. It occurred iPhone placed the call. Very cool…unless… to me that the book I needed has been published It should be obvious that privacy experts will be for a while and it might be available at a library. I didn’t concerned with the ability for anyone to know your need to keep the book, but wanted to check a reference. location. Of course, since I am a law abiding citizen, I Grabbing my iPhone, I touched the Google Mobile icon really don’t expect law enforcement to get a subpoena to do a search. However, the first thing that happened from a judge to force AT&T, Apple or Google to reveal was a pop-up that asked me if I was willing to share my my location. But what if a hacker figures out how to location with Google. I didn’t have any reason to hide infect my iPhone with a Trojan horse program that activates where I was, so I pushed the “yes” button. When I typed the “my location” feature and sends the informa- in “library” to do a search, something cool happened. tion about my present location to someone that might Google search results immediately listed libraries that not have my best interest at heart. For example, maybe were closest to my location. Even better, the results someone would like to know that I am traveling and not had two features that were very handy. Because Google at home. Of course, I am a firm believer that you should Christian Computing® Magazine August 200815

special feature<br />

Mobile Comput<strong>in</strong>g Breakthroughs:<br />

Good News or Raised Concerns?<br />

By Steve Hewitt<br />

Much is happen<strong>in</strong>g <strong>in</strong> the area of mobile comput<strong>in</strong>g. In just a few short<br />

weeks, Apple has sold over 3 million iPhone 3G units. This week T-<br />

Mobile has announced that they will be the first wireless provider to<br />

market a phone with Google’s Android. What do these two phones have <strong>in</strong> common?<br />

First, they have Google Mobile with the “My Location” feature. Hav<strong>in</strong>g the<br />

ability to search the Internet via your smart phone is nice, but add<strong>in</strong>g the ability<br />

for the search eng<strong>in</strong>e to know WHERE you are, opens many doors, some of them<br />

fantastic, some of them a bit scary. What is important to note is that Yahoo has<br />

realized the value of what Google pioneered, and has just announced they are add<strong>in</strong>g<br />

“Fire Eagle” as one of their latest features. Fire Eagle gives users of Yahoo the<br />

ability to report their location. Why would a user of Yahoo want to opt to report<br />

their location? First let’s go back and look at what Google Mobile with “My Location”<br />

is presently do<strong>in</strong>g on smart phones.<br />

I just purchased an iPhone 3G for my wife and myself,<br />

knew where I was located at that moment, and where<br />

and have been enjoy<strong>in</strong>g many of the applications the library was located, I could touch a l<strong>in</strong>k to have a<br />

that I can download (more on this <strong>in</strong> a bit). Recently I map display show<strong>in</strong>g me driv<strong>in</strong>g directions from where<br />

needed access to a book and drove approximately 20 I was at that moment, to the library. It also listed the<br />

miles to my local Borders. However, I learned that the phone number, which I could simply touch, and my<br />

book I needed was not for sale at that location. It occurred<br />

iPhone placed the call. Very cool…unless…<br />

to me that the book I needed has been published It should be obvious that privacy experts will be<br />

for a while and it might be available at a library. I didn’t concerned with the ability for anyone to know your<br />

need to keep the book, but wanted to check a reference. location. Of course, s<strong>in</strong>ce I am a law abid<strong>in</strong>g citizen, I<br />

Grabb<strong>in</strong>g my iPhone, I touched the Google Mobile icon really don’t expect law enforcement to get a subpoena<br />

to do a search. However, the first th<strong>in</strong>g that happened from a judge to force AT&T, Apple or Google to reveal<br />

was a pop-up that asked me if I was will<strong>in</strong>g to share my my location. But what if a hacker figures out how to<br />

location with Google. I didn’t have any reason to hide <strong>in</strong>fect my iPhone with a Trojan horse program that activates<br />

where I was, so I pushed the “yes” button. When I typed<br />

the “my location” feature and sends the <strong>in</strong>forma-<br />

<strong>in</strong> “library” to do a search, someth<strong>in</strong>g cool happened. tion about my present location to someone that might<br />

Google search results immediately listed libraries that not have my best <strong>in</strong>terest at heart. For example, maybe<br />

were closest to my location. Even better, the results someone would like to know that I am travel<strong>in</strong>g and not<br />

had two features that were very handy. Because Google at home. Of course, I am a firm believer that you should<br />

<strong>Christian</strong> Comput<strong>in</strong>g® Magaz<strong>in</strong>e August 200815

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!