What To Do on Getting a New PC?

Kurt Knutsson offered a checklist for this in a recent Fox News article, and it could be a useful checklist, but for one glaring error (IMNSHO).

That error relates to securing the new PC from hackers. In Knutsson’s checklist, that doesn’t occur until the fourth step. His first step is thereby made the most dangerous thing a new PC/laptop owner can do.

When you first open your new PC, Windows will ask…to connect to your Wi-Fi. Select whatever network you use and input your password. You can then click on “connect automatically” so Windows won’t ask you for a password every time you want to connect to the internet.

Years ago, I bought a new laptop from a major seller, and in short order, it arrived, direct from the seller’s factory in Shanghai, PRC. At the time, in my naivete, I thought that was pretty cool. However, before I connected the laptop to my LAN, much less to the Internet, I swept it with an anti-malware software package that I moved onto it via a thumb drive, something I’d always done heretofore just on GPs. My brand, spanking new, fresh from the factory laptop had come with a factory-installed Trojan malware package. (When I corresponded with the seller about this, that entity showed zero interest in dealing with the matter. I’ve declined to do business with that company since.)

So. Contra Knutsson, it’s a Critical Item that the first thing you do after applying power to your brand new PC/laptop, wherever it was assembled, is to sweep it with your anti-malware package, which you install from a thumb drive (not by any connection to your LAN or to the Internet), and clear out any malware that may already be present. In truth, preinstalled malware is a pretty rare thing, but it would take only one occurrence to infect all of your devices.

Once that sweep-and-clear operation has been done, it would be good to work through Knutsson’s checklist. One further recommendation, though: if the Windows OS (or the Mac OS) allows it, do the computer security settings step next, then install your preferred browser and set up its security/privacy settings. Then do the Windows (Mac) update step, and then proceed through the checklist.

But malware sweep first.

President Plagiarist

Harvard’s, not the one currently sitting, on occasion, in the White House. Claudine Gay has been caught out again.

Seven of Gay’s 17 published works have already been impacted by the scandal, but the new charges, which have not been previously reported, extend into an eighth: In a 2001 article, Gay lifts nearly half a page of material verbatim from another scholar, David Canon, a political science professor at the University of Wisconsin.
That article, The Effect of Minority Districts and Minority Representation on Political Participation in California, includes some of the most extreme and clear-cut cases of plagiarism yet. At one point, Gay borrows four sentences from Canon’s 1999 book, Race, Redistricting, and Representation: The Unintended Consequences of Black Majority Districts, without quotation marks and with only minor semantic tweaks. She does not cite Canon anywhere in or near the passage, though he does appear in the bibliography.

Gay’s…performance…goes downhill from there.

Is it the case that here, too, every word she writes is a lie, including “and” and “the”?

In the end, on Tuesday she resigned as Harvard President. The Harvard management team cravenly allowed her to resign, rather than firing her for cause—of which there were two: her dishonesty and her bigotry. Harvard management, even more cravenly, are keeping her on the professorial payroll. Never mind that she should be fired altogether for cause—of which there are two: her dishonesty and her bigotry.

It’s unfortunate that Harvard continues to employ this person, and her continued employment demonstrates that the school doesn’t care about her dishonesty or her bigotry. From that, Harvard should be disqualified from any further government funding, from any level of government.

Western Battery-Car Adoption Anxiety

The Wall Street Journal ran an article centered on how “western anxiety about Chinese EVs could prove self-defeating,” with a subheadline that summarized the thesis:

The US and Europe risk slowing electric-vehicle adoption by excluding Chinese suppliers from subsidies and raising tariffs

I have a hard time seeing the downside to slowing battery car adoption. Leave aside the tremendous drain that charging all those battery cars (assuming widespread adoption) would have on our already near or at capacity electric power grid and generating capacity for that grid.

Battery cars are tremendously polluting and damaging to our environment, from dirt in the ground to end-of-life battery disposal. Mining the metals—lithium, nickel, cobalt, copper, and on and on, metals that are used in far greater quantity in battery cars than in gasoline- diesel- or natural gas-powered vehicles—is extremely damaging, both from the toxicity of the metals themselves and from the toxicity of the tailings from the mining operations.

Processing those metals into battery-car-usable components is intensely energy demanding (have I mentioned the strains on anyone’s electricity grid?).

Disposing of those so-far unrecyclable dead batteries at their end of life is enormously polluting as they leach out of even the most well-kept landfills.

The risk is that the West cuts off its nose to spite its face. Slow down the shift to EVs too much to build local supply chains and give domestic manufacturers time to adapt, and Chinese technology might simply pull farther ahead….

Meh.

The technologies involved are useful, they should be pursued apace, and the supply chain problems need to be worked for a host of different reasons. However, it’s a Good Thing that battery cars are not being rapidly incorporated into our transportation systems.

A Karen Sues a Company

So, what else is new? Not this one; it just happened to catch my eye. A Florida Karen, Cynthia Kelly, is suing Hershey’s over its Reese’s labeling, which Kelly claims is misleading advertising. The image below is the cause of her ire and the center of her (proposed class-action) suit:

She would not have purchased the candy had she known there was not actually ap face carved into the item. Given the image, she plainly expected, also, that there would already be a bite taken out of the item. Why would she buy a candy that had already been partly eaten?

This is the depth of the…foolishness…to which so many Precious Ones and outright lawfare gold diggers have stooped.

Protecting Your Cell Phone “from a banking threat”

Kurt Knutsson has a Fox News article centered on protecting Android cell phones from malware that bypasses Android’s Restricted Setting Feature to steal, among other things, a user’s banking app PIN. It’s well worth reading and taking appropriate action, given that so many users have so many have banking (and other) access apps on their cells.

However.

Knutsson missed, in his article, the larger solution, or perhaps he deliberately elided it given how easy it is to use a cell phone—Android or other—to do things besides make and receive telephone calls or to exchange text messages.

What he missed is that that convenience comes with a very large cost, and that it’s an unavoidable cost given the ubiquitous presence of thieves in the world, including the virtual world of the Internet. The unavoidability of that cost stems directly from the fact that the contest between security and hacking past security is a permanent arms race in which security is, of necessity, reactive and not proactive. The hackers always have the first-user advantage, and that advantage lasts until security catches up—a gap that may be short or long but is always present.

The solution the Knutsson missed? Don’t have those banking (and other) access apps on your cell in the first place. At least, don’t go beyond social media apps—Facebook, Instagram, et al. (as if these are must haves)—at all. What’s not on a cell phone cannot be hacked by a cell phone hacker.

It’s certainly true that a laptop or PC is subject to the same vulnerabilities, but there’s no reason to extend and expand the reach of those vulnerabilities.