Jan 05

Sean Hannity Radio Show Interview on Julian Assange, WikiLeaks, Russian Hacking, and Cyber Warfare

sean-hannity-radioBackground

The day after an amazing personal interview of Julian Assange by Sean Hannity aired on his TV show, FMS President Luke Chung was invited to discuss the related technology on his radio show.

Hannity traveled to London to interview Assange at the Ecuadorian Embassy where he’s seeking asylum. They discussed an overview of Assange’s role as founder of WikiLeaks, and their obtaining and publishing the emails from the Democratic National Committee the weeks before the US Presidential election. Some people attribute Hillary Clinton’s loss to the revelations in those emails especially from John Podesta, the former White House Chief of Staff and Chairman of the Clinton campaign. They are also accusing the Russians for hacking (stealing) and providing the data to Assange so Donald Trump could win the election.

Radio Show

On January 4, 2017, I was on the radio show with Sean Hannity and Brigadier General Eli Ben Meir, former Israeli Military Intelligence chief. The three of us discussed the WikiLeaks disclosures. I commented specifically on:

  • Cyber attacks and the security breach at OPM disclosed non-classified government employees and by omission who were covert at American Embassies globally.
  • Noting Julian Assange’s careful word choices to exclude Russia as source without excluding them as the ultimate source of his sources.
  • The need for WikiLeaks’ to keep their sources confidential and how they amplified the data from Bradley Manning and Edward Snowden.
  • Different approaches to preventing cyber attacks depending on the cause.
    “It’s one thing when someone steals your car because they broke into it. It’s another thing when someone steals your car because you left your keys in the ignition.”

Here’s the audio of the show:

My segment starts at the 6:50 mark. Sean and General Meir speak first, then I start around 9:25. Final comments at 14:15 and it wraps up by 14:50.

Additional Issues

Only a limited amount of information can be discussed in such a short interview. Some additional issues to consider are:

Data Security

Securing data over the internet and inside organizations is very challenging. Threats may come from:

  • External hacks that need to be monitored and defeated
  • Internal people who unintentionally leave the front door unlocked
  • Internal people who intentionally leak information

Different solutions are required for each type of threat. Some are at the software vendor, design, and developer level, while others involve end-user training, background checks, and monitoring.

Applications can be built so that simply disclosing a user name and password doesn’t compromise the whole system by require two-factor authentication and registering devices that can use those credentials.

Unfortunately, many systems were built well before today’s cyber threats existed. The cost of making those systems more secure without breaking their existing functionality will be daunting and expensive. In many cases, the original source code, development environment and/or vendor are long gone, so the only option is to replace them which is also very expensive and time consuming.

Julian Assange and WikiLeaks are Not Heroes

We need to keep in mind that the WikiLeaks exposed top secret US information by publishing the disclosures from Manning and Snowden. Lives were put at risk and lives may have been lost because of those publications. The Arab Spring was inflamed in part by the disclosure of diplomatic communications and one could argue the human tragedy in Syria is tied to this as well. While Republicans are celebrating and defending Assange and WikiLeaks now for the DNC emails, the tables may turn very quickly.

Data That’s Not Exposed May be More Dangerous

While many are focused on the DNC emails, it’s not unreasonable to assume the people who hacked that also got the RNC emails. Data can be power, and in the wrong hands, data can be used for nefarious purposes such as blackmail.

If the RNC data were compromised, we should be extremely worried if the hackers discovered it was more valuable to keep private than public. Whether they use it directly or sell it to another party or country, the information can make victims puppets by threatening the exposure of their personal data. It’s not uncommon during E-discovery of an email server to discover all sorts of inappropriate language, behavior and activity conducted by individuals in an organization. Disclosures of affairs, homosexual activity, underage sex, bribery, unethical business dealings, breeches of confidentiality, collusion, and actual crimes are often found in email threads and can be used for blackmail.

Apr 15

Total Access Startup Available for Microsoft Access 2016 and 2013

total-access-startupTotal Access Startup makes it easy to centrally manage all your Microsoft Access database deployments. Ensure that all your users run the latest version of your database application with the right version of MS Access. Easily deploy updates without having to manually change things on each user’s PC. Simply point your users to a shortcut and they never need to know the actual name of the database.

overview

Total Access Startup 2016 is now shipping to let you:

  • For optimal performance, deploy a local copy of your master database on each user’s PC and keep it updated when you update the master
  • Run it with a specific Access version or a range of allowable Access versions. This makes it easy to support legacy versions of Access even if users install later versions of Office/Access.
  • Specify the bitness (32 and/or 64-bit) that are allowed for Access 2010, 2013, and 2016.
  • Display a professional splash screen graphic while your database loads
  • If your users can’t launch your database, a message appears with information you provide to contact you. You can customize our messages or translate them to your user’s language.

startupMore Resources

Total Access Startup is also part of the Total Access Ultimate Suite. Existing Total Access Startup customers can upgrade at a discounted price.

Mar 22

Total Visual Agent Ships for Microsoft Access 2013 and 2010

Microsoft Access Database SchedulerTotal Visual Agent for Microsoft Access DatabasesAutomate Microsoft Access Database Compact and Other Chores

We are very pleased to announce that Total Visual Agent 2013 is now shipping.

Don’t Forget System Administration for Microsoft Access Database Solutions

A professional Microsoft Access database application needs ongoing system administration. It’s an area that many MS Access developers neglect and causes problems when things go wrong (database corruption, missing backups, disaster recovery, etc.):

Enterprise Quality System Administration with Audit Logs and Email Alerts

Total Visual Agent has provided an Enterprise Quality solution for almost 20 years by giving organizations a reliable way to perform their critical tasks on a 24/7, 365 days a year basis. A detailed audit log documents each action that is performed, and sends emails if errors are encountered.

Schedule Events, Databases, and Actions to Perform

Total Visual Agent automates and schedules Microsoft Access tasks. It ensures repetitive tasks are completed reliably. Tasks such as database compact and repair, zipped backups, rolling backups (e.g. 7 copies for each day of the week), running macros, running Windows command lines, making copies of table data, collecting database statistics such as size and record counts, etc. Easily schedule tasks for the middle of the night and know they’ll be completed.

Events can be scheduled every X minutes, hourly, daily, weekly, monthly or just one time. You can specify the days of week and time periods that it runs to limit processing to off-hours. Select the databases and directories (including subdirectories) to manage with support for workgroup security and database passwords.

Includes a Windows Service for Secure Processing and Reliability

Once defined, the events and tasks can be run by our Monitor program that is a standard Windows program.

Alternatively, Total Visual Agent includes a Windows Service, so you can run your tasks without having anyone logged on the machine. The Windows service is a more secure, robust solution since it can automatically restart if the machine reboots.

New Features in the 2013 Version

A huge number of new features were added in this 2013 release from the previous 2007 version:

  • Microsoft Access 2013Support for Microsoft Access 2013 and 2010, plus 2007
  • Support for 64 bit Operating Systems
  • Simplified Startup and Easier Management of Multiple Microsoft Access Versions
  • Import Settings from Multiple Versions of Total Visual Agent
  • Test All Actions for an Event, Database, Directory or Task Group
  • Create Events that Run Every X Minutes
  • Create Events that are Limited to Periods Spanning Midnight
  • Process Directories with Managed Databases
  • Data Extract Tables are Keyed
  • Run Macros for Database Password Protected Databases
  • Pause for a Fractional Minute
  • Compressed Archive File Names Support Multiple Extensions
  • More Detailed Activity History Log with Deletions
  • More Detailed Database Statistics with Deletions
  • Add Your Comments to Events, Directories, and Actions
  • Simplified Addition of New Actions
  • More Modern and Improved User Interface
  • New User Manual and Help File

For complete list, visit: New Features in Total Visual Agent 2013

Download a Free Trial Version

A fully functional trial version is available for download so you can run it on your system with your databases

Contact Us

  • Visit our Support Site if you would like to submit any questions to our technical support team.
  • Place an order online. Existing customers can upgrade at a discounted price.
Sep 22

Email Collaboration using Microsoft Outlook and Exchange from a Database Perspective

One of the challenges most organizations face is how to coordinate communications and tasks among team members and external contacts. With multiple people and clients/projects, emails fly in many directions. People with vital information may be unreachable while customers may be providing information to someone in your organization while others who need that information are oblivious. When someone leaves a team or organization, much of their information is lost.

Microsoft OutlookOver the years, we've helped several clients better manage their emails and treat them like a database. We've built solutions that work with Exchange and Outlook to automatically classify contacts, tag emails, and store the information in a Microsoft SQL Server database. The data is presented through a Microsoft Outlook add-in showing all communications with a contact's firm when you create or respond to an email. The data can also be displayed in the Facebook like interface to make it easy for everyone on your team to know what's going on.

There's no longer a need to look in someone else's Inbox since information is immediately shared between everyone who needs to know (even before the recipient opens their message). Searching for messages is quick and easy, and corporate document retention policies can be enforced.

To learn more about this and other innovative activities of our Professional Solutions Group, please contact our consulting team.

Jul 29

Microsoft Access Developer Help Center Debut

We are very pleased to announce the creation of our new (and free) Microsoft Access Developer Help Center. It contains our many popular papers with tips and techniques for becoming a better Microsoft Access developer, programmer, and administrator. It covers the whole life cycle from strategic planning of how MS Access fits, database and table design, form and report tips, programming do's and don'ts, deployment, best practices, performance tips, etc.

This follows our recent Microsoft Access Query Help Center that's been well received, and our Microsoft Access to SQL Server Upsizing Help Center

We welcome any feedback on what we've put there and suggestions for additional content that would be helpful.