Serial Number Killers

By | November 22, 2011

image

I’ve been mulling the issue of registering and activating software of late, and while I feel users generally are less averse to the process of having to enter a serial number or activating a program before they can use it than before, I think there’s still a lot of frustration out there.

And I know from clients that it’s a balancing act between upsetting users and not encouraging those who seem unable or unwilling to pay to have a free ride.

It seems to me to boil down to this: Users who have paid for software expect to be able to use it out of the box. It would be like taking a bread maker home and having to call the manufacturer before you can start making bread.

What’s more, customers shouldn’t have to cope with silly technical problems that aren’t their fault. The example above is from my efforts to test Adobe’s latest version of Acrobat. The initial installation failed, and now it’s blocking the legitimate serial number it previously accepted—on the same machine. I still haven’t found a way around this problem, so my ardour for things Adobe has diminished a little.

The problem is that it’s fixable. I can yell at Adobe and hopefully I’ll get another serial number. But that’s not going to happen now—when I need it. It’s going to happen in 24, 48, 72 hours’ time. By which time I may feel like a mug for buying the software in the first place.

Here’s a possible solution: An automated temporary serial number that will work until a proper serial number can be available. This could be delivered online—say, a bot on IM, where you enter the serial number that’s not working and get issued a temporary one that does. Or a product could come with two serial numbers, one a permanent one and one a backup one.

Once customer service comes online and fixes the problem, the emergency serial number can be deactivated. As it lasts only for, say, 48 hours it would be relatively worthless to pirates. It will also push software companies to ensure they get back to frustrated customers within the allotted time or risk further wrath.

Either way, software manufacturers have got to make it easy for users to get around the limitations, and frailties, of the registration and activation process. Users should never be left in the lurch for even an hour if they’re a legitimate customer. It’s up to the software companies to address this issue. Perhaps something like this already exists, but if not I think an emergency serial number might be an answer.

How to Set Vacation Email Messages

By | October 15, 2008

I’ve written elsewhere of the hazard of setting a blanket auto-respond email message in Microsoft Outlook. Many programs and services have ways for you to tweak these settings so that only your contacts—those people in your address book—receive these messages. (This does not remove the chances of revealing information you don’t want to bad guys, but it does significantly reduce it):

Gmail

In Gmail, got to settings

image

and then scroll down to vacation responder.

image

Make sure you check the button at the bottom of the window Only send a response to people in my contacts.

image

Hotmail

in Hotmail, you’ll find the same option in Options/Vacation reply.

image

Microsoft Outlook 2007

Outlook has something similar, so long as your account is on the Microsoft Exchange Server (usually meaning you’re on your office network). There you can also select whether the auto-replies go to people outside or inside your organisation, etc:

image

Mozilla Thunderbird

There’s no in-built way to do it. Here’s a workaround, explained in more detail here, but it’s not pretty, and it depends on your computer remaining on and connected.

(My thanks to Brett Roberts of Microsoft New Zealand for suggestions.)

Watch Out For the Big Skim

By | October 14, 2008

By Jeremy Wagstaff

For those of you nervous about doing your banking online, here are some comforting words: It may be just as dangerous to do it at an ATM machine.

That’s because scammers have figured out how to steal your account details and PIN number straight from the machine. And they’ve been doing it for a while. And they’re getting better at it: Think of it as an industry with its own standards, supply chain and, well, ethics.

Here’s, roughly, how it works. A scammer walks up to an ATM machine. He chooses one in a place that’s not too busy, where there aren’t too many surveillance cameras, and where there are lots of tourists or rich people. He reaches into a plastic shopping bag and pulls out what looks like the card slot of an ordinary ATM machine—the bit on the panel where you slide in your ATM card.

Actually, it is the slot of an ATM machine, only it’s got an extra card reader built in. He sticks this over the top of the existing slot; it fits so well that unless you look carefully you won’t see anything odd. The only thing is that now the magnetic strip on your card would be read twice as it goes in—once by the bad guy’s reader and once by the bank’s machine.

The other part is the PIN reader. This can be done in a couple of ways: either by laying an extra key pad over the existing one, in much the same way he’s laid an extra card reader over the legitimate one. This will just capture your PIN number as you key it in.

Another way is to hide a little camera somewhere near the screen to record you tapping in your PIN number. This could be hidden in a fake speaker—which is where an alert customer found one in Pennsylvania last year—or a leaflet holder, or over the customer’s head.

(If you’re interested, you can watch some alleged bad guys installing this gear in less than a minute here: http://is.gd/41XO.)

All this information is stored on a flash card or something inside the fake keypad or card slot. Now the scammer has all the information necessary to make a fake card, program it with your account, waltz up to an ATM machine and enter your PIN number.

(Oh, and before you ask, you can buy a machine that makes a credit or ATM card, complete with magnetic strip, online for a few hundred dollars. Legitimately.)

This may be news to you, but it’s certainly not new. ATM skimming, as it’s called, has been on the go for quite a few years—at least 2004, but probably earlier. And it’s big business: Turkish police last month (Sept) arrested a man who, they said, had sold skimming devices to 10 countries including in North America and Europe. The police footage of his house—which has a swimming pool, by the way—includes boxes of ATM slot covers, keypads, and what looks like either a sun-bed or an ATM card maker. (You can watch the raid here: http://is.gd/41Xz.)

He also ran an online network which had details of at least 15,000 credit cards. Members bought gear, swapped stories, sold and bought credit card numbers, bitched about the neighbors and the FBI. The web-site was shut down earlier this month, but there’s bound to be another one up soon.

Now you may think that your visit to an ATM should be safer than this. OK, you might say, I can understand that my bank can’t be sending folk around to my house to check my computer is free of viruses, trojans and key-loggers, but surely they can have someone go around and periodically check that their ATM machines don’t have dodgy bits stuck on them, like extra card readers or keypads?

And if that’s too tricky, how about looking out for the more obvious stuff like speakers and brochure holders that weren’t part of the original design? Surely if a customer can spot these things, an employee should be able to? If you thought that I think you’d be thinking straight.

The thing is that banks do seem to be getting smarter. The problem for bad guys is that until recently they would have to go back to the ATM machine to pick up their gear and download the data. This is the risky bit, because the banks are beginning to wise up, figured out something is amiss and may be waiting for them.

So now they’re getting smarter. (The bad guys, not the banks.) They are putting cellphones or wireless chips inside the card slots or keypads or speakers or brochure holders to transmit the data back to Starbucks or wherever they’re waiting.

Now they don’t need to pick up their gear. Skimmers, as these people are called, can now buy a complete device which would transmit more than 1,800 cards via short message service before needing a re-charge. The whole kaboosh for $8,000. Or they could dial into the device when they like and download the data. By then they’ve probably got enough ATM data to buy their own bank.

In other words, you got to feel slightly sorry for the banks. This is sophisticated stuff. And it’s getting more so; according to some security consultants, there are indications that the slot covers that these guys use so closely match the ATM machines in color, material and dimensions that they well be made by the same manufacturer. As the blurb to one skimmer’s brochure put it:

Thus, we achieved the full and precise compliance of the paint’s tone, gleam, hue at the different light angles, the paint’s surface feelings to the touch etc. In the real situations the skimmers really look like an integral part of ATM.

The scammers are clearly getting smarter—either by being in cahoots with the employees of the companies that make these machines, or else by studying the material very carefully.

Either way, it looks like the banks are woefully out-gunned. They’re trying a few things—one is ‘jitter’, which moves the card around while it’s being read, confusing a scammer’s reader—but this means replacing all the old ATM machines. I can’t see that happening any time soon.

Bottom line? This may not happen everywhere, and it may not happen very often. But it makes sense to use ATM machines that are in your bank (i.e. not in a mall or the middle of a red light district), that you’re familiar with, and that you’ve thoroughly inspected for oddities—from extra card readers to brochure holders with little cameras coming out of them.

©2008 Loose Wire. All rights reserved.
Jeremy Wagstaff is a commentator on technology
. He can be found online at
loosewireblog.com or via email at jeremy@loose-wire.com.

The Financial Crisis in Charts

By | November 22, 2011

Thought I’d offer a brief history of the financial crisis as seen through Google Insights, which measures the popularity of a search term over time.

image

Interest in the word subprime spiked a couple of times in 2007 (above) before we figured out it was all about toxic debts (below):

image

and credit crunches:

image

Then we realised suddenly we had to learn a bit more about Freddie Mac and Fannie Mae:

image

and even basic terms like liquidity:

image

Useful information. And it wasn’t just an economics lesson. We had to gen up on countries that we had recently given little attention to, like Iceland:

image

Although it’s worth keeping it all in perspective. Search for the word meltdown, a commonly used term to capture the excitement of the past few weeks, and you get this. Clearly rising interest, but that spoke in 2005? It’s linked to Ice Age: The Meltdown, which grossed $70 million at the box office in its debut week:

image

The Financial Crisis in Charts

By | November 22, 2011

Thought I’d offer a brief history of the financial crisis as seen through Google Insights, which measures the popularity of a search term over time.

image

Interest in the word subprime spiked a couple of times in 2007 (above) before we figured out it was all about toxic debts (below):

image

and credit crunches:

image

Then we realised suddenly we had to learn a bit more about Freddie Mac and Fannie Mae:

image

and even basic terms like liquidity:

image

Useful information. And it wasn’t just an economics lesson. We had to gen up on countries that we had recently given little attention to, like Iceland:

image

Although it’s worth keeping it all in perspective. Search for the word meltdown, a commonly used term to capture the excitement of the past few weeks, and you get this. Clearly rising interest, but that spike in 2005? It’s linked to Ice Age: The Meltdown, which grossed $70 million at the box office in its debut week:

image

Hollywood still trumps global financial disaster, I guess.