The Silicon Jungle by David H. Rothman

3. Compromise. (“You get half raped.”)

3925 words  |  Chapter 108

Baird doesn’t blame just the manufacturers for some computers’ sievelike leaks. “Business isn’t willing to pay the price to secure systems,” he says—a complaint echoed in effect by the Computer and Business Equipment Manufacturers Association (CBEMA). It acknowledges the present clash between security and ease of use of computer systems. “If a computer could be designed with various levels of security as options, computer security might well be a marketable commodity,” said a statement from CBEMA to a trade magazine. In recent years there has been much more research in this area, and when 32-bit micros become the norm, it will be much easier to beef up security. When crimes do happen on existing systems, they’re often covered up by top executives panicky over going to court or jail. How’d you like to be the chairman of a corporation faced with an ugly data-security scandal—and the possibility of a stockholders suit? You needn’t be in the scandal personally. Your stockholders could charge you with malfeasance, if not misfeasance, for _letting_ it happen. So could the Securities and Exchange Commission and other feds. When companies hush up computer crimes, it’s not necessarily for high-minded reasons such as protecting assets by playing down vulnerability to electronic crime. Consider Baird’s experiences. Called to a New England firm to do routine theft prevention, Baird merrily put himself on the payroll—not to steal but to demonstrate system weaknesses. “I also,” he says, “nicked the vice-president for participating in a $400,000-a-year kickback.” At another company, an accounting firm did the books at year’s end and had to make an adjustment of $1.2 million. “Then,” said Baird, “we went in some more and really did a number on that company. And we came up with $4.5 million in proven losses. And it all had to do with their computer system.” But, you’re wondering, how about that crook who stole $8 million and got away with it? The story—perhaps apocryphal but told in the sedate _Smithsonian_ magazine—is that bank officials confronted the thief in a restaurant over breakfast. He coolly confessed. If they tried to jail him, why he’d blow the whistle on the bank’s vulnerable computer system. And it would cost more than $8 million to fix. So the bank officials just asked him to step down quietly. Leaving the table, the crook smiled. “I’ll keep the eight million,” he said, “but I’ll pick up the tab for breakfast.” Definitely, then, Donn Parker was on target when he once called computer security “first and last a people problem.” People and Policies: Working with the Right Ones Honest, loyal employees are more important than the latest security gizmos. Use common sense. Beware of the $26,000-a-year programmer who suddenly acquires a posh home and a sports-car collection. Don’t pry. But don’t shut your eyes, either. Start with a sensible hiring policy. Decide on the questions you want to ask applicants and their references—about the prospective employees’ backgrounds and characters. Then bounce them off your legal department. The rule of thumb is that you won’t get in trouble if the questions are related to the job. IBM has said it doesn’t even ask applicants about their ages or marital statuses. If there aren’t legal obstacles, you might invest $25 in a credit-bureau check of a keypunch clerk but perhaps several hundred dollars for a top programmer. Keep in mind the notorious lack of reliability of many reporting services. Check for criminal records when hiring for responsible positions. A Maryland hospital didn’t. It hired a convicted embezzler, a computer operator who later diddled $40,000 out of the system. Granted, there are occasions when you might knowingly hire an ex-con to give him a chance. But ask the normal questions. What’s he done to justify your trust since his sentencing? What are your risks? How much could he steal, and how? Whomever you hire—ex-cons, Harvard grads, or combinations of the two—know how to respond to the common criminal motives. Jay BloomBecker, a top computer crime expert, sums up one of the main motives by quoting the title of a collection of Doonesbury comic strips: _But the Trust Fund Was Just Sitting There_. Reduce the temptation. Let your people know there’ll be surprise audits—and mandatory vacations. A thief busy slicing salami might be loath to take too much time off, lest his or her replacement catch on to what’s happening. Likewise, consider rotating duties every few months and also divvying them. People who write checks with computers, for example, ideally won’t be the ones approving them; in a small business, of course, this might not be possible. The old need-to-know policy, of which the military is so fond, may also increase the criminals’ risks—by increasing the need for collusion. This, too, isn’t always possible, and it could boomerang. If employees aren’t supposed to know what their colleagues are doing, maybe a thief would actually have less chance of being noticed. Also, tell people that stealing—even small amounts from a large company—_will_ hurt. If you can’t prove how it will hurt the corporation noticeably, then you’d better make a good case that it will hurt them. Pretend you’re a department store warning the nimble fingered: “All will be prosecuted.” Well, within bounds. You needn’t fire and prosecute a thirty-year man because he once used a company micro to calculate his average golf score. But do remind your employees of the applicable theft-of-service laws, larceny ones, and others. Not that electronic theft is your only problem. Whiteside tells of a computer-ridden North Carolinian, working for an insurance firm, who reportedly shot a handgun several times at the hated machine. And Harold Joseph Highland offers another cautionary tale. Executives at an East Coast firm fired a crabby woman, then returned the next Monday to find its floppies sliced apart with a paper cutter. They never proved her guilt. Regardless, _someone_ moved the blade up and down, costing the company several hundred thousand dollars in time reentering the paper versions of the records into the computer. And that doesn’t even include the orders canceled by customers angry over the delay. In yet another story, a disgruntled worker short-circuited a terminal by urinating on it. “Hire well,” says Jack Bologna, an expert on the “people” side of computer security, summing up ways to avoid such traumas. “Pay fairly, praise people for good work, give them opportunities for advancement, and make them feel comfortable talking over their problems.” Remember that the line can fuzz between outright sabotage and simple sloppiness induced by poor morale. If there’s a disaster and you’re not sure if it’s accidental or deliberate, however, don’t be too quick to point your finger. You may find it chopped off with a lawsuit filed by your suspect, perhaps for less than $1,000, while your firm must spend several times that to defend itself. Unjustified accusations, also, hurt morale and may even add to security problems. And if you do prove theft or sabotage? Act. Don’t cover up. Rather, cover yourself—legally. Tell your boss what happened. If you’re mum and someone else reports the crime, your superior may consider you among the guilty. Also, don’t discount the possibility that your boss may himself be either guilty or a part of a cover-up because he fears a stockholders’ suit. You may have no choice but to report him to _his_ boss. Press for an independent audit committee if you’re powerful enough and if the size of the crime justifies one. Should you fire someone for a computer-related offense, do it artfully. “If they’re in a critical job position, help them clean out their desk, collect their ID card and any office keys, and walk them to the door or to the personnel department,” says Timothy A. Schabeck, who edits _Corporate and Computer Fraud Digest_ with Jack Bologna. The FBI’s Lewis says as much. If you do prefer instant firing, follow Schabeck’s advice to provide counseling and severance pay. And soften the blow, too, by warning everyone, when hired, that your axes are quick and sharp. Mightn’t instant firing, however, be brutal, anyway? Well, it depends on the amount of damage that a discharged employee could inflict and on how vindictive you perceive him to be. Ideally, you could minimize the damage by having backup disks or tapes out of the your victim’s reach. Also consider how successfully you can keep the fired employee from returning to your computer—by ruse or otherwise? Is your office absolutely physically secured? Can you trust guards or janitors working weekends not to admit a familiar face? It’s all a part of bridging the gap between policy and practices. Don’t just wait until a crime to make your staff security conscious. Too often, warns James A. Schweitzer, a Xerox security expert, people protect information only if it’s on paper. He says, “There have been a number of cases where tapes and disks have mysteriously disappeared from places like desktops.” If need be, designate an employee to make sure others have locked up right by the end of the day. In less than a minute, using a floppy disk, a thief may duplicate hundreds of times as much material as he could on a paper copier. Worry, too, about your people’s use of _modems_—the gizmos that transform your computers digital output into a whiny sound for the phone lines. Don’t let them routinely keep sensitive material on disks that will play back to savvy criminals who happen to dial in. This especially applies to Winchesters. They’re the oxide-coated aluminum disks that remain in the machine housing them, and they stash away many times the amount of information on most plastic floppies. Now imagine the delights awaiting a thief or snoop. Via your auto-answer modem he could rifle thousands of pages of Winchestered documents. Such electronic robberies needn’t happen, but until businesses get burned this way, they will. So if you’re sharing an electronic spreadsheet or mailing list with your branch office, do so if possible at a prearranged time during business hours when you know who’s calling. Tell your people to do the same. You’ll also need a privacy policy—internal and external. Do you, for instance, want salary information on a Winchester disk that any of your company’s computer-users could read? And how about employees’ health records? Good data security should protect your people as well as your company. So limit your computerized records to the essential and tell your executives not to use their home computers to bypass privacy laws. Worry, too, about an external-privacy policy. Are you respecting the rights of your customers, including those, who, by computer, may be transmitting to your company _their_ electronic jewels? It isn’t just decency you want; it’s also good protection against suits, whether from people or client companies. Here again, set a firm policy against your people misusing their personal micros. Alan F. Westin, a Columbia University professor of public law and government, correctly warned in _Popular Computing_, “A financial officer of a bank might store information about the life-style, habits, sexual preferences and other personal behavior of large individual borrowers or key corporate executives.” The banker might do this behind customers’ backs to help decide who was “stable” enough for loans. You’ll also need a policy covering employees who use your computers for, say, maintaining their church’s bingo books. Why not let them? It isn’t the worst public relations. Some companies even allow their employees to play games after hours, tapping into company systems from home, and you, too, might experiment with this, provided it won’t add to your data-security problems. Better a fringe benefit than a crime. On the other hand, you’ve got to draw the line somewhere. Can you estimate how much this extracurricular use of your machines costs in wear and tear—in, eventually, replacement costs? Feel your employees out on this one if you’re running a small business or hold sway over a large one. Would they rather enjoy computer privileges or better health insurance? You might offer cafeteria-style fringe benefits, with computer use as one of the options. Employees not selecting this choice might have to agree to it, anyway, if you discovered them using a company computer for personal purposes. This problem, of course, may lessen as the prices of small computers plummet and their capabilities grow. Whatever the form of potential crime—theft or otherwise—keep remembering one of the basics of data security: It should cost neither more money nor morale than justified. Hardware and Software Now for advice on finding the _most_ crookproof computers and programs. Buy a micro with 16- or 32-bit word lengths and RAMs of 256K or more. Those specifications will let you use more elaborate codes to protect information. What’s more, they might be less cumbersome than codes on an 8-bit machine. Look, too, for electronic design that lets your computer establish privilege levels—reachable through passwords. That way, Sally, the new secretary, can start out getting into the computer only for word processing. Helen, the payroll clerk, can have access to confidential salary information but not a top-secret budget that doesn’t give her the raise she’s been pestering you about. Questions exist about the effectiveness of passwords and codes, at least when the thieves or snoops may be sophisticated, but that’s another story. Most experts will tell you that anything that can be coded can be cracked. The trick is to make it not worth the criminals’ time and resources. Of course, the best safeguard is still the simplest: locking up the disks and computer after you or your people are through. New minis, by the time you’re reading this, may all be 64 bit or higher. They adapt to codes—and fancy electronic logs showing the kind of work done on them—more easily than do micros. And they might justify other costly security measures. Suppose, for instance, you want to follow the many government agencies’ examples and pen in the tiny radio waves that computers emit so that eavesdroppers can’t pick them up with sensitive receivers. A micro fortified this way might cost perhaps $10,000. “What’s the sense of doing that for what’s essentially a throwaway computer?” asks Harold Joseph Highland. The “throwaway,” be assured, is an exaggeration, but his point comes through. Of course, don’t forget the disadvantages of minis. Most machines at the mini level or above need professional programmers, and that’s bad news if you’re trying to stay in complete charge of your business. Also, minis, because of their expense, normally won’t pay for themselves unless they have at least several terminals. And the more terminals you have, the more “doors” through which crooks can “walk.” Still, you normally shouldn’t let security alone determine if you end up with a micro or with a mini. Remember the warning earlier in this chapter that security costs shouldn’t overwhelm you. How often, for instance, is your information so sensitive that you’re worried about criminals lurking in the bushes with the elaborate equipment needed to make sense of the tiny waves your computer emits? Your data might not even justify use of codes. I myself haven’t the slightest need for codes, user-privilege levels, anything other than locking up my disks, since I’m essentially a small businessman who is the sole operator of a micro. Even the FBI doesn’t really worry about security on some computers. At the time I visited the agency’s academy in Virginia, several little Radio Shack models were purring away there—the same kind you’d buy off the shelf. The micros’ software had passwords, but some agents could bypass them, anyway, which wouldn’t be necessary, of course, since, in this case, the FBI _wants_ the machines to be used. Before saddling yourself with fancy electronic precautions, do see if a security service, a good, heavy safe, a locked room, or a burglar alarm would work instead. And what about simply carrying home some duplicates of your most important floppies? That possibility will become increasingly attractive as the disks’ storage capacity increases. This isn’t to say, however, that you should store Exxon’s major corporate secrets in a dirty unlocked drawer next to old underwear. But a small businessman might consider taking his backup disks home. If you buy a safe for your office’s disks or tapes, think about fire protection. Check with your fire department. What makes of safes could be in the middle of the flames without the disks suffering temperatures of more than 115 degrees Fahrenheit? Investigating locks and burglar alarms, you’ll learn that your computer may be able to protect itself. How? Some gadgets can let only card-carrying employees—your people with magnetic cards—enter a room. And they can tie into the computer to save you money. The same applies to burglar alarms. Of course, you might want nothing fancier than a strong lock bolting your computer to a heavy table. Don’t spend more than the data are worth to replace. You might also consider a guard service. The problem is that salaries add up even for quick nighttime checks. After a few months or a year, you may be well on your way to having shelled out the cost of an elaborate electronic security system. Guards normally would be more appropriate for users of large minis and mainframes than for desktop types. One advantage of physical security—most any kind—is that it can protect the computer equipment itself, not just your electronic files. You’ve undoubtedly read of theft of computer chips from Silicon Valley firms. Now be prepared for reports of widespread computer theft, eventually, as the market grows for both legally bought and fenced merchandise. With computers shrinking in size, they may well be an even hotter item for fences than stolen Selectrics. Even Apples several years ago were too intimidating to a burglar, like the one who stole the silverware of an acquaintance of mine but passed over his computer. Be assured, though, that crooks are increasingly computer literate. There’s even talk of the mob moving into computer crime, raiding government files, and, presumably, engaging in less challenging illegalities, like setting up computer-fencing rings. With computer crooks in the future being smarter and more organized, you should think hard before depending on simply passwords or codes to protect you. First, assume that at least some people may try to unravel your puzzles. A whole generation of prodigies right now is practicing by copying the supposedly uncopyable computer games on disks. In effect, notes Churbuck, the New Hampshire lawyer, each disk provides two puzzles. One is the original game. The other is the puzzle of figuring out how to make illicit copies. And at the University of Western Ontario, Prof. John Carroll surveyed students in two advanced computer courses and found that one-third had sought free, illegal computer time. It’s been pointed out that the very best, the very brightest, students have too many legitimate opportunities—on large systems—to worry about pillaging small computers. And that may be true. But by the late 1980s or early 1990s, some journeyman criminals may develop among the second-raters. Second, don’t shrug off a warning from R. E. (Bob) Kukrall, author of the handbook _Computer Auditing, Security and Controls_: “Cracking a computer system’s defenses may be about as difficult as doing a hard Sunday crossword puzzle.” He says that thieves managed in minutes to call up computer files that were protected by a five-digit code number. They just programmed the computer itself to try each of 100,000 combinations. “In effect the speed and capabilities of the computer were used to violate its own security,” Kukrall said in _TeleSystems Journal_. ■ ■ ■ How the _National Enquirer_ Gets Some Security along with Bargain Communications Some _National Enquirer_ reporters send in stories via computers, but there’s little danger of rival tabloids spying on the computer collecting the articles. The reason? There’s no receiving computer, actually—just an auto-answer modem rigged up to a dot-matrix that spews out paper copies at several hundred words a minute. The modem and printer can’t send messages or relay stories elsewhere. But who needs that—not when some computer-smart _National Star_ reporter might give his eye teeth to find out what the competition is up to? To be sure, the scheme has some problems: ● The _Enquirer_ can’t transfer the reporters’ stories to a computer there for editing, since they are on plain old paper but not in an electronic format. Editors, however, heavily rewrite the original stories. Capturing reporters’ key-strokes for the typesetter wouldn’t help as much as at an ordinary newspaper. ● Theoretically someone could still steal the hard copy (just as he or she could sneak off with a floppy disk). ● The system isn’t secure against telephone tappers who could translate the modem whines. Still, the system is dirt-cheap. If knowledgeable, you could probably replicate it for less than $500 for the printer and modem. And you could send to it with just a $400 lap-sized portable. Beyond that, the _Enquirer_’s arrangement may be safer than leaving an unprotected computer on the phone to collect unencrypted files. ■ ■ ■ Then there’s the Dalton school case in New York City in which the four culprits, age thirteen, violated silicon sanctity hundreds of miles away. The feds caught up with them before they could steal Pepsi Cola, by coaxing an order out of a warehouse. But another computer didn’t fare so well. The thirteen-year-olds destroyed more than one-fifth of the 50 million bits in the machine’s memory, inspiring a magazine writer to call them “electronic Huns.” More recently, the 414 Gang out of Milwaukee—named after their telephone area code—broke into computers across the country. These half-dozen or so high school students, tapping on home micros, broke into more than sixty computers and among other things they: ▪ Hooked up with a VAX 11/780 at Sloan-Kettering Cancer Center in New York. Eighty hospitals across the U.S. were using the computer to help treat hundreds of radiotherapy patients.[55] ▪ Broke into an unclassified computer at the Los Alamos nuclear laboratory. ▪ Penetrated a Security Pacific Bank computer in Los Angeles. That may not have been so much a challenge. The account name and password both were “SYSTEM”—a word that many computer manufacturers routinely put in new machines and that their customers often forget to take out. “TEST,” “DEMO,” and “MAINTENANCE” are other old standbys. Footnote 55: The 414 invaders fortunately didn’t alter radiotherapy information. But they reportedly did zap a file used to bill customers a total of $1,500 for computer use. If teenagers can wreak Attilan havoc and snoop on a bank computer, then think of adults. So use passwords and codes, knowing their vulnerabilities. Try, anyway, to give computer crackers a good challenge by avoiding use of obvious passwords like street names or those of wives or children. Consider a two-level password; also, maybe one with two words of pure gibberish; that’s what CompuServe does. And, obviously, purge the computer of standard passwords in the “SYSTEM” vein. If your system permits dialing in through a modem, see if it can limit the number of tries that people can make before the modem hangs up the phone. Your dial-up computer should send its name until the caller has given the right ID. Be careful of overly helpful =prompts= that lead callers on to the next step. “A prompt saying, ‘Hi! This is the Last National Bank Disbursement Department,’ sort of gives the game away, doesn’t it?” says a _Creative Computing_ article laying out precautions. Also, change passwords regularly. And if an employee’s leaving? Change the access codes. Here’s what I’d ponder if shopping for a password or encryption system:

Chapters

1. Chapter 1 2. Chapter 7 and Backup VII, you’ll learn (1) the basics, (2) when charts 3. Chapter 12, “How I Found ‘God’ on MCI (and a Few Other Odds and Ends 4. 1. Bigger RAMs can work with more and larger numbers—a handy capability 5. 2. More RAM can accommodate programs more complicated for the computer. 6. 3. You may want the most sophisticated software to thwart computer 7. 1. You can quickly make safety copies of valuable disks—something that’s 8. 2. You can more easily work with long electronic documents. 9. 1. Absence of bugs. The software maker should have gotten all the bugs 10. 2. General ease of use. A program should be easy enough to learn _and_ 11. 3. Good documentation. The manual should be clear and logically 12. 4. Usefulness to beginners and old pros alike. You can adjust the best 13. 5. Speed. It lets you do your job fast, especially when you use it with 14. 6. Power. Related to speed. The program can quickly accomplish 15. 7. Fewer chances for botch-ups. Good programs limit the chances for 16. 8. The Jewish-uncle effect. Ideally, your software will slow you down or 17. 10. After-the-goof feedback. After you’ve botched up—and we all do 18. 11. Ability to customize. You or at least a software expert can 19. 12. Availability of “accessory” programs to make your original software 20. 13. Support. Ideally, the software seller will stand behind his product 21. 1. A =cursor= is just the marker on your screen—a blinking line, 22. 2. A =file= is an electronic version of a letter, report, or other 23. 3. A =control key= is what you start holding down to turn a letter or 24. 4. To =scroll= just means to move from place to place in your 25. 5. A =menu= lists commands on your screen. It can tell you how to 26. 6. A =block move= is the ability to move material from one part of 27. 8. A =search and replace= substitutes one word (or group of words) for 28. 1. When you work for a stuffy old bureaucracy that’s rich and afraid 29. 2. When you’re a procurement officer on probation. As they say, no 30. 3. When you want to dump the training problems in the manufacturer’s 31. 4. When you prefer an extra-large, extra-sharp screen and giant 32. 5. When you’re looking for a machine that will run special software 33. 1. It takes all of two or three minutes—maybe less—to copy a disk 34. 3. Computer users want to befriend others with similar machines so 35. 4. Many software companies overprice their wares. Yes, it’s expensive 36. 5. Some people in large companies think software houses don’t give 37. 6. Many software companies don’t offer enough guidance or other help. 38. 2. A file in a data base is the electronic version of a file drawer or 39. 3. A =field= is a category of fact like the amount of money spent on 40. 4. =Structure= is simply the way a record is set up. There are three big 41. 5. The EDIT command changes the contents of a data field. You can type 42. 6. A command to APPEND can add new records to your electronic filing 43. 7. =Sorting= lets you reshuffle records alphabetically, by date or other 44. 8. The LIST command tells dBASE II to flash across the screen the 45. 9. .AND. helps you narrow down the information you’re looking for or 46. 10. .OR. is another way to describe the desired facts. LIST FOR 47. 11. LIST FOR .NOT. SALE:PERSN = ‘BABBITT’ could help weed from view, or 48. 12. =Command files= are programs that tell the machine how to manipulate 49. 1. A large number of rows and columns. A spreadsheet of 254 rows and 65 50. 2. Speed. “Even with a simple spreadsheet,” says Scharf, “someone might 51. 3. General simplicity and ease of use. In tricky places, does the 52. 4. Range of commands. Most spreadsheets nowadays let you easily move or 53. 5. The ability to do what-if tables. The best spreadsheets won’t just 54. 6. Easy consolidation of figures from different spreadsheets. That’s no 55. 7. =Natural order of recalculation.= Cells must influence the numbers in 56. 8. A useful =macro language=. Macros are combinations of commands that 57. 1. Deciding whether to hire a computer consultant. How much in your time 58. 2. Hiring and using a consultant. It isn’t just a matter of asking, 59. 3. Training employees. Don’t clutter your people’s minds with 60. 4. Working with your company’s data-processing people. Know which 61. 1. The computer company’s FORTRAN, according to Stewart, was as badly 62. 2. FORTRAN wasn’t as good as BASIC for micro data bases that stashed 63. 3. Brown was still basically a mainframer. And micro FORTRAN was 64. 3. “What’s the quality of the work? 65. 1. Who’s teaching? Can he or she communicate well with the students, and 66. 3. Why is the material taught? To make your people computer literate in 67. 4. When do the students learn? On their time or yours? Will you reward 68. 5. Where is the learning happening? Ideally, your students can take the 69. 6. How do the students learn? Through instruction manuals, mainly, or 70. 1. Even the best-intentioned companies may fail miserably in easing some 71. 2. The traits which make somebody valuable to his company _may_ be the 72. 3. At the same time you can’t stereotype anyone—by age, folksiness, or 73. 4. An important part of training is simple salesmanship—persuading the 74. 5. Don’t make computerization seem more threatening than it has to be. 75. 6. As early as possible start people on real projects. The first day at 76. 2. Helped them with some learning aids like color-coded keys showing 77. 3. Motivated them by explaining how their new computer skills would make 78. 1. Before approaching Data Processing, ask who-how questions about the 79. 2. Ask your informal Data-Processing contact about possible technical 80. 3. When you’re ready to deal with the Data-Processing manager, tell 81. 4. Make it clear you’re aware of your project’s complications. 82. 1. =The canary-in-the-mine= theory of labor relations. Ergonomics is 83. 3. =“Terminal” happiness.= Detachable keyboards are just a start, 84. 7. =Air conditioning, heating, and ventilation=—basics neglected by a 85. 8. Honest assurances to your people that you’re exposing them to the 86. 9. A willingness to consider alternatives to the TV-like CRTs that 87. 10. Sensible use of wrinkles like the mouse—the hand-sized gizmo you use 88. 11. A related ingredient, good software—the topic of earlier chapters. 89. 2. How far the keyboard platform protrudes from the platform on which 90. 4. The angle at which the screen faces you. You can swivel away to your 91. 5. The height of your chair. You don’t of course need high-tech 92. 1. Removing half the tubes from existing fluorescent fixtures. You’ll 93. 2. Parabolic fluorescent fixtures with baffles to keep the light out of 94. 3. Parawedge louvers, which, according to Eisen, “have been particularly 95. 4. Desk and floor lamps. You might buy rheostats you can plug in between 96. 5. Indirect lighting. The disadvantage is the expense. You may have to 97. 1. Coatings or etching applied during manufacture of the video displays. 98. 2. Coatings put on after manufacture. Generally, but not always, they 99. 3. “Colored plastic panels and etched faceplates,” which, says Eisen, 100. 4. Micromesh filters, favored by German ergonomists. Eisen says U.S. 101. 5. Polarizing filters. They may reduce brightness and shorten tube life, 102. 1. There is a possibility, extra-slim, but still there, that 103. 2. More minor physical and mental problems from computers definitely do 104. 6. The possibility of a detached retina 105. 3. Guarding your electronic files 106. 1. Burden programmers and others with electronic versions of heavy 107. 2. Keep their computer systems easy to use—and vulnerable. (“Then you’re 108. 3. Compromise. (“You get half raped.”) 109. 1. How hard, exactly, would it be to puzzle out? Just how many 110. 2. How compatible is the program with your computer? If security is so 111. 3. Is the security program easy to use? If it’s too hard, it’ll be 112. 4. Are you certain the program won’t jeopardize the accuracy and 113. 5. Should you expand your system, will the security software be able to 114. 6. Do you want a =public key= encryption system? It works this way. You 115. 7. Will your code be based on the =Data Encryption Standard= (=DES=), 116. 1. See if your disk has a file at least 500 or 600 words long. If so, 117. 3. Erase A. 118. 1. Zealously enforce a no-drinking, no-eating policy around disks, at 119. 2. Remember the Rothman Dirt Domino Theory. Dirt, dust, and grease often 120. 3. Realize that floppies don’t always mix well with office materials 121. 4. Know about other natural enemies of floppies or at least of the data 122. 5. Don’t even let your floppies rest against your computer’s screen, 123. 6. Remember that the more information you can pack on a floppy, the more 124. 7. Clean your disk heads. Don’t use rubbing alcohol. “Try something like 125. 8. Have head alignment checked, to reduce disk errors. With heads out of 126. 9. Buy quality disks. Of course, the more you spend on disks, the more 127. 1. Every five minutes or so, type out the “KS” or an equivalent and dump 128. 2. Every half an hour make a printout of your recent work. With a fast 129. 3. Every day make your backup floppy. You might forget about the scratch 130. 1. Dumping to floppies. It’s cheap but slow. Then again, you can speed 131. 2. Transferring the Winchester’s contents to a special tape drive large 132. 3. Dumping to an ordinary videocassette recorder. Although slow, it’s 133. 1. How much time or money does it take to enter your data or set up your 134. 3. How much time or money do you have for copying, cleaning, 135. 1984. Many more companies might be. They might have kept quiet, however, 136. 1. The cottage keyers are paying more than $2,600 a year to rent their 137. 3. Likewise, the cottage keyers lack the normal fringe benefits. The 138. 4. The keyers may not be sharing the experiment’s rewards fifty-fifty. 139. 1. Ease and speed of use. You needn’t be a computer expert or wrestle 140. 2. Friendliness. A good system isn’t just easy to use; it’s also boy 141. 4. Confidentiality. Clerks aren’t privy to the same information as the 142. 1985. They’d be able to place mutual-fund orders for clients, conduct 143. 1. Lower phone bills. In a Midwestern office of the H. J. Heinz Company, 144. 2. Elimination of telephone tag. “We can type a memo at the end of our 145. 3. An end to garbled messages. Errors and misunderstandings decline when 146. 4. More efficient sharing of ideas. =Computer conferencing= is an 147. 1. How long a Kaypro took to sort dBASE II files electronically while 148. 3. How long a second Kaypro needed to sort the dBASE files in the first 149. 1. How extensive do you want your network’s file-sharing capabilities to 150. 2. Who’ll manage the network? Who’ll determine who can see what 151. 3. Do you want to assign special network-related duties to other people? 152. 4. Who will work at what =node=? That’s jargon for a location or =work 153. 5. Will some people share work stations? If so, you’d better decide 154. 7. How many printers and other gizmos will people share, and where will 155. 8. What kinds of computers are you planning to hook up? The WEB as of 156. chapter 11, but subject to court approval, would be bought by a Swedish 157. 1. If your computer messes up, remember the very last thing you did, 158. 2. See if that isn’t the answer to your problem. 159. 1. Know your prices. Study the want ads of the local papers. There’s 160. 2. Pay attention to the machine’s physical condition. A banged-up 161. 3. Find out how your pet programs run. If you don’t have any available 162. 5. Find out what generation of equipment it is. Does it include all 163. 6. Learn where you stand legally if you’re buying software with the 164. 7. Call up commercial auctioneers and find out if they’re holding any 165. 8. Obviously you’ll want to consider a maintenance agreement with a 166. 1. Another daisy wheel machine. The daisy wheel is plastic or metal and 167. 2. A =laser printer=. Typically, it works a bit like some copying 168. 3. A =thermal-transfer printer=. This uses patterns of heat to arrange 169. 4. An =ink-jet printer=. This kind literally squirts ink against the 170. 1. =Draft quality.= The letters are too dotty for anything but drafts 171. 2. =Correspondence quality.= It’ll do for a letter to a forgiving friend 172. 3. =Near-letter quality.= You can get away with it for book manuscripts, 173. 4. =Letter quality.= That’s typewriter quality. 174. 1. Does the printer offer them no matter what computer or program you 175. 3. For free, will the store modify your computer system to make the 176. 4. Will your desired combinations of features work simultaneously? 177. 2. If not, can the store make one up for you? At what cost? 178. 1. The general logic of the manual. The author should have written it 179. 2. The quality of the index. I’ll charitably assume it’s there to begin 180. 3. Simplicity of vocabulary and sentence structure. A manual shouldn’t 181. 1. The field may only contain certain numbers and/or letters—for 182. 2. The field will _enter itself_ based on your previous entries. For 183. 3. The field can be a constant. For example, if your data record 184. 4. The field can automatically shift cases for you. For example, you 185. 5. The field can insist that whatever you type in is identical two 186. 6. The field can be required—something that you _have_ to enter, or 187. 1. Does the program help you come up with pies, bars, or whatever kind 188. 2. Can it do so as quickly as possible? 189. 3. Does the program fit in well with your other software? 190. 4. How much memory space does the program—and the electronic files of 191. 5. What about the program’s color capabilities—both on screen and on 192. 6. Does the program coexist okay with the printer or plotter you own or 193. 7. How easy is the program to learn? What about the other general traits 194. 1. “Who?” Who from the contracting firm is doing the work? A junior 195. 2. “What?” Describe the task as clearly and precisely as possible. And 196. 3. “When?” Can you negotiate a penalty if the firm misses a deadline? 197. 4. “Where?” Will the consultants do the work in your office? Theirs? On 198. 5. “How much?” Obvious. 199. 1. Thinking small. Don’t bargain over the Who-How simply for the whole 200. 2. Making the consultant give you the source code of the new software. 201. 3. Insisting that any manuals for his software be complete and in plain 202. 4. Bargaining if possible for a software warranty. Then, if you discover 203. 5. Possibly requiring the consultant to give you a discount on 204. 6. Negotiating for full or part ownership of the software he may develop 205. 7. Forbidding the consultant from selling the new software to your 206. 8. Making the consultant pledge that he won’t violate any trade-secret 207. 9. Hammering out a confidentiality agreement, if necessary, to protect 208. 10. Making the consultant agree in writing that he is working as your 209. 11. Trying to write into the contract your right to a full explanation 210. 12. Remembering that there’s only so much protection the law can give, 211. 13. Choosing the right lawyer, if you can afford one, for the contract. 212. 1. Is the convenience worth the extra several hundred dollars you’ll be 213. 3. How do the windows look alongside each other? Do they =overlap=, just 214. 4. How about =data transfer=? If you move information from one 215. 5. What kind of graphics—=bit mapped= or =character based=? The bit 216. 6. Will the window program work with ordinary software or just products 217. 7. Will the windows at least slightly slow down some programs? A word 218. 8. Is the program picky about the computers it’ll work with? A window 219. 9. Does the program require a mouse—the gadget you roll on your disk to 220. 1. Communicate teletype-fashion with the other person. You can keep 221. 2. Call up electronic bulletin-board systems (BBSs) or plug into The 222. 3. Get copies of other programs that altruistic computer buffs have 223. 1. Start out with the other person’s modem set on ORIGINATE and yours on 224. 3. Hit your carriage-return key. 225. 6. Assuming you’re using a manual modem, flick the switch to “data.” 226. 3. Hit your return. 227. 1. From MODEM7’s main menu, you select =T= and again hit the return a 228. 2. Find out if the other person can read words you type. (Don’t worry if 229. 3. Tell him (or her) to set up his computer so that, on paper or on a 230. 4. Once the other person is ready—while you’re still in the =T= mode—hit 231. 5. Now you type =B:[name of file]=. Here and elsewhere don’t type the 232. 6. Next hit your return. The disk should start spinning, and both you 233. 2. Again, select your trusty =T= from the main menu. But don’t hit your 234. 4. Type =B:[the name of the file you’re creating on the data disk to 235. 6. Then hit the letter =Y= with your finger on the control key 236. 8. Then, to preserve the file, “writing” to your disk, you must type out 237. 2. From MODEM7’s main menu, type =S B:[name of the data disk file you 238. 3. Hit the return. 239. 3. Hit your return. 240. 2. Type the word TYPE, then a space, then the name of the file—preceded 241. 3. Then hit your return. 242. 4. Hit your return. 243. 3. Tap =Control-B=. 244. 4. Type the right number (300 for 300 baud, 1200 for 1,200; do not use 245. 5. Hit your return.

Reading Tips

Use arrow keys to navigate

Press 'N' for next chapter

Press 'P' for previous chapter