Computer Networking & Storage - Legal Technology - Technologist
Technologist - The FindLaw Legal Technology Blog

Recently in Computer Networking & Storage Category

When I was in law school, course materials repeatedly referred to "Google or Bing," as in, don't use them for legal research. It was a combo that was, literally, laughable. Bing? Almost no one used Bing back then.

And that's a problem, according to the European Union. With Google having a virtual lock down on the Internet search market -- it controls around 65 percent of U.S. searches, but over 90 percent of searches in Europe -- it has enormous power to control where Internet users end up. And it's been abusing that power to promote its own services, according to an antitrust complaint filed by the EU.

It's the middle of the night and you're facing a deadline, or you have a "hot pen," to use Justice Ginsburg's phrasing, when suddenly your screen goes black. You have no idea if your current work has been saved, but worse still -- what about all your other work?

Computer crashes are no fun at all, and if you can't make it to an IT professional to fix the problem, you may want to try these suggestions out before you truly start panicking:

Just when you thought it was safe to go back to Comcast (which won't matter soon if the Justice Department approves Comcast's merger with Time Warner Cable), they go and do this. According to a lawsuit recently filed in San Francisco, Comcast secretly enabled a "feature" in Comcast-owned wireless routers that broadcasts a public wireless signal from those routers.

Comcast is hijacking your wireless network! Well, sort of. But it's still sneaky, if true.

Thanks to lobbying by totally disinterested third parties like Comcast and Verizon, 20 states have laws on the books prohibiting municipalities from creating municipal broadband or wireless Internet services ("Wi-Fi"). Effectively, under these laws, the cities themselves can't build Internet infrastructure; they have to obtain it through a private company.

But at least seven cities and counties in Colorado, reports Ars Technica, are defying state law and approving the installation of public broadband Internet and wireless.

Cloud Storage Price Wars: Best Free and Paid Options

Remember when everyone offered free email? At a certain point, it didn't matter which one you picked because they were all free. The only differentiator was feature set, and for a while, all the freebies (Hotmail, Yahoo) looked exactly the same ... until Gmail shook things up and everyone else played catch-up.

To a certain extent, we have the same thing happening with cloud storage: it's space, on the Internet, to store your files. DropBox was revolutionary, but now there are fifty-seven* companies offering the exact same service. How bad is the market saturation? Here's a breakdown of your choices for free and paid service, respectively.

The Jargon-Free Basics of Wireless Network Security for Lawyers

Your wireless network probably isn't very secure. It's not your fault -- they come out of the box semi-secure, with just enough settings enabled to lull you into thinking that your home or office network is safe and sound. It might be, but you probably want to be sure, don't you?

Now, we don't want to make you cry by tossing out complicated discussions on encryption -- no AES, TKIP, or LMNOP here.

Here are some plain and simple tips, with as little tech lingo as possible, to help you double-check your network's security protocol:

Internet Explorer Patch Is Here -- Set Up Automatic Updating

On Monday, the Department of Homeland Security advised users to stop using Microsoft's Internet Explorer until a security flaw was patched. That patch, called security update 2964358, is now available.

Users who have automatic updating turned on will not need to take any action because the security patch will be installed for them. Here's is how to make sure you have automatic updating turned on. Please note that you will need administrator permissions. The updating is scheduled (not immediate), so Internet Explorer will not be safe to use until your system updates itself.

The Time I Got Hacked By Algerian Anonymous: Lessons Learned

Mystery solved.

Why couldn't I log in to my website yesterday? It's because, four days ago, somebody hacked my site and replaced it with some neon green colors, misspelled alphanumeric messages of triumph, and other gibberish.

Congrats. You hacked a nearly empty site that was used for testing WordPress plugins. Total damage caused: about fifteen minutes of time spent logging in to my horridly bad web server and changing a few passwords, plus hitting the "reinstall" button on WordPress.

Yes, I was fortunate, because it was a non-business site. Your law firm's website, however, is far more important. Here are a few things I've learned from the experience:

Courts' Sites Crashed: Troubleshooting When it Happens Again

On Friday, PACER stopped. And the Administrative Office of the U.S. Courts' website stopped. And many of the Circuit Courts of Appeals' sites crashed. It was a full-blown outage, first reported as a hack, then as a glitch, then again, as a hack.

Either way, somebody broke it.

Fortunately, it was Friday afternoon. Many of you probably didn't even notice. We barely did, and that was because we are on the West Coast, and were still open for business.

Still, a court site crash can be a major headache for you. What can you do about it next time?

Who Do You Trust More With Your Data: Sea Pirates or the NSA?

It really is sad that this is a legitimate question. With each day bringing a new revelation about the National Security Agency's data collection activities, such as yesterday's that the NSA was spying on the United Nations, it really does seem that there is no end to this rabbit hole (red pill or blue pill? How much do clothes cost in the Matrix? Is any of this real? Ahhh!).

The only safe assumption is this: the NSA has copies of everything you do, and everything you say, especially when those activities are conducted online. If you do have something to hide, need to protect clients, or you simply value your privacy, would you then be tempted to store your data offshore, with a bunch of pirates?