Computer Club Dates


Click the menu below to select the required date:-

Computer Club Date


Wednesday 13th February 2019


Checking For Windows Updates
If you go to Settings, Update & Security and click on Check For Updates, you are deemed to be a "seeker", i.e. someone who wants to get the latest updates before they would be automatically released. So, just be cautious that clicking Check For Updates makes you a 'guinea pig' for testing updates before they are more widely released - unfortunately, Microsoft don't tell you this! Have a look at this "How-To Geek" article for more on this subject:-

Updating Windows 7/8.1 to 10
Just to confirm what I said last month, I had the opportunity to update a Windows 8.1 system to Windows 10. I did this by running setup.exe from a USB Installation Drive made with the Media Creation Tool (see last month's Blog for details). The newly updated Windows 10 automatically activated with a digital licence, so there was no requirement to enter a Product Key.

You can use this method of updating from the USB Installation Drive to perform one of the big Feature Updates (e.g. 1809), or just to re-install Windows on a system that is not performing correctly. This method preserves the installed apps, although I recommend backing up before any big update.

Windows 7 Support
Windows 7 has about 11 months of support remaining until 14th January 2020. After that, it will no longer receive security updates from Microsoft. Anyone still using Windows 7 would be advised to move to Windows 10 in the next few months. You should be able to use the above technique to update your Windows 7 system to 10.

File History
We had a brief discussion of the File History feature in Windows 10 and how to restore a backed up file. You can learn more about this and backup on Windows 10 in general from my Backup in Windows 10 document:-
bit.ly/CE-Backup

We also talked about USB-C, the new smaller, reversible USB connector. This is also described in the above document.

Nextdoor.co.uk
Following a query from Brian, just a quick mention of this web site. Nextdoor is an USA based organisation that operates local social networks in many countries around the world. In the UK, it took over a site called Streetlife in 2017 which performed a similar function. It provides a local forum in your neighbourhood where people may offer goods and services for sale (e.g. house cleaning, gardening, etc), users might ask for recommendations for local plumbers, washing machine repairers, etc.

You can invite other neighbours to join by email, WhatsApp or postcard. It is free to use. You can use it via the web site or download the app onto your mobile device. As with any social network, the usual privacy aspects should be considered, so check the Privacy settings to control how much information you reveal and be cautious what you include in your Profile.

Google+
The little-used social networking site, Google+, is being closed down on 2nd April this year. If you are using it (and obviously, not many people are!) you need to ensure that you have copies of any photos that you may have uploaded to Google+, as these will be deleted when the service closes. You can see Google's notice about this here:-
https://support.google.com/plus/answer/9195133?hl=en-GB&authuser=0

Mesh Routers
Tony asked a question about BT's mesh routers which they call "BT Whole Home Wi-Fi". The idea of mesh routers is to provide better distribution of Wi-Fi throughout the house. They consist of a number of nodes - usually 2 or 3 is enough, but you can add more. Each node communicates with nearby nodes, but they operate as a single wireless network. So your device (e.g. iPad) would connect to the nearest node. If you move around the house with your iPad, it will seamlessly switch its connection to the nearest node, so it is always receiving a strong wi-fi signal. If you want to read more, have a look at this "How-To Geek" article:-
https://www.howtogeek.com/290418/what-are-mesh-wi-fi-systems-and-how-do-they-work/

Web Site Encryption
Following a query from Brian about email encryption, I thought it might be useful to have a quick look at how web site encryption works in general.

Originally, most web sites use a protocol called HyperText Transfer Protocol (HTTP) which did not provide any encryption. HyperText Transfer Protocol Secure (HTTPS) is an extension of HTTP which encrypts the communication between your device (the client) and the server. It used to be the case that HTTPS was only used where personal or financial data was being entered, such as a payment page where you enter your credit card details. More recently however, HTTPS has become the norm for most web pages. Google, in particular, have encouraged this move to HTTPS by progressively flagging up HTTP sites as insecure – see:-
HTTPS sites show a locked padlock symbol in your browser.

The system used to secure HTTPS pages was known as SSL (Secure Sockets Layer). This system has been superseded by a more secure system called TLS (Transport Layer Security), although it is often still referred to as SSL. SSL/TLS offers three main security benefits:-
  1. Encryption. The data passing between you and the server would be unintelligible to anyone if they were to intercept it.
  2. Authentication. This ensures you are communicating with the correct server, not an impostor.
  3. Integrity. This ensures that no data has been lost or altered between client and server.
Public/Private Key Encryption
Modern encryption systems are based on Public/Private Key cryptography, otherwise known as asymmetric cryptography which was developed in the mid-1970s. Symmetric cryptography, on the other hand, is a relatively simpler system, where both parties use the same key. However, the drawback of symmetric keys is that the key has to be passed to the other party and could get intercepted, allowing a third party to decrypt the transmission.

Public/Private cryptography uses two mathematically related keys with the following properties:-
  •        It is mathematically infeasible to compute the Private Key from the Public Key.
  •        Data encrypted with the Public Key can ONLY be decrypted by the Private Key.
  •        Data encrypted with the Private Key can ONLY be decrypted by the Public Key.
[The maths behind this is a nightmare, but if you really want to try to understand it, look at this article (don’t say I didn’t warn you!):-

Essentially, this asymmetric encryption enables you to send a secret to the server which no one else can read. This secret could be a symmetric encryption key which the client and server can use to communicate during the time you are connected. This combination of asymmetric and symmetric cryptography is commonly used on the Internet, with the symmetric key being discarded at the end of the session. The reason for using a symmetric key for the main part of the session is that it is computationally easier and, therefore, quicker.

If you want a simple overview of HTTPS encryption (with no maths!), have a look at this short video:-

Digital Certificates
The web server needs to acquire a Digital Certificate which is “signed” by a Certificate Authority (CA). The CA verifies that the web site is genuine before it will issue a certificate. The certificate is actually a small data file which includes the name and domain of the web site, an expiry date, and the web site’s Public Key. When your browser connects to a web site, it requests a copy of the certificate. The details of the CA on the certificate must match the details in the Trusted Root Certificate store in your browser for it to be valid and trusted by your browser.

If you click on the locked padlock symbol of a web page in your browser, you can view the details of the certificate, including the public key.

Digital Signing
The concept of Digital Signing of a certificate (or other document) referred to above consists of 2 steps:-
  • Creating a Hash of the document. A Hash is a mathematical computation based on the content of the document using a standard algorithm. A Hash is also known as a Checksum. A hash is irreversible, i.e. you could not re-construct the document from the Hash. If the document was changed in any way, the Hash it produces would be different.
  • The hash is encrypted with the Private Key of the CA.
When your browser receives the Digital Certificate (in plain text) and Signature (i.e. the encrypted hash) from a web site, it first uses the Public Key of the relevant CA (which will be in the browser’s Root Certificate Store) to decrypt the Hash. It then uses the same algorithm to hash the Certificate. If these 2 hashes match, then the Certificate can be trusted and has not been tampered with. The browser can then use the web site’s Public Key from the Certificate to begin the encrypted communication as described above.

Verified By Visa
Margaret raised a query about her credit card provider now asking for a mobile phone number to be used as payment verification. As I understand it, this system will be replacing the existing Verified By Visa procedure which requires you to enter characters from a password you created when you registered. The new system will send a code by Text message to your phone, you then need to enter this code into the payment site to complete the purchase. There was an article on this on "This is Money" in July last year:-
https://www.thisismoney.co.uk/money/saving/article-5946191/Visa-require-text-message-confirmation-online-card-purchases.html

Next Session
Wed 13th March 2019 1:30 to 3:30pm.

Print Friendly and PDF