Saturday, January 22, 2011

Cleaning "Green"

Toxicity. Do we really know what this means? Can you even say it ten times really fast? What ever it is we know it has become a way of life.

It is a fact that we are exposed daily to an incredible array of toxins in our normal lives. They are "toxins" and each one has a certain degree of toxicity to it. Toxicity can be determined in a variety of ways.

With an interest in a sparkling house you need to know a little bit about it to protect yourself, your family and anyone else whose house you clean.

The next question then becomes how can you respond and what can you do?

Well, you can do a lot as a dedicated house cleaner. First, limit your exposure. Read labels carefully. Use nontoxic cleaning products. Avoid using indoor pesticides.

Secondly, limit the exposure of the people around you. Happily for you and your house there are plenty of effective, earth-safe cleaners that you can buy or make. Borax mixed with lemon juice will take out toilet-bowl stains. White vinegar is useful for disinfecting bathrooms and kitchens. Bon Ami, a borax-based powder cleanser sold in supermarkets and hardware stores for more than 50 years, safely cleans pots, pans, sinks, oven interiors along with other corroded surfaces.

Using these alternatives will reduce the toxic load in your house and beyond. Using environmentally friendly cleaners will also safeguard your health and that of the community. It reduces air, water and ground pollution in the big picture.

So why isn't everyone doing it? The reality is, few people actually check labels. Start now. Take time to read the lable. Distinguish yourself as a "green cleaner." You can start a trend. You can actually become a product toxicity home specialist.

The first thing to know is that not all "green" products are created equal. Again, read. Catch the ones that have been prettied up with essential oils. Check labels for irritating chemicals such as chlorine, ammonia and artificial fragrances and dyes.

Many people who "think green" are just now applying their philosophy to the dirt at hand. "Eco-friendly cleaning and laundry products are the next frontier of environmentalism," says Marci Zaroff, former publisher of Macrocosm and CEO of Under the Canopy, an organic-fabric clothing company. "It's an inexpensive, easy and effective way to protect our planet and commitment to life." About The Author: Joy Jackson writes extensively on House Cleaning Tips so you can clean faster and clean better.

Cryptography

The recent explosive growth of PC’s and Internet-based commerce has significantly increased the need for a wide variety of computer security mechanisms. This article, the second of a three-part series, lays the underlying foundation in plain language.

A slightly longer series of articles "Keeping Your Secrets Secret" will examine practical examples in greater detail and provides useful tips and advice. Of course, these will continue with the theme of making crypto and computer security easily understood.

One-Way Hash

Also known as a one-way function, a message digest, a fingerprint or a checksum, the algorithm creates a fixed-length output that cannot be reversed. One-way hashes provide checksums to validate files, create digital certificates and played a central part in many authentication schemes.

Let us consider this example. For ages, the Chinese have a fortune-telling method that relies on "Ba Ji" (eight characters) which uses the time, day, month and year of birth according to their calendar. There are sixty possibilities (almost equal to 6 bits) for each of the four variables. Since the Chinese use two characters for each variable, the result is always eight characters. This is an example of a nonsecure 24-bit one-way hash.

Obviously, this way of producing a one-way hash is not acceptable for security purposes because of the huge number of collisions (different inputs producing the same output).

The most commonly used hashes are SHA-1 (Secure Hash Algorithm uses 160 bits) and MD5 (Message Digest uses 128 bits). In August 2005, a team of cryptographers led by Xiaoyun Wang of Shandong University, China, presented a paper that found faster ways of finding collisions than the usual brute force method. These exploits (vulnerabilities) may make digital certificates forgery a reality.

The implications to e-commerce may be widespread not to mention the millions of websites which used MD5 to hash the users’ passwords in their databases. Any webmaster can tell you that converting these sites to use SHA-256 or SHA-512 will not be a trivial task.

In a recent directive, NIST (National Institute of Standards & Technology, U.S.A.) has advised U.S. governmental agencies to use SHA-256 or SHA-512 (256 and 512 bits respectively) instead.

Biometrics

A biometric device is one that can identify unique characteristics from a finger, eye or voice. Many believe that biometrics should provide a higher level of security than other forms of authentication.

There is a news story in March 2005 of how a Malaysian owner lost his Mercedes car and index finger to car thieves armed with machetes. Obviously the keyless ignition electronics cannot detect whether the finger is still part of the original body nor whether the finger (and by extension the person) is alive or not.

Recent security breaches have heightened concern over depositories of personal information stored on many financial sites. When such breaches occurred, the incidence of identity thefts will thus rise also.

If you lose your credit card, you can always void the card and get a new one. When you lose your fingerprint (stored digitally), or other biometric features, who can replace those?

Passwords

When asked to conjure a random number or characters, most people inevitably used materials that are familiar to them like birthdays, names of family members, pets’ names and so forth.

For example, most will choose dates when asked to choose a six-digit number for their ATM Personal Identification Number (PIN). Doing so will reduce the number of possibilities by nine times.

Random Numbers and Generators

Random numbers are central to crypto. To qualify as true random numbers, the output from random number generators (RNG) must pass statistical tests of randomness. Two suites considered as de facto standards are the "diehard" suite developed by Prof. George Marsaglia of State University of Florida and "Statistical Test Suite" from NIST.

Second, the RNG’s output must be unpredictable even with complete knowledge of the algorithm or hardware producing the series and all the previous bits produced.

Third, the RNG’s output cannot be cloned in a repeat run even with the same input.

The most common approach to producing random numbers is by using an algorithm carried out by a computer program (Yarrow, Tiny, Egads, Mersenne Twister). Such algorithms cannot produce random numbers, hence their names, pseudo-random number generators (PRNG).

Another approach is to use physical events such as entropy produced by the keyboard, mouse, interrupts, white noise from microphones or speakers and disk drive behavior as the seed (initial value).

Some may argue that true random generators are those that can detect quantum behavior in subatomic physics. This is because randomness is inherent in the behavior of subatomic particles - remember the electron cloud from your high school physics.

One-time Pad

The most effective system is often the simplest. A one-time pad (OTP) is a series of random bits that has the same length as the digital object to be encrypted. To encrypt, just use a simple computer operation, exclusive OR (XOR). To decrypt, simply XOR the encrypted result with the same random bits.

The downside of using OTP is that once used, it must be discarded. Second, the OTP and the digital object must have the same number of bits. Lastly, the obvious problem of synchronizing the OTP between the receiver and sender.

Internet Protocol

With VOIP technology, you can now place a phone call to someone on the other side of the world using your broadband internet connection rather than a telephone. VOIP technology, in essence, takes the analog signals from your voice and converts them into digital signals able to travel over the internet. Then, at the other end, VOIP converts the digital signal back to the spoken word. Types of VOIP service vary.



Some VOIP providers only allow you to call other users of the same VOIP provider; other VOIP providers allow you to call anyone with a telephone. To break it down, there are three basic types of VOIP service: With an ATA (an analog voice adaptor), which is box that connects your computer (or your internet connection) to your telephone for VOIP use. With an IP phone, a special VOIP phone that is by all appearances a regular telephone but with special Ethernet connectors allowing you to hook it up to your router. Before long, WIFI VOIP phones will be on the market, allowing you to place a VOIP call from any internet hot-spot.With just your computer, you can install VOIP software and place, for free sometimes, VOIP phone calls anywhere in the world.



Get a sound card, speakers, a microphone, and an internet connection, preferably broadband, and youÕre good to go. Probably one of the most apparent benefits of VOIP is how it relieves you of the need to pay the telephone company for phone service. That's one more bill out of your life! You only need to pay your broadband bill (plus VOIP charges) to have your telephoning needs met as well, and a VOIP bill is usually much cheaper than a phone bill. If you carry an internet-enabled laptop with you wherever you go, say, on a vacation, then all you need to do is bring your VOIP adapter and/or IP telephone and you've got service as good as, if not sometimes better than, a cell phone.You must also consider the disadvantages before diving in and going VOIP. For one, your VOIP service may not respond well during power outages and server failures. If your internet is ever out, your VOIP will be out as well, and thus your ability to place phone calls.



Additionally, not all VOIP providers offer 9-1-1 or directory assistance calls. Before purchasing VOIP hardware and service, make sure the VOIP company you choose provides the services you need. Interestingly enough, you may have been placing VOIP calls for a long time now without even knowing it. Telephone companies have been using VOIP technology to make their services more efficient. You can also expect most of the same features from your VOIP service provider as you currently get from your phone company. VOIP service often includes caller ID, call waiting, call transfer, return call, and other convenient features youÕre used to.



Additionally some VOIP providers offer call-filtering services, letting you choose how calls from a designated number are dealt with. Maybe you forward the call to a different number elsewhere, maybe the caller gets a busy signal from you, or a message saying your number is Òno longer in serviceÓ. Some even allow you to check your voicemail over VOIP and add voice messages as email attachments.VOIP is a burgeoning technology with extremely promising possibilities ahead of it. Before long, Ma Bell may become obsolete.