Monday, January 16, 2017

Google Voice & Video - Network Activity

The Windows Resource Monitor provides expanded details of CPU, memory, disk and network activity. A link to the Resource Monitor appears on the bottom of the Windows 7, 8 and 10 Performance tab of the Task Manager. This older article describes briefly the features and displays of the first 4 tabs of the Resource Monitor.

During this morning's conversation on 3740 kHz I joined a Google Hangouts session with W4BXI and explored the Resource Monitor a bit more than I had previously. I looked at the Network Activity tab to see the usage of the Google Talk plug-in that provides voice and video for Google Hangouts. Below are 3 partial screen shots showing the levels of network activity for both voice and video.


This first view shows network activity with a table of processes on the left. (Click on the image for a larger view.) Separate columns show send, receive and total Bytes/sec. For the voice activity in progress you see the average receive rate of 6,856 Bytes/sec. By clicking the check box to the left of googletalkplugin.exe its activity is highlighted in orange on the graph to the right. The receive activity corresponds to 8 x 6,856 = 54,848 bits/sec or 54.848 kb/s, which is very low on the 1 Mb/sec full scale graph.


This view shows the greatly increased average send rate of 61,170 Bytes/sec when I started sending live webcam video. The average rate corresponds to 489,360 bits/sec or almost 1/2 Mb/s. The graph on the right shows the variation in data rate as I was moving the camera around.




This view shows the data rate dropping on the graph when I stopped sending video. Due to the averaging time for the data on the left side, the send rate had not yet settled back to its voice-only rate.



I hope you will think of the Resource Monitor program the next time you are wondering about what is going on in your Windows computer.

- John


Wednesday, January 11, 2017

Passwords & Two-Factor Authentication

During a recent morning on 3740 kHz we discussed the two big Yahoo email breaches and the need for effective password use and management. A detailed Q and A about the Yahoo breaches is available in this article by Brian Krebs. Today we depend upon online accounts for many purposes. Our most important accounts (e.g. finance-related) must have strong passwords that are not reused at other sites. A good way to meet these requirements is by use of a password manager. (Paper records are also popular, but require manual typing of login details and secure handling.) Below are links to two (of many available) password manager programs that have good reviews from security analysts and journalists. Both are free and have versions for Windows, Mac, Linux, iOS and Android.  If you have not used one, I suggest that you try one with one or more of your existing logins to explore the features.

You can find these and many others reviewed in many web articles such as the following:

Several programs provide automatic fill-in of username and password blanks on web sites that you log into. Some or most can use secure cloud storage to make it easy to access your password data from multiple computers or mobile devices. These programs can also generate a complex, random unique password of any length to use with each online account.


Note that use of any password manager requires you to choose a strong master password since it must protect all of your stored passwords.


For additional security you should consider two-factor authentication (2FA) which requires entry of an additional piece of information when a login is attempted from a previously unknown device. This is strongly recommended for online accounts that involve your financial matters. Below are links to articles that discuss how two-factor authentication works and why you should use it.

At the very least, you should make sure that your important / finance-related online accounts use unique and long passwords. Password complexity is important too, but if you must sacrifice complexity, use longer length. For an appreciation of the importance of password length see this article by Steve Gibson. With a password manager you can use long and complex passwords since you are not burdened with manually typing them in at each login.

Your comments and questions are welcome.

John