record your guns!

Status
Not open for further replies.
I have had a complete list for years on an Excel spreadsheet. If a gun comes home with me, it's on the list.

yeah me too and because I keep receipts I was able to rebuild my gun buying history back to my first purchase in 1978 ;) I also track ammo so I can tell you what I paid back to 2003
 
For instance, if you think that it's easy to decrypt files that properly use good and time-tested commercially available encryption software, then you've got another think coming.

Correct; it's still impossible to break higher end encryption that's secured by private certificate, if you don't have the private certificate (key).

Password based encryption is as weak as the password, regardless of encryption mechanism. We can break AES256 at my office overnight if the seed is hashed off of a plaintext password (out to a limit; you get over 14 characters or have mixed special symbols it broadens the key space to the point we might not have compute time to do it). Meanwhile, if it is instead secured with a proper 4096+ bit key, we won't even try. I'd be long dead and buried before my servers could break it.

And anybody who thinks security ends there is sadly mistaken...this is another area of vulnerability. Multiple layers of security make access to important files incrementally more difficult because each level of security provides an added level of protection against methods that others are vulnerable to.

Correct again.

E.g. Your home network is only as strong as your WiFI password. Use a common English word, surname, or mix of those with maybe a few numbers, your home network could be breached easily.

Then it comes down to what computer level security you have. Windows XP? We're in, in seconds. Windows 7, properly patched, with a decently strong password? Going to take longer. Don't use a password on your PC? You're screwed.

Use the same password on your computer that you use on a website that sends HTTP login info we'll snatch it out of the air and have full access to not only that website but also your computer, and any other (secure HTTPS) website that you happen to use the same login info for.

Use a different password for ALL websites, and computers. (I have to remember hundreds of them for work, it's a pain, but not impossible).

Don't write the password down and stick it on the bezel of your computer.

For example, secure networks don't just rely on firewalls and electronic security access programs. They're also set up to be independent of other networks, and the stations which access them are also in controlled areas. You cannot hack through a firewall by an independent computer if that computer has no physical access to the network.

We use a similar scheme for our storage networks. They are not accessible from the outside world, separate physical switches, etc.

The same philosophy applies to electronic files. If all you take is the bare minimum, then you're setting yourself up for a single-point failure. Just like hand writing a list and then not securing it physically, for example.

I can't count the number of times we've had to send things to DriveSavers because a customer "thought his laptop was backed up" .. (Magically, I imagine). Most of our customers now have us set up forced replication on any work computers to get a snapshot of mobile devices; but invariably, someone starts to do work related stuff on a personal device we don't have control over and then loses it (drive crashes, coffee spills, whatever). We can generally salvage it, but not always.

Also, your backups are only as good as the media they are written to. Had a customer sadly disappointed one time when they were using an off the shelf MagOp disk based backup (this was 15 years ago), disks were bad, they didn't notice. Same thing with tape backups, etc. Those things have a shelf life. As do burnt DVD's!

I have an older laptop, for example, that I could set up as a stand-alone computer and never connect it to a network. If I really wanted to be secure, I could set it up to boot up and run on an operating system installed on a flash drive. I could create and save any files I want and save them as heavily encrypted files on flash drives or micro-SD cards, which I can then remove and physically secure elsewhere. I can shred existing files/erase hard drive space using a shredding program rated to DOD standards. If I was really concerned, I could also physically destroy the laptop hard drive by a variety of means.

Most mobile phones have enough storage to stash an OS on them and boot off of them now. My phone even has a boot menu - if I plug it in to boot off of it, I can choose any Windows OS (workstation or server), either boot in to, or run setup off of. I've used it to rebuild servers from bare metal before. :)

In the end I would have any data I wanted secured in encrypted flash drives or micro-SD cards which are so small that physically securing them presents any number of possibilities that could frustrate even the most dedicated search for them.

Until you get forgetful and forget where you stashed something that small. :)

This is why I roll my eyes at a lot of people who don tin hats about how electronic files are "so easy to hack". They're ONLY easy to hack IF they can be found, IF they can be accessed, and IF they can be decrypted.

Security through obscurity still works, always has, always will. Is it 100%? No, but what really, truly is? :)
 
Trent:
It seems safer to use a foreign word as password on the company website.
But the general subject of this word would not be hard to figure out, because of the type of business.
 
Now if I can just get my lazy self in gear to get my OWN completed! It's the photo-taking.....I'm just too anal to use snapshots, I want good quality, detailed photos

That is the hard part. My list is complete. But my photo taking is not. Just never satisfied with the photos.

yeah me too and because I keep receipts I was able to rebuild my gun buying history back to my first purchase in 1978 I also track ammo so I can tell you what I paid back to 2003.

I did that as one of my very first projects when I bought my first computer (except the ammo part as I don't care enough for that). High dollar and collectables are on lists or most of them.

If I ran NSA, my agency would have the capability of reading the files on any computer hooked up to the Internet.

Me too or I would think about such a system. That my friend is the "big one" as far as I'm concerned. You know all those automatic scans that your computer does.... once could vey easily be a government scan that you are not even aware of happening. Download or update virus files.... everyday.... tin foil hat stuff to be sure.

Since the NSA revelations, I have been disconnecting my computer from the internet when it's turned on but idle. If you leave your computer on, many of the scans happen at night and you are not even aware of them happening IF the computer is left on 24/7.
 
All the guns i've owned in the past 20 years are in an Excel file along with serial numbers, make of scope, date disposed of, etc. i have a photo album of my antique Winchester collection and my more valuable modern guns.
I keep all of my info in a single excel file as well. I see no need for a separate file food each gun.
 
Amazing what some of us actually carry with us every single day via cell phones. I have not evolved to that level of information accessibility. It is one of the reasons that I resisted getting a smart phone for years, not to mention the added cost. But a year or ago, I finally took that plunge as well.
 
When I wrote my Shot Works software, the very first thing was build the security high encryption framework. Then the rest of the software. I even posted the encryption routine on the website so folks can look at it.
 
If your firearms are insured, make sure that you have documentation that will satisfy their claims folks. I keep all relevant purchasing information plus photos showing condition in a folder in my safety deposit box.

If things get stolen, the police will want the basic firearms info, the insurance company may want/need a bit more depending upon your insurance coverage.

Been there, done that.

allan
 
I've done the same thing years ago. Sorry fellas, I'd have mentioned it then, but I thought pretty much everybody knew about databases and such.:uhoh:

I have copies in different safes and a SDB.
 
Status
Not open for further replies.
Back
Top