SMARTen up!

How do you know if your hard disk is about to die?

A couple of months ago, a writer friend called me about a problem with her computer. The sort of problem that drives you nuts; an intermittent one.

Sometimes the machine would be slow to boot. V-e-r-y slow. Sometimes it would freeze while she was working, then resume. Other times it would behave perfectly normally. But the bad times were getting more frequent and she’d reached the stage where she no longer trusted the machine.

What was it? What could she do?

She’d called in a geek – the wheeled variety (Kiwis will know who I mean) – who performed some tests, did some checks, presented a bill and declared the machine was fine. Only it wasn’t.

Someone recommended “their guy” who charged in, did some stuff, uttered some techno-babble and charged out again. (As well as charging, in the other sense.)

He went away, but the problems didn’t.

So she called me.

Oh great. Two “experts” had failed. What chance did I have?

But in talking to her and her husband about the problems – something neither of my precedessors had done – I began to see a pattern in the randomness, booted the machine, hit F2, and within two minutes had the solution.

The machine was an HP. Like many “brand” computers, HPs contain a set of hardware diagnostic tools available from the boot menu. All I did was kick them off.

A typical short hard drive check takes around two minutes. And, as I’d guessed, two minutes later the diagnositcs reported the hard drive was failing.

HPfail

The machine was a little over a year old, still under warranty, and the faulty drive was replaced within a week.

 

Behind the scenes

Hard drives die in one of two ways. Around 40% go suddenly and without warning. The remainder suffer lingering deaths from mechanical wear and drive surface degradation, sometimes giving out warnings – like my friend’s – in the form of sluggish response and erratic performance. And, if you know where to look, you can see and even log their decline.

Behind the scenes, that HP diagnostics program ran a SMART analysis of the hard disk. SMART stands for Self-Monitoring, Analysis, and Reporting Technology, and is built in to all hard disk and solid-state drives. It tries to aniticpate failure by running a series of electrical and mechanical tests and recording the results. Some tests are more useful than others, but by looking at past failures and their frequency, it can provide you with a vital clue that a drive’s on its way out.

Some motherboards display a SMART drive status when they boot. Some don’t. Plus, there are many different types of drive and types of connection – USB, Firewire, ATA, SATA, SCSI, SSA, RAID, etc. That “low-levelness” is something operating systems like Windows struggle with. What’s more, SMART is only a “sort of” standard. Most drive manufacturers follow the basic implementation, but only some aspects are cross-compatible.

 

Linux SMARTs

As usual, Linux users have the edge here. Installing SMART is simply a matter of installing Smartmontools:

sudo apt-get install smartmontools

This provides two utilities — smartctl and smartd – a monitoring and control program and a disk monitoring daemon.

 

To get information about the disk and see whether it supports SMART:

sudo smartctl -i /dev/sda

where sda is the drive concerned. (Use lsblk to see what drives are attached to the machine.)

This will give you a summary of your drive. Look for the lines:

SMART support is: Available - device has SMART capability.
SMART support is: Enabled

 

If SMART’s not enabled, enable it with:

sudo smartctl -s on /dev/sda

 

To get a quick health status report:

sudo smartctl -H /dev/sda

which should show something like this:

=== START OF READ SMART DATA SECTION ===
SMART overall-health self-assessment test result: PASSED

If this shows FAILING, back up the data immediately!

 

To get a full drive report:

sudo smartctl -a /dev/sda

There are two options for testing a drive – short and longt. A short test typically takes around two minutes. Long tests take considerably longer – two to six hours is not uncommon – but both tests will tick away in the background and still allow you to use your machine.

 

To see roughly how long each test will take, run the full report

sudo smartctl -a /dev/sda

and scroll down to a section under the line

=== START OF READ SMART DATA SECTION ===
 where you'll find something like this:Short self-test routine
 Short self-test routine
 recommended polling time: ( 1) minutes.
 Extended self-test routine
 recommended polling time: ( 333) minutes.

 

To run either test, use the -t option:

sudo smartctl -t short /dev/sda
sudo smartctl -t long /dev/sda

Running a test will give you a completion time:

=== START OF OFFLINE IMMEDIATE AND SELF-TEST SECTION ===
...
Testing has begun.
Please wait 2 minutes for test to complete.
Test will complete after Tue Jun 21 21:33:38 2016

 

To abort the test use:

sudo smartctl -X

You can see how the time is going with the date command:

 

To see the results of the test:

sudo smartctl -l selftest /dev/sda

or run the full report again.

 

If you prefer a GUI front end for SMART, install GsmartControl:

sudo apt-get install gsmartcontrol

 

Next time, I’ll show you how to automate drive testing using smartd.

 

 

Share this ...
Share on FacebookTweet about this on TwitterPin on PinterestShare on Google+Share on TumblrShare on LinkedInDigg thisShare on RedditShare on StumbleUponEmail this to someonePrint this page

What Google knows about you!

Creepy Google logo with eyesWhat does Google know about you? Lots!

Visit this link to look at your search history:

https://www.google.com/history

The column on the left breaks it down by Web, Images, News, Shopping, Ads, Videos, Maps, Blogs, Books, Visual Search, Travel and Finance.

 

What about your YouTube search history? That’s here:

https://www.youtube.com/feed/history/search_history

 

If you haven’t opted-out of “interest-based ads”, this link will display your gender, age language(s) and interests:

http://www.google.com/settings/ads

Do you remember actually telling Google these things? Probably not. Clever, isn’t it?

 

 

If you use GPS on your Android phone, Google collects your location history, indexed day-by-day. Find it here:

https://maps.google.com/locationhistory

 

The Dashboard on the Account Activity page lists all the services you’re using:

https://www.google.com/settings/dashboard

Check the tick-box at the top to get a monthly reminder emailed to you.

 

If you don’t like them knowing quite so much, try Startpage — Google search results in complete privacy.

.
Share this ...
Share on FacebookTweet about this on TwitterPin on PinterestShare on Google+Share on TumblrShare on LinkedInDigg thisShare on RedditShare on StumbleUponEmail this to someonePrint this page

Too Many Smarts?

tv-set

 

Michael Price is terrified of his new “smart” TV. Along with a plethora of glitzy features, it includes a 46-page privacy policy.

Yes, it has streaming multimedia, games, apps, social media, internet browsing, facial and voice recognition, but in order to deliver those features, the set is “always on” to the extent that the manual warns …

“Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party.”

As the Salon columnist notes,

“You may not be watching, but the telescreen is listening.”

Back in 2012, then CIA Director David Petraeus noted:

“Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation internet using abundant, low-cost, and high-power computing.”

It seems that the Internet of Things may well turn out to be the Internet of Spies.

.
Share this ...
Share on FacebookTweet about this on TwitterPin on PinterestShare on Google+Share on TumblrShare on LinkedInDigg thisShare on RedditShare on StumbleUponEmail this to someonePrint this page

Passwords: The numbers

passwordscloud-1024x327

14% of people use just one of 10 passwords. 40% of all passwords fall into the top 100 list, 91% fall into the top 1,000, and 98.8% in the top 10,000. That’s according to data accumulated by Mark Burnett from a collection of over 6 million unique username/password combinations he’s collected over the years.

Some more interesting figures:

  • 4.7% of users have the password password
  • 8.5% have the passwords password or 123456
  • 9.8% have the passwords password, 123456 or 12345678

The top 20 passwords:

  • password
  • 123456
  • 12345678
  • 1234
  • qwerty
  • 12345
  • dragon
  • pussy
  • baseball
  • football
  • letmein
  • monkey
  • 696969
  • abc123
  • mustang
  • michael
  • shadow
  • master
  • jennifer
  • 111111

from The 10,000 Most Common Passwords List

Or if you prefer a graphical representation, (shown small at the top of this posting), click here to see how they look in high-res a tag cloud.

.
Share this ...
Share on FacebookTweet about this on TwitterPin on PinterestShare on Google+Share on TumblrShare on LinkedInDigg thisShare on RedditShare on StumbleUponEmail this to someonePrint this page

Know your onions

tor

Tor is a browser you should add to your desktop if you want to surf anonymously. It was originally developed to protect government communications — the US Navy, no less — but can be used to protect anyone against a common form of internet surveillance called “traffic analysis“.

But before we get into that, try it out for yourself.

First off, visit this site, www.systemdetails.com in your regular, day-to-day browser.

You’ll find it returns a surprising amount of data under five different tabs, including your location, operating system name, browser type and version, even your screen resolution. All of this can be used to uniquely fingerprint your browser, but the most telling detail is your IP address.

Now install Tor. It’s free and available for Linux, Mac and Windows. You’ll find full instructions on the site.

With Tor running, click on the Test Tor Network Settings link, or try this one. It’ll return a message saying whether Tor is working (or not!) and what your new IP address is.

If you revisit www.systemdetails.com you’ll find all your details suggest your browser is now located somewhere else on the planet.

Woot, anonymity!

tor2

How it works

Tor uses a process called “onion routing”. (In fact its name was originally an acronym for “The Onion Router”.) The eye-watering bit refers to its layers, nested like the layers of an onion, that distribute your traffic around numerous places on the internet so that your data packets take random pathways through various relays. The result is that no observer at any single point can tell where traffic has come from or where it’s going to.

There’s a full illustrated explanation of the system here.

 

Bad habits

Of course no system is foolproof — because fools are ingenious — so there are one or two things to watch out for that may compromise your anonymity.

Don’t torrent over Tor
File-sharing applications often ignore proxy servers and invariably send out your real IP address in tracker GET requests. That’s how torrents work, so layering on Tor will give you no protection.

Don’t add other browser plugins
The Tor browser actively blocks plugins like Flash, RealPlayer and Quicktime because they absolutely compromise your anonymity. Other plugins may do likewise. So that means YouTube videos are blocked by default, but YouTube do have an opt-in feature, which you can enable here. It seems to work fine with Tor.

Lookout for HTTPS sites
The ‘S’ stands for ‘Secure’ and Tor tries to enforce that end-to-end encryption by using the HTTPS Everywhere plugin. Most major sites support HTTPS, but double-check the URL bar if you’re asked for sensitive information.

Don’t open the documents you download while on Tor
This particularly applies to DOC and PDF files which can contain internet resources that will be downloaded outside of Tor. That will of course reveal you non-Tor IP address. Here’s what the Tor site has to say on the matter:

If you must work with DOC and/or PDF files, we strongly recommend either using a disconnected computer, downloading the free VirtualBox and using it with a virtual machine image with networking disabled.

Share this ...
Share on FacebookTweet about this on TwitterPin on PinterestShare on Google+Share on TumblrShare on LinkedInDigg thisShare on RedditShare on StumbleUponEmail this to someonePrint this page