Technology and Writers
You are currently browsing the archives for the Technology category.
One of the nice things about working on the Writer’s Knowledge Base is that I see A LOT of writing articles pass by. I don’t have time to read all of them, of course, but M.E. Summer’s post “Kate Beckett’s Murder Board: Reverse Engineering Your Story” caught my eye just from the title alone. “Reverse Engineering.” Hey, that’s a technical term and I’m a technical guy (plus I probably know what she’s going to say and it’s right up my alley.) Then, there’s this “Murder Board” thing and that puppy sounds interesting!
Check out M.E.’s post and then come back. (I’ll start the Jeopardy music…)
Nice post, right?
I thought so, too. I’ve been thinking about this stuff a lot due to my work on my novel writing software so I knew about the nature of the issues in the post. However, I came away with an observation and a question for myself:
- “Reverse engineering” your story is outlining after the fact
- Could Hiveword solve the presented issues?
Outlining after the fact
If you reverse engineer your story you are effectively making an outline from what you wrote pantser-style. Then, you examine the outline and look for a broad range of problems. That’s cool if you want to work backwards like that but it leads to what I’ve been calling rework.
Outlining first or after the fact ends up with the same artifact (an outline) so there’s no loss there. Doing it after the fact is naturally faster. I should say seemingly faster but I’ll get to that in a moment. Then, you study your reverse engineered outline and look for problems. M.E. mentioned some of the ones she looks for:
- Scheduling mishaps
- Dropped subplots
- Extraneous fluff
- Missed opportunities
Thing is, when you find any of these things you’re going to have to do some rework. Hopefully, the rework isn’t too extensive but you never know. That’s why I said that, sure, doing the outline itself after the fact is faster but the total time to novel completion is not. In fact, I’d argue that the time to market is faster if you outline first.
Of course, as soon as the reverse engineered outline is done it’s a high-fidelity representation of the story. That is, until you change the story as a result of corrections. It’s easy (and OK!) to deviate from an outline but nobody said you can’t update the outline as you go. It’s relatively painless (depending upon your system) and you’ll always have a high-level representation of your novel.
Seems to me that outlining first saves time and can prevent carpal tunnel. (Hmm… “Prevent carpal tunnel syndrome.” Maybe I should use that in my marketing efforts!)
Essentially, doing an outline first allows you to see the story in its entirety and make changes while they are less costly in terms of time and rework.
M.E. mentions that a “painstaking outliner” probably doesn’t have these problems and that reverse engineering an outline is a way to help pantsers. So she knows the choice that she and her fellow pantsers make. I think the concept that M.E. presents is a great boon for pantsers. But, outline first or outline afterward, it’s still outline time!
Can Hiveword track the concrete examples M.E. gave?
As mentioned above, that’s a question that came to mind while reading the post. After all, these are issues I’m trying to solve and the post listed a bunch of concrete examples (including one commenter who tracks phases of the moon!). Turns out the answer is a mixed bag.
I’ve categorized the issues that M.E. presented below along with how Hiveword might help (if possible).
Setting inconsistencies (travel, weather)
Hiveword can help here since you can easily see the characters and setting by scene. If a character is at Setting X in one scene and Setting Y in the next, you know there’s some travel involved.
Plot and dropped subplots
For plot, M.E. specifically asked “How did she know X when she doesn’t find out about Y for another three chapters?” That’s tricky for Hiveword to know and really depends on the nature of X. Judicious use of tags might help. (I explain tags below.)
The dropped subplot part is handled by Hiveword. In the screenshots you’ll see a rudimentary example of the plotline visualizer tool. You can easily see how subplots weave in and out and when they end.
Hmm, this is a tough one. Hiveword lets you describe a character in great detail. You can also assign those characters to each scene. But M.E.’s example question was “Would she be talking to him again so soon after he did Z?” which Hiveword really can’t answer since it’s a judgment call.
Realism, scheduling mishaps, extraneous fluff, missed opportunities
I’ve grouped these together because Hiveword is of no help here. These issues simply require a human brain.
Moon phases, time between scenes, and events at points in time
I’ve grouped these together because Hiveword addresses all of them with tags. Tags are simply arbitrary words or phrases that you can attach to scenes, characters, settings, or plotlines. Tags are powerful because they are Hiveword’s extension point that allows writers to track whatever they need to.
A tag could be a date, a phase of the moon, a critical happening/event, a marking of the first plot point, etc. Since you can have multiple tags all of these could exist at the same time.
So, Hiveword fared reasonably well in its ability to track the provided items. Some things, though, simply require a brain. Sorry about that!
Check out the Hiveword screenshots for an idea of what can be tracked. Though you won’t see much use of tags there I think that the loose, custom tracking they provide can tremendously help writers.
- Outline before writing or after — you’re writing an outline either way
- Outlines can be a high-fidelity living thing, kept current as you write the prose
- Outlining first saves time and rework
- Hiveword can help!
By the way, if you want to call Hiveword a “Murder Board” I’m cool with that. 😉
How about you? Do you reverse engineer outlines from an existing work?
Image by kowitz
Computer security and protecting yourself online are huge issues which will only get worse in the future. As technology and network effects get more and more compelling to the masses the attractiveness to scammers and hackers also skyrockets. Ownership of your computer and identity are at risk without a working knowledge of computer security and appropriate online behavior.
In this post I will highlight the main areas of computer security so that you can take proactive steps to protect yourself. While most of these issues affect everyone with a computer I will pay particular attention to the effects on an aspiring writer. Why the distinction? Because an aspiring writer (and other creatives such as musicians) are not only users of computers and the internet but also unusually active participants as they market their work to the world.
Given the stakes let’s get started on this survey of computer security topics. This post is a long one and you have stories to write so if you’re pressed for time just slide down to the bottom where I’ve extracted most of the tips. You can then dig deeper into a particular topic if you’d like.
Here’s the high-level view of what will be covered:
- Identity Protection
First up, passwords…
Don’t you just hate that everything wants a username and password? What’s a harried writer to do given all the accounts that must be tracked: email, bank, Facebook, Twitter, blog, FeedBurner, and you name it? What people typically do is re-use passwords or make weak ones.
Reusing passwords sure is easy. I’ve been guilty of that myself. The risk is that exposure of one password puts your other accounts at risk. It’s far better to write down your passwords then to duplicate them. If you do write them down try to use a cryptic notation that you will understand and (hopefully!) not forget.
Most of the time, weak passwords are far worse than reusing them. Using passwords such as “password,” “abc123,” your pet’s name, or your account name is an open invitation to be hacked. Besides being guessable they are also weak and fall quickly to automated password-guessing programs.
The fix? Be strong like your main characters. Strong passwords are at least 8 characters long and combine upper and lowercase letters, digits, and special characters (such as %). By using more than just lowercase letters you drastically increase the search space for password crackers and make it nearly impossible for a human to guess your password.
Luckily, many websites now provide password strength meters as you type your password. These indicators are basing the strength on the techniques I described above. So, a password like “jD8jf_6EE” will be considered strong. Your passwords don’t have to be quite so unmemorizable — do what’s easy for you while keeping the spirit like “jImmy_bonD007.”
What’s worse than weak or reused passwords? Sharing them, of course! Don’t, don’t, don’t do that. Just don’t. Not with your friends. Not with Aunt Tilly. And definitely not with other applications like Facebook or applications within it.
Oh, but you’ll be tempted to give SkyNet your email account info so it can scarf up your contacts. Mighty convenient and highly coveted by SkyNet, of course. So, if you must do that, allow the application to get what it wants and then change your password so it can’t go back to that well for another drink later.
Your computer hardware plays a significant role in your computer security posture. The hardware I’ll talk about includes you computer, of course, as well as your router which is likely WiFi-enabled.
The surface area for exploits against your computer is huge. Your operating system (OS) may be Windows or Apple’s OS X but either way it has millions of lines of code. Hackers try to find flaws anywhere in that massive codebase which will enable them to get a foothold on your computer and take it over. No computer will ever be completely secure but let’s make it harder for them.
NOTE: Lest you think that because you use Apple products you are more secure you should think again. Like any computer, Macs can be exploited but Windows’ large installed base keeps most hacker attention there. As Macs get more market share you’ll see that the hackers will follow.
Has your computer ever run incredibly slow or spewed pop ups like a cheesy late night TV ad? You’ve got malware! Using the correct type of user account will help prevent that in the future.
While not commonly known among Windows users, you should not use an administrator (“root” in Unix variants like Apple’s OS X) account for day to day work. Instead, set up a separate non-admin user account and use that one most of the time. Doing this will help prevent malware from taking hold since it’s difficult for a program to get installed surreptitiously in a non-administrator account.
As mentioned above, operating systems are complex. Hackers or the OS developer will discover a vulnerability and then the OS vendor will usually fix it so that the vulnerability cannot be exploited. These patches are included in the updates to the OS which are both regularly scheduled and on-demand when the situation warrants. As your OS falls farther and farther behind on these patches your system becomes more and more vulnerable. Moral: Stay up to date with your patches.
If you’re anything like me, antivirus programs rank right up there with having a nice case of toe nail fungus. I’ve never had that personally but I can imagine…
Anyway, antivirus programs often cost money, they slow you down, and they’re needy (Look at me, look at me!). Regardless, pick one and keep it updated. With antivirus programs staying current means you get regular antivirus definition updates AND updates to the antivirus program itself.
No antivirus program will catch all threats. In fact, they won’t even catch 50% of the threats but some prevention is better than none.
Chances are you have a Wi-Fi router between your computer and modem. The router functionality allows you to hook multiple computers to an internal network for file sharing or internet access. It also hides the computers behind the router from being easily discovered by seedy folks on the internet who would love to break into your computer. Thus the router is serving as a firewall.
The Wi-Fi component allows a machine to connect to that internal network wirelessly. Mighty nice, yes?
By definition, Wi-Fi is wireless so the area of access is wider than the few feet around your router. If you don’t secure your Wi-Fi access you might find that the punk kid down the street is mooching off of your internet access. Not a big deal? That same kid is on your internal network because you allowed him in. Guess what? He just found the Quicken file you shared so that your spouse could view it on her laptop. Or maybe you shared your directory of fiction writing. I sure hope that kid doesn’t delete everything…
Perhaps I’m being overly dramatic but the scenarios above are easily possible. Luckily, the fix is easy:
- Change the router’s default password
- Enable the strongest security standard your router supports
- Don’t broadcast your SSID
- Avoid punching holes (aka opening ports) in your router for the Wii or other devices
Wi-Fi Hot Spots
Wi-Fi hot spots can be found in many places frequented by writers. Starbucks anyone? Airports, hotels, your neighbor’s unsecured Wi-Fi…
Be aware that when you join a network via an open access point you are taking a risk. Just like the punk kid scenario above, all computers attached to the access point are connected on the internal network and share the same risks as above.
If you must connect to an open access point ensure that you are running a software firewall to help detect any inbound connection attempts.
The software category is quite vast. For example, I discussed operating systems under Hardware above but clearly it is software. For purposes of this article, though, I’m going to consider software to be browsers, web sites, email clients, and document-oriented software such as Word and Adobe Reader.
Browsers and Web Sites
Web browsers and the web sites they interact with are so intertwined I’m just going to treat them as a unit. Like operating systems, browsers attract a lot of hacker attention. They’ll look for a vulnerability that they can then exploit by getting you to go to a particular web site, for example.
On the other end of the connection you have web sites. The popular ones like Facebook also attract a lot of hacker attention. Hackers will try to find ways a trusted website like Facebook can be turned against its users. Website vulnerabilities can occur because of the web server software it’s using or coding mistakes on the website developers’ part.
Consider this: Your operating system runs a browser. The browser contacts a web server which processes the browser’s request. The browser then renders the response from the server. All of these components and interactions are subject to exploitation.
There’s no way that you can know or even guard against every possible attack vector so the only thing you can really do is practice proper digital hygiene. Being safe online largely requires behavioral changes assuming the basics from above are already in place. For example, antivirus software is useful when surfing the net since downloads (even those that you didn’t request!) would get checked.
Maintaining a posture of security while online mostly involves awareness. Without going into a lot of detail I’ll highlight things you should do to stay as safe as possible.
Malware authors love when people use ancient browsers since there likely many known exploits against them. Always keep your browser current. Updates not only fix bugs but close security holes. Configure your browser to automatically update and you won’t have to think about it.
Scripting, Active Content, and Browser Plugins
Because many websites rely on these technologies its often difficult to simply disable them even though that is the safest option. So, if you’re going to a new website you might consider turning off scripting until you determine that the site seems safe. Obviously, this method isn’t foolproof and it sure is painful but it’s almost a necessity especially if you’re surfing the seedier side of the web. Another way of doing this is to use a custom browser plugin that only allows scripting on sites that you specify. You could also have a different browser from your normal one configured without scripting and use that for general web surfing.
Finally, like browser updates you should also keep your browser plugins current for the same reasons.
Isn’t tabbed browsing great? There’s a great temptation to stay logged into a website in one tab while surfing in another. It’s very handy but that convenience lends itself to a particular security problem. Surfing in one tab while another tab is logged into your bank’s site (for example) can cause you to lose your latte money. Or your mortgage money.
If you care about the way this attack works you can have a look at the Wikipedia article on CSRF. Website developers can help prevent this problem but an easy behavioral fix is to ALWAYS log out of a website when you’re done with it but especially when you’re doing other surfing.
By the way, it’s not just browser tabs which cause this problem but I believe that they almost encourage the dangerous behavior. However, the same problem can occur with multiple browser windows or even one browser window. Moral of the story: Always log out.
URL shorteners such as the ones you see on Twitter are a ne’er-do-well’s best friend. I hate them. Pretty strong, huh? 😉 The problem with them is that you can’t tell where they’re ultimately going and a cleverly crafted URL could make your life miserable if you get sent to a malware site.
The big boys such as bit.ly go to great lengths to help prevent abuse and even provide tools to help you see where the link goes. If you don’t use one of these tools before clicking you might want to consider turning off scripting in your browser before you follow the link.
(Update: Twitter just announced their new forthcoming URL shortener called t.co which is designed to alleviate the drawbacks of other shorteners. You can see where you’re going and it will check if there’s malware at that site. Pretty nifty.)
I love ’em! Especially with milk.
Most people seem to fear website cookies but they are generally harmless. They can be used to track you but they are very useful for a website so that it can personalize your experience.
Personally, I usually don’t worry about cookies. If you do you can turn them off or only allow certain websites to use them by configuring your browser settings.
“I’m doing laundry.”
Who cares! The signal-to-noise ratio on social networking sites like Facebook and Twitter is incredibly low. However, the risk of personal data exposure is high. Facebook, for example, is notorious for exposing (on purpose, even) data that you add to their site. Add in the element of location awareness such as FourSquare, Facebook Places, or Twitter’s location feature and you’ve now told too many people where you are. Or, perhaps, where you aren’t.
Of course a writer needs social networking to spread the word. So, use the tools but be careful. Watch what you say and don’t use the location features if that makes you uncomfortable. Avoid giving your username/password to applications that will then sign in as you to grab data. The most common example of this is Facebook (and third-party applications) which love to snatch your email contacts. If you’ve done this already I recommend immediately changing your password.
Finally, you may have a “friend request” from a scantily clad female that you don’t know. These “friends” are usually best avoided, unfortunately. Sorry, but don’t view their profile, either.
The two main things I want to talk about regarding email is attachments and phishing.
Most people know by now that attachments can be infected with malware. Powerpoint, Word docs, PDF files, and especially executable files could all be bad news. Avoid opening attachments from people you don’t know. Also avoid opening attachments from people you DO know if you weren’t expecting the file. (The reason is that your friend’s computer may be infected and sending emails on his behalf.)
Gmail has a nice feature where you can view the attachment in Google Docs. I sometimes do that to be safe.
The concept of phishing is also getting to be better known now. If you’ve ever gotten an email supposedly from your bank that prompts you to login and even conveniently provides a link then you know what phishing is. The link is not to your bank’s website (even though it may look exactly the same) and they are just trying to collect your username and password.
Even if you think the email is legit you should not click the link. Instead, go directly to the site in your browser and login there.
Your Personal Safety
As someone in the public eye, you face special challenges as a writer since you might be singled out due to your fame. Whackos might try to acquire your home address or get you to open an infected file or web page. You can reduce your risk by securing your computer and watching what you do online as described above.
As a writer using the internet to market your work you probably have domains and at least one email list. Each can expose your home address.
When you sign up for a domain you must supply your address. Using a PO box or a service like Domains By Proxy will keep your home address private.
Regarding email, if you live in the United States you must comply with the CAN-SPAM act. The CAN-SPAM act requires you to provide your “valid physical postal address” when sending commercial emails. Using a PO box here would also prevent your home address from being exposed.
So, to summarize, secure your computer to the best of your ability. Refrain from risky online behavior and learn how to spot questionable emails, URLs, and web pages. Avoid giving out location information and if you must, make sure it just regional and not lat/long coordinates! Even a regional location could give a stalker enough information to narrow a search in public databases.
Finally, remember that every little piece of information you provide online can be used against you. Think before you post.
Summary of security tips:
- Use strong passwords
- Don’t share or reuse passwords
- Keep your OS updated
- Use a non-admin account
- Use an antivirus program and keep it updated
- Keep your browser and its plugins updated
- Change the default password
- Enable the strongest security standard your router supports
- Don’t broadcast your SSID
- Avoid opening ports
- Run a software firewall when using a Wi-Fi Hot Spot
- Avoid providing location data or your home address
- Beware of scripting in the browser
- Always log out of a web site
- Think twice about clicking shortened links
- Beware of email attachments and phishing attempts
Please feel free to comment on anything in this post or discuss how you’ve addressed online security in your marketing efforts. I’d love to hear from you.