{"id":467,"date":"2017-03-17T15:03:28","date_gmt":"2017-03-17T20:03:28","guid":{"rendered":"https:\/\/www.baronsoftware.com\/Blog\/?p=467"},"modified":"2017-03-17T15:03:28","modified_gmt":"2017-03-17T20:03:28","slug":"handle-open-source-software-security","status":"publish","type":"post","link":"https:\/\/www.baronsoftware.com\/Blog\/handle-open-source-software-security\/","title":{"rendered":"How to handle Open Source Software and Security."},"content":{"rendered":"<h2 style=\"text-align: center;\">How to handle Open Source Software and Security.<\/h2>\n<p>Open source has always left so many questions unanswered on whether your comfort level for software security is high or you have sleepless nights.<\/p>\n<p>The keys for open source have the following open questions, can someone else view the source and modify it \u00a0or do you rely on internal software developers fix the security flaws. \u00a0 Open source is mostly freely written software by developers who love to write software code and do not mind submitting their projects for all to use.<\/p>\n<p>When using open source, the internal developers need to test the piece out and whether it can be used in the production systems. \u00a0It is up to the developer to test the code on a machine that can be safely removed from production. \u00a0After the testing \/ QA phase the software can then be released into production.<\/p>\n<p>The one key piece of the above paragraph is that the word testing is involved. \u00a0There are quite a few developers that tend to think they can incorporate their code as well as open source into a production system without even testing it. \u00a0Those are the companies that tend to write terrible, buggy nonsense and could open up lawsuits due to the damages incurred by their clients.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong>How do I secure the Open Source code that i download ?<\/strong><\/p>\n<p>Download only from a trusted source. \u00a0You should be able to grab code from GitHub or a download center that you can trust but if you think you can download a piece of code from any FTP or WEB server, you open up the door for anything to happen. \u00a0As described in the terminator, you are the virus.<\/p>\n<p>You have the option to insert or update the open source when a patch \/ upgrade is released. \u00a0That is one way but if you think about it, you have the internal developer who should be able to update the code themselves otherwise what is the point you might as well hire the open source developer.<\/p>\n<p>&nbsp;<\/p>\n<p>Maintain security on your software by simply locking down the production release and update only when you have QA\/test the application in a test environment. \u00a0You need to make sure that your internal developer understands the legal aspect as well when using the open source in a commercial product.<\/p>\n<p>So using open source is not bad but you need to make sure you read the code and any document associated whether you have the legal right to use it in a major distribution.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to handle Open Source Software and Security. Open source has always left so many questions unanswered on whether your comfort level for software security is high or you have sleepless nights. The keys for open source have the following open questions, can someone else view the source and modify it \u00a0or do you rely [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[11],"tags":[16,21,20,7,13,22,47,8,29,28,15,37,6,24],"class_list":["post-467","post","type-post","status-publish","format-standard","hentry","category-pc-tips-bits-bytes","tag-apple","tag-computers","tag-delphi","tag-development","tag-embarcadero","tag-google","tag-idera","tag-lazarus","tag-linux","tag-mac","tag-microsoft","tag-rapid-sql","tag-software","tag-windows-10"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to handle Open Source Software and Security. - Baron Software<\/title>\n<meta name=\"description\" content=\"Open source has always left so many questions unanswered on whether your comfort level for software security is high or you have sleepless nights.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.baronsoftware.com\/Blog\/handle-open-source-software-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to handle Open Source Software and Security.\" \/>\n<meta property=\"og:description\" content=\"Open source has always left so many questions unanswered on whether your comfort level for software security is high or you have sleepless nights.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.baronsoftware.com\/Blog\/handle-open-source-software-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Baron Software\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-17T20:03:28+00:00\" \/>\n<meta name=\"author\" content=\"richard@baronsoftware.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How to handle Open Source Software and Security.\" \/>\n<meta name=\"twitter:description\" content=\"Open source has always left so many questions unanswered on whether your comfort level for software security is high or you have sleepless nights.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:site\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"richard@baronsoftware.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/handle-open-source-software-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/handle-open-source-software-security\\\/\"},\"author\":{\"name\":\"richard@baronsoftware.com\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/person\\\/079d370e4230be9d5f75885bb33dd8cd\"},\"headline\":\"How to handle Open Source Software and Security.\",\"datePublished\":\"2017-03-17T20:03:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/handle-open-source-software-security\\\/\"},\"wordCount\":432,\"publisher\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\"},\"keywords\":[\"Apple\",\"computers\",\"Delphi\",\"Development\",\"Embarcadero\",\"Google\",\"Idera\",\"Lazarus\",\"Linux\",\"Mac\",\"Microsoft\",\"Rapid SQL\",\"Software\",\"Windows 10\"],\"articleSection\":[\"Computer PC Tips - bits and bytes\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/handle-open-source-software-security\\\/\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/handle-open-source-software-security\\\/\",\"name\":\"How to handle Open Source Software and Security. - Baron Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#website\"},\"datePublished\":\"2017-03-17T20:03:28+00:00\",\"description\":\"Open source has always left so many questions unanswered on whether your comfort level for software security is high or you have sleepless nights.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/handle-open-source-software-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/handle-open-source-software-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/handle-open-source-software-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to handle Open Source Software and Security.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#website\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\",\"name\":\"Baron Software\",\"description\":\"Highest Quality Software Developed.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\",\"name\":\"Baron Software\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i2.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i2.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"width\":1920,\"height\":400,\"caption\":\"Baron Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/Rbaroniunas\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/person\\\/079d370e4230be9d5f75885bb33dd8cd\",\"name\":\"richard@baronsoftware.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"caption\":\"richard@baronsoftware.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to handle Open Source Software and Security. - Baron Software","description":"Open source has always left so many questions unanswered on whether your comfort level for software security is high or you have sleepless nights.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.baronsoftware.com\/Blog\/handle-open-source-software-security\/","og_locale":"en_US","og_type":"article","og_title":"How to handle Open Source Software and Security.","og_description":"Open source has always left so many questions unanswered on whether your comfort level for software security is high or you have sleepless nights.","og_url":"https:\/\/www.baronsoftware.com\/Blog\/handle-open-source-software-security\/","og_site_name":"Baron Software","article_published_time":"2017-03-17T20:03:28+00:00","author":"richard@baronsoftware.com","twitter_card":"summary_large_image","twitter_title":"How to handle Open Source Software and Security.","twitter_description":"Open source has always left so many questions unanswered on whether your comfort level for software security is high or you have sleepless nights.","twitter_image":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo.jpg","twitter_creator":"@Rbaroniunas","twitter_site":"@Rbaroniunas","twitter_misc":{"Written by":"richard@baronsoftware.com","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.baronsoftware.com\/Blog\/handle-open-source-software-security\/#article","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/handle-open-source-software-security\/"},"author":{"name":"richard@baronsoftware.com","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd"},"headline":"How to handle Open Source Software and Security.","datePublished":"2017-03-17T20:03:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/handle-open-source-software-security\/"},"wordCount":432,"publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"keywords":["Apple","computers","Delphi","Development","Embarcadero","Google","Idera","Lazarus","Linux","Mac","Microsoft","Rapid SQL","Software","Windows 10"],"articleSection":["Computer PC Tips - bits and bytes"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.baronsoftware.com\/Blog\/handle-open-source-software-security\/","url":"https:\/\/www.baronsoftware.com\/Blog\/handle-open-source-software-security\/","name":"How to handle Open Source Software and Security. - Baron Software","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#website"},"datePublished":"2017-03-17T20:03:28+00:00","description":"Open source has always left so many questions unanswered on whether your comfort level for software security is high or you have sleepless nights.","breadcrumb":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/handle-open-source-software-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.baronsoftware.com\/Blog\/handle-open-source-software-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.baronsoftware.com\/Blog\/handle-open-source-software-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.baronsoftware.com\/Blog\/"},{"@type":"ListItem","position":2,"name":"How to handle Open Source Software and Security."}]},{"@type":"WebSite","@id":"https:\/\/www.baronsoftware.com\/Blog\/#website","url":"https:\/\/www.baronsoftware.com\/Blog\/","name":"Baron Software","description":"Highest Quality Software Developed.","publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.baronsoftware.com\/Blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization","name":"Baron Software","url":"https:\/\/www.baronsoftware.com\/Blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","contentUrl":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","width":1920,"height":400,"caption":"Baron Software"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Rbaroniunas"]},{"@type":"Person","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd","name":"richard@baronsoftware.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","caption":"richard@baronsoftware.com"}}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2e6qU-7x","jetpack-related-posts":[{"id":102,"url":"https:\/\/www.baronsoftware.com\/Blog\/google-to-close-google-code-open-source-project-hosting\/","url_meta":{"origin":467,"position":0},"title":"Google to close Google Code open source project hosting","author":"richard@baronsoftware.com","date":"March 13, 2015","format":false,"excerpt":"Google Code will officially stop existing. The open source project hosting service will no longer be accepting new project submissions as of today nor will no longer be accepting updates to existing projects from August 24, and will be closed entirely on January 25, 2016. \u00a0 The company has moved\u2026","rel":"","context":"In &quot;Software Events&quot;","block_context":{"text":"Software Events","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/software-events\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":159,"url":"https:\/\/www.baronsoftware.com\/Blog\/developers-always-looking-to-keep-with-the-current-market-based-on-their-skills\/","url_meta":{"origin":467,"position":1},"title":"Developers always looking to keep with the current market based on their skills.","author":"richard@baronsoftware.com","date":"September 23, 2015","format":false,"excerpt":"Software developers have always fought to keep up with the skills necessary to make themselves marketable. \u00a0A new\u00a0survey has been created by IDC \/ Application Developers Alliance that provides the insight on the tools used as well as organizations. \u00a0 As always a survey is conducted by taking a sample\u2026","rel":"","context":"In &quot;Software Events&quot;","block_context":{"text":"Software Events","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/software-events\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":349,"url":"https:\/\/www.baronsoftware.com\/Blog\/code-analysis-application\/","url_meta":{"origin":467,"position":2},"title":"Code Analysis what does it do for your application ?","author":"richard@baronsoftware.com","date":"October 17, 2016","format":false,"excerpt":"Code Analysis what does it do for your application ? When developing an application you want to provide the best solution for your clients.\u00a0 This means you need to evaluate current or possible future defects in your source code.\u00a0 This is a reality during the development stage and is highly\u2026","rel":"","context":"In &quot;Computer PC Tips - bits and bytes&quot;","block_context":{"text":"Computer PC Tips - bits and bytes","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/pc-tips-bits-bytes\/"},"img":{"alt_text":"Baron Software","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":853,"url":"https:\/\/www.baronsoftware.com\/Blog\/google-believes-android-is-as-secure-as-ios\/","url_meta":{"origin":467,"position":3},"title":"Google believes Android is as secure as iOS","author":"richard@baronsoftware.com","date":"March 21, 2018","format":false,"excerpt":"Google believes Android is as secure as iOS Google recently published its fourth annual year in review for Android's security and looking\u00a0 through the comprehensive,\u00a056-page report\u00a0yourself there are various items you can see and determine whether they are legit. Machine learning is playing a huge role in securing Android devices.\u2026","rel":"","context":"In &quot;Software Events&quot;","block_context":{"text":"Software Events","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/software-events\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1-300x62.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":612,"url":"https:\/\/www.baronsoftware.com\/Blog\/swift-4-0-released\/","url_meta":{"origin":467,"position":4},"title":"Swift 4.0 Released!","author":"richard@baronsoftware.com","date":"October 2, 2017","format":false,"excerpt":"Swift 4.0 Released! Swift 4 is now officially released! Swift 4 builds on the strengths of Swift 3, delivering greater robustness and stability, providing source code compatibility with Swift 3, making improvements to the standard library, and adding features like archival and serialization. Swift is a general-purpose programming language built\u2026","rel":"","context":"In &quot;Software development Concepts&quot;","block_context":{"text":"Software development Concepts","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/software-development-concepts\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1011,"url":"https:\/\/www.baronsoftware.com\/Blog\/using-sata-wire-3-0-to-clone-drives\/","url_meta":{"origin":467,"position":5},"title":"Using SATA Wire 3.0 to clone drives","author":"richard@baronsoftware.com","date":"May 4, 2020","format":false,"excerpt":"Recently Baron Software was using Apricorn SATA Wire 3.0 to clone drives in multiple machines. SATA Wire is an amazing piece of software. It comes with a cable which connects the SSD to the USB port 3.0. It is also compatible with a USB 2.0 port. An average person who\u2026","rel":"","context":"In &quot;Hardware Reviews&quot;","block_context":{"text":"Hardware Reviews","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/hardware-reviews\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/05\/Step3.gif?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/comments?post=467"}],"version-history":[{"count":1,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/467\/revisions"}],"predecessor-version":[{"id":468,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/467\/revisions\/468"}],"wp:attachment":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/media?parent=467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/categories?post=467"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/tags?post=467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}