Saturday, December 26, 2009

Battleplan: PC Invasion

Or, How all that Nastyware Invades Your Computer

Here 'tis –the shocking truth! Explained in a few simple steps:

In almost ALL cases –YOU are responsible!

  • You, knowingly or unknowingly, installed something you shouldn't have from an untrustworthy source. This can include screensavers, toolbars or torrents (downloaded music, video, etc). You failed to check the format (that little extension after the period or dot in the name of the item) before you downloaded. Or you also failed to scan for viruses after it was downloaded and before you opened and/or ran it on your machine. Note: the second you click the executable file, Pandora is out of the box and the trouble starts. Sometimes you may not notice it immediately, it may have a delayed action, but sooner or later, you will notice that things are not as they ought to be.
  • You failed to proceed cautiously when installing an otherwise very likely reputable application that bundles optional rubbish-ware along with the programme or application you want to install. (See 5 below for more on this one.)
  • As in 1 above it can be software you installed sometime in the past and has either already been infecting your machine, or it starts its malicious action after the lapse of a certain amount of time. Further, it may arrive with other programmes that install themselves alongside an existing piece of software and, like a time bomb, explodes its previously hidden payload of malware without notice.
  • You are not running an effective and legitimate Anti-Virus or Anti-Spyware application and, you are not taking time to allow it to run periodic full and in-depth scans of your machine to allow it to do its full job of detection and prevention. Sadly, there are more fake and extremely malicious anti spy and antivirus ware programmes out there trying to con you into giving them access to your machine than you can shake the proverbial stick at! Typically they promise the world as far as their ability to clean and protect your machine, but always along with multiple and dire warnings of how badly your machine is infected. Then, when you respond by clicking what appears to be the, 'button of deliverance', your troubles increase until any activity on your machine is pretty much impossible. Removing them can be a challenge even to experienced technicians, and can necessitate a full reinstall of the Operating System and all your other important applications.
  • Otherwise Legitimate and Useful Software Manufactures 'Sell Out' to the Bad Guys: It seems hardly credible, but those who make good and useful software can be enticed into including these optional and often quite unwanted apps and making them difficult to notice and thereby easy to install along with their own. There is, of course, some sort of incentive. Remember, the price of liberty (freedom from infestation) is constant vigilance!
  • Pop Ups etc: These are particularly effective at trapping PC users. You slavishly and obediently, like a sheep to the slaughter, clicked on the one of the many enticing and attractive pop-ups that followed a previous infection and exacerbated an already compromised position.

The Good News is, you have read this article and you are now armed with knowledge. You are forewarned and forearmed. You, from now on, will view with great skepticism:

  1. The steps you are led through as you seek to download that enticing piece of software, music, move, file etc from the web. You will ponder the file and seek to find out a little bit more about its bona fides, its format, its origin and more.
  2. The process of installing downloaded programmes and applications from the web. You will not simply click, 'OK', 'Next', 'Yes' etc without reading what you are saying 'Yes' and 'OK' to!
  3. You will NOT click on Pop-ups at all, ever again, unless you know exactly what they are, what they will do, and where they may lead you. You will disable pop-ups so that your browser must ask you before allowing them to appear and distract you from what you are doing.
  4. You will resolve to be less impulsive in your web activities and more reflective on where you point your browser and what sites you visit and say to yourself, "Do I really want some destructive nutter to have access to my expensive and so very useful computer that is so much fun in so many ways?" Do I want to have to pay my friendly computer tech all that money to fix what my own momentary lapse in concentration caused? (The answer to this is, of course, 'Yes', I do. I am only too glad to contribute to their retirement fund!' That being the case please ignore all you've just read and carry on regardless. My contact details are on my web site: www.jbc.gen.nz/pccare. Thank you very much.

Sunday, November 15, 2009

Text Etiquette –Obey why don’t you!

Sourced from a fellow blogger... and shamelessly pillaged and plagiarized! (Seriously, the source link is provided below J)

  1. Put your phone on vibrate or silent mode when texting back and forth with someone. Everyone doesn't need to hear your favorite ringtone every time you get a text.
  2. Check the recipient's number one last time BEFORE you hit "send." A slip of the finger could easily send a wrong person that intimate message intended for your significant other.
  3. Take precautions to protect private or personal text messages since you never know who might be snooping. While a high percentage of people lower their voices when they talk on their cell phones in public, a few actually shield their cell phone when sending or receiving text messages.
  4. Beware of texting when out with friends. It's disrespectful and can give the impression that you aren't paying attention to the conversation.
  5. If you are expecting a text message let the people you're with know.
  6. Don't get into the habit of marathon texting. if you need to use more than 150 characters to go back and forth more than two or three times send and email or call.
  7. Avoid using text-message speak, abbreviations or emoticons since not everyone may know what you mean. Especially when texting work colleagues, use correct capitalization (And remember ALL CAPS EQUAL YELLING), punctuation, salutations and closings, and proofread for both spelling and grammar.


 

I'm sure there are a few more that others might have. So, please feel free to add more to this if you want.

Source: Dmitri

Heaven_and_Hell


Heaven_and_Hell
Originally uploaded by oracle_from_beyond
Thank you, beyond.

Wednesday, November 11, 2009

Mysteries of WiFi Resolved!

Here we go! Read on as we delve into the mysteries of WiFi, that wonderful set of wireless standards that lets us do so much online, both locally via LAN and widely via the Internet.

The full set of WiFi Wireless Standards is: 802.11b, 802.11a, 802.11g and 802.11n.


 

The Wonderful Wireless LAN (Local Area Network)

The WiFi enabled LAN has revolutionized the home and business network. In order to thread your way through the minefield it will help to realize that the accepted series of standards that have evolved over the years since Vic Hayes, and others, gave birth to WiFi in the early 90s the evolution was fast and furious. We now have four and with time we will undoubtedly see yet further enhancement. For greater and more in-depth discussion visit the Wiki article which I have read and is excellent. The generally accepted list of conforming WiFi technologies are the four listed above. There are other related forms of wireless such as Bluetooth which is an alternative wireless network technology that followed a different development path than the 802.11 family. Bluetooth supports a very short range (approximately 10 meters) and relatively low bandwidth (1-3 Mbps in practice). It is designed for low-power network devices like handhelds. The low manufacturing cost of Bluetooth hardware also appeals to industry vendors. You can usually find Bluetooth in the networking of PDAs or cell phones with PCs, but it is rarely used for general-purpose WLAN networking due to the range and speed considerations. Another alternative is WiMax, developed separately from Wi-Fi, WiMax is used for long-range networking (spanning miles or kilometers) as opposed to local area wireless networking.


 

802.11 –Where it started

In 1997, the Institute of Electrical and Electronics Engineers (IEEE) created the first WLAN standard. They called it 802.11 after the name of the group formed to oversee its development. Unfortunately, 802.11 only supported a maximum network bandwidth of 2 Mbps - too slow for most applications. For this reason, ordinary 802.11 wireless products are no longer manufactured.


 

802.11b –WiFi becomes Useful

IEEE expanded on the original 802.11 standard in July 1999, creating the 802.11b specification. 802.11b supports bandwidth up to 11 Mbps, comparable to traditional Ethernet.

802.11b uses the same unregulated radio signaling frequency (2.4 GHz) as the original 802.11 standard. Vendors often prefer using these frequencies to lower their production costs. Being unregulated, 802.11b gear can incur interference from microwave ovens, cordless phones, and other appliances using the same 2.4 GHz range. However, by installing 802.11b gear a reasonable distance from other appliances, interference can easily be avoided.

In Summary:

  1. Pro 802.11b - lowest cost; signal range is good and not easily obstructed
  2. Con 802.11b - slowest maximum speed; home appliances may interfere on the unregulated frequency band


 

802.11a – The Confusing Standard

While 802.11b was in development, IEEE created a second extension to the original 802.11 standard called 802.11a. Because 802.11b gained in popularity much faster than did 802.11a, some folks believe that 802.11a was created after 802.11b. In fact, 802.11a was created at the same time. Due to its higher cost, 802.11a is usually found on business networks whereas 802.11b better serves the home market.

802.11a supports bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz. This higher frequency compared to 802.11b shortens the range of 802.11a networks. The higher frequency also means 802.11a signals have more difficulty penetrating walls and other obstructions.

Together But No Unity: You've heard the truism,
'Two cats tied by their tails are together, but definitely NOT in unity!' Because 802.11a and 802.11b utilize different frequencies, the two technologies are incompatible with each other. Some vendors offer hybrid 802.11a/b network gear, but these products merely implement the two standards side by side (each connected devices must use one or the other).

In Summary:

  1. Pro of 802.11a - fast maximum speed; regulated frequencies prevent signal interference from other devices
  2. Con of 802.11a - highest cost; shorter range signal that is more easily obstructed


 

802.11g – We're getting somewhere now

In 2002 and 2003, WLAN products supporting a newer standard called 802.11g emerged on the market. 802.11g attempts to combine the best of both 802.11a and 802.11b. 802.11g supports bandwidth up to 54 Mbps, and it uses the 2.4 Ghz frequency for greater range. 802.11g is backwards compatible with 802.11b, meaning that 802.11g access points will work with 802.11b wireless network adapters and vice versa.

In Summary:

  1. Pro of 802.11g - fast maximum speed; signal range is good and not easily obstructed
  2. Con of 802.11g - costs more than 802.11b; appliances may interfere on the unregulated signal frequency


 

802.11n – In Search of Perfection

The newest IEEE standard in the Wi-Fi category is 802.11n. It was designed to improve on 802.11g in the amount of bandwidth supported by utilizing multiple wireless signals and antennas (called MIMO technology) instead of one.

When this standard is finalized, 802.11n connections should support data rates of over 100 Mbps. 802.11n also offers somewhat better range over earlier Wi-Fi standards due to its increased signal intensity. 802.11n equipment will be backward compatible with 802.11g gear.

In Summary:

  1. Pro of 802.11n - fastest maximum speed and best signal range; more resistant to signal interference from outside sources
  2. Con of 802.11n - standard is not yet finalized; costs more than 802.11g; the use of multiple signals may greatly interfere with nearby 802.11b/g based networks.


 

There are other IEEE 802.11 standards such as 802.11h and 802.11j. These are extensions or offshoots of Wi-Fi technology that serve specific purposes not generally used in normal work-a-day wireless networking situations.

For a full list of WiFi Standards and to read more click this link.

Sunday, November 1, 2009

Sailing Christopher Cross (Tall Sailing Ships)

Isn't the Internet wonderful? Here is something truly beautiful for all to enjoy. Thank you Christopher Cross.

Thursday, July 23, 2009

A Big Tick for Microsoft

I'm talking hybrid computing here. Definition of Hybrid Computing: Apps and utilities that work locally AND in the Cloud.

Quoting from one of my fav columnists, "Microsoft currently is the only company that gets this right while everybody else fails miserably at it." I agree.


He cites a case in point: 'You want to use a service that provides reliable email, instant messaging, contact, file and calendar management. You want it all to work no matter what computer you're on. You want something that is accessible on the web, as a local client and on your mobile device.'


'And', as he says so correctly 'you want it all for free'. Too right.


So, where do you go? The answer: to Microsoft and their Windows Live service. It does it all, and it does if for free. More, it works, it works and it works fantastically well. Here they are. These are the apps, utilities and service you get all in a package, or standalone.

  • Hotmail: for email
  • Windows Live Messenger: for instant messaging.
  • Hotmail again: for contact management.
  • Skydrive: for files (25 GIGS WORTH!)
  • Calendar management: with, you guessed it, Hotmail again.

All of the above work on the web, sync seamlessly with the Windows Live Mail client and, if you prefer to stay with Outlook, syncs smoothly with Outlook's Calendar via Outlook Connector. And wait, there's more! All this PLUS 100% accessible via your smartphone/Windows Mobile equipped PDA/Phone as well (I use Palm's Treo 700wx and have full access with Windows Mobile Pocket MSN.


As my columnist asks, in words to the same effect, 'who else does it with anything like the same smooth efficiency?'
  • Google? Not even close.
    With Google you must stay in the browser completely –Gmail is browser based. You can download and send email via Outlook Connector (Microsoft to the rescue please note!), bu NOT your contacts. Further, there is no way to make use of Gmail "labels" using any other client. I must add, I am a fan of many things Google, not least of which is Blogger, on which this is being published (!), yet even more so, I, as a consumer, love competition even more. This blog will hopefully serve to stimulate the folks at the big 'G' to turn up the heat yet again for you and me. After all, in the end, in a democratically and enterprise based society (the Net), we vote with our feet! (or is fingers as we type?)

  • Apple? Nah. You have to pay. MobileMe cost ya. How much? US$99 yearly just to have it.
  • Yahoo? No again. Yahoo offers no local client access and POP cost again. Microsoft wins again because Hotmail's POP access is now free since March 2009. Can't beat that FREE! Then again, just like Google you must stay in the browser to achieve full functionality.

So, as Dave states, 'In the end, Microsoft's Windows Live is the only sensible choice for true hybrid computing. You've got your local and your cloud within easy reach.' And, he adds, 'it's also stupidly easy to backup your mail and contacts using freely available software.

So, let's hear it for Microsoft, so often the recipient of boos and brickbats, on this occasion they definitely earn the laurel wreath of victory in this age when the aerial battle for web dominance is being fought way up in cloud-sphere.

More bad news for the other combatants: Microsoft Office will be integrated into Windows Live in 2010. Wow!

Is that laughter in Redmond I hear?

Ref: Dave Risley, PCMec.com

Friday, May 22, 2009

How to Ensure I Will Read Your Email

Recently I read a very pertinent and apropos blog which I have taken the liberty of plagiarizing –at least, to some extent.






If you want your e-mail ignored do these things:
  1. Leave the subject line blank
  2. Put your entire message into one, long, 300-word sentence
  3. Use cutesy, curlicued font styles that cannot be deciphered
  4. Make sure you use lavender backgrounds and neon green type (or other ghastly combos)
  5. Add in-line photos of such huge dimensions that they take forever to download even on fast connections
  6. Use super bad grammar and never ever bother with spell checks apostrophes full stops and other archaic helps to comprehension that might actually allow the long suffering recipient to understand what on earth you are talking about
  7. Treat emails like examples of speed texting on mobile phones with high priced plans and low end technology …and so on. I'm sure you can think of other offenses against the good will of fellow netizens.

So, how can you contribute towards a more calm and courteous communication between us all?


State, as explicitly and simply as you can what your message is about in the "Subject" line. That's that line with the label 'Subject' up in the 'Header' section of the email. Messages with vague subjects such 'Hi, Hello, How are you?' and, even worse, left glaringly blank, invite instant deletion by those of us who do not get paid on word counts of emails read each morning.

Remember that many of us are savvy enough to have set our spam deletion rules to filter emails that use all capital letters, an excess of exclamation points, and words typically seen in spam. I'd give examples, but my spam filter would trap them and refuse to send the email. I don't use these kinds of expletives myself, I do not treat my recipients to samples of what used to be called the 'gutter press' so please don't do it to me.

Messages that are one long paragraph with complicated details (rather like this one) will often not get read either. Do yourself and your longsuffering recipient a favour and break up your message into three or four small paragraphs. Unless you are sending a draft copy of the annual 'Address to the Nation' a reasonable limit, it seems to me, is three or four paragraphs. After that I think it likely that most of us will start dozing. If your email has to be lengthy consider providing a one or two sentence overview. Even a quick bulleted list of topics to be covered introduced with an explanatory, "I have a complicated issue, which will take a bit of explaining. Here is the gist and below is the lengthier explanation." Or, "I need help with xyz. If you have time to help, I've provided details below." If you need answers to a series of questions and/or you need to make several points, why not number them? This will make replying easier as the answers can be numbered accordingly thus saving the need to restate each issue or question.

If you want to share a link, please don't just stick the URL in the e-mail, particularly if it's a long one as is often the case. Most email utilities, such as Outlook and others will allow you to use html and code it into the source so that you can create a clickable link and all the gobbledygook is hidden. Another courteous trick (read technique) is to use TinyUrl. This will allow you to enter the long URL and convert it into a shorter version. It's quite free and you can add a toolbar shortcut for frequent use.

Now for photos: This can be a real issue, especially for those longsuffering souls among us who still labour with dial-up and other slow connections. If you need to share a bunch of photos don't just attach them by the dozen. If there are more than three or four courtesy demands they be zipped or posted to a site such as Flicr (the link to my public photos on Flickr). You can then email the link and the burden of a huge download is not laid uninvited upon your recipient. An excellent free compression utility is 7-Zip.

More on Photos: Further, when sending images please reduce them in size. A dozen 4-megabyte photos of your last picnic will not win your friends and allow you to influence people towards your latest favourite thing! Learn to use an image resize for reducing the size of images for exactly this purpose. Microsoft has a free one for XP as part of its Power Toys collection. There's one for Vista too, if you're afflicted with that particular OS.

Videos: While I'm on topic let me discuss sending 10-megabyte videos of birds using tools. Now vides are fun, but attaching a video in e-mail is so passé. If you look I'll bet you'll find it on YouTube. Here's a way to send big files when needs must. There are several places on the web where you can upload large files for free as well as paid services. Try LargeFilesASAP, or Huddle. Provided it's not something super private these are good options to crashing your friend's machine!

Turn of Your Antivirus Blurb: Most people who have any sense today do have their own Antivirus programmes running and scanning their incoming and outgoing emails. This means they do not need to see your AV program's blurb at the bottom of your e-mail telling them it has scanned the email before sending. Take a moment to check out your AV programmes Options and just turn it off please. Thank you.

OK. That's about it, for me. I think I've made my contribution towards world peace and goodwill with this little blurb. My appreciation to my muse -you will recognize some of it, but not a whole heap I'm thinking.



Happy emailing my fellow netizens.


Friday, May 8, 2009

The Serious Sickness of PC Rage!

Hi! Folks,
It's winter time here in Kiwiland (That's New Zealand for the uninitiated!), and with all those lurgy's floating around I thought I should weigh in with some advice against one particularly common affliction: PC Rage! Here we go…

Save yoursef from "PC Rage"!

Symptoms: This affliction is often evidenced by strange noises coming from those you know for normally being of a calm and peaceful disposition. The early symptoms are often a low mumble, which can progress into loud yelling, even screaming. This may well be followed by loud bangs, thumps and explosive sounds, even breaking glass as windows are shattered and large objects are sent hurtling into outer space!


If you have ever been tempted to enquire into these events you may find yourself in George Bush like situations, dodging that infamous shoe. Only this time it could be keyboards and other low flying objects of a technological nature.


Further enquiry will often reveal a very sick and tired computer user frustrated by their machine taking forever to start up and load programs, crashing randomly and performing other forms of unsolicited behaviour.

Prescription: I am happy to be able to prescribe cures for this affliction. Follow these steps at routine intervals and all should be well. Sadly, this is not a 'once only' cure, as the bug circulates and always returns.
Here is my prescription for curing 'PC Rage' when the symptoms become apparent.

1. Delete Temporary Internet Files. When you visit a new website as its content is stored on your PC and takes up hard drive space. Go to "Tools", then "Options" – as each browser is a bit different, click through tabs to find an option for deleting temporary files and cookies. (A cookie is a small piece of code, usually innocent, but not always, that performs certain tasks of, usually, but not always, a benign nature.)

2. Use a registry cleaner such as Registry Mechanic, or one of the excellent free versions that PC Care can install for you. Windows® registry can be a common cause of crashes, slow performance and error messages. Registry cleaners will stabilise your system and help improve its performance.


3. Ensure automatic Windows® Updates is turned on. You can turn this feature on via the Control Panel and then click on Automatic Updates to configure the settings. My recommended setting is to set Windows to download updates but for you, the user, to decide when to install. This way you will be sure of getting the updates.


4. Eliminate unused files & desktop shortcuts. Every file and application that sits on your desktop takes up extra space, delete them to free up your hard disk space. This is called 'good housekeeping' and PCs really benefit from systematic and routine cleaning.


5. Uninstall unused programs. The more programs you have installed the slower your system will become. You need to use the "Uninstall" command in the Add/Remove program feature in the Control Panel. Caution: You can't remove a program just by deleting its folder and files. Full un-installation may require the use of the registry cleaner to clean up stray references left in the Windows Registry after un-installation. Again, caution: You should consider carefully all the files your cleaner offers to remove and backup the Registry beforehand.


6. Empty the Recycle Bin. Files that you delete from your computer are still stored in your recycle bin and will continue to take up a valuable hard drive space.


7. Schedule regular anti-virus & anti-spyware scans with your antivirus programme. You do have an antivirus programme running and up to date on your machine, don't you? A quick daily scan followed by a full weekly scan is what this doctor orders. Computer viruses and spyware can take over your computer's memory and slow down performance.

8. "Defrag" your computer regularly. Each time you work with a file your computer stores changes in a different place on the hard disk. A good defragmentation tool is Desktop Maestro, or you can check with PC care for recommended free versions. Warning! Don't just download and install the first Registry Cleaner you come across (or any other programme for that matter) there are con jobs out there that masquerade as legitimate software but are, in fact, wolves in sheep's clothing! They will hijack your machine and prevent you doing any work until you pay large amounts of your hard earned dosh -and even then you won't get free of it. Alternatively, you can use the free defrag utility packaged in Windows. However, you may have to stop all running apps to prevent them writing to disc and stopping the defrag process. The Windows defrag utility can be tricky, but if you want to give this a whirl you should find it in XP under 'Accessories' from 'Start' and then 'Programmes'. For Vista it will be elsewhere.


Current Threats: For your interest here is the Current Crop of Top Threats identified by Malware Research:

• Backdoor.Emogen • Backdoor.Turkojan • RogueAntiSpyware.VirusMelt • Trojan-Downloader.Agent.VB • Trojan-DDoS.VFI • Trojan.Adclicker

Best regards,
John

Thursday, April 16, 2009

Confidence in the Face of Conficker

Conficker is a worm. That is to say it is a self-replicating computer program. It uses a network, any network, including the biggest one of all, the Internet, to send copies of itself to other computers on the network and it may do so without any outside help -I.e. without you or I clicking on anything, intentionally or unintentionally. It is different to a virus in that it does not need to attach itself to an existing program. Are they dangerous? Yes and no. They almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. The Conficker worm is also known as win32 Conficker, Win32 Downup, ConfickerA, Net Worm Kido and possibly by other names as well. It appears to do a variety of things that are most often of nuisance value. However, its early days yet, and the bad news is that there could be more surprises down the line.

We do know these things:

  • SpywareProtect2009: Reports are identifying SpywareProtect2009 as being another of the specific scareware tactics being used after Conficker's latest update. The victim receives a warning and is prompted to purchase the removal tool @$49.99. When you do the download streams in from the Ukraine and compounds the problem. Do not under any circumstances follow instructions from one of these prompts.
  • Microsoft has purportedly put a bounty on the head of its creator, to the tune of $250,000.00.
  • The Department of Homeland Security has also, I believe, issued a removal tool for its federal, local, and state governments and commercial vendors.
  • High Infection Rate Already: I have also read that this worm has already infected between 9 million and 15 million systems.
  • Known Actions: It saves a copy of its .dll (dynamic link library) files randomly in the Windows System folder and then load each time you boot Windows.
  • Potential Harm: Once entrenched it can potentially disable system devices, reset and remove restore points, and stop automatic updates. This is in addition to stopping Windows security, Windows Defender (Microsoft's antispyware utility) and Error Reporting. This worm possesses the latest technology to help spread its destruction and avoid detection and removal.

Systems that are affected are: Windows 2000, Windows XP, Windows Vista, Windows Server 2003, Windows Server 2008 (beta thru RC), Windows 7 beta and all the beta versions.

Steps To Avoid Harm

  1. Update all Definitions: Ensure all your antivirus and antispyware programmes are kept updated
  2. Windows Updates: Ensure Windows is up-to-date with the latest patches. If unsure visit www.microsoft.com.
  3. Configure Windows Auto-Update: Make sure Windows is configured to automatically download and install all updates.
  4. Microsoft Malicious Software Removal Tool: Download, install and run Microsofts Malicious Software Removal Tool, keep it updated and run at random intervals.
  5. Strong Passwords: Use strong Password Protection. I'll post an article on strong password shortly.

Tuesday, March 31, 2009

Tip of the Month

I get so many requests about avoiding net nasties that I thought I would try to come up with an occasional Tip of the Month that would help save you from potential infection. So, here's my first thought:

Avoid the Habitations of Lions.

You cannot go to sites such as Bearshare, Limewire or other questionable sites and seriously expect to stay malware free. Music download sites in particular carry great inherent risk. Music files are large provide huge opportunities for programmers to hide malware of all sorts in amongst the code. But they are not the only sources of potential infection. Many sites use what has come to be called 'Drive by Attacks'. With the web page is executable code that launches an action that can harm your PC without your knowledge. If you employ anti-pop up software this can save you much of the time, but hackers can get past those forms of security by cloaking their code and/or using a delayed execution method. Ultimately your only protection is your own self discipline and net savvy. Make it your business to learn the kind of sites to avoid and then avoid them like the plague. You have been warned! Don't act all hurt, innocent and surprised when you find you've been infected by a virus, worm, Trojan or other net nasty when you were directly responsible for your own foolish actions on the net. After all, if you go walking in the jungle at night where the big cats are known to prowl, who is really to blame when the inevitable eventually happens –the wild animal or you?


This should be obvious too, but downloading illegal music or visiting questionable sites will cause you grief sooner or later. Blokes, you need to know that if you download pictures and movies of alluring ladies you are high on the risk scale. Finally, NEVER click a popup that says "Your Infected…Click here to remove this threat", because that will guarantee that you become infected, as surely as night follows day.

Thursday, March 19, 2009

Here it is: Cloud Backup for SMBs

clouds.jpg The name is Zmanda, and trust me on this, it is the solution you have been waiting for.  The Cloud, what all savvy PC users in the 21st Century know is the new buzzword for cyberspace is where it happens.   Out there where we all roam free as the birds there's a new land to occupy.   For SMBs (that's another dreaded acronym for Small to Medium Sized Business), and individuals, this equates to generous slabs of cheap storage space available external to your business premises.   The mantra for all wise business managers is, and always will be, backup, backup, backup…and again, backup.    The best backup is done off-site and away from your business premises.  A fire or other disaster can destroy onsite storage never to be seen again.  You should backup locally, but off-site is vital.  No backup is suicidal.  Of course, off-site has the same risk, but  a reputable third party will also backup their servers and anyway, life's a lottery, the secret to work the odds in your favour.   Enter Zmanda Enterprise 3.0.  To quote their own blurb, this Windows based little beauty offers a fully-supported solution for backing up Windows files, applications, databases and networked devices to the cloud.   Of course it is fully automated for regular backup and easy to use.  Further, it costs the massive amount of US$50 one-time fee for the software and storage fees with the all new Amazon S3 is the unbelievable US$0.20 per Gigabyte per month.  For SMBs and private individuals with manageable amounts of data that is very low cost.  You can read more about Zamanda at the Zmanda Home site.  You can download Zmanda here: Download Zmanda.  

Thursday, February 5, 2009

Safe Social Networking

thief Scams, traps, cons and swindles abound on the Internet. Here’s some tips to keep you socially safe online.

Social networking has come of age. If you’re not socially networking life may be passing you by –maybe! The fact is, millions are and sites like MySpace, Facebook, Twitter, and Windows Live Spaces are services people can use to connect with others to share information like photos, videos, and personal messages.

With the rising incidence in popularity of these social sites, so do the risks of using them. Identity thieves, crims, hackers, spammers, virus writers along with other weird practitioners of arcane cyber wizardry follow the traffic on these sites with the intention of catching the unwary.

Avoid being fleeced, ripped-off and otherwise taken advantage of –read these tips.

  1. Unsafe Clicking: Count ten before you click links that you receive in messages from your friends on your social Web site. Treat links in messages on these sites exactly the same as you would links in e-mail messages.
  2. Practice Healthy Suspicion: Never trust that a message is really from who it says it's from. Hackers can and do break into accounts and send messages that look like they're from your friends, but aren't. A suspicious message is best treated as fraudulent and the use of an alternate method employed to contact your friend and check they did in fact, contact you. This most definitely includes invitations to join new social networks.  (I.e. SN sites new to the web. 
  3. Protect your friends: Never allow social networking services to scan your e-mail address book. When you join a new social network, you typically receive offers to enter your e-mail address and password to find out whom else is on the network. They will likely offer to use this information to send e-mail messages to everyone in your contact list or even everyone you've ever sent an e-mail message to with that e-mail address. Many responsible social networking sites explain that they're going to do this, but some do not.
  4. Lazy Clicking: Here’s a tip you should be already aware of. Type the address of your social networking site directly into the ‘Open’ command of I.E. or the address bar if you use Firefox, or use your personal bookmarks that you know you can trust. If you click a link to your site through e-mail or another Web site, you might be entering your account name and password into a fake site where your personal information could be stolen. Further, links in emails and on web pages can hide the real link and be masquerading as the legitimate link.  This is similar to what we call ‘phishing’ and I’m sure you’ve read the stories bout the ever growing incidence of phishing emails arriving in mail boxes.
  5. Choose Your Friends Carefully: Be selective about who you accept as a friend on a social network. Identity thieves do create fake profiles in order to get information from you. This is known as social engineering and is more prevalent than many realise.
  6. Haunt the House: Choose your social network carefully. Evaluate the site that you plan to use and make sure you understand the privacy policy. Find out if the site monitors content that people post. Read the information that is immediately available and do a Google search of the site. You never know what you might discover about it. Don’t immediately believe negative reports, but, the old adage, ‘no smoke without fire’ is worth remembering. After all, you will be providing personal information to this site, so, here’s a thought: use the same criteria that you would to select a site where you enter your credit card details!
  7. Your Footprint On the Web Is Long Lasting: Did you know that what you write on a social networking site is long lasting and almost permanent? Even if you can delete your account, anyone on the Internet can easily print the information or save it to a computer.
  8. Think Before You Act/Download: Installing extras on your site is chancy. Frequently social networking sites invite or make available software and third party apps for you to download that allow you to do more with your personal page. Cyber criminals may use some of these applications to steal your personal information –and more. Again, Google the app you’re interested in first and find out what others are saying about it. An excellent site for information on software in general is www.cnet.com. Check out their reviews and read the views of others besides the publishers themselves and/or the editors. Get a balanced picture and then make up your mind whether you want to add that app to your list of installed programmes on your computer.
  9. Mixing Work & Socialising on the Net: Some employs accept/allow responsible extra curricula activity while you’re on their clock. Others don’t –for obvious reasons. If you value your weekly pay-check think about whether this is what you should do or not.
  10. Parents: Kids Social Network a lot. Your children probably know far more about it than you! Talk to them about social networking. Be wise, maybe you can find out what they know and whether they are being safe online by asking for help and advice yourself! They may be keen to demonstrate their sites and show off their knowledge. Then you can adroitly (there’s a good word) suggest safety tips. Don’t, whatever you do, show shock or anger. All you will do is wreck any chance you have of monitoring their activities and fostering safe socialising on the net. That would not be smart.

There you have it.  Have fun, make friends, enjoy the web –and be safe while your at it.  John

Monday, February 2, 2009

Summer Freeze

summer Here in Kiwiland we are enjoying warm beautiful, even hot, weather.  Summer is here and great to be alive –until your PC freezes, that is. 

Yep, that’s right.  The dreaded freeze.  You know what I mean.  That machine in front of you just stops working and refuses to respond.  No matter what you do –or say(!) – nothing will make it do what it’s supposed to do.  Not for you anyway. 

Well, good news and bad news.  It happens to all of us.  Even PhDs in computer science face the dreaded catharsis of PC Freeze from time to time.  So, don’t feel so bad.  You’ve come to the right place  The bad news: well, sometimes it can be quite serious, but, more good news, most of the time it’s easily fixed. 

Here we go…

Just a wee commercial right here though –If you live in Hamilton, New Zealand, if this doesn’t solve your troubles right away, give me, Hamilton Office & Home PC Care, a bell on +64274412623 and you can drop it off and we are sure to be able to get it going for you. :-) 

Please note that these words of wisdom (I hope) are primarily for XP users.  Vista will be able to do similar things but you will have different paths and terms for the same tasks.  Sorry about that. 

Back up now! The golden, and I do mean golden, rule of PC Care is BACK UP, BACK UP, BACK,  BEFORE the freeze and before any sort of trouble strikes.   Scroll through these blog articles for more on PC Maintenance to help you with this.

Access Task Manager: Press the Control (Ctrl) + Alt + Delete keys now, commonly called the ‘three-fingered salute’.  This will open the Task Manager and then look under the ‘Applications’ tab, usually the one that opens first by default, and look to see if any running apps have stopped responding.   You will be able to see if this is so because the offending app will say, ‘Not responding’ right beside it.  If so, click on and select then click the ‘End task’  button at the bottom of the Task Manager window. Chances are, this will fix the problem immediately by closing the faulty app and you will find you’ve regained control of your PC. 

Re-launch the Application: Re-launch  the app that failed responding and start back over.  Hopefully, you won’t have lost too much data in the process.  Of course, you can avoid losing too much work by saving your work as you go along.  Every sentence or so you should develop the habit of pressing ‘Alt+F+S’ in Windows which is the speed key to save your work without lifting your hands off the keyboard.  I’m doing it all the time as I type now.  In fact, I just accidentally closed my Windows Live Writer window and, if I hadn’t been saving as I go along, I would have lost it all! 

Further Checks:

Caps Lock & Number Lock: You might have accidentally presseed the Caps Lock or NumLk keys on your keyboard.  If you have take a look and see if the indicator lights for those keys have changed.  Usually they are located at the top RHS of your key board, but they many be elsewhere.   You can check that they are working OK by pressing the ‘Function (fn) button + Caps Lk’ and see if the Number Lock button lights up.  Then do the same with the ‘CapsLk + Num Lk’ buttons and check that as well.  It may be just a matter of having accidentally switched on or off these controls.

Led Lights: Look and see if your Hard Drive activity light is flashing?  If it is, windows is working hard for you performing some necessary task and you need to pause and let it get on with it.  As soon as it has done whatever pressing job it must do, it will yield control back to you.  So, be a little merciful and allow your (sometimes) faithful machine to do it’s work.  Go and make a cup of coffee!  You wouldn’t believe the amount of work your machine has to do to serve your every wish! ;-)  It may be the hard disk is working too hard and you should be merciful and add more RAM. 

Just another wee commercial right here though –If you live in Hamilton, New Zealand, give me, Hamilton Office & Home PC Care, a bell on +64274412623 and you can drop it off and we will add more RAM for you in flash –or maybe two flashes! :-) 

Mouse Worries: Mice do need a bit of care and attention now and again.  They actually benefit from a careful cleaning once-in-a-while.  To do this examine your mouse carefully and see if you can open it up and then use some compressed air and/or a soft bristled brush and clean the parts that provide the contacts in the vicinity of the ball.  If unsure, you can check with us or simply buy a new one.  PS2 mice are very cheap to replace these days.  If it’s wireless mouse the batteries may be simply flat –they don’t last forever you know! 

Chick All Your Peripheral Devices:  You may need to unplug them all one by one systematically and check to see if one of them is malfunctioning and causing a conflict or other problem.  Sometimes your machine may be performing a security scan of your devices (USB storage devices etc) and you may need to allow it to finish.  Or, it may have stalled in the process and run into a glitch of some sort.  Remember to stop all USB devised properly using the facility provided by Windows.  If you are unsure about this consult your hardware/PC manuals.  I’ll do a Blog on USB devises shortly to help with this.  Unplug all unnecessary USB devices such as printers, scanners, iPods and USB drives.   None of these wonderful and immensely useful gadgets do not last for ever, sadly.  So, one of them may have simply stopped and you will need to replace it.

If none of  the above steps helps and/or solves the problem, you may well have a major on your hands.  This could range from overheating issues, other major hardware failure, serious software failure, driver conflicts and more.

Hardware Failure: Hardware failure can be anything from an improperly seated or bad memory module to a failed hard drive or system board. The very first thing to do is to run a hardware diagnostic test. To do this it may be best to ask a PC tech to help such as Hamilton Office & Home PC Care on +64274412623 if you live in Hamilton, New Zealand.

I hope the freeze is of short duration and the long happy days of summer return.  John

Sunday, January 18, 2009

The Options: Vista Now or Windows 7 Later


One of the HOT topics right now is, do we upgrade to Vista or wait for the all new Windows 7.
Here is s consensus of what I've gleaned so far. The options appear to be four-fold:

1 - Buy Now! If you haven't already done so, Buy a vista PC now
2 - Wait until July: then buy a vista PC and benefit from the promised free upgrade to W7
3 - Stay with XP: If you're buying now look for an XP based machine and stay with that until MS cease support in 2014
4 - Abandon Windows: Buy an alternative -a Mac or one of the many free flavours of Linux

Whatever you choose, this check list is a good starting point:
Do I need a New PC Checklist:

  1. What do you use your PC for? If all your apps still function well and you know your way around your machine do you really need to replace it?
  2. Running Slow: If it has slowed down, you may just need to give it an overhaul. Check out my previous Blogs or get it in to Hamilton Office & Home PC Care, or if you can't get it to us seek out a good tech and as him/her to clean up your machine and advise you on the options -apart from replacement.
  3. Gamers: If you are a gamer then you may well need a new machine with more grunt -that's another ball game and this Blog is really not for you.
  4. Age of your machine: If your machine is older than, say 4 years, you may have an argument for replacement, however, unless money is not an issue (for most of us among the great unwashed it is -especially with recession-itis setting in!) Again, seek some advise, because component or peripheral upgrades may do the trick for hundreds less than even an entry level new PC.
  5. The Learning Curve: Are you comfortable with a new learning curve right now? A new OS comes with the hidden cost of learning lots of new things that you are probably doing reflexively right now. You will probably need a book as well to read while you watch TV to bring you up to speed. Vista is fun to learn if that's what you like doing. If, on the other hand, you find your masochist tendencies can be gratified satisfactorily in some other way -my advice, do the other! Hence, my suggestion that, even if you decide to replace your machine, think about staying with XP until 2014, or just put if off until later...
  6. The Bugs Issue:
  7. Any new OS will have bugs, and it is wiser to wait at least until the first service pack (SP1) has been released. Vista has now passed that milestone, so it is an option for now. As a result, a lot of the compatibility issues are being sorted.

The Jones Syndrome: Of course, there are those who have the 'J' syndrome and just have to have the newest and shiniest model available as soon as it hits the showroom floor. If that's you, and you don't give a toss about the money, then go for it. Buy the "biggest and the best" you can afford with lots of Ram, disc storage etc and keep doing it every six months or so. This, will help the economy and my dividend check and that's fine. You can also ask me to provide it for you and I will do so with real pleasure. After all, that's why I'm in business. I'm very serious, by the way. I love customers with lot's of money. You are the very best kind. Call me now.

My Pick of the Options:
  1. Buy an external hard disc & Back Up: If you haven't already, right now buy one of the many excellent USB external drives with back up or sync software included and do regular back-ups. This will protect your data, which is always consideration number one -and stay with XP (upgrade to Pro if you can do so easily), or Vista if you already have it. Check your RAM to see you are running the maximum your machine will allow as, if you are running an early version of Vista chances are you are under powered in this department.
  2. Stay with Your XP Based Machine: Here's a couple of applicable cliché's: 'The devil you know is better than the devil you don't know', and 'If it ain't broke why mend it?' My argument for not abandoning Windows here and going with Mac or Linux, is simply because of the 'Learning Curve' issue I dealt with earlier.
  3. Wait Until July 2010 and Buy a mid range 64 bit machine with Windows 7 and SP1 installed. However, the variable here is my 'Age of Your Machine' comment above.

Final Words: Technology is always evolving. Unless you are a techno nut, as I am, your only interest is in how it works for you and makes life better or easier. If it doesn't do that what's the point? So, if your XP based machine is working well, you can do all the things you want to do on it, stay with that for at least the next four or five years. Upgrade as cheaply and effectively as you can along the way and only buy a new machine when you absolutely must.

Message Center

Wednesday, January 7, 2009

More Scamming


As you know, I have written about this ongoing issue before. However, others do to and we need it. Scams morph and multiply fast and staying informed is a task. Here's a top article by a David Risley who owns and runs PC Mech. A great source of information from a full-time blogger, who, as he says, makes his entire income from the great art of blogging for a living.
Read on at: PC Mech Blog

In the meant time, Season's Greetings and all the very best for 2009.
John