Thursday, February 4, 2010

Hacked On Facebook! Has It Happened To YOU Yet?

Have You Been Compromised on Facebook…Yet?

If you haven't yet, then you will be…unless you take action NOW!

Hacking attacks on Facebook are increasing with every tick of the clock, so here are some basic precautions you should be taking.

  1. Check Your Password Strength…NOW! Your password is your first line of defense on Facebook. These are the rules: No pet names. By pet, I mean your pet cat, dog, budgerigar, hamster, spouse, boyfriend, next door neighbor, your worst enemy or any name at all. Make it loooooooooooooong and random: Better still, get yourself a password generator. There are excellent ones around. Here are a few. AnyPassword: www.anypassword.com, Steve Gibson’s Perfect Passwords can be harvested from https://www.grc.com/passwords.htm#top. These are generated each time the page loads which makes each one unique. Bookmark the page and return at random intervals to refresh your Router password and harvest any others you may need. Just be sure the utility your using them in can handle long passwords. Of course, you can shorten them if you wish, but that kind of limits their effectiveness. Steve Gibson advises that each ‘one is [a]completely random (maximum entropy) without any pattern, and the cryptographically-strong pseudo random number’. Further, the ‘page will only allow itself to be displayed over a snoop-proof and proxy-proof high-security SSL connection’. So, sorry guys ‘n’ gals, if your connection doesn’t qualify you need help fast to secure your router/connection to the Internet.
  2. Secure your password: This means, keep your password itself secure! There’s no way you’re going to remember your specially created, super strong password, and type it in each time you need it when you log into Facebook etc. For that you’ll need a secure storage facility. Therefore, you need a vault, such as AnyPassword, I’ve already mentioned, which incidentally, has a built-in password generator that is great for most things. Or, another recommended one is Last Pass: http://tinyurl.com/yjz32ka. (This will download the file from Download.com.) Last Pass, like AnyPassword is freely available.
  3. Guard Yourself Against ‘Youtube.xyx’: this site is a scam site. Note this in your memory now and check your browser address bar each time you type in the legitimate www.youtube.com address. What follows is an explanation of what happens when you accidentally access this site. It is usually initiated by a message from one of your friends saying that they found a video of you on Youtube or, they put one of you on Youtube, that features you, yourself, doing something crazy. Naturally you click on the link to see this video of you, yourself, and you see a page made up to look exactly like Youtube, only it isn’t. It’s a scam site. Next, you are assaulted by a pop-up advising you of a flash player error and that you need to click on the provided link to update your Flash player. Like a sheep to the slaughter you meekly, trustingly, mindlessly, click on the oh so readily available link and, “Whamo” you have just initiated the installation of some really nasty malicious software that begins to key log each key stroke you make from now on. Along with everything else it gathers, it will harvest your Facebook password and proceed to send the same fake message, you responded to, to a bunch of other poor suckers. So, be warned! If your reasonably sure you haven’t done anything to get yourself filmed on Facebook recently -then it is likely a phishing scam.
  4. Those Pernicious Facebook Apps: You know the ones I mean. They are ubiquitous on Facebook nowadays. Everyone, it seems, is doing them. Wakey wakey, people. These apps are often the perfect way to harvest your Facebook password. All of them know so much about you already, and now they have access to all that other personal information available about you on your page. Some is hidden info, and includes access to your friends and all their details as well. The following demonstrates how they obtain your password. It will be either exactly like this, or in a manner very similar. You take a Pokemon quiz on Facebook to see what sort of person you are, or something similar. Then you finish the quiz and hit that submit button. Next, the instructions advise you that you must now log back in to Facebook, which you obligingly do. The only problem is, the log-in page is now not one belonging to the real Facebook and, just like that, they have your log-in and password. We must be fair to Facebook as they do try to purge these nasty apps but, by the law of averages, they can not protect you from them all. Some will get through and, the sad truth is that the legitimate ones make it easier for the illegitimate ones to bluff the unwary. That’s just the way it is, in this old naughty world.
  5. The Moral -Don’t Share: Make it your golden rule, DON’T EVER, EVER SHARE YOUR PASSWORD WITH YOUR FRIENDS. EVER. Sorry, but that’s the rule. A Facebook friend may be a friend today, but you don’t know what tomorrow may bring. Also, when you share with one Facebook friend, they may share with another. You simply don’t know. Further, some ‘friends’ are not your friends. They are, in fact, your enemies and they will happily share all your secrets as ‘status updates’ on Facebook and then change the password so you are unable to get rid of it. The news is full of stories like these. I’ve read them, and maybe you have to. So, remember the old adage, “An ounce of prevention is worth a ton of cure”. Also, it’s sobering to realise that Facebook’s rules now do not allow for the removal of any site on Facebook –ever! That’s right. If you die, your Facebook site continues on and on and on. Granted, access is limited to certain people, like proven relatives etc, as a sort of obituary. But, the scary thought remains, it will remain in cyberspace until the Last Trumpet!

Be aware that these rules apply to all Social Networking sites. So, apply them now and practice them from now on, and my you enjoy your Facebook adventures without too many misadventures along the way.

Monday, February 1, 2010

The Most Important Thing in the World

If I had only a few minutes of life left and I had the opportunity of sharing with you - this is what I would like to say. The most important thing in life is to know what will happen when you die. Somebody has said that the two most certain things in life are...death and taxes! Well, we know what happens after tax...more tax! But what happens when we draw that last breath - well that's something else again.

The only person who ever spoke with absolute authority about death and what we can expect to follow, was Jesus Christ. His words have fascinated thinkers and philosophers throughout the ages. For example, he called himself by this startling title, "I am the resurrection and the life". He said that at the tomb of a man called Lazarus who, in a few moments, he was to raise from the dead after he had laid in the tomb for four days! You can read the story in the Bible. You will find it in John's gospel chapter eleven.

Then, some time later, he demonstrated this authority over death and life when he rose from the dead after having been in the tomb himself for three days.

Faced with the claims and sayings of Jesus Christ one must decide whether he was who he said he was, and whether he spoke the truth. Somebody has put it this way, Jesus Christ was either a liar, a lunatic, or who he claimed to be, the Son of God.

For me, he is who he said he was, the Son of the Living God. Therefore, I accept his words as being truthful and trustworthy. I believe him. As many of his hearers said of him, "No man has ever spoken like this man". (John 7: 46)

Here are some more of his sayings.

"He that believeth in me, though he were dead, yet shall he live: And whosoever lives and believeth in me shall never die." John 11: 25 - 26

"I am come that they might have life and have it more abundantly." John 10: 10

"I go to prepare a place for you, and if I go and prepare a place for you, I will come again, and receive you unto myself; that where I am there you may be also." John 14: 3-4

I am the way, the truth, and the life: no man cometh unto the Father but by me.” John 14: 6.

There are many more of these wonderful statements. All of them give hope, encouragement, courage and faith. You can "bet your life" upon them. They are totally true and utterly trustworthy.

As you read on you will find out, in five clear steps, more about God and what kind of person he truly is and some of the good things he has planned for your life. Along the way you will discover why many people never come to enjoy these for themselves. You will then find, explained as simply and clearly as I can, how you can be sure of The Most Important Thing In The World - Eternal Life. Finally, there are some keys to living abundantly in the now of your life.

Please click to continue... Steps to be sure of eternal life...

Saturday, December 26, 2009

Battleplan: PC Invasion

Or, How all that Nastyware Invades Your Computer

Here 'tis –the shocking truth! Explained in a few simple steps:

In almost ALL cases –YOU are responsible!

  • You, knowingly or unknowingly, installed something you shouldn't have from an untrustworthy source. This can include screensavers, toolbars or torrents (downloaded music, video, etc). You failed to check the format (that little extension after the period or dot in the name of the item) before you downloaded. Or you also failed to scan for viruses after it was downloaded and before you opened and/or ran it on your machine. Note: the second you click the executable file, Pandora is out of the box and the trouble starts. Sometimes you may not notice it immediately, it may have a delayed action, but sooner or later, you will notice that things are not as they ought to be.
  • You failed to proceed cautiously when installing an otherwise very likely reputable application that bundles optional rubbish-ware along with the programme or application you want to install. (See 5 below for more on this one.)
  • As in 1 above it can be software you installed sometime in the past and has either already been infecting your machine, or it starts its malicious action after the lapse of a certain amount of time. Further, it may arrive with other programmes that install themselves alongside an existing piece of software and, like a time bomb, explodes its previously hidden payload of malware without notice.
  • You are not running an effective and legitimate Anti-Virus or Anti-Spyware application and, you are not taking time to allow it to run periodic full and in-depth scans of your machine to allow it to do its full job of detection and prevention. Sadly, there are more fake and extremely malicious anti spy and antivirus ware programmes out there trying to con you into giving them access to your machine than you can shake the proverbial stick at! Typically they promise the world as far as their ability to clean and protect your machine, but always along with multiple and dire warnings of how badly your machine is infected. Then, when you respond by clicking what appears to be the, 'button of deliverance', your troubles increase until any activity on your machine is pretty much impossible. Removing them can be a challenge even to experienced technicians, and can necessitate a full reinstall of the Operating System and all your other important applications.
  • Otherwise Legitimate and Useful Software Manufactures 'Sell Out' to the Bad Guys: It seems hardly credible, but those who make good and useful software can be enticed into including these optional and often quite unwanted apps and making them difficult to notice and thereby easy to install along with their own. There is, of course, some sort of incentive. Remember, the price of liberty (freedom from infestation) is constant vigilance!
  • Pop Ups etc: These are particularly effective at trapping PC users. You slavishly and obediently, like a sheep to the slaughter, clicked on the one of the many enticing and attractive pop-ups that followed a previous infection and exacerbated an already compromised position.

The Good News is, you have read this article and you are now armed with knowledge. You are forewarned and forearmed. You, from now on, will view with great skepticism:

  1. The steps you are led through as you seek to download that enticing piece of software, music, move, file etc from the web. You will ponder the file and seek to find out a little bit more about its bona fides, its format, its origin and more.
  2. The process of installing downloaded programmes and applications from the web. You will not simply click, 'OK', 'Next', 'Yes' etc without reading what you are saying 'Yes' and 'OK' to!
  3. You will NOT click on Pop-ups at all, ever again, unless you know exactly what they are, what they will do, and where they may lead you. You will disable pop-ups so that your browser must ask you before allowing them to appear and distract you from what you are doing.
  4. You will resolve to be less impulsive in your web activities and more reflective on where you point your browser and what sites you visit and say to yourself, "Do I really want some destructive nutter to have access to my expensive and so very useful computer that is so much fun in so many ways?" Do I want to have to pay my friendly computer tech all that money to fix what my own momentary lapse in concentration caused? (The answer to this is, of course, 'Yes', I do. I am only too glad to contribute to their retirement fund!' That being the case please ignore all you've just read and carry on regardless. My contact details are on my web site: www.jbc.gen.nz/pccare. Thank you very much.

Sunday, November 15, 2009

Text Etiquette –Obey why don’t you!

Sourced from a fellow blogger... and shamelessly pillaged and plagiarized! (Seriously, the source link is provided below J)

  1. Put your phone on vibrate or silent mode when texting back and forth with someone. Everyone doesn't need to hear your favorite ringtone every time you get a text.
  2. Check the recipient's number one last time BEFORE you hit "send." A slip of the finger could easily send a wrong person that intimate message intended for your significant other.
  3. Take precautions to protect private or personal text messages since you never know who might be snooping. While a high percentage of people lower their voices when they talk on their cell phones in public, a few actually shield their cell phone when sending or receiving text messages.
  4. Beware of texting when out with friends. It's disrespectful and can give the impression that you aren't paying attention to the conversation.
  5. If you are expecting a text message let the people you're with know.
  6. Don't get into the habit of marathon texting. if you need to use more than 150 characters to go back and forth more than two or three times send and email or call.
  7. Avoid using text-message speak, abbreviations or emoticons since not everyone may know what you mean. Especially when texting work colleagues, use correct capitalization (And remember ALL CAPS EQUAL YELLING), punctuation, salutations and closings, and proofread for both spelling and grammar.


 

I'm sure there are a few more that others might have. So, please feel free to add more to this if you want.

Source: Dmitri

Heaven_and_Hell


Heaven_and_Hell
Originally uploaded by oracle_from_beyond
Thank you, beyond.

Wednesday, November 11, 2009

Mysteries of WiFi Resolved!

Here we go! Read on as we delve into the mysteries of WiFi, that wonderful set of wireless standards that lets us do so much online, both locally via LAN and widely via the Internet.

The full set of WiFi Wireless Standards is: 802.11b, 802.11a, 802.11g and 802.11n.


 

The Wonderful Wireless LAN (Local Area Network)

The WiFi enabled LAN has revolutionized the home and business network. In order to thread your way through the minefield it will help to realize that the accepted series of standards that have evolved over the years since Vic Hayes, and others, gave birth to WiFi in the early 90s the evolution was fast and furious. We now have four and with time we will undoubtedly see yet further enhancement. For greater and more in-depth discussion visit the Wiki article which I have read and is excellent. The generally accepted list of conforming WiFi technologies are the four listed above. There are other related forms of wireless such as Bluetooth which is an alternative wireless network technology that followed a different development path than the 802.11 family. Bluetooth supports a very short range (approximately 10 meters) and relatively low bandwidth (1-3 Mbps in practice). It is designed for low-power network devices like handhelds. The low manufacturing cost of Bluetooth hardware also appeals to industry vendors. You can usually find Bluetooth in the networking of PDAs or cell phones with PCs, but it is rarely used for general-purpose WLAN networking due to the range and speed considerations. Another alternative is WiMax, developed separately from Wi-Fi, WiMax is used for long-range networking (spanning miles or kilometers) as opposed to local area wireless networking.


 

802.11 –Where it started

In 1997, the Institute of Electrical and Electronics Engineers (IEEE) created the first WLAN standard. They called it 802.11 after the name of the group formed to oversee its development. Unfortunately, 802.11 only supported a maximum network bandwidth of 2 Mbps - too slow for most applications. For this reason, ordinary 802.11 wireless products are no longer manufactured.


 

802.11b –WiFi becomes Useful

IEEE expanded on the original 802.11 standard in July 1999, creating the 802.11b specification. 802.11b supports bandwidth up to 11 Mbps, comparable to traditional Ethernet.

802.11b uses the same unregulated radio signaling frequency (2.4 GHz) as the original 802.11 standard. Vendors often prefer using these frequencies to lower their production costs. Being unregulated, 802.11b gear can incur interference from microwave ovens, cordless phones, and other appliances using the same 2.4 GHz range. However, by installing 802.11b gear a reasonable distance from other appliances, interference can easily be avoided.

In Summary:

  1. Pro 802.11b - lowest cost; signal range is good and not easily obstructed
  2. Con 802.11b - slowest maximum speed; home appliances may interfere on the unregulated frequency band


 

802.11a – The Confusing Standard

While 802.11b was in development, IEEE created a second extension to the original 802.11 standard called 802.11a. Because 802.11b gained in popularity much faster than did 802.11a, some folks believe that 802.11a was created after 802.11b. In fact, 802.11a was created at the same time. Due to its higher cost, 802.11a is usually found on business networks whereas 802.11b better serves the home market.

802.11a supports bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz. This higher frequency compared to 802.11b shortens the range of 802.11a networks. The higher frequency also means 802.11a signals have more difficulty penetrating walls and other obstructions.

Together But No Unity: You've heard the truism,
'Two cats tied by their tails are together, but definitely NOT in unity!' Because 802.11a and 802.11b utilize different frequencies, the two technologies are incompatible with each other. Some vendors offer hybrid 802.11a/b network gear, but these products merely implement the two standards side by side (each connected devices must use one or the other).

In Summary:

  1. Pro of 802.11a - fast maximum speed; regulated frequencies prevent signal interference from other devices
  2. Con of 802.11a - highest cost; shorter range signal that is more easily obstructed


 

802.11g – We're getting somewhere now

In 2002 and 2003, WLAN products supporting a newer standard called 802.11g emerged on the market. 802.11g attempts to combine the best of both 802.11a and 802.11b. 802.11g supports bandwidth up to 54 Mbps, and it uses the 2.4 Ghz frequency for greater range. 802.11g is backwards compatible with 802.11b, meaning that 802.11g access points will work with 802.11b wireless network adapters and vice versa.

In Summary:

  1. Pro of 802.11g - fast maximum speed; signal range is good and not easily obstructed
  2. Con of 802.11g - costs more than 802.11b; appliances may interfere on the unregulated signal frequency


 

802.11n – In Search of Perfection

The newest IEEE standard in the Wi-Fi category is 802.11n. It was designed to improve on 802.11g in the amount of bandwidth supported by utilizing multiple wireless signals and antennas (called MIMO technology) instead of one.

When this standard is finalized, 802.11n connections should support data rates of over 100 Mbps. 802.11n also offers somewhat better range over earlier Wi-Fi standards due to its increased signal intensity. 802.11n equipment will be backward compatible with 802.11g gear.

In Summary:

  1. Pro of 802.11n - fastest maximum speed and best signal range; more resistant to signal interference from outside sources
  2. Con of 802.11n - standard is not yet finalized; costs more than 802.11g; the use of multiple signals may greatly interfere with nearby 802.11b/g based networks.


 

There are other IEEE 802.11 standards such as 802.11h and 802.11j. These are extensions or offshoots of Wi-Fi technology that serve specific purposes not generally used in normal work-a-day wireless networking situations.

For a full list of WiFi Standards and to read more click this link.

Sunday, November 1, 2009

Sailing Christopher Cross (Tall Sailing Ships)

Isn't the Internet wonderful? Here is something truly beautiful for all to enjoy. Thank you Christopher Cross.