Help Support my Blog!

Virgin Mobile USA
Glasses USA
Amazon
Newegg
VPN4ALL
Netflix
Hulu
CafePress

 

Subscribe to Paul’s Tech Talk Affiliate Marketing Blog

Subscribe to Paul’s Tech Talk Science Fiction Blog

Subscribe to Paul’s Tech Talk Scams Blog

  • Acer 11.6
    Acer 11.6" Laptop 2GB 16GB | C710-2856
    Acer

    Currently  in process review this Acer Chrome book and boy is it nice!

Navigation
Sponsors

Entries in Internet (44)

Wednesday
Jun242009

Insanity Run Rampant -- Antivirus Pro System (scareware)

Some of you would want to ask me why I am calling this title an usual title. In fact it is quite simple, I have been at the hospital since early this morning. While I was there I had some intriguing things happen. I was watching a person cruise the internet while they were at work. This is someone who is supposed to answer the phones and such. Then I see this POP UP, this draws my attention. "You SYSTEM Has Spyware". This was my first thought, Scareware. The Popup said it was for "Antivirus Pro System".
antivirus-system-pro

Since this was a Hospital computer, I couldn't get a real screen shot of this but there are plenty examples out there, just like that one above.  Anyways what worries me is how System Admins are allowing employees to surf the web while at work on company time.   It also makes for a bad experience with their family.  It also concerns me about the fact that while that computer is infected some of the patients records could be leaked online.

[ad]If you have this Scareware program, Here is a good explanation on how to remove it.   Hospitals have a duty to protect peoples privacy.   Although I seriously this system had patient records it was being used to keep track of who was in surgery and where they were.

Hospitals should prevent their employees from using the internet and preventing patients or their family's from using the internet.   While I was there I couldn't do much but check my email and Maybe watch Twitter using Tweetdeck.   That was how bad the bandwidth was there.  According to some nurses they have a T1 Line.   So you know people are watching movies or other things through the internet.   I also heard from a doctor that people were streaming who were supposed to be at work.

That has been my day,  and am I tired.

I would also suggest people have a f[intlink id="2205" type="page"]ree anti-virus software and a Good free Firewall[/intlink] to help prevent this type of scareware in the future.  Remember your the End User and that means only you can prevent this from happening in the first place.  Never go to suspicious sites or URLS that you don't know where they go.   If you can prevent these types of attacks then you are much better off.
Thursday
Apr092009

Electric Company fear Mongering gone wrong!!

I saw this talking going on at Arstechnica and SANS Interenet are Talking about the Elecric Company Fear mongering. Here's what Ars Says:
It sounds like something straight out of Hollywood. Current and former US security officials have reported that foreign nations have penetrated the cybersecurity barriers surrounding the US electrical grid, water system, and even financial networks. Although no known attempts have been made to activate the booby traps said black hats left behind, such sleeper cells could activate suddenly during a war or crisis, plunging the nation into a disaster only Bruce Willis and that Mac dude could avert.

[Via Arstechnica]

[ad#cricket-right-ez]This was posted today with people asking the question Is the Electric company have a viruses or have a worm? I don't know but these fears are coming from the Wall Street Journal:
WASHINGTON -- Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials.

[Via Wall Street Journal]

Now let's talk about this, This is being a talked about on a friends Podcast, The Caffination Podcast. This is where I have figure we should talk about this. I think Sans Internet Storm says it better than I could:
One email stated that The power systems we have in place today are ran by Knobs and Switches. Mostly built int he 70's and 80's, these power stations are mostly ran by manual intervention. The power stations that _have_ been stood up since then, a couple of Nuclear Power stations, are federally regulated to not have any connections to anything, let alone the Internet.

Since this particular email comes from a very trusted source, I am inclinded to believe this person. Is it possible that there ARE computers in power stations that are connected to the Internet? Yes, I am quite sure there are. However, is it possible that the computer or computers (if there are any) that actually CONTROL the power are connected to the internet, I tend to not believe that.

[Via Sans Internet Storm]

I agree with what Sans is saying but I don't think there is anything to worry about, for the fact that I think that the computers that control electricity are not hard wired to be online. This is meaning that if someone virus or worm gets on those computers there is no way these viruses or worms could talk back to command and control. This is my Theory and I don't work from the electric but I do think this is the most plausible way they are preventing this type of attack. The First Tier, just like tech support, is for Corporate and technicians to talk to eat other over the intranet. The 2nd Tier, this is the important computers that would control Electric process. I don't know this for sure but I think the 2nd tier would be used to isolate the computers from being accessed externally. Like I said before I don't work for the electric company and this is all theory on how the electric has this set up!! So you can take it with a grain of salt or come up with your own ideas.
Sunday
Mar222009

Are You and Your Friends Fine -- Virus Spam

Logged into my Google Email and was checking my spam to see what I see and this one draws my attention:

virusspam

I think I know where this is leading me but I click the link and this website with the Reuters logo pops up:

fakesvideo

Now as you can tell this looks authentic but when I did go to this site, AVG detected some trojan.  It blocked it, but  the file that it is downloaded called "save.exe" and I have talked about [intlink id="2991" type="post" target="_blank"]flash player fake updates[/intlink].  I have seen other blogs talking about dirty bomb news report leads to malware.  I don't know about you but if I wanted to update my flash player, I go to the source and not use any links.  It is wise not to download any programs or files and run them without properly checking them out for viruses and Trojans.  You should have a fiewall and anti-virus running at all times and that will help but it is your actions that help your prevent from getting viruses or Trojans.
Thursday
Mar122009

Is Google the ultimate news source?

As you know We had a big problem Monday Night and All day Tuesday. If you are a regular reader of this blog, you would of noticed either a 503 or lag. It was due to an article that I released late Monday night about the PIFTS.EXE and the so call conspiracy.

At the time, I was wondering and quite disturbed about what Norton Symantec was doing to the forums. So I blogged about this and wouldn't you know my site was Held Hostage by Google. I kid you not, I had so many people come to my site in under an hour it wasn't even funny.

[ad#cricket-right-ez]So I sit here, asking a really good question is Google the News? I don't know exactly when but according to Wikipedia Google was formed in 1998. The Google Motto is Don't Be Evil, and I guess it makes them look like a news source. When did they get past the news site? I would hazard a guess that it was in late 2004 they started when they when Google gave people the first chance to own the stock on August 19, 2004, when Google became a publicly held company.

I got hit hard by Slashdot, Reddit.com, and Google.  In truthfulness, It was more of searches and people coming from Google than anywhere else. I would say Google was the 90% and and Slashdot and Redidit was 8% and the rest was from other websites for this one article. Now don't get me wrong the 2% of people was my normal amount of people for the day. So you can imagine how many people actually came to my site over this fiasco.

I call this a fiasco because basically it was one that really made me worry about the server going down. People seemed to try to find out about this program and some of them didn't even do any more research than to come to my site? Although I do know a little, I have always considered myself to be a BLUE COLLAR Tech Blogger. So you can just call me "The Blue Collar Tech Blogger" when it comes to things like this. I will never proclaim I know everything and I am still learning every day I blog I learn something new.

So this leaves me with a question on how did Blogs become the news also?  Did we step into the roll of news?  I know there are many blogs out there that are telling the news and are almost as if they are the news.  Is that where this has become Web 2.0?  I throw these questions out to see what type of comment.  I just thought this was a good topic for today to talk about.
Tuesday
Mar102009

Thinking back to PIFTS.EXE.

Thinking to this very incident looks to something out of the movie "Lemony Snicket's A Series of Unfortunate Events".  I won't go into much detail but here is what I want answers to about the PIFTS.EXE.  You see after I have read a great article talking in detail about this, I have also come to the conclusion something isn't right.

[ad#cricket-right-ez]The blog owner known as Anshar in the forums on the Symantec points out some key events. He wanted to point out that the users who were posting were not violating the TOS and was posting questions that look to asking about this file. See screen capture of what I took. This one picture doesn't prove his theory in whole, but does bring up some suspicions. This actually might be them trying to find a 'scapegoat' so to speak. He also talks about what others are asking? What is PIFTS.EXE? People seem to still have not be answered that question.

Although, in Norton's defense there seems to be a lot of information that they have to sort through. I'll admit this information people are asking should be really simple to find in the Symantec Databases somewhere. I will not say they are hiding anything major but I do think something is going on that we are not aware of. Here's some other thoughts to considers? If Norton needed to find out who was using Windows 7, couldn't they of asked or even made a simple site redirect to find that information, after all anytime you visit a site you have that information sent to the stats. I could in theory find out how many visitors are visiting from Macs and how many are on older systems. That would be very easy to do with Google Analytics.

Now with that said let's talk about Why it took almost a whole day for them to release a public statement about what happened.  I might be wrong but if I was a stockholder, I'd of demanded them to send that out ASAP instead of waiting 20 to 24 hours.  Although I'm not trying to make any more conspiracy theories, I do think the Streisand effect came into effect and people are feeling like Norton did something they shouldn't have.  In which case, Norton probably made "A fail whale" attempt of making it better when they started to delete the post.

I've been watching the Norton forums trying to make sense of all this, and I do know that Norton have lost people's faith in them and people are removing their product off there systems if Norton doesn't start answering questions that need to be answered.

Norton has released the information of PIFTS.EXE and what it does. Although I am sure people are going to argue about what it does or doesn't. I wanted to post this for people to check out and consider for yourself.
Monday
Mar092009

Fake Emails about Windows Support spam!

According to Trend Micro, Some malicious software is being sent to unsuspecting users about Windows SP1 andSP2 having a error that could damage software or even hardware.  See Trends blog with the photos of the fake spam.

[ad#ad2-right]Although from time to time Microsoft does send out security information to Technet subscribers people have also used this in the past to get people to install Viruses and Malware, like this one that installs TSPY_BANKER.MCL. TSPY_BANKER.MCL monitors the affected user’s online transactions and steals banking related information




Microsoft sends e-mail messages to subscribers of our security communications when we release information about a security software update or security incident. Unfortunately, malicious individuals can and have sent fake security communications that appear to be from Microsoft.


[Via Microsoft]



So if you get an email from Microsoft you'll probably want to delete it.  Any Microsoft communications will be sent from the Update center.  You should never install software that is from an untrusted website.    If you are concerned you should check the web and find out what people are saying about the situation and see if it is a scam or true!!  Remember only you can prevent a virus or Malware!

Friday
Mar062009

Getting to the A600 Program Files

So you want to see this screen when you plug in the A600 Broadband Card:
cricketa600softwarecricketdrive1

[ad]But doesn't pop up! I found out why. If you installed it one time or another and had a problem with the installation and it won't pop up with that screen. You'll need to take this first step:

Uninstall THE USB DRIVERS for A600
C:\Program Files\Cricket\USB DRIVERS\Uninstall.EXE

Once you do that you will see need to reboot and then try to insert the A600 Modem into the USB slot. It should pop up with t hat screen or you should see the drive become available.



I've also took the drive and copied the program files into a sub Directory of the 4 Gig drive installed in the A600 and I decided to help everyone else out by uploading the self-extracting program to rapid share:

Cricket-A600-Program.exe Bit torrent file

This is the file I created on Memory card for when I need it.  If you are uncomfortable downloading this because your worried about virus, then follow the directions on how to uninstall the software to get to your Cricket software for the A600.  I did this to make it easier later on to re-install the software without having to uninstall software.  Let me know if this helps. You should consider downloading Free Anti-virus Software and free Firewalls to protect your system if you haven't already!!
Thursday
Mar052009

Reviewing the 3G A600 Cricket Modem

So I got the Modem and wanted to test out the speed being stationary, So I go to my usual site Speedtest.net look at the speed, check below for speed.
As you can see this went fairly well. It does depend on your Cricket Coverage area. So you want to hear all about it.

First thing if you are upgrading from the UM100 Broadband Card, You'll want to uninstall the Quicklink Software.  To do that you can uninstall it by going to:

Computer > C: Drive > Program Files > Cricket > Quicklink > UNWISE.EXE

(This will uninstall the Quicklink software, I'd suggest after you uninstall it you reboot.)

a600cricketspeed

How does the USB Modem work?


Once you do that you can then insert the A600 Modem into your USB.  The Nice thing about this is the software for the Modem is on the Modem itself, so you don't loose the CD for the modem.  It currently only supports Windows and MAC OSX operating system but I have seen there is a work around to use the A600 Modem with Linux if your wondering.Once you insert it into the USB you'll find you have a new Drive.  It will say a Cricket CD Drive with 24 megs used.  You'll want to run that program on the Cricket CD and that will install the software.

The Connection


A600Connection

As you can see this is the provided application to connect to the Cricket Network and the speed and signal strength can differ from location to location due to coverage areas. This application can do several different functions:

  • Connecting to Cricket

  • Text Messaging (Free with broadband connection)

  • Bandwidth Monitor (Helps makes sure you don't use to much Bandwidth, they do have a soft cap of 5 gig's but haven't affected me yet.)

  • Statistics, this is good for those who want to try to get the most out of the modem.

  • Logs, Also good for those who want to keep track on how much they used the modem. It however only logs activity on the system it is connected to.

  • Activation -- Seems to help get updated tower positions when your traveling and can be done as long as you can get a signal


Pro's to this EVDO MODEM:



  • [intlink id="3174" type="post"]Memory Slot[/intlink] to have backups on files in case the worst case scenario happens (1 to 4 Gigbyte Capabilities)

  • Speed and Bandwidth (See above for speed test)

  • No loosing CD -- I have the [intlink id="3067" type="post"]program files[/intlink] online if you need them.

  • Independent card reader without having to install the Modem Software.

  • Able to take the modem with you as you go. (There is a clip slot for you to carry it anywhere you go.)

  • Found out there is an External antenna connector and will be looking at Antenna's for it in the future.

  • Swivel USB port, You can swivel it up or down 90 degrees or side to side 180 degrees. (X and Y Axis)


Cons:



  • If you use it primarily internet you'll expect some slow downs from time to time during HIGH Peak Zones.

  • This has a dormant signal feature that I will have to figure out how to disable but easily fixed by reconnecting to the tower. You can get out of dormant mode by web surfing, just load up your browser and the dormant mode will go away.


Twitter Comments:


@Laforge129 I sure am trying out the Cricket broadband.!I just started it last week and so far it never ceases to amaze me! (Via Twitter)

Conclusion







I and others would recommend the Cricket Broadband Modem a600 to anyone who wants an inexpensive and portable internet connection for $40 dollars and no contracts. Though with all the things you can do with this modem makes it an invaluable extra incentive in buying this modem. You should always check the Coverage area for Cricket and make sure you are able to use this modem in the first place. I'll have another update on this later on but I'm really impressed with all the features of this modem.


Clicker here to buy it now.

Check out my Extended Review of the A600 and All the programs that I added to my 4 gig MicroSD Card.

If you want to comment on the A600 just twitter me and tell me what you think. Maybe you'll twitter will be on my review site.

[gsom-optin]
Thursday
Mar052009

I hate Snopes Spam

As you know Snopes is used to find out about urban Legend and Rumors:

I received a Virus alert from my RSS feed about Email virus warning.  It even adds a Snope URL.  The Author just copies and pasted the virus warning into the blog without even going to Snopes.
[ad#ad2-right]
According to Snopes and I'll quote:
Although the Postcard virus is real, it isn't a "BIG VIRUS COMING" (it's already been around in multiple forms for a long time now), it will not "burn the whole hard disc" of your computer, CNN didn't classify it as the "worst virus" ever, and it doesn't arrive in messages bearing a subject line of 'Invitation.'

[Via Snopes]

Now as you can tell the link described in the blog post was "http://www.snopes.com/computer/virus/postcard.asp". If you went there, you'd have seen this as a not really true and some parts of this might be but that part about burning your Hard drive or even consider the Worst virus isn't true.

Some things you need to consider before forwarding anything is:

  • Is it completely True?

  • Is it Legitimate?  (True blown warning about something like a product recall  or something important like that)

  • Does it Say to Forward? (if so it is probably not wise)

  • is it from a Friend (If so you might want to remind the friend nicely that it isn't nice to send spam)


If you follow some of these suggestions you'll be making the Internet a far better place for everyone.  Remember if you don't know, it's time to learn.  if you do know, it is time to teach.  These are the fundamental aspects of using the internet the right way.  Also if it is a fake virus warning you should tell them to get a Free Anti-virus and Firewall to better protect them.  Also  remind them that if they keep their system updated then they shouldn't be too worried.  Remember only you can prevent a Computer Virus and it's up to you keep your system up to date.
Tuesday
Mar032009

Cracking and Warez sites are Host of Trouble!!

It is nothing to laugh at and should be understood that gamers have no freedom right now.   That said this new Variant to Virux Trojan is in regards to Win32/Vitro Trojan.  It seems tobe infecting .exe and .Scr files just like this.

According to Trend Micro:
[ad#ad2-right]
The downloaded malware include variants under the FAKEAV, TDSS, and VUNDO families. Infection chains, however, are notable for the presence of VIRUT and VIRUX malware. VIRUX and VIRUT attacks were initially about the volume of infected PCs. The numbers are massive enough to worry Web users and security researchers: around 20,000 PCs are infected per day
Read more: "Crack Sites Distribute VIRUX and FakeAV"

Now it seems to be more and more sites with getting computer infected. It also seems the Malware writers are using these servers for helping infect essentially gamers computers. So for the time being, if you have a favorite game and you want to:

  • No-CD Crack (This is good for those who want to play the game without the CD)

  • Key Gen Cracks (This is used for pirated version of a game)

  • Update Cracks (This is used to prevent CD checking or Also prevent Version Checking)

  • Game Cheats (This is usually a small program like a bot or some other way for the gamer to cheat)


And should not be Downloaded or USED!! I don't say that lightly, because Gamers feel they should be able to play any game they want. Although this post will probably make the Gamer developers happy, I do this to tell people that these virus writers are using the gamers to distribute the Virus.   I encourage all the gamers out there, that don't want to loose their games to not download any more of these types of cracks.  It seems the virus writers are wanting to infect systems and slow you down.  You don't want to slowed down do you?  Please consider getting a Firewall and a Free Anti-virus software to better protect your system.
Sunday
Mar012009

Facebook Goes Phishing again

In one of my Previous articles about the Koobface Worm, I talked about the way they were infecting the systems and what you need not do.

It seems that Trend Micro has seen an even more rise in people downloading the WORM_KOOBFACE.AZ and Seems to be on the RISE. This is all done with a Social engineering and Has had some attempts before with this little worm on Facebook.

[ad#ad2-right]After your Infected with this new Variant, it searches for cookies and Sends out a message to people from:
* facebook.com
* hi5.com
* friendster.com
* myyearbook.com
* myspace.com
* bebo.com
* tagged.com
* netlog.com
* fubar.com
* livejournal.com

This seems to be a social engineering Nightmare for these websites and as yet are unsure what else it does but it says the same thing it did before by saying "This is a Video of You on the Street." Which is bogus but none the less people click and think they have to download a codec or update their Flash. Social Engineering is on the rise and will be taken seriously. You should read the full report from Trend on what it does but you also should have an anti-virus and Firewall installed to prevent this from happening in the first place. The only true way of preventing this is not to be fooled, you should NEVER Download from a site you don't know or trust. See all the Facebook articles for more information.
Wednesday
Dec312008

Viacom might be going to HULU

According to some of the news post people are worried about Viacom leaving Time Warner. Now Here's where Viacom might be going digital. What do I mean Digital, I am talking about going to HULU. If Viacom doesn't sign a deal with Time Warner, that would leave a space ope for someone else like Hulu.

So Viacom isn't happy with Time Warner, or They want to go IPTV. Some of the Headlines I'm seeing are:

These are just a few that I am seeing pop up around the internet.  So what does that mean to the internet user?  Well On one of there show's like Dora the Explorer on Nickelodeon will begin to stream some of the shows previews on Dec 29, 2009 for it's next show.  When you go to Nickelodeon Site you get this:

nickplea


[ad#ad2-right]Although this just means they want as much money as possible this does give Hulu the chance to start streaming this type of content easier and probably be able to sign a contract with them without much of a fuss. After all Viacom wants to make money some how. So what can you do to get them to go to Hulu. Email Hulu and tell them and tell them you want Viacom to come to Hulu. If this happens so many things will happen with regards to online media.
Tuesday
Dec302008

Using Skype with Cellular BroadBand Modems

If your like me you will want to make sure you have the best possible speed and connection with your broad band modem. Here are a few articles to better help with you get the best possible speed with a broad band modem like a Cricket modem:

Some other things to consider are:

These will start to make it better for you to use a modem and get the best possible speeds from the modem.  You have to realize what your coverage area is.  There are many factors in regards to your modem speed but that is something that you will have to figure out how to get better speeds.

How do you use Skype with your Cellular broad band modem?


Somethings to remembers with your broadband modem is you won't have a good connection no matter how hard you try.   Most cellular carriers don't want you to us it with VOIP(Voice of Internet Protocol).   So you will have to pay close attention to how you use the bandwidth and what you are doing while making a VOIP call.

The good thing about Skype is, it comes with some very useful tools to better watch your bandwidth and to help get the best possible connection.  You will want to make sure not to have it be a super-node, to do this you go to:

Tools then;Options




My settings for Skype with Cricket<



As you can see I checked off use port 80 and 443 as alternative incoming connections, I also like to see all the technical information and bandwidth usage per call.  I made sure to use Socks5 to prevent skype from becoming a super-node. I also have it set to not automatically start up when I load windows.  To do that all you have to do is go to the General tab and un-check start Skype when Windows start.   You can use any port you want as long as you use the same on the SOCKs5 setting also.   I just made the port up it can be 0 to 4 numbers long.   If you want to understand what ports are this little document will greatly help you figure out which ports are good to use.  Some other things to remember when you use Skype for long periods of time is if you need to call someone you should try not to use the internet to much for that takes bandwidth also.  It is better to have Skype use all the possible bandwidth you have available.

Monday
Dec292008

Panatech PX-500 PCMCIA Sprint EVDO BroadBand Card

[ad#tmi-right-1-1]The Pantech PX-500 wireless mobile broadband card for Sprint gives you data communication access for your PC laptop anywhere you roam on the Sprint network at faster speeds than ever before. EV-DO rev A compatibility gives you download speeds of up to 3.1 Mbps and beefy upload speeds of up to 1.8 Mbps. Simple to use, the Pantech PX-500 wireless mobile broadband card lets you surf the Internet, send and receive email and text messages, and connect to corporate networks from just about anywhere.

Technical Specs:

  • Dimensions - 4.57 in x 2.13 in x 0.51 in

  • Weight - 1.8 oz

  • Data Download Speed - EV-DO rev A (Up to 3.1 Mbps Down/1.8 Mbps Up), EV-DO rev 0 (2.4 Mbps Down/153 Kbps Up), 1xRTT

  • Download Protocol - CDMA 850, 1900

  • Compatible Carrier - Sprint PCS

  • Network Compatibility - CDMA 850, 1900

  • 3G Data Speeds - Yes


Compatibility Features

  • Device Supports Data Plans - Yes

  • Available For Purchase Without Service Plan - Yes


Saw this card and did a little digging.  I looks like the newest updated software and drivers for this card can also make it Vista and Linux compatible.   Although with any card you will use up more battery life but it is a small price to pay to check email and surf the web. Also if you have an newer laptop or am about to upgrade I'd suggest Getting a Sierra Wireless Compass 597 USB Modem from Sprint! This is good for anyone who wants to surf the web and not have to buy the hardware to do it with.  Both are free to buy and ship with a two year contract. If in doubt please get the USB card that way you know you know you will be able to use it.
Thursday
Dec182008

Disaster preparation 101 -- Data backup

In this one I will talk about Disaster, it happens to all of us from time to time. A fire, a earthquake, a stolen laptop or any number of ways. So what happens to your data, is it stored on the laptop? Is it important very sensitive data? Could you get fired if you lost that data?

[ad#ad2-right]These are all questions you must ask yourself when you have laptop. How do you backup your data or even do you have a backup? Having seen this with my own clients, I must wonder if there are people out there who just don't care. I had a client the other day who gotten a virus and this was a really mean virus. Deleted some very important files when you tried to clean the virus out. She called me in a panic because she couldn't load up windows? I asked if she had any backups, she said "what's a backup" . So I sat there discussing this with the client for over 20 minutes. Finally she started to understand, she said she had the OEM Backup DVD but nothing else. She also said she needed help with getting data off the computer. I told her that I would be able to come the next day and I was lucky the virus didn't do anything else to her data. We were able to retrieve the data from her system. That is where I start my rant , Why would anyone not have backup of there most important data?

So How do you backup your data? This is controversial and somewhat depends on how much people want to spend to keep there data safe and not loose pictures or music. There are several ways to do it, each way has it's pitfalls or short comings and requires a little more effort:

Kinds of Backup


Hard Medium - DVD, CD, External Hard drive

Although,  The hard medium is usually used that doesn't mean you can have a backup other than hard.   Here are some ways to back up on the internet.

Internet Medium:

  • Jungle Disk -- Provides online storage through the Amazon s3 service.   Only pay for what you use.   It works well with most Operating system.  I've used it on Vista so it is really nice.

  • Carbonite Online backup --Another good Online storage.

  • Some Other Online backup -- Here a list from Amazon to better help you find the type of software that you might need.


These are just a few options, if you want to look for other you can.  The important thing to do is BACKUP because if you need some data that gets wiped or destroyed.  You will be kicking yourself for not backing up.
Tuesday
Dec162008

Microsoft to Release KB961051 on the Dec 17, 2008

According to McAfee and I will quote:
December 16, 2008: Microsoft has announced an out-of-cycle patch release for a critical, remote-code-execution, vulnerability in Microsoft Internet Explorer (CVE-2008-4844). The patch, to be released on December 17, will address the vulnerability across multiple versions on Internet Explorer running on supported Windows platforms.

[via McAfee Threat Center]

[ad#ad2-right]From what I am understanding it will be KB961051 and will be a critical update on all Windows platforms.  Microsoft issued a security advisory for this on there Technet support website.   This will probably be put online sometime tomorrow and will be available to download after 10am PST although this is just a rumor because when I go to that article they talk about the work around and how to fix it temporary until they release the patch.  This is releated to the IE Vulnerability that is in the wild and has been causing havok on the internet.
Sunday
Dec142008

Signs of a Computer Infection!

So I was thinking this morning what I missed and I totally missed on how you might be able to tell if you have a computer virus. It does me no good to talk about a virus if you don't know you're infected. I was thinking of the times I had a client who had trouble but wasn't what I thought.

So How do you know?


Some people would say it depends on factors but here are what I call clues that make me suspect a virus:[ad#ad2-right]

  1. Slow or Sluggish computers --  Here is what I know if the computer is really slowing down and have a dual core or quad core.  If you are running a system and sees a lot of hard drive activity even when the computer is idle then it might be a virus or it could be a program doing what it is supposed to be doing.  So this is somewhat of an indication but not always.

  2. Slow internet connection on the computer or on the network -- Due to the fact that most people have a router that is connected to all the computers and if you internet connection on all your systems are slower than normal then you could have a virus.  I use Speed Test website to help determine this.

  3. Corrupt files or Missing files --  Sometimes you have a text documents or files that are missing and you have to pay to get them back.   It's an old scheme and usually once your files have been encrypted you can't get them unencrypted.  So this is why I added this one also because it varies from virus to virus.

  4. Programs don't work like they used to --  This is also a very common association with a virus because virus makers don't have time to test it out on a variety.   Most of the time if you get a call that a program is no longer working tat would be the first thing I'd look at, if not check to see what other programs have been installed lately.

  5. In some cases more files are the Hard drive --  This can be a indication of a virus because the virus might be using the system to host files or other such illegal activity.   Although this is happening less and less it can still be a possibility and should be checked out.   I like to use a graphical tree size program to determine if that is the truth.

  6. Pop ups or Browser redirects -- this is a common thing along the way.  It's always the same and saying something like "you have a virus" or "You unprotected and you might have a virus".  The theme here is to scare the user into buying there product that does not do anything.   It sometimes even looks like a real anti-virus program or spyware program but in truth it is just a scam.  In some cases it will send you to a site because it keeps wanting you to buy the product.

  7. DNS Changes on you -- Some hackers like to have you go through there server so they can watch everything you do online.  They are wanting to get the sensitive information of bank account, and other important accounts.  This is really the ones that need to get off your system asap.


[ad#ad2-left]These are the signs I've seen in the past that would indicate a virus but as with any problem.  You will need to check for all the possibilities.   It is always going to be an issue with people because most people don't know about the signs, now you do and you can now be a better computer user.  It is you who can only fight viruses by knowing all the possible system and only you can defeat a virus.  In the next article I will talk about the tools to help you find and defeat a virus.   This will be a big blog post because I have so much to teach and explain.   If you like these post by all means leave a comment and help spread the word.
Sunday
Dec142008

Cricket Wireless Broadband Card -- How to get better speed!

After buying the card last month,  I did a quick review about the broadband card. I wanted to talk about the speed problems that I had when I first used the modem.  Here is how to possibly getting better speeds when you use your card.   First off, you will need to disconnect from the internet and go to your quicklink mobile application:

cricket-wireless



You will click on “Tools”  and then hit ‘Activation’.   If you have it fail on your the first time you should reboot your system then try to do the activation after reboot that should fix the activation problem.
newspeedtestAs you can see after I did the activation of the modem, my speed went way up from the last review.  I thought I should talk about how you could possibly fix this.  I called tech support over this to get a better speed.  

This is where I learned about the activation.  If you move or go to another City or travel to far, you will need to tell the modem that there is a new tower closer to you.   It seemed to of really boosted my performance when I go to places on the internet.   So if you come up with some cool tips or tricks to help others by all means leave a comment. After this problem is fixed and the speed seems to be coming more and more, I’d like to recommend everyone who reads this article to go buy the A600. It is really a fast little modem and more reliable to boot. My other review was incomplete because of the speed problems I had but now it is fixed and I am really happy!!!

Saturday
Dec132008

Uncovering a Virus/Trojan

Getting done with the first part really got my juices flowing. I was shopping looking and thinking about this next article. I came up to only one option turning this into a 3-5 length post due to all the content that I will have.  So where did we leave off?  Oh that is right figuring out if you have a virus/Trojan.  The instant I made a post about this 12 hours later someone make a comment and here is what he said:
[ad#ad2-right]
Rene Van Belzen

I can't wait to read part two of this article. I always wondered how you'd know you're infected if a virus don't want to be detected and no virus definitions are yet available, because the virus is so new.

Now the truth is anytime a Virus does something it usually leaves a footprint somewhere and somehow.   Even the hardest working hacker can't plan for all possibilities and that is where we begin.   I have been helping people for a while with viruses and know that no matter how hard the virus tries to hide you can usually find it relatively quickly and easily do to virus check here are the ways I've done to figure out if they may or may not have a virus/Trojan.

Now if this is a client's computer and you don't want to be rude to the client, there are a few indications of user error and installing a virus.   This is relatively simple, all you do is do a quick inventory of all the start menu programs.  You'd want to look for any P2P file sharing program, If they have Firefox Installed, and if they are using Window Mail and not Thunderbird.   You see 80% to 90% of virus downloaded are installed by the End USER.  They either downloading a game and installing a virus with [ad#ad2-left]a game, or not protecting themselves by using Internet Explorer or Using Windows Mail.  That is usually my first step due to the fact, I've got to be diplomatic about finding out about security ways.  Also make sure they are up to date on there Window updates, unless they are using a really old system then you will have to work even harder.  Also you can suspect a virus if the client is talking about having problem with a program recently although this isn't always true it sometimes is the case due to the fact hackers don't have a big chance to test these viruses/Trojans out before they set them into the wild.  So there are always going to be unplanned problems associated with them.

After the first initial search of desktop, you should really know the likely hood of a possible virus getting on the system and later we will talk about counter measures to prevent virus attacks in the future.   There are a few places a hacker likes to put commands.   Hackers love to put in the Registry to run a program every time Windows starts.  It usually in:

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\


Usually 50% to 70% of virus like to make sure the program to runs.  This is a flaw in Windows because hackers can edit this without much effort but there isn't many places a hacker can go to make sure a program is set to run when you boot.   So this is also a benifit to finding those little programs.


Now just like the Regisitry, Hackers also like to put programs in a few areas on the hard drive.   This is also kinda hard to hide because most of the time these are consider important to the system but if you know what to look for you can pretty much figure out if it is truelly a system file.  These areas of the hard drive are:




  • C:\WINDOWS\System32[ad#ad2-right]

  • C:\WINDOWS

  • %programfiles%\common files\microsoft shared

  • %windir%\temp\


These are just a few but if you look hard enough it can be found most of the time.   Most of the time I use the registry to tell me where these programs are so I can do a further check of the program.  Some of this is not needed with some of the programs that I recommend but this is for those who want to be a through job and make sure the virus is gone.

On my next post we will talk about some good tools for the trade to help get rid of a virus/Trojan.  This little step here is used to  better help identify a virus and also give you chance to google each name on the list of registry and the hard drive  to see if you can identify the virus.
Saturday
Dec132008

Figuring out the Email-Worm Win32.Zafi.b

This is another just I just saw on the web and wanted to talk about what this little Worm does and what it's known Aliases:

Email-Worm.Win32.Zafi.b (Kaspersky Lab) is also known as: I-Worm.Zafi.b (Kaspersky Lab), W32/Zafi.b@MM (McAfee), W32.Erkez.B@mm (Symantec), Win32.Hazafi.30720 (Doctor Web), W32/Zafi-B (Sophos), Win32/Zafi.B@mm (RAV), PE_ZAFI.B (Trend Micro), Worm/Zafi.B (H+BEDV), W32/Zafi.B@mm (FRISK), Win32:Zafi-B (ALWIL), I-Worm/Zafi.B (Grisoft), Win32.Zafi.B@mm (SOFTWIN), Worm.Zafi.B (ClamAV), W32/Zafi.B.worm (Panda), Win32/Zafi.B (Eset)

[ad#ad2-left]This worm spreads via the Internet as an attachment to infected messages, and also via local and file-sharing networks.
It is written in Assembler, and packed using FSG. It is 12800 bytes in packed form, and 33292 in unpacked form.


This Worm seems to be running through email and file sharing sites, One thing it tries to do is stop the process and deletes:
fvprotect.exe
winlogon.exe
jammer2nd.exe
services.exe

It attempts to detect antivirus program files on the computer and overwrite them with a copy of itself.

[ad#ad2-right]It also attempts to conduct DoS attacks on the following sites:

www.2f.hu
www.parlament.hu
www.virusbuster.hu
www.virushirado.hu

This seems to be a very big virus and can be removed with the use of Kapersky Virus removal tool for free for this type of virus. In order to prevent this virus in the future the user has to remember about not getting opening unknown documents or emails and not running any unkown program from an unknown file sharing.   Also remember you need to have an anti-virus  and also a firewall to protect yourself in the future.