Help Support my Blog!

Virgin Mobile USA
Glasses USA
Amazon
Newegg
VPN4ALL
Netflix
Hulu
CafePress

 

Subscribe to Paul’s Tech Talk Affiliate Marketing Blog

Subscribe to Paul’s Tech Talk Science Fiction Blog

Subscribe to Paul’s Tech Talk Scams Blog

  • Acer 11.6
    Acer 11.6" Laptop 2GB 16GB | C710-2856
    Acer

    Currently  in process review this Acer Chrome book and boy is it nice!

Navigation
Sponsors

Entries in list (16)

Monday
Dec292008

Twitter Spam bots are hot to trot: http://gentai.com/revenge1

Ok so I was curious why I all of the sudden got people joining my list. each one I look at just to see who these people are have only one twitter message saying this from two different accounts:
twitbot3

and this one also


twitbots2

and once you click that link it takes you to this website and see what they want you to do:


twitterbots
These people are trying to get you to click on there links and [ad#ad2-left-1]get you give them email accounts.  This has been socially engineered to look like it is real.  I gave them a 10 min email account to see what they sent me.  It was a link to there porn site.  Wanting me to give them my credit card or checking account information and to join there site.  I don't think so, not this old dog.   Anyways if you get this spam from a user you might just want to block these people.  Some of these people have followers.  Hmm I don't know about these people.  I guess they want you to send an email to other people to spam them also.  How nice of them to social engineer this scheme so you can make your friends and family mad at you and probably not even talk to you.   So that is why it is good not to auto-follow people when they subscribe to your twitter account.   Some people have that set.  Some people just don't learn. I am sure some people will like this site for other reasons but please don't spam people with this little site. Please don't put people on that list.

Thursday
Dec182008

Disaster preparation 101 -- Data backup

In this one I will talk about Disaster, it happens to all of us from time to time. A fire, a earthquake, a stolen laptop or any number of ways. So what happens to your data, is it stored on the laptop? Is it important very sensitive data? Could you get fired if you lost that data?

[ad#ad2-right]These are all questions you must ask yourself when you have laptop. How do you backup your data or even do you have a backup? Having seen this with my own clients, I must wonder if there are people out there who just don't care. I had a client the other day who gotten a virus and this was a really mean virus. Deleted some very important files when you tried to clean the virus out. She called me in a panic because she couldn't load up windows? I asked if she had any backups, she said "what's a backup" . So I sat there discussing this with the client for over 20 minutes. Finally she started to understand, she said she had the OEM Backup DVD but nothing else. She also said she needed help with getting data off the computer. I told her that I would be able to come the next day and I was lucky the virus didn't do anything else to her data. We were able to retrieve the data from her system. That is where I start my rant , Why would anyone not have backup of there most important data?

So How do you backup your data? This is controversial and somewhat depends on how much people want to spend to keep there data safe and not loose pictures or music. There are several ways to do it, each way has it's pitfalls or short comings and requires a little more effort:

Kinds of Backup


Hard Medium - DVD, CD, External Hard drive

Although,  The hard medium is usually used that doesn't mean you can have a backup other than hard.   Here are some ways to back up on the internet.

Internet Medium:

  • Jungle Disk -- Provides online storage through the Amazon s3 service.   Only pay for what you use.   It works well with most Operating system.  I've used it on Vista so it is really nice.

  • Carbonite Online backup --Another good Online storage.

  • Some Other Online backup -- Here a list from Amazon to better help you find the type of software that you might need.


These are just a few options, if you want to look for other you can.  The important thing to do is BACKUP because if you need some data that gets wiped or destroyed.  You will be kicking yourself for not backing up.
Friday
Dec122008

What is a Virus and Why do I have one

After seeing more and more the updates coming from the net.  I wanted to talk about what a Computer Virus or Trojan is and how you get it.   So how did  you could of gotten a Virus in the first place.   So here are some information to consider:

The vulnerability of operating systems to viruses


So what does that mean to you?  Most of the times when you get a virus you have a vulnerability in some place in your Operating system and it is either something that has not be known by Microsoft, Apple, and Linux or is know as a Zero-day Exploit. [ad#ad2-right]
A zero-day (or zero-hour) attack or threat is a computer threat that tries to exploit unknown, undisclosed or patchfree computer application vulnerabilities. The term Zero Day is also used to describe unknown or Zero day viruses.

[Via Wikipedia]

This is one of the most used because if it is an unknown exploit by the Operating System creators then they have a longer to us the exploit.  Most of the time hackers like to use this because that means there is a possibility of finding even more vectors to infect other systems.  You see if they can get on one system they can then find ways to get on other systems.

In the Old days, you'd ask

How Did I Get This Virus, Anyway?


You get a virus when you copy infected files to your computer, then activate the code inside by running the infected application or opening an infected document. How you copy the infected files is irrelevant: Viruses don't care if you get them as an e-mail attachment, a download, or via a shared floppy disk, though e-mail attachments are the most prevalent (and easiest) mode of transport.

[via PcWorld] (Dated Oct 13, 2000 11:00 pm)

That was before hackers wanted to infect for more personal gains.   There is a list of things that hackers want to get when they Infect a system and it is usually very few things.   In the Old days they wanted the fame but now they want money and to take control over the internet.  They usually want to infect for Money or to have computers become botnets.  Now We aren't talking about the Movie, I Robot.   Once a system becomes a bot it doesn't think for itself but follows a line of command from the Command and Control center.  So lets say we have  several hundred bots on one net, and the hacker blacked mailed a server saying if they didn't pay up they'd get DoS attacked.  With enough bots going to one site at one time can slow or even bring down a site, that is how A hacker sometimes uses a virus or trojan to get into a system.

Viruses & Trojans try to Avoid detection


So you have a virus, it wouldn't do a virus any good to be detected right after getting onto a system.   More and more, viruses are trying to avoid being seen and heard.  Most hackers who program are wanting to infect more than one system so they have to make really sure that you don't find out your infected.    So with that said there are several ways  and I won't try to explain them because I think the link talks about it better than I could.   It however will give people something to think about.


In the next few days there will be another post on How you will be able to figure out if you have a virus.  I had to talk about this first so people could understand how to figure out if you have in the next post.  So stay tuned for more
Tuesday
Dec092008

The Important Windows patches Released Today

As many of you know we talked about the Non-critical patches that Microsoft will release today.  IF you want to read those please go and check it out.   I'll be talking about the REALLY important ones that Microsoft has kept tight until now.    These are the more important ones but I will list the ones that I previous talked about to better help people recognize the non-important ones:



[ad#ad2-right]
  • KB955839

  • KB957388

  • KB890830

  • KB905866

  • These are just the tip of the iceberg. although this list are not A lot.  I'd wanted to let people know about what people coin "Exploit Wednesday".  I really don't know if this is a Myth or actually does exist but I'd figure we discuss the problems associated with installing the critical updates and try to tell you which ones should be installed As soon as possible.  Though people have in the past used a Virtual Machine to see if there is any problem, that should be your first step if you don't want to have any problems with these updates.  I don't suggest testing it more than a couple days.  Here are some good Virtual Machine software to try out yourself:




    Here is the list of updates that are critical that Microsoft released today.   Each one of these are quite important and should be considered installed when you get a chance.


    [ad#ad2-left]Microsoft Security Bulletin MS08-073 - Critical
    Cumulative Security Update for Internet Explorer (KB958215)

    This security update resolves four privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.



    Microsoft Security Bulletin MS08-071 – Critical
    Vulnerabilities in GDI Could Allow Remote Code Execution (KB956802)

    This security update resolves two privately reported vulnerabilities in GDI. Exploitation of either of these vulnerabilities could allow remote code execution if a user opens a specially crafted WMF image file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.



    [ad#ad2-right]Microsoft Security Bulletin MS08-075 – Critical
    Vulnerabilities in Windows Search Could Allow Remote Code Execution (KB959349)

    This security update resolves two privately reported vulnerabilities in Windows Search. These vulnerabilities could allow remote code execution if a user opens and saves a specially crafted saved-search file within Windows Explorer or if a user clicks a specially crafted search URL. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.



    KB952069
    (not quite sure what this one is, when I go do a Google search this is what pops up. It was in German but Google translated it for me)

    In the Windows Media Runtime to the default in Windows XP SP3 contains Windows Media Player (WMP) 9 were discovered vulnerabilities that could allow an attacker to compromise your Windows-based system and gain control over it. See Security Bulletin MS08-076 ( englisch bzw. deutsch ) See Security Bulletin MS08-076 (English or German)


    These are just ones that I found and wanted to let you know, the others have been explained on the other article.  So check them all out and I suggest installing them quickly as possible.

    Tuesday
    Dec092008

    Google let your work from home with Task Lists!!

    As the day go by we have all have tasks, and that means we have to keep a way to remember them.  Google decided to add that to there Google Mail.  Pcworld said it the right way:


    [ad#ad2-left]If keeping Gmail open all the time just wasn't enough, Google gave us one more reason to stay glued to our computer screens. The Labs Team have released yesterday a new feature for Gmail - Tasks - basically a To-Do list manager. But besides the usual task list bonanza, the new feature can also associate emails with tasks and create multiple to-do lists.


    [Via Pcworld]



    [ad#ad2-right]So how do you get that to work.  Pcworld has a great resource for people to find out how to get it to work.   Just think it gives you one more reason to work from home.   Google actually did something quite nice when it comes to mail.   It can even convert email into tasks.  If you know of any good uses of this little feature leave a comment.
    Sunday
    Dec072008

    Facebook : Beware Spam for breakfast. (Virus)

    In today's society, we've been to complacent with people with people clicking links for the social group. In one such article on Channel Web, a nice little blog, says this:
    [ad#ad2-right]


    The worm was discovered by IT security provider Kaspersky Lab, which said the threat, Net-Worm.Win32.Koobface.b, is targeting Facebook users by creating spam messages and sending them to the infected user's friends via the site.

    "Unfortunately, users are very trusting of messages left by 'friends' on social networking sites," said Alexander Gostev, senior virus analyst at Kaspersky Lab, in a statement. "So, the likelihood of a user clicking on a link like this is very high."


    [Via Channel Web]



    This seems to be a problem people thinking that a link someone sends them is a real good link but actually is a link to a video site. According to this article the links people are sending are actually a fake video link, telling you have to download some update to flash player, by downloading this program. The user gets involved with the virus and the fun begins. So how can you prevent this from happening, two ways one is a very good group of software to make sure you have the latest and greatest video codecs. That too can be something they'll say you need and if you've already installed this list of codecs then you know they'll not telling the truth and you can quickly get away from the site laughing.


    [ad#ad2-left]What's this program name, it is call the K-lite Mega Codec pack. In this Pack you will be able to play almost everything without having to go download another program. This is done by people who want you to have all the latest codecs installed so you don't have to go by a program you'll only going to use once a month.



    Once you've done that, you'll no longer have to worry for the most part about codecs. There will be times when you might have to visit that site and update them but that will be far less.


    The other thing you must remember is if it says you must update your player. That should be a sign that there is something. I'll always go to the site and check for example Adobe. If it says I need to update my flash I'll manually type it into my browser. This way you will know you have the latest updates, if you need to update the flash player by all means go to here and update.


    If you got the virus I'd check out my Anti-virus and Anti-Spyware page and that should show you will you need to get rid of the Virus. This virus is very easy to get rid of, just download any one of the anti-virus software and install it. Don't forget to update the virus database while your at it. That should fix the problem pretty fast. Remember the only way to prevent from getting the virus is YOU.

    Thursday
    Dec042008

    Viacom and ATT layoff some people. (12,850 People)

    Today, we are announcing a company-wide restructuring plan that includes staffing reductions in all divisions. This will result in a reduction of our worldwide workforce of approximately 7 percent, or about 850 positions. We are also suspending salary increases for the Company's senior level management in 2009. In addition, after a comprehensive review of our operations, we will write down certain programming and other assets. These three actions will bring us significant cost savings and other efficiencies.



    [via Gawker]



    [ad#ad2-left]This is a Sad day for the telecommunications industry both AT&T and Viacom are laying off people. According to reports Viacom will lay off around 850 people. ATT will layoff 12,000 Jobs. Here's the quote from Associated Press:



    AT&T Inc. joined the recession's parade of layoffs Thursday by announcing plans to cut 12,000 jobs, about 4 percent of its work force.



    [Via Associated Press]



    So in all today total that is 12,850 people who are going to be laid off. This is another set of layoffs but isn't the last to see the whole list of of Layoffs in the Tech industry that I've talked about please click this link. You may find some usefull tidbits if you search my blog enough, I've got some great tips on getting hired and what you should do to be prepared.
    Tuesday
    Dec022008

    You asked for it, Now it's real -- Vista SP2 Dec 4,2008

    Beginning Thursday Dec. 4th, we will be making the Windows Vista and Windows Server 2008 Service Pack 2 Beta available to everyone through a Customer Preview Program (CPP). The CPP will launch on TechNet and be available to anyone interested in trying out this service pack. The CPP is intended for technology enthusiasts, developers, and IT Pros who would like to test Service Pack 2 in their environments and with their applications prior to final release. For most customers, our best advice would be to wait until the final release prior to installing this service pack.

    [Via Technet]



    [ad#ad2-right]Yes you heard right, you can get into the Beta of Vista SP2 and not have to wait till April.  Some things to remember:

    • It is a Beta

    • It will Have Bugs

    • It is for people who want to test it out

    • It should only be installed for people who need to test it out


    Some of the changes that they are going to incorporate into Sp2 are support for new types of hardware and emerging standards that will grow in importance in the coming months.  The complete list of changes can be found here.   I will be testing this out sometime this weekend to give it a full thorough check out.   I will give a report later on this month possibly first part on January I would like to give it a complete test.   To test it out yourself, check out this link for directions on how to download it.
    Saturday
    Nov292008

    Spying on Spyware.ISpynow!!

    [ad#digg-right]This is another Virus that is going around and thought I'd tell you about it:
    Spyware.ISpyNow monitors files, network traffic, and keystrokes. This Spyware gives the person who installed it a Web-based interface with summaries of logged information on the host computer.

    [Via Symantec]



    [ad#ad2-left]Now this one isn't to hard to figure out what happened.  You have to manually install it on your system to get infected.  Symantec has a great way on uninstalling this annoyance.  I also suggest checking out my other program list just in case you don't want to buy Symantec Anti-Virus programs.  Some other things to check out is:

    This is just the beginning in getting your system clean.  You have to keep all you programs up to date and one way I do that is with Appsnap.  This little program keeps you programs up to date from Virus to Firewall.  I hope this helps people prevent and control spyware.
    Friday
    Nov282008

    Some good CyberMonday Sites to look at for 2008!

    I was just getting done with that story about the Walmart Stampede, and thought I would encourage people to check these good sites for people to check out for great deals.   I have been looking through sites combing for some great sites to find the best deals and here they are:

    [ad#ad2-right-1]

    • Dealio -- Dealio will not only show you sneak peaks at Cyber Monday ads, but we will also send you directly to the store so that you can purchase the often limited inventory Cyber Monday deals before they disappear. Best of all, there is no need to hop from site to site – Dealio has all your Cyber Monday shopping covered.

    • CyberMonday -- Shop hot holiday deals from more than 500 merchants. All of Shop.org's proceeds from CyberMonday.com support the Ray Greenly Scholarship Fund.

    • Cybermonday Mahalo Deals -- This Mahalo page collects links to websites offering information and discounted merchandise for Cyber Monday.

    • Best Cyber Monday Sales --Well, I finally put together a list of the top retailers throughout the country with links directly to their Cyber Monday deals.

    • Shopzilla --  The company's mission is to enable shoppers to quickly and easily find compare and buy anything, sold by virtually anyone, anywhere. Each month, Shopzilla connects millions of consumers with thousands of stores.


    These are just a few that I could find and wanted to let people decide where they would like to go!!
    Monday
    Nov102008

    Antivirus Professional 2008 uses Scare tactics

    [ad#ad2-right-1]
    We came across a rogue today called Antivirus Professional 2008 that uses GeoIP Lookup as part of its scare tactics. This site uses Flash and script to create the effect of an online scan, that then attempts to push an installer at the visitor. The NoScript extension for Mozilla Firefox is an excellent way to mitigate against this kind of garbage.

    [Via F-secure]



    It seems that there is a site out there, that seems to be trying to scare you into downloading there software. If you have any questions about this site please feel free to check out what I've found out:
    Registration Service Provided By: ESTDOMAINS INC
    Contact: 1.3027224217
    Website: http://www.estdomains.com
    Domain Name: ANTIVIRUS-ONLINE-SCANNER.COM
    Registrant:
    N/A
    Serento faloimitator@list.ru


    Minskay str. 27-14
    Kiev
    Kiev 237293
    UA
    Tel. 044.2901732
    Creation Date: 07-Jun-2008
    Expiration Date: 07-Jun-2009
    Domain servers in listed order:
    ns2.antivirus-online-scanner.com
    ns1.antivirus-online-scanner.com
    Administrative Contact:
    N/A
    Serento faloimitator@list.ru


    Minskay str. 27-14
    Kiev
    Kiev 237293
    UA
    Tel. 044.2901732
    Technical Contact:
    N/A
    Serento faloimitator@list.ru


    Minskay str. 27-14
    Kiev
    Kiev 237293
    UA
    Tel. 044.2901732
    Billing Contact:
    N/A
    Serento faloimitator@list.ru


    Minskay str. 27-14
    Kiev
    Kiev 237293
    UA
    Tel. 044.2901732



    [ad#ad2-right]Now as you can see this site is located in Russia, and if that's the case it is probably some virus itself to take control of your system to do what they want with it. So you best advice is if you think you have a virus then check out my recommendations these are all free to download and try. Unlike this site, they are legitimate and actually do what they promise.  If you want to email them you can but It don't think it will help.

    *UPDATE on that Website*


    According to F-secure that site is now Suspended.  Great job guys.  We are now fighting these people even better than I'd thought.
    Monday
    Nov032008

    Peek Email tops Time Gadget of the Year!



    [ad#ad2-right]I've not seen this yet, I will do my research on this Peek Email Device. This is fascinating that I didn't know that there was something I've never heard of.   Anyways, I can't beleive they don't have a netbook or the new Gaming Laptop.  Please, a WII fit, Now how did they get there too?   How did The T-Mobile G1 get number 5th in the list.  I'm surprised that the GameBoy Advanced wasn't one to be on there, After all they sold so many this year.   Why not the Xbox 360?  It seems people can still vote but don't expect anything to change.

    Go Vote and lets make our voice heard!!
    Monday
    Oct202008

    What's with Google trends?

    Having been going to the Google Trends and keeping watching.  I am starting to wonder something?  Take a look at this and you tell me?

    Oct 20,2008 Google Trends



    [ad]Can you see how someone might use this to create a Goog-411 and use it to promote there website? It is all about the hits and getting what publishers like to say the eyes on a website. Now is that going to confuse people or make people not want to come to a site.  So how would people abuse this?

    Very Simple, they'd watch what is trending and post accordingly.  Now you as a reader would click on the website expecting to see what you want to see but instead it would popup with advertisements and maybe malware?  Check these links to better understand it:

    [ad]
    Now even though these are just a few.  You can see how someone might want to abuse it and get there site up on Google trends and be able to infect several to even millions of computers before Google sees that or stops.  You could in theory take over a website high in Google rankings and do exactly that.


    Then I have to ask myself, why would hackers want to do it in the first? One they'd be able to direct people to sites that they could use to phish your information, or maybe make money by you going to these sites. It is all about money, I don't say that lightly, but it seems to always be true.

    So what is Google doing to prevent this? is it right to use Google for your advantage? Do we need it for anything other than to see what people are looking at? Is that a form of them tracking your every click.

    [ad]
    Are you comfortable with them keeping the list of what people searched for last year? if you don't believe me, go check it out yourself. These are important questions to answer and should be explored.