Help Support my Blog!

Virgin Mobile USA
Glasses USA
Amazon
Newegg
VPN4ALL
Netflix
Hulu
CafePress

 

Subscribe to Paul’s Tech Talk Affiliate Marketing Blog

Subscribe to Paul’s Tech Talk Science Fiction Blog

Subscribe to Paul’s Tech Talk Scams Blog

  • Acer 11.6
    Acer 11.6" Laptop 2GB 16GB | C710-2856
    Acer

    Currently  in process review this Acer Chrome book and boy is it nice!

Navigation
Sponsors

Entries in PcWorld (10)

Tuesday
May122009

When not to post #twitterpornnames

twitterpornname-security1


I've heard others call this a scam:

twitterpornname-security2


[ad]Now Although I know PCworld has made everyone paranoid that this is a scam.  I want to remind people that it was probably just a for fun.   According to Graham Cluely's blog, He points out why you shouldn't tell people the important information.


I see no evidence this was done to gather your information but Pcworld has sent out the warnings and made people think this was a scam, or a Phishing attack.  Although this could be used to get the information needed for your Gmail or other accounts.


I do recommend deleting those tweets and reminding people that you are the only ones that can prevent identity theft.  Trend Micro talks about this very detail about the subject but again they don't think this was conceived as a phishing attempt.   I'll let you decide but remember tweeting that it is a scam will only keep it on the trends, your best advice is just go on with your life and tell everyone to delete that sensitive information.

Thursday
Jan292009

Do you have the Obama Worm?

So I sit here reading about the Obama Worm from PcWorld. Asking myself what type of worm this is? Here's what I do know, it isn't a malicious intent but it does look like it is something someone thought of this to test out their skills and to make people laugh. This however isn't a well made worm, it seems to slow down systems after awhile and prevents loading up of programs. The Odds of you getting this worm is like Dieing in an Airplane or Very slim according to some researchers.

[ad#ad2-left]It seems to be spreading through USB and therefore should prevent this by disabling Autorun features in your machine, also you should limit the use of external storage devices whenever possible to help prevent infection.  Although currently it seems that the worm isn't detected by any anti-virus software t right now.  There is a screen capture of the Obama Worm in case anyone wanted to see what it looks like.

The Back story is this started at school, and It looks to be only visible on Monday's.  So if you find yourself seeing the face of Obama on the right hand corner of your screen. That is the only way to find out if you have the Obama Worm.   If you want to find out,if you have the worm, the easiest and quickest way is to change the time on your Windows systems to the following Monday and reboot.  IF after you reboot, and you see the head then you will know you are infected or at least that is my theory on discovering it, haven't had a system with the Obama Worm yet but expect it to be really simple to find out.

Right now, Most of the Anti-virus companies are trying to figure out how to detect it and remove it so it will of course be a little while.  The best advice I can give you is to make sure you systems are fully patched to help protect the systems from Malware infestations.
Saturday
Jan242009

Brace for Impact, Brace for Botnet! (Conflicker Worm)

The Worm that has infected 6% of Personal Computers is starting to build into something totally different.  According to some Researchers, they are saying this has to happen soon. And I'll quote:
In any case, today seems better than the day before and we think that growth of Downadup has been curbed. Disinfection of the worm remains a challenge.

[Via F-secure]

[ad#ad2-right]Although this sounds like it has stopped, I don't think so I am sure the worm will get even bigger.   I don't think it has been curbed we might have a rest period before the Worms tries again.
"Why is it taking so long?" asked Huger. "That's what we're all asking." He couldn't recall an attack of this size with such a long lag time between the initial attacks and follow-on downloads of more malware to the hijacked systems.

[Via PcWorld]

Now We know this exploit is being patched as quickly as possible in some areas of the industry but that leaves the question?  What isn't being patched, I am guess the next stage of this worm is mutant into a new worm much like the way it tries to communicate to download new software or instruction.   I believe it will be using a newer exploit so that it can infect even more computers.   I also think it will be a botnet and so does others.
But he also pointed out that the clock is ticking. "If they don't hurry up and do it, someone else will," he said, explaining that hackers must fend off not only security researchers, but also other criminals, who would like nothing better than to pinch a ready-to-use botnet.

[Via PcWorld]

So they are going to use this Downadup Worm soon, I am counting on it.   Somethings for IT professionals to prevent more infections are to make sure you have patched the latest security holes before they exploit that.   Like my favorite program, the Clone of Autopatcher, which you can create a month by month patch DVD to install on all important systems.   IT professionals must not start getting relax, because of people saying it is on the downfall. In nature there are always going to be periods of rest before growth. So I am sure something will happen rather quickly, and probably in the next week or two.
Friday
Dec122008

What is a Virus and Why do I have one

After seeing more and more the updates coming from the net.  I wanted to talk about what a Computer Virus or Trojan is and how you get it.   So how did  you could of gotten a Virus in the first place.   So here are some information to consider:

The vulnerability of operating systems to viruses


So what does that mean to you?  Most of the times when you get a virus you have a vulnerability in some place in your Operating system and it is either something that has not be known by Microsoft, Apple, and Linux or is know as a Zero-day Exploit. [ad#ad2-right]
A zero-day (or zero-hour) attack or threat is a computer threat that tries to exploit unknown, undisclosed or patchfree computer application vulnerabilities. The term Zero Day is also used to describe unknown or Zero day viruses.

[Via Wikipedia]

This is one of the most used because if it is an unknown exploit by the Operating System creators then they have a longer to us the exploit.  Most of the time hackers like to use this because that means there is a possibility of finding even more vectors to infect other systems.  You see if they can get on one system they can then find ways to get on other systems.

In the Old days, you'd ask

How Did I Get This Virus, Anyway?


You get a virus when you copy infected files to your computer, then activate the code inside by running the infected application or opening an infected document. How you copy the infected files is irrelevant: Viruses don't care if you get them as an e-mail attachment, a download, or via a shared floppy disk, though e-mail attachments are the most prevalent (and easiest) mode of transport.

[via PcWorld] (Dated Oct 13, 2000 11:00 pm)

That was before hackers wanted to infect for more personal gains.   There is a list of things that hackers want to get when they Infect a system and it is usually very few things.   In the Old days they wanted the fame but now they want money and to take control over the internet.  They usually want to infect for Money or to have computers become botnets.  Now We aren't talking about the Movie, I Robot.   Once a system becomes a bot it doesn't think for itself but follows a line of command from the Command and Control center.  So lets say we have  several hundred bots on one net, and the hacker blacked mailed a server saying if they didn't pay up they'd get DoS attacked.  With enough bots going to one site at one time can slow or even bring down a site, that is how A hacker sometimes uses a virus or trojan to get into a system.

Viruses & Trojans try to Avoid detection


So you have a virus, it wouldn't do a virus any good to be detected right after getting onto a system.   More and more, viruses are trying to avoid being seen and heard.  Most hackers who program are wanting to infect more than one system so they have to make really sure that you don't find out your infected.    So with that said there are several ways  and I won't try to explain them because I think the link talks about it better than I could.   It however will give people something to think about.


In the next few days there will be another post on How you will be able to figure out if you have a virus.  I had to talk about this first so people could understand how to figure out if you have in the next post.  So stay tuned for more
Tuesday
Dec092008

Google let your work from home with Task Lists!!

As the day go by we have all have tasks, and that means we have to keep a way to remember them.  Google decided to add that to there Google Mail.  Pcworld said it the right way:


[ad#ad2-left]If keeping Gmail open all the time just wasn't enough, Google gave us one more reason to stay glued to our computer screens. The Labs Team have released yesterday a new feature for Gmail - Tasks - basically a To-Do list manager. But besides the usual task list bonanza, the new feature can also associate emails with tasks and create multiple to-do lists.


[Via Pcworld]



[ad#ad2-right]So how do you get that to work.  Pcworld has a great resource for people to find out how to get it to work.   Just think it gives you one more reason to work from home.   Google actually did something quite nice when it comes to mail.   It can even convert email into tasks.  If you know of any good uses of this little feature leave a comment.
Wednesday
Dec032008

Apple's Immunity, Botnet sanctuary.

Apple Immune?  No way!
But is Apple projecting a false sense of security just to save face? Many experts repeatedly warn that all operating systems are susceptible to viruses, and as the Mac becomes more popular OS X will inevitably become a bigger target for malicious attacks.

[via Pcworld]



Having said that I feel the notion that Apple is trying to keep there reputation as a virus free system. I can only hope that they stay that way. Which as much as I know, Apple will most like start to be the main source for botnets, because of the lack of security.



[ad#ad2-right]According to reports on this blog, people are worried Apple stance on it being the safest and having so much immunity to viruses. Apple in the past has stated they have mislead people with there firewall. Yet Apple takes down that suggestion of having an Anti-virus(Quietly).

[ad#digg-left]Everything I've seen suggest that virus writers and Malware writers will MOST likely start targeting the Mac OS X, they know Apple sense of security is Vulnerable to attack and they will exploit it more and more. So what does that mean for Apple, it just means that soon every hacker who has a botnet will want a piece of the Apple Pie and is right now.
[ad#ad2-left]As PC Trojans go, the programming features of RSPlug.E look fairly basic. PC malware is more highly evolved and usually cleverer. But a programmer - probably a Russian - with knowledge of OSX had taken time to create a Trojan that hits Macs instead of PCs, James pointed out.


[via Techworld]


Which looks like it has already begun. So what can Mac users do, get an Anti-virus and maybe Apple will have to start backing down from the Virus commercials and actually admit it. Sooner or later someone will have to challenge Apple to get them to start admitting to it.
Wednesday
Dec032008

Is this Hardcore PC Falcon Northwest Mach V Extreme or not?



[ad#ad2-right]Just saw this on PcWorld Reviews and thought I'd talk about the specs. I would love to get one of these for my self. It comes with:


All these are links are for those who would like to make this computer yourself.   The links are where you could go to buy the parts. The price after you buy the parts are estimated at $7395 price and I think you could get that down to 5000$ if you look for rebates and other incentives.   I wouldn't mind having this computer for gaming myself.   It sure would be nice to give for someone on the holidays.  This would be good for people wh o are looking to computer game developers or people who are into 3D rendering.  Just though I share this little  review with you.   They really did a fantastic review of this product on there site.
Monday
Dec172007

Vista named #1 biggest tech disappointment of 2007 -- by PC World


First PC World gets all up on the soapbox that (until a certain date) the MacBook Pro is the fastest PC the mag had tested, but consider the next step taken: PC World has boldly declared Vista #1 with a bullet in in their Biggest Tech Disappointments of 2007. Ok, sure, we get that it's "disappointments" and not "crappy products" -- the two imply very different things, and it's hard not to be somewhat disappointed by any product that took the better part of a decade to come out -- but if PC World harshing on Vista this bad doesn't smack at all of linkbait, well, we don't know what does. Oh, and here's that link.
I've had a lot of troubles with Vista but seriously who doesn't have trouble with a OS!! Come on, They must only want a Macintosh!
Tuesday
Sep252007

Fifteen Back up programs to save your data!

There's no way around it: Malware happens, drive failure happens, natural disaster happens. If your data isn't backed up, it's gone--or it will require an extremely expensive, not-certain-to-succeed recovery operation.

If all you have on your system are scribblings and unimportant downloads, you might not care. But you probably have something of value: scanned pictures of ancestors, wedding videos, a presentation you worked all week on, the song that's going to make you famous.

It pays to back up, and it has never been easier to do so. No matter what method you're most comfortable with, be it traditional file-based backup, image backup, or continuous data protection, one of the following fifteen tools will do the trick.


http://www.pcworld.com/article/id,137434/article.html



Even though they aren't free I'll still take a look at them to see if I can afford one or two of them.
Monday
Sep242007

20 Vista Downloads to Tweak & Improve Your System

Looking for software to get the most out of Windows Vista? As yet, there hasn't been a flood of great downloads designed specifically for Microsoft's latest operating system. But that didn't stopped us from searching high and low for the best free Vista apps available--and we've come up with 20 real keepers.

For your convenience, we've arranged them into four categories: System Tweakers; Startup, Log-On, and Boot Tweakers; Vista Component Tweakers; and Miscellaneous Tools. So if you've got Vista and you're longing to make it better, rev up your browser and start downloading.

System Tweakers

Want to bend practically every aspect of Vista to your will, from improving system performance to customizing the interface? Then try out the following six system tweakers. With them, you'll be the master of your own private Vista universe.


http://www.pcworld.com/article/id,137214/article.html

I will have to check this out, some are paid programs but some are also free.