Help Support my Blog!

Virgin Mobile USA
Glasses USA
Amazon
Newegg
VPN4ALL
Netflix
Hulu
CafePress

 

Subscribe to Paul’s Tech Talk Affiliate Marketing Blog

Subscribe to Paul’s Tech Talk Science Fiction Blog

Subscribe to Paul’s Tech Talk Scams Blog

  • Acer 11.6
    Acer 11.6" Laptop 2GB 16GB | C710-2856
    Acer

    Currently  in process review this Acer Chrome book and boy is it nice!

Navigation
Sponsors

Entries in IOS (2)

Thursday
Oct242013

How Cryptolocker (Ransomware) gets installed and how to remove it!


Cryptolocker Virus!


I have been watching what has been going on in the past few days and thought it was high time I tell you about this nasty little worm or virus! It has been many months since I have talked about this and I wanted to help you understand how you might of been infected. If you have been infected and want to remove it, you can easily remove it by using Malwarebytes Pro, Which is a sponsor of my blog. The Malwarebytes Blog has some interesting stuff about what this bug really does to your files and what it encrypts!

Drive by download


Some would say it is coming from emails but I suspect it will get much worse before it gets better. If they are making money they will probably start advertising that you have a virus and when you click on the image you will be taken over to actually have the virus or worm as some would call it. It all started when scammers started infecting systems and doing the defederpageblock and others like that. They found they could actually make money by scaring people into paying. I even tried to help people by offering some great Antivirus And Antimalware tools to help fight off this types of infections.

So how are some ways to get infected? The basic ways are simple opening email links if you don’t know the sender. This is the most common approach by any scammer or spammer because you can’t really see where that link is going or even if they are trying to use a script.

Social Media is the next biggest way that you might get infected by clicking links in Twitter, Facebook, LinkedIn, and sites like that. You have to be careful but most of the time you can expand the URL by using a service like LongURL. I sometimes use this to find out where a shortened bitly link or twitter link is going to take me.

Googling or Searching is the next way an attacker would install this type of software on your system. They would just use scripts, known vulnerabilities, to force install or silent install this type of software in your system and if you were using something like NoScript you would be much safer than if you didn’t!

Installing untrusted software can lead to you getting infected by this virus and others if you think you have to have a piece of software for something then please do not use your Windows Admin account to install this on. You should try to see what others are saying about a particular software or application. It isn’t always going to be fool proof but it will at least slow it down.

Now these are a few ways you could get infected if you were trying to get infected with this nasty virus. Which case you would be paying 300 US dollars or 2 bitcoins which is how they want to keep getting paid. So if you don’t want to find your pictures, and important data encrypted, please put them on a recordable dvd and put them up! This would be one step to help fight this little problem.

I havent’ heard if it has infected any Apple, Android, or Linux Operating systems it looks to be primarily Windows Systems. I can assure you it will happen to these other OS in the coming months so don’t think you aren’t immune to this and other malwares or viruses. With Android having exploits in the wild you can bet they will targeted soon to encrypted your contact list and your pictures. This would be my next bet!

Tuesday
Sep032013

I'll Explain Why Software filters will not work!  

Wise Eyes

I recently found Covenant Eyes

Use Coupon Code paulstechtalk15 and save 15% off your order!I really wasn’t sure when I heard this service, if it would be a very useful way to keep children from seeing mature material on the internet.   After all, If a child wants to do something they will find ways to do it.   I did however want to touch base on a few observations on why this will never work with some of the kids.   It might work with your kids but probably not all kids!

At first glance!

We see that in order to use this software, as with a lot of other software base monitor services, you will need to install software on the computer(s), Tablet(s), and all Cell Phone(s) you currently have possession of all.  Which is all free as long as you have an account with them.   I do find their methods a little questionable and I understand why it would be rather difficult to uninstall some of this but it just worries me that it will either slow down my Android device(s) or break something.   It is after all another program that I have to keep running on my devices to monitor what my kids are doing on the internet.  

Ownership of the Device!

This can be a bit tricky and could cause major legal issues if you do it wrong or if you do not own the device in question.   After all, the teen may get it in his head to avoid being watched by his/her parents he can just buy a Virgin Mobile, or Straight Talk Phone and not have to install that particular software!  This is one major reason why it wouldn’t work buying this subscription. It just depends on what the law says in your area if you can force your teen who buys a phone to install this software on their phone.  

Probably Easily by passable!

You can easily prevent snooping by using a VPN like Vpn4all to prevent anyone from seeing what you do online.   I am sure like any other software based companies they are utilizing a server to grab all this stuff you are searching and surfing habits.   I am pretty sure just using a VPN on your tablet or even cell phone would prevent the logging and keep people from seeing what you do.   This hasn’t been tested but it does make a lot of sense because in order for any filtering software to report back to the main user it has to be able to see what you are typing and searching for but if it is encrypted, it shouldn’t be able to.   I do not know if they install their own Certificate Authority but it maybe a way they try to get all encrypted data.   Although if it is encrypted before it gets sent out to the CA, then it will still look unreadable.

On a laptop or desktop, it could be as easy buying a USB Drive and installing Kubuntu or Ubuntu as a live CD and Thus they can do all their exploring of the internet without being watched.   The only problem about this is that you as the main Admin would need to password locked your CMOS and prevent any loading of USB or CD drive in boot up.  You’ll have to figure that one out on your own.   Each CMOS is different and there for it is a complicated process!

Reseting a Device!

This can be the easiest way to get that monitoring software off the system in the first place.   I can easily do that with any Android device and you can do a hardware reset without any administration intervention!  You can basically do this to all Android and IOS devices with no help from the admin of the device.   So it really could be a pain to use these types of services for kids who are shall I say AT RISK to do the most exploring.  I’ve pretty much told you everything that could happen if a teen wanted to not be monitored by their guardians or parents.  

As I’ve stated in this post, it is to show how someone could do these things.   I hold no liability if someone uses this information to do what was talked about in this post.   This was a way to open people’s eyes on how it may or may not help your situation.   Each child is different and thus must be judged accordingly.