Help Support my Blog!

Virgin Mobile USA
Glasses USA
Amazon
Newegg
VPN4ALL
Netflix
Hulu
CafePress

 

Subscribe to Paul’s Tech Talk Affiliate Marketing Blog

Subscribe to Paul’s Tech Talk Science Fiction Blog

Subscribe to Paul’s Tech Talk Scams Blog

  • Acer 11.6
    Acer 11.6" Laptop 2GB 16GB | C710-2856
    Acer

    Currently  in process review this Acer Chrome book and boy is it nice!

Navigation
Sponsors

Entries in Windows (2)

Thursday
Oct242013

How Cryptolocker (Ransomware) gets installed and how to remove it!


Cryptolocker Virus!


I have been watching what has been going on in the past few days and thought it was high time I tell you about this nasty little worm or virus! It has been many months since I have talked about this and I wanted to help you understand how you might of been infected. If you have been infected and want to remove it, you can easily remove it by using Malwarebytes Pro, Which is a sponsor of my blog. The Malwarebytes Blog has some interesting stuff about what this bug really does to your files and what it encrypts!

Drive by download


Some would say it is coming from emails but I suspect it will get much worse before it gets better. If they are making money they will probably start advertising that you have a virus and when you click on the image you will be taken over to actually have the virus or worm as some would call it. It all started when scammers started infecting systems and doing the defederpageblock and others like that. They found they could actually make money by scaring people into paying. I even tried to help people by offering some great Antivirus And Antimalware tools to help fight off this types of infections.

So how are some ways to get infected? The basic ways are simple opening email links if you don’t know the sender. This is the most common approach by any scammer or spammer because you can’t really see where that link is going or even if they are trying to use a script.

Social Media is the next biggest way that you might get infected by clicking links in Twitter, Facebook, LinkedIn, and sites like that. You have to be careful but most of the time you can expand the URL by using a service like LongURL. I sometimes use this to find out where a shortened bitly link or twitter link is going to take me.

Googling or Searching is the next way an attacker would install this type of software on your system. They would just use scripts, known vulnerabilities, to force install or silent install this type of software in your system and if you were using something like NoScript you would be much safer than if you didn’t!

Installing untrusted software can lead to you getting infected by this virus and others if you think you have to have a piece of software for something then please do not use your Windows Admin account to install this on. You should try to see what others are saying about a particular software or application. It isn’t always going to be fool proof but it will at least slow it down.

Now these are a few ways you could get infected if you were trying to get infected with this nasty virus. Which case you would be paying 300 US dollars or 2 bitcoins which is how they want to keep getting paid. So if you don’t want to find your pictures, and important data encrypted, please put them on a recordable dvd and put them up! This would be one step to help fight this little problem.

I havent’ heard if it has infected any Apple, Android, or Linux Operating systems it looks to be primarily Windows Systems. I can assure you it will happen to these other OS in the coming months so don’t think you aren’t immune to this and other malwares or viruses. With Android having exploits in the wild you can bet they will targeted soon to encrypted your contact list and your pictures. This would be my next bet!

Monday
Jul292013

Webhost Deathmatch: Linux Vs. Windows

When you choose a desktop operating system, there is a pretty significant difference between Windows and Linux. The user interfaces are vastly disparate, many applications are designed for one OS or the other and the underlying kernels are worlds apart. The same concept applies for Linux VPS hosting and Windows hosting. While the differences in user experience tends to be lessened because you’re typically working through control panels, and not the operating system proper, you still have features, scripts and technology that one server OS supports that the other doesn’t. Here’s what you need to know.

Script Support

The script languages supported by Windows and Linux differ greatly. Perl and CGI are both difficult to support on Windows, while Windows technologies aren’t supported on Linux servers at all. While the latest Windows server operating system supports PHP, you aren’t guaranteed to have that version of Windows on specific hosts, so confirm the OS version if you want PHP scripts to work properly on a Windows server. Always keep essential script support in mind when you choose the server operating system. Scripting really is the primary decision maker for choosing Windows or Linux, as the two operating systems don’t share a lot of cross-platform scripting support.

Pricing

Linux distributions are generally free and are all open source operating systems. Some distros do require a paid commercial support package, but the pricing and overhead is less expensive than comparable Windows servers, due to Windows’ licensing costs. Windows also depends upon more hardware resources to run properly, requiring a more powerful server than you would otherwise use. Keep your price point in mind, and be aware of the capabilities you’ll get with Windows compared to Linux.

Microsoft Technologies

If you’re using FrontPage extensions, ASP, ASP.NET or .NET, you are essentially locked into a Windows server. Microsoft doesn’t make it easy to use this technology on Linux, BSD or OS X servers, although some emulation is possible. However, performance is not optimal, and it tends to take a lot more time and energy than just getting a Windows server on hand.

Database Technology

Database-driven scripts are common in web applications, and Linux database support covers MySQL technology. It does not, however, cover Access databases or Microsoft SQL. Enterprise-level applications use extensive database technology, and Access is great at handling high volumes of fields and information. If you need a specific type of database, confirm it is compatible with the server operating system you are choosing.

Security

Linux is widely considered a more secure operating system than Windows, mostly because the Linux architecture is not as easy for virus creators to program for. The lack of executable support in Linux prevents standard viruses from working, and security holes are plugged up by the many programmers looking at the open source code. Windows gets attacked by hackers on a consistent basis, and users have to wait for Microsoft to develop and deploy patches.

Which do you prefer for web hosting: Linux or Windows? Tell us in the comments.

Gregory Adams

Greg is a technology and mobile trend freelance writer with a penchant for rollerblading.