Sunday, November 26, 2006

Dig a hole through the earth

If you dig a hole "clear through the earth", will you really come out in China?

Find out with this very clever Google Maps mashup by a Brazillian developer.

Clever and fun.

Saturday, November 25, 2006

Zoom vs. text size in IE 7

Internet Explorer 7 has many new features to help you as you surf. One I like is the "Zoom" feature.

First, let's be clear. "Zoom" is not the same as "Text size" in IE 7. Changing the text size does only that -- increases or decreases the size of the text on the page. If what looks like text is really part of an image, it does not change. "Zoom" make the entire page enlarge or shrink. That also means that as you enlarge the page, it will (usually) eventually exceed the window area and the left and right parts of the web page will be "cut off" in the view.

So text size and zoom each have their uses.

In the lower right of the (bottom area) status bar, you see a zoom percentage. You have several options to changing the "zoom": level

  • Click on the zoom number. This rotates through a three zoom levels (125%, 150%, 100%).
  • Click on the down-arrow to the right of the zoom percentage, then select one of the set levels you want to view or choose "Custom view".
  • If you have a wheel mouse, hold down on the keyboard's "Control" key (often marked "Ctrl") and rotate the mouse wheel. Rolling toward your body decreases the zoom by 10%. Rotating the wheel away from your body increases the zoom by 10%.
  • Hold down on the Control key and then press the plus (+) or minus (-) key to zoom in or out by 10%.

Friday, November 24, 2006

Family-proof your PC

Family members vary in the degree of risky computing behavior they perform. You can help lessen the chances of getting infected by taking the below steps:
  • Create a separate user account for each family member.
  • Only assign the type account really needed. Try to use "User" level for most. Assign "Power User" with caution.
  • Never sign on and do normal work with an account that's a member of the "Administrators" group.
  • Take the offensive against possible attackers. Install software that monitors and protects the computer. Many such basic software programs are free. The gamut includes general security monitors, security scanners, antivirus software, antispyware, and firewalls.
  • Protect surfers. Configure privacy and security settings in the user's browser (each user has their own settings). Use a program like McAfee's SiteAdvisor, which gives sites a color-coded safety rating.
  • Upgrade to the latest version of your browser. This is especially important if you use Microsoft Internet Explorer. Version 7 is more secure and nicer to use that prior versions.
  • Use filtering software (aka Parental Controls) for your kids.
  • Teach each user. Explain why opening messages from strangers is not a good idea, for example.

These tips are based on an excellent article, "How to family-proof your PC", by Jessica Dolcourt, CNET Download.com.

Tis the season ... to be paranoid

It's OK to be paranoid if people really are out to get you. And that's the case with "greeting card" attacks. As the Christmas season nears, the number of attacks involving faked greeting cards rises.

The attack arrives in your inbox as a message (perhaps looking like it's from a friend) with a link to a "Greeting Card". If you click on the link, you may even see some sort of online greeting. But along with the greeting comes a Trojan. You have been attacked.

Prevention tips:
  • Don't open email messages from strangers
  • Don't assume a message from a friend is really from that person, especially if it has links or an attachment you didn't expect to receive.
  • If you get a message like above from a friend, send them a separate email and ask if they really sent the one with the link or attachment.
  • Don't "reply" to a suspicious message -- you could be replying to the attacker.
  • When in doubt, delete.

Saturday, November 04, 2006

Recent science-related news

It's a bit off-topic, but here's a motley collection of recent web and science-related news links...

Saturday, October 28, 2006

Neat gadgets

The Cyberguys site, which I like a lot, has some more neat gadgets (I choose to get emails about the latest offerings).

If you like to check out new computer-related gadgets as much as I do, you may want to bookmark the "New items" page at Cyberguys . Happy online "windows shopping".

Friday, October 27, 2006

How to buy online more securely

You wouldn't mail an unsealed envelope because anyone with access to it could read the contents. And they just might steal the information or contents. So remember to take precautions when you are online. Here are a few:
  • Make sure that you only buy products or services, pay bills, or provide personal data from a secure web page. This means the website encrypts the information.
  • Check the web address in the browser's address bar. A secure web server address should start with "https://" ("s" for secure) rather than the normal "http://".
  • Look for a "padlock" icon in the browser's status bar (in the lower right in Internet Explorer). Check the encryption level by hovering your mouse pointer over the icon.
Tip: You can find more detailed information about the security and encryption level of the site you are viewing by double-clicking on the lock icon in the location bar and viewing the
tabs (General, Details, and Certification Path) in the pop-up.
By the way, just because a website uses encryption doesn't mean it's legit. Malicious sites can mimic "good" ones and use encryption too. Be cautious. Be paranoid. It's OK ... your money and identity is at risk.

Friday, October 06, 2006

Hold on to Windows XP?

You may want or need to hold on to Windows XP instead of upgrading to Vista. If so, you should know that you can still get some of the benefits of Vista by adding on to XP. Here are some cool add-ons, (courtesy of an article by Paul Thurrott's SuperSite for Windows). These are free unless a price is listed. Read Paul's article for a more in-depth review of each category.

Saturday, September 23, 2006

Clean up Windows files and folders

Fred Langa, author of the LangaList newsletter, offers great tips. His 2002 series on cleanup of multiple versions of Windows is still a classic. The linked page contains:
  • Basic cleanup for all versions of windows
  • Advanced cleanup batch file (Win 9x)
  • Advanced cleanup for other versions of Windows (including XP)
  • Sageset tips
  • Sagerun tips
  • Cleaning of temporary files folders
  • Advanced use of cleanup commands
At both work and home I use a custom version of "cleanxp.bat". It's fast and handy. You wouldn't believe how many problems it "magically" fixes. I often tell clients to exit from all programs and then run it before trying more advanced troubleshooting. Too many programs leave behind temporary files that they should delete when you close them.

Fred's LangaList newsletter comes in two versions -- free and an inexpensive paid ("Plus") version. It's available in varied emailed formats as well as on the web. The Plus version gets you even more juicy tips. Oh ... and despite coming from New Hampshire, Fred doesn't take anything for granite.

Friday, September 15, 2006

Google fun!

There are a bazillion ways to enjoy Google. Now there's a book, "55 Ways to Have Fun with Google", that lets others in on Google entertainment.

This unique book is available as a purchase or even as a free PDF or MS Word download. Just make sure you read the Creative Commons license.

Friday, September 08, 2006

HP printer power cord recall

If you have an HP printer in one of the following series (at work or home), check whether the power cord has been recalled.
  • DeskJet 800 series
  • DeskJet 900 series
  • PhotoSmart 1000 series
  • PhotoSmart 1100 series
  • PhotoSmart 1200 series
  • PhotoSmart 1300 series
HP power cord recall page

Thursday, August 17, 2006

Share your firewall log

The DShield organization, which appears affiliated with the SANS Internet Storm Center, collects information about what attacks are being seen at computers. If you have a broadband internet connection (DSL or cable modem), you really need a firewall. And if you have a firewall, it should be set to generate a log of incoming and outgoing communication attempts.

The DShield site puts received data into a database so they can analyze attacks. They also have a list of how to send the data for various firewalls. The site also has links to third-party solutions.

DShield describes this as a distributed intrusion detection system, since tons of people pitch in from all over the globe.

Wednesday, August 16, 2006

Create a healthy computer work environment

Computers are everywhere and we spend a ton of time using them. But we often neglect to take care of our bodies, which hammer away at keyboards, tenaciously gripping mice, and sitting uncomfortably for long periods of time -- all the while staring at flickering monitor screens.

About.com has a series of pages with tips to reduce strain on your body while you use your computer. Give yourself a break (literally). Take these tips to heart and enjoy a happier, healthier life.

Please note that About.com has pop-ups on nearly every page. So if you don't want to see them, enable your pop-up blocker before clicking on a link below.

Wednesday, August 09, 2006

Intel Centrino Wireless driver security vulnerability

The Microsoft Windows drivers for the Intel 2200BG and 2915ABG PRO/Wireless Network Connection Hardware have a secuity vulnerability and should be patched.

How do you tell if you need this? Use Device Manager:
  1. Select the Start Button
  2. RIGHT-click on "My Computer"
  3. Select "Properties" from the pop-up menu.
  4. Select the "Device Manager" button
  5. Expand the "Network adapters" section if it's not already expanded.
  6. If either of the above adapters shows in your list, RIGHT-click on the adapter and then select "Properties"
  7. Select the "Driver" tab and note the Driver version.
The Intel site has the wireless driver patch and more details.

Saturday, August 05, 2006

Like emerging technology? Read a blog

Reuters (the news people) have an interesting "Emerging Technology" blog. If you're a technology news junkie, add this one to your list. And here's a few more, in no particular order. Surf. Enjoy.

Friday, August 04, 2006

Fake Google toolbar spreads virus

Surf Control reports that computer hackers are now using a Google Toolbar look-alike application. The fake app tries to lure you into installing a malicious program. Be paranoid. Be very, very paranoid.

Monday, July 31, 2006

More neat gadgets

The CyberGuys site intrigues me more every day. They seem to stock a lot of specialty items related to the electronic age. Here are some of the latest items that seem quite useful as well as unique:
  • Plusdeck2c - converts cassette tapes to MP3 format. Put them on an MP3 player, computers, USB stick ... whatever. Music to go. And the sound doesn't get scratchier with age! Coming in September will be a similar type product for records, the Ion USB Turntable.
  • Retractible USB file transfer tool. Transfer files directly from computer to computer (or notebook to PC). The included file transfer software automatically starts after both USB cables are plugged in. Just drag and drop files or folders.
  • DVD/CD Carousel. Remember slide carousels? Same principle. The unit holds 150 CDs or DVDs. Inventory software uses a database to let you find and access files on any CD in the carousel. You can even stack carousels.
  • Power Station Organizer. This handy unit gets you gang three charger units and hide the AC/DC converter and cord mess. It includes cable ties and allows for larger chargers. Got an iPod, handheld computer, cell phone, or similar? Charge any three of them all at one efficiently organized unit and use only one electrical wall outlet.
  • Laptop as desktop unit. The laptop organizer lets you raise up your notebook to a better height for viewing its screen when you're using it on a desktop surface. If you use a notebook as your only computer, check this out.

I have only bought one item from them (so far), but the online ordering process was painless and it arrived quickly. You may opt in for emailed "flyers" of new and sale CyberGuys items ("exclusive email specials"). I chose to get them.

"Safety" reminder: Some sites might sell your email address. Others may have less than the best security and hackers capture client email addresses without the company knowing it. Use either a separate or a "throw away" email address to protect your main email address from spam accidentally (or deliberately) triggered by ordering online. This is an online "Best Practice", not a comment on the safety of the CyberGuys site. They say they do not sell or trade your email address.

[No, I don't get any kickback for comments about CyberGuys, nor am I in any way affiliated with their company. I just think they have neat items.]

Friday, July 14, 2006

Lock down your USB drive!

Protect your portable data! A long time ago (a few years), floppy diskettes were all we had to worry about getting infected. And they could only hold 1.44MB of data. Protection? Well, we pushed that little slider to make it "read only". So what can we do now that we have portable everything? One device getting more attention is the now common USB flash drive. Some call it a "jump drive" or "pen drive" or "key drive".

No matter what you call it, those little suckers are very handy. Small, lightweight, and can hold a ton of data. We can use a USB flash drive to copy files to a friend or client's computer, to boot a computer, and even use as the source of a presentation at a conference or training session. But therein lies the rub. It's so easy to use that we tend to downplay the need to protect the data on it. And we forget that we need to protect that helpless USB drive from attack.

USB flash drives can get infected just like any other drive.

"Bah," you say. "My computer has Antivirus software -- it'll catch anything."

Think so? Read the scary but true article, " Social Engineering, the USB Way", which describes a security test by a Credit Union. Their consultant had a Trojan program made, added to USB flash drives along with some images, then seeded 20 of the little poisonous puppies in the Credit Union parking lot. Within a few days 15 of the 20 USB drives had been picked up and plugged into business computers. The result? The Trojan on the USB drive infected all 15 computers. And some of these infected other computers.

Remember, a new piece of malicious software will be able to attack thousands of computers before the Antivirus companies have time to get out an detection and disinfection update.

OK, so what security measures should you take with USB flash drives?
  • Write-protect it. If all you need to do is copy files from the USB drive to another computer, write-protect it if possible. Many USB drives include a "lock" slide switch on the side.
  • Encrypt data. In case it gets stolen or you lose it, does the USB drive have any information that other people shouldn't see? If so, check out encryption software that works with USB drives. Some USB flash drives come preloaded with encryption software, such as the Lexar JumpDrive Secure line.
  • Physically secure it. Always, always physically protect a USB drive. If possible, keep it on your person. That's what the lanyard is for after all.

Thursday, July 13, 2006

Fast charge, long life battery

M.I.T. is researching use of nanotubes as mini-capacitors in batteries that would recharge within seconds and could be recharged thousands of times. The researchers are drooling at practical uses in everything from hearing aids to cars.

Wednesday, July 12, 2006

Great site for digital photo nerds

PhotoJoJo has some good tips, including photos. Make your own fisheye lens for under $10, for example.

If you enjoy using a digital camera for more than "snapshots", this site is for you.

Monday, July 10, 2006

Private Folders lets XP users protect data

Microsoft now offers, for free, Private Folders 1.0, using password protected folders. It is a step to protect sensitive data from prying eyes. Though billed as being for a computer that multiple people use, it may also help protect against data theft by hackers and thieves.

Then there's file and folder encryption too using XP's Encrypting File System (EFS). The Federal Government will soon have to start using encryption on all its laptops, notebooks, tablets, ... (portable computers). Just remember -- encryption is not for files you need to share.

Wednesday, July 05, 2006

Cell phones = drunk driving

"Danger, Will Robinson! Danger!" Results of a recent study show that using a cell phone while driving is as dangerous and sometimes even more dangerous than driving under the influence.

In the study, many cell phone users crashed into the pace car ahead of them, but none of the DUI ones did. Yikes!

A commenter at a CNET blog posting on this report says that the problem is "self-phones" -- phones used by people who are so self-centered that they forget even common courtesy to others while using the cell phones.

Monday, July 03, 2006

Other free PDF readers

You probably know about the free Adobe Reader, which reads PDF files. But did you know that there are lots of other free PDF readers, some of which are as small as 1MB in size? One great use is as a slimmer PDF reader for a utilities collection on your USB flash drive.

[update 8/5/06] FoxIt Reader for Windows

Saturday, July 01, 2006

Mouse control software for shaky hands

People from hand tremors can use Mousecage software to let them control a mouse much better.

Neat nerd stuff

I've been impressed with Cyberguys as a source of unusual and helpful computer accessories. If you are computer-friendly, you'll enjoy looking over their wide range of items. Here are a couple that caught my eye lately:

Monday, June 26, 2006

Microsoft offers "full service" system check

Microsoft's "Windows Live Safety Center" offers a free, yet customizable "full service" online checks of your PC. It checks for:
  • Viruses and other malware
  • Wasted hard disk space
  • Maintenance issues
  • Internet connection security
  • Invalid registry entries

You must download scanning tools, but that goes fast (at least on my broadband). Also, click on "Customize" and uncheck scan options you you don't need to perform.

Friday, June 23, 2006

Security risks you don't know about

A recent PC World article lists the 10 security risks you don't know about. Among the tidbits is the fact that the latest attacks target cell phones with phony text messages.  The messages claim that you have been subscribed to a dating service and if you don't cancel, you'll be charged.  This nasty social engineering aims to dupe people into actually visiting the listed web site. The web site infects their PC.

Monday, June 19, 2006

Parents clueless about their internet role

Teens and preteens may be totally naive about the social trickery and manipulation so common on parts of the Internet, yet savvy about computers in general. Parents can't protect their kids from dangers they don't understand.

The fact that postings in a blog or MySpace type web site are very public, not private, never crosses the minds of many youth. An aggravating problem is that their parents are often not well-versed in the dangers and how kids can cope.

A Technology Review article encourages parents and kids to talk more about safe use of the Internet. Parents need to learn much more about their role as guardians when it come to the Internet. They can learn a lot from their own kids!

Friday, June 16, 2006

cnet Deal of the Day

CNET Shopper's "Deal Exchange" offers ever changing deals on a wide range of merchandise.  Most have expiration dates. Recently a $900 Canon Rebel camera was on sale for $621, for example. Check it out.

Thursday, June 15, 2006

Hackers already exploiting MS vulnerabilities

Microsoft announced 21 bugs (vulnerabilities) and their patches on Tuesday. On Wednesday, hackers were already exploiting 7 of these to attack PCs. Note that some of the patches are for Microsoft Office products. So if you normally only run Windows Update, be sure to check Microsoft Office Update.

The moral? Don't wait -- update your computer when a software vendor offers new security patches. Apple computers are usually set to automatically update. Windows computers can also be set to automatically download updates. I prefer to have the system alert me when the updates are ready to install and let me actually start the installation.

The old maxim used to be to wait and carefully test patches or wait for someone else to test them. Then and only then did you install a security patch. In today's world of same-day exploits (called "zero-day exploits"), smart computer users don't wait. They keep data backed up and they patch as fast as they can.

I often force Microsoft Update (which checks for both Windows and Office updates) to check and update my PC even before Windows alerts me. I know that new updates usually come out on the second Tuesday each month, so I start checking that night.

Security-savvy computer users also keep their Antivirus, 2-way Firewall, and AntiSpyware software updated. It's OK to be paranoid when bad guys really are out to get you.

Improving wireless network security

Do you use WiFi? Make sure you read Fred Langa's "Wireless Poachers, Wireless Guests" article in Information Week . Fred Langa's newsletter, the LangaList, is a real gem.  The "Plus" edition is budget-priced and a great value.  The Basic, ad-supported, version is free but the Plus edition contains extra articles. A recent Plus version newsletter lists 4 steps to improving your wireless security. A subscription could pay off very fast if it prevents an intrusion.

Wednesday, June 14, 2006

Backup Outlook PST file

Prevent "gotchas" -- backup your Outlook "Personal Folders" (PST file) every so often. Also burn that to CD or save it to a different drive in case your current drive "goes south".  Microsoft offers a free MS Outlook plug-in for Outlook 2000 and 2003.

Tuesday, June 13, 2006

Laptop desks lower lap heat

You should protect your lap from notebooks, which can heat up to over 150 degrees F. That can be too hot for comfort. Men should also remember that excess heat in "that certain area" can be harmful. The solution? A laptop desk.

A laptop desk can also let you work at a better angle to the keyboard.

Here are a couple of Froogle search results:

Cleaning the notebook (or laptop) also reduces heat.

Sunday, June 11, 2006

Free "zip" file compression utilities

An alternative to WinZip gets better compression and is free. WinZip used to be a one-time license -- buy it and get updates free for life.  No longer (so much for promises -- the ability for the company to unilaterally change this must've been in some fine print I didn't read). Fred Langa, in his Langa List newsletter, says he's changing over to 7-Zip as WinZip licenses expire. I just may be doing the same thing, as upgrading from WinZip 9 to 10 costs $29.95.

Net Neutrality amendment fails to pass

The House of Representatives voted down the Net Neutrality amendment to the Communications Opportunity, Promotion and Enhancement Act. If you're not sure what "net neutrality" is or why you should care, read Fred Langa's newsletter article, " Network Neutrality" and see the Wikipedia entry on network neutrality.

Also read the news article on the net neutrality vote, "House ignores public, sells out internet".

Tuesday, May 30, 2006

Battle of the mappers

Microsoft's new (beta) "Local Live" map site includes some "Bird's Eye" views that are astoundingly high quality. Not all areas of even major cities are yet covered by the "Bird's Eye feature, though. Expect the covered areas to get larger as more multi-angle photos are commissioned.
 
Both Microsoft and Google have a map view that shows roads plus satellite.  Between the Google "hybrid" view and Microsoft's "aerial", I prefer Google's.

Of course, Microsoft Live Local has an added plus -- Traffic maps ( Atlanta traffic , for example) that show speed and construction. Georgia's DOT has such a map, too.

Monday, May 29, 2006

What you type can hurt you

If you mean to type "Google.com" but mistype it in your browser, you could surf to a site that installs a malicious Trojan program on your computer.

Thursday, May 25, 2006

Homeland security slams RFID use on humans

A draft report from the Department of Homeland Security's Privacy Office condemns use of radio frequency identification devices ( RFID) due to excessive privacy and security risks. RFID can be used to monitor people's behavior, the report states. Things may not be looking so good for the proposed use of RFID on Mexican border crossing cards and similar ones being considered for use by the Departments of State and Homeland Security.

Saturday, May 20, 2006

Computer security blogs

If you like to stay on top of protecting your computer from "the bad guys", you would do well to read computer security-related news and tips. With blogs being so popular now, there are some security-related blogs "out there". Here are a few:

Friday, May 19, 2006

RSI from tech could hurt kids

An article on cNet news today reminds us that kids today spend one whale of a lot of time with technology "things" from game controllers to computers to cell phones.  All that slamming of thumbs on controllers, rapid pushing of tiny keys when text messaging, and slamming fingers and thumbs on keyboards be people that are not touch typists makes today's kid a poster child for Repetitive Stress Injuries (RSI). Many medical practioners are concerned.
 
Actually, I have to be careful myself.  I'm not a touch typist and I tend to hit the keys instead of gently pressing them down.  Some days I come home with a wrist tendons that hurt.  Think of the cumulative damage a lidetime of such digit slamming could do.

Tuesday, May 16, 2006

Evil lurks in search results

McAfee raises a caution flag about the safety of internet search engine results. Their January through April study examined the end results of people using the five major search engines (Google, Yahoo, MSN, Ask.com and AOL Search). The study showed that clicking on links in search results took users to malicious web sites on average 285 million (yes, million) times a month.

The real kicker is that "sponsored" links are nearly three times more likely to link to malicious sites than are regular search results. Search engine companies are taking steps to protect their users, though. These steps include tools for detecting and removing spyware, pop-up blockers, and anti-phishing filters. McAfee, for example, suggests you download and use their "SiteAdvisor" utility to make surfing safer.

Wednesday, May 10, 2006

Microsoft toobar now fights phishing

The MSN Toolbar, a free download from Microsoft, now includes an anti-phishing filter add-in.  When you try to go to a site that the program recognizes as a possible or known phishing threat, you get one of two levels of warnings. This will be part of Internet Explorer 7, but the MSN Toolbar will let you add it to IE 6 right now.

Friday, May 05, 2006

Shield your sockets for free

The SocketShield software is in a free beta version of a program that checks for malicious activity and works at the socket level. It's actions are based on use of a Blacklist plus checking for suspicious activity. This new software is a zero-day exploit blocker.

The aim is to prevent even opening a web page to a site that tries to do a "drive-by download" of some software. Some drive-bys are commercial ad-related, but some are malicious.
This program is one more to add in your computer defensive array. The total defense consists of:

  • Two-way firewall
  • Software updates
  • Antivirus software
  • AntiSpyware software
  • AntiSpam software
  • Socket monitoring software

Tuesday, May 02, 2006

More ways to read these postings

You can always come to this blog's web page to read the posts. That's my personal preference. But if you start subscribing to a "bunch o' blogs", the number of new articles may get large. One way to manage scanning them for what you really want to read is to use a " Feed Reader", which I've mentioned in prior posts.

Blog readers (a.k.a. feed readers or RSS readers) come in two basic forms -- web-based and ones installed on your PC. The web-based variety involves setting up an account at Google, Yahoo! or similar wites, then adding blogs to track. You log onto the Web site to see new headlines from the blogs in your list. The local install method gives you a program. When you run the program, many of which look similar to MS Outlook, you "subscribe" to blogs. The program then pulls down information about the blog postings and you read as you like.

Here are a few recently touted feed readers (blog readers):

Monday, May 01, 2006

Yahoo! Tech now online

Yahoo! has added a "Tech" section.  It offers information about products, advice from at least four different people, and gives you the ability to create a "My Tech" page that displays the stuff you're most interested in.  You need a Yahoo! ID, but it's free (ad-supported).

Wednesday, April 26, 2006

Spyware can change Desktop

SpyWare comes in all forms. A recent one I ran into on a friend's PC was new to me and quite annoying to him. The SpyWare had changed his Desktop to a Web view -- shortcuts had links. And it made the background look like a window alert to SpyWare, with a link added to go to a site to allegedly fix this problem.

This is a reminder never to trust the truthfulness of such announcements, emails, or pop-up windows. In many cases it's a ploy to get you to buy some (often substandard) software. In other cases, it could be a trap to install malicious software or capture personal data.

Install AntiSpyware and keep it updated. One suggestion -- install Windows Defender, use Microsoft Update installed (not Windows Update), and keep the Windows Defender checking your system in real time in addition to periodic scans of your hard disk.

Saturday, April 22, 2006

Free Microsoft software, photo info

Microsoft offers some nifty free XP downloads -- Photo Story 3, SynchToy, PowerToy Add-ins, photography-ralated PowerToys, and more. Go to the Windows XP downloads page .

Microsoft also has a Digital Photography Center. You never know when you'll run across a tip that puts you on the path to better photos.

Wednesday, April 19, 2006

10 malware hoaxes

TechRepublic has a good page describing 10 different malware (malicious software) hoaxes. Don't be taken in. Read the article.

Tuesday, April 18, 2006

Mozilla products have vulnerabilities

As further proof that no software is free of security vulnerabilities, several security flaws in Firefox, Thunderbird, Mozilla browser, and Mozilla SeaMonkey have been announced.
If you use one of these products, upgrade now. The latest version of Firefox is 1.5.0.2.

Thursday, April 13, 2006

Blight of the zombies

Computer hackers can turn your computer into a zombie -- one that does their dirty work for them. And often, they enlist (infect) armies of zombie computers to attack a specific site, say Microsoft or a bank. So your computer could get identified as participating in a felony.
Hmm, you say, not good. That's why being alert to possible malware and "scam" type links, windows, and email messages is so important.

Use easy, strong passwords

About.com has a good page describing how to create a "strong" password that is easy for you to remember. In general, you need to heavily protect passwords to sensitive data such as any financial transactions (banking, bill payments, online sales, etc.), and personal data other than name and address.

Sunday, April 09, 2006

Spin your text size

You have browsed to a great web page, but the text is not the best size for you to comfortably view the page. What to do; what to do. If the web page author used "relative" sizes for fonts you can use many web browsers to increase or decrease font size and you can use your wheel mouse to do it quickly.

Just hold down on the "Control" key, then spin the mnouse wheel for ward or backward to change the font size. If your browser supports this feature yet the fonts don't change size, the web page author chose to specify a fixed font size (boo!).

Don't have a wheel mouse? Consider adding the "Text size" icon to your browser's toolbar. Firefox also lets you use Control+minus and Control+plus keys to do the same thing.

Preview IE 7 features

Microsoft has a site that shows off new features in Internet Explorer 7 via an online "tour".

Friday, April 07, 2006

Strong passwords, weak memory?

If you're like most people who use a computer a lot, you have had to set a password at many different internet locations as well on your own computer. Windows users can catch a break by using Roboform.

Roboform can generate an extremely strong password, memorize passwords, encrypt the passwords, back up your passwords, and can even fill in a long registration form in one click. It can even synch passwords with your handheld computer. The basic version is free.

Free Spyware Defender

Microsoft has issued the Beta 2 version of its free AntiSpyware tool, which is now called "Windows Defender". The prior version was good, catching and cleaning some nasties that other AntiSpyware I'd tried did not. So I'm installing the Beta 2 version.

Thursday, April 06, 2006

Jetico firewall gets kudos

Mark Edwards, of Windows IT Pro, writes in Security UPDATE that he considers Jetico Personal Firewall (for Windows) the best at detecting software trying to inappropriately send information out of your computer. He rates it overall better than the popular ZoneAlarm (Free or Pro), Kerio (SunBelt), or Symantec (Norton).

Sunday, April 02, 2006

Social Bookmarking booms

An increasing number of people save and share bookmarks online. This is also called " social bookmarking". Several free services let you do this. A recent contender is Yahoo!'s " My Web 2.0". A popular service is del.icio.us (the site name is a geeky pun on "delicious").

There are two basic advantages to this. First, you can access your bookmarks from any computer that has internet access. Second, you can check out other people's bookmark lists. You might find some treasures buried there. Of course, there is also the ability to search for others' bookmarks, making their bookmarks treasure easier to find.

The Berkman Center for Internet and Society at Harvard Law School has a nice "Social Bookmarking Resources " page with links to popular services as well as reviews of many of the services. "Look before you leap". You might also want to check out " Online Link Managers" (bookmark managers) at Prospect.com.

Saturday, April 01, 2006

Free MS Office 2003 guide

You can read or download up a free MS Office 2003 10-minute guide (eBook PDF) at Que Publishing.

Friday, March 31, 2006

Don't accept "home-grown" security fixes

Today's SANS "Newsbites" newsletter has a cautionary comment about security fixes. Sometimes third parties announce "fixes" to security problems. Such is the case with a recently announced Internet Explorer vulnerability. But the editorial comment by Pescatore warns, in a cuttingly humorous way, not to accept "fixes" from other than the original vendor.
 
You can subscribe to get these semi-weekly "SANS Newsbites" by email or you can view them online in the Newsbites Archive. Subscribiing requires that you set up a login account.
 
Another related newsletter for end-users is Ouch!, a monthly security awareness newsletter.

Phishers attack smaller banks

Recent attacks on some small banks' web sites showed a troubling fact -- the attacks were very sophisticated and very hard for people to tell they had arrived at fake sites.  The attack of the web sites redirected traffic to a "bad" server, which had a web sites set up to mimic the original.  To nearly any user, the site looked genuine.  They arrived at the criminals' site even if they typed in the correct web address for their bank.
 
This type of attack is the first of its kind and may become more common. 'Even if you do go to your online bank's Web site, you need to be very careful,' says Bob Breeden, special agent supervisor with the Florida Department of Law Enforcement's Computer Crime Center.
 

Thursday, March 30, 2006

cnet news adds The Big Picture

cnet news.com (news.com.com) has a neat feature.  It's either new or I just hadn't tried it out before -- "The Big Picture".  When you are on a page about a single story, let's say " Microsoft to bring Hotmail onto the Desktop", click on "THE BIG PICTURE" link (dark red background, white letters) in the right column next to the story.  Then click on the small blue " full screen" text link to get the largest view.
 
Play with it.  This interactive utility shows relationships of stories, topics, and companies. If you hold your mouse over a story image, a little box slides down and contains a link to the story itself. You can choose to display stories, topics, companies, or any combination. Experiment. Have fun!  cnet also has a " Learn more" page.

Phish Fry starts

CastleCops and Sunbelt Security have a new joint venture -- the Phishing Incident Reporting and Termination (PIRT) Squad. You can volunteer to help out by joining the PIRT squad, submitting new phishing scams, generating reports or contacting officials.  They have how-to type FAQs and a Fried Phish tool (... gotta love the pun).  But you can benefit from the work of others if you prefer.  Visit and check out the site.

Hearing loss bites Apple

After getting bitten by complaints about the loud volume of iPods causing hearing loss, Apple is now offering a tasty downlod to address that on several (but not all) models.  The download lets iPod users set a maximum volume level.  If you use an iPod, get this download!  Remember, your body is a temple.

Throw-away email accounts

Why would you use a disposable email account? To reduce spam. Let's say you place an order online and have to provide an email account. Do you know for sure that the site wil not sell or otherwise let others know your email address? That's one way you start getting spam.

One way to combat this is to use a temporary email account when you order online. You wait for any needed emails to arrive (confirming the order, etc.), then you delete (throw away) the email account. You could, of course, keep the email account active until you actually start receiving spam or until it expires. Either way, it helps keep spam out of your normal, personal mailbox.

You can get a list of sites that offer free temporary email acounts at Prospector - Free Stuff. Make sure to check the free email account site's privacy policy first. You don't want to get spammed by signing up for the temporary account, do you?

Tuesday, March 28, 2006

Spam? Fight back!

You can give spammers a taste of what they're dishing out. How? Subscribe to the " Do Not Intrude Registry" and let BlueSecurity's "Blue Frog" use its Active Deterrence.

Monday, March 27, 2006

Groups name Adware, Malware offenders

The Center for Democracy and Technology (CDT) has a list of software companies that use adware. Another organization, StopBadware.org has also published a list of "malware" programs that do not comply with the group's guidelines.ZD Net article (CDT)TechWorld article (StopBadware.org)

Monday, March 20, 2006

Getting Podcasts

ZDNet has a great overview of Podcasting -- Podcasting 101.  It's a video feed, so you'll need to first choose to receive it either in Windows Media Player or Realmedia Player.  ZDNnet discusses what Podcasting is (getting audio or video via an RSS source), how you get it, and how you use it.
 
If you scroll down to the bottom of the ZDNet page linked above, you'll see a ton of links to other cnet videos. Explore. Enjoy. Learn.
 
ZDNet has a bunch of blogs too, if you're interested.

Friday, March 17, 2006

Obese pix need file size diet!

Many Windows XP users are in the bad habit of taking their photos and then attaching them to an email message without making any changes. It's not a big deal if you have broadband, right? Wrong. Consider that you may be sending your ultra-cool-gotta-see-it pix to people who really don't want to deal with huge images. The more megapixels your camera has, the more likely that you're a bloated pic offender.

The solution is to edit photos down to a reasonable file size before attaching to emails. Windows XP users can easily resize those images using Microsoft's free " Image Resizer" PowerToy. After you install the tool, just right-click on an image in Windows Explorer and choose to resize it to a smaller dimension better suited as an email picture or attachment.

If you have an image editor, it's a also good idea to improve the images where needed, then "optimize" them to further reduce file size before shipping them on to unsuspecting friends.

This information is based on a blurb by David Chernicoff in the "Windows UPDATE Client" email newsletter anyone get for free from Windows IT Pro. The magazine offers several of these free emailed newsletters. Drop by their site and make your choice.

Thursday, March 16, 2006

Blasting Web Ads

The Internet used to be for a free exchange of ideas among scholars and the military -- see DARPA, and then computer enthusiasts (geeks like me). But the advent of HTTP and World Wide Web page caused a blossoming most never saw coming. Commercial web presence now drives much of the web, not academicians and geeks. This irritates many people who have been used to all information on the web being free.

If you have a real need to reduce displayed advertising, consider taking the following actions:
  • Turn on your browser's Pop-up blocker. Only allow pop-ups on sites you choose.
  • Use FlashSwitch to toggle Flash off/on as you want, since some ads are now done in Flash.
There's a real problem with too many people blocking ads, though, because the real challenge here is a financial one. Creating and maintaining a good web site costs money -- there's no free lunch. If too many people hide ads by using these or other methods, a web site owner might have to start charging a subscription fee to defray costs. So maybe it wouldn't hurt that much to let ads display. And if (on a site you trusted) you saw an ad that really caught your eye, you might even want to click on it.

Wednesday, March 15, 2006

Google Safe Browsing for Firefox

If you are a Firefox user, you may want to install the free "Google Safe Browsing" extension. It alerts you when a web page you visit might be being used to steal personal information.

Tuesday, March 14, 2006

Fed site keeps you on guard

Onguard Online has tips from the federal government and the information technology industry to help you guard against internet fraud, safeguard ytour personal information, and better secure your computer data. If you like internet aution sites like eBay, check that out there too.

Sunday, March 12, 2006

Email scam pretends to be from IRS

A recent phishing email scam pretends to be from the IRS and about a tax refund. The email links to a web site that claims to be able to tell you the status of your refund. It also asks for your name, Social Security account number, and credit card data. Don't fall for it.

Anti-Phishing, Pharming tips from Microsoft

Microsoft's web page, "Help prevent identity theft from phishing scams", defines Phishing, shows some images to help explain what it looks like, and offers some tips to reduce identity theft.
A companion page, "Pharming: Is your trusted Web site a clever fake?", gives you cautions and tips about criminally redirected web pages.

Microsoft "Live" tools

Microsoft is now gathering its "Live" product tools onto one web page, Windows Live Ideas. Many of these are in beta, but it's a pretty cool collection. Windows Live Mail is webmail with an Outlook feel, including message preview, Calendar, Contacts, and "Today" tabs. YOu can sign up and try any of these.

Friday, March 10, 2006

Microsoft blogs

Microsoft, like many other companies these days, has some blogs at the Microsoft Developer Network site.  You might find a couple of them interesting even if you're not a developer.

The Internet Explorer 7 blog lets you keep track of the latest news and comments about this upcoming major upgrade.  In fact, there's even a more specialized IE 7 blog, ClearType in IE7.  And speaking of fonts, you may find the Font Blog interesting.


Wednesday, March 08, 2006

Mac OS X attack succeeds in 30 min

The Mac user community should no longer feel as safe.  Mac fanatics used to claim that the Mac was "safer".  The Windows crowd would retort that it was only because there were a whole lot less Macs so it wasn't worth the time for "black hats" to bother with.
 
Well, the malware is heading to Macs too. One person accepting a challenge to hack a Swedish user's Mac OS X computer found that he could hack a Mac in less than 30 minutes. The successful hacker says that there are a lot of unpublished exploits of the Mac OS X.
 
My point is not to bash the Mac, but to remind all that system and data security is a concern for computer users of all types.

Splogs and Blog comment spamming

Spam + Blog = Splog


After blogs got popular, spammers latched onto them too. This happened fast and seems to have caught Blogger.com (bought by Google) by surprise. Some spam blogs serve solely to drive traffic to other spam sites. The text of such sites may be nonsense, with the links being the only thing the spammer is really interested in having on the page.

Spam in Blogs is called comment spamming. To reduce automatic spam attacks of blog comments, Blogger now offers:
  • Comment moderation -- the blog administrator has to approve a comment before it actually gets posted.
  • Word verification. They added the option to require entry of some letters ("word verification") that are displayed as a graphic. Automatic ("bot") type processes can't cope with that.
  • Screening of blogs that are included in the "Next Blog" feature of the Blogger NavBar (which some blogs hide).
  • A "Flag" button on the Blogger NavBar. This lets a person "flag" a blog as questionable and ripe for review for elimination.
Several blogs and other web sites have commented on and proposed ways to fight blog spamming...
Blogs at Blogger splogger haven?
ProBlogger reports that Blog search engine owner Mark Cuban has criticised Google for not blocking sploggers, who are using its free blogspot.com to create tons of splogs daily. Cuban says that blog search engine sites may need to start deleting any blogs from offending domains such as blogspot.com or ones that end in ".info".

Tuesday, March 07, 2006

IE 7 will handle "feeds"

Microsoft's site about IE 7 shows that Internet Explorer version 7 will include the ability to interact discover and read syndicated "feeds" such as the one from this blog.  Firefox already does that, by the way, with its " Live Bookmarks" feature.
 
I discovered this fact about IE 7 by following a link in Ray Ozzie's Microsoft blog that touts a "Live Clipboard" as being needed for the web.

Sunday, March 05, 2006

Track down those trying to use your 'puter

Everyone knows that you should run a Firewall program, even in addition to (or instead of) the default Windows Firewall that comes with Windows XP. "So great", you say. "I do have a firewall. But what do I do with alert information the firewall shows -- for example the IP (Internet Protocol) address of another computer trying to access mine?" Personally, I'm mighty curious about even the attempts my firewall blocked. Aren't you?

Well, you can figure out who owns the source IP by looking at the Firewall logs. For example, my ZoneAlarm firewall "More info" option showed that the computer that had sent the data packet that caused an alert to be entered into the log was 70.224.246.43. OK, but exactly who owns that computer IP address and who should I email for details, assuming I want more information?

Luckily, the "WHOIS" database at ARIN (as well as some others) gives a free listing of such information, based on the registration of the IP address/web site. Just enter the IP address at their site and you get detailed information. Try the above IP address and see what you get.

If you have a web address (URL) instead of an IP address, you can get information via the general WHOIS database at whois.net or AllWhoIs.com. For example, enter umc.org into the AllWhoIs Search field and click on "Search". Scroll down through the results to see what data is available.

With such tools, you can often trace attempts to get into or out of your computer. It's important to check on these attempts periodically, if only for peace of mind. I do so every month or so.

And remember -- it's important to check who's trying to send information out of your computer as well as who's trying to get in. Check on both types of attempts.

Saturday, February 25, 2006

Calibrate your monitor!

Most people can benefit from adjusting their monitor in order to view online photos better. Here are two web pages that help you do this:

  • Step wedge adjustment - a simple adjustment that can improve the photo looks a lot. You should be able to see each of the shades of gray.
  • Monitor Calibration - Stanley Rowin Photography. This page includes a step wedge with even more intermediate shades of gray, making finer adjustment possible.

Also note that Stanley Rowin's page mentions that the gamma adjustment part of his page doesn't work for most flat panel monitors.

Tuesday, February 21, 2006

Feed Reader reviews

You don't really have to come to this web page to read the latest posts. All you have to do is set up to receive the "feed" from this page.

OK, OK, so now you're starting to get glassy-eyed and wondering about "feed". Well, a "feed" is the information about a posting here -- the title, date/time, and text of the post. You can access those via a "Feed Reader". Most are free.

Once you "subscribe" to a feed, your NewsReader automatically checks for new posts when you open it. Of course, you can still just check back here now and then.

cnet has reviews of several feed readers. An executive summary... if you use Internet Explorer, it looks like Pluck is a good one to try. [ Download Pluck ]

If you'd like to read blog feeds via a separate web page that collects "feeds" from different blogs for you, try the Google Reader or NewsGator.

If you are a FireFox user, you can "drag" a web address for a blog to your bookmark bar and it adds an orange "feed" icon. Clicking on that icon lets you see all current posts for that blog. Internet Explorer 7 is reported to also add this feature.

Sunday, February 19, 2006

Free PowerTools, PowerToys

Karen Kenworthy has some great, and free, PowerTools (utilities) including Cookie Viewer, Directory Printer, and Registry Pruner.

Microsoft developers created the free (but unsupported -- go figure) PowerToys for Windows XP.

I personally also use an older PowerToy (for Windows 98) called "SendTo X" in XP Pro a lot, myself. Caution: SendTo breaks the "Desktop (shortcut)" in the SendTo context menu, but I rarely Send a file to Desktop anyway, and if I wanted to I could SendTo any folder and choose desktop.

Thursday, February 16, 2006

WiFi for Dummies

The average user has no idea of the risks associated with public WiFi hotspots. They don't even know what common related terms are -- 802.whatever!, WEP, WPA, SSL, https, POP3, IMAP, SMTP. Tons of people surf the web with ease and can even send emails with attachments (gee, isn't my baby cute!). But they have little knowledge about the computer system itself, let alone what the security vulnerabilities are or how to protect themselves.

Scott Granneman, columnist for Security Focus, has some very simple tips to keep your WiFi network access secure.

Wednesday, February 15, 2006

Protect your PC from malware

The amount of malicious software on the Web has increased greatly recently. Here are some guidelines to help protect yourself:
  • Practice Safe Browsing.
  • Avoid unfamiliar or untrusted Web sites, especially Web sites that advertise "too good to be true" deals.
  • Don't install unfamiliar third-party toolbars. WindowsIT Pro magazine recommends you use only the MSN toolbar or the Googletoolbar.

A few other tips from Windows IT Pro...

  • Configure your email program to read messages in "Plain text", not HTML or Rich Text.
    This avoids possibly activating malicious software
  • Use your browser or a browser add-in such as the Google Toolbar to block pop-ups.
    Only allow pop-ups from pages where you really need them.
  • Only install updates from trusted sites.
    Some people have been burned by installing an "update" that arrived by email. Don't.
  • Do keep your system and programs updated.
    Many software programs need security-related updates too.
  • Use caution with IM -- bad guys abound. Don't automatically click on a link you receive, even if it seems to be form someone you know.
  • Always run virus protection.
You may want to subscribe to the "Windows Tips & Tricks UPDATE" or one of the other email newsletter from Windows IT Pro .

Monday, February 13, 2006

Clean your registry

The Windows registry over time accumulates entries that are no longer needed. They just make the registry larger and slower. So cleaning out those entries is a good idea. Unfortunately, doing that by hand is tearfully tedious, let alone risky.

That's where Registry cleaner utilities come in. Fred Langa's article in Information Week contains comments and evaluations of 10 Registry cleaners. Fred recommends JV16 Power Tools for a commercial product or EasyCleaner if you need a free one.

Read the whole article

Security: Upgrade Firefox to 1.5.0.1

Details on how to exploit a Firefox web browser vulnerability has been posted on the Internet. Firefox has upgraded the severity of the flaw to critical. Firefox 1.5.0.1 fixes that flaw.

ACTION: If you use Firefox, download and install version 1.5.0.1
http://www.mozilla.com/firefox/

Read the articles:
News.com (CNET News)
Information Week
ComputerWorld

Friday, February 10, 2006

Tech News Junkie highs

Defender stays free

Windows Defender will be the new name for what has been called Microsoft AntiSpyware. Microsoft has promised that it will remain free. If you want the full "OneCare" security package, though, it will probably be a subscription fee.

Some related sites:

Thursday, February 09, 2006

Suite security!

Isn't it disgusting what lengths we have to go to nowadays to just protect ourselves online:

  • Anti-Virus software that even checks your email (outgoing as well as incoming)
  • Cookie blockers
  • Anti-Spam software
  • Anti-Phishing software
  • Anti-Spyware software
  • Firewall software
I personally use ZoneAlarm Security Suite for AntiVirus (from Computer Associates, really), Anti-Spam, and Firewall, though the new version of the firewall checks so much in depth that I still get a bunch of pop-ups to authorize a program to do its thing.

Fred Langa has always recommeded a multi-pronged approach that even uses more than one AntiSpyware program. My current favorite is Microsoft's AntiSpyware (Beta). It has seemed to do the most thorough job of both detecting and cleaning our spyware. But I use Ad-Aware SE Personal and SpyBot as a backup. If I detect spyware with Microsoft's AntiSpyware, I then use Ad-Aware and SpyBot to do a second and third "sweep" of the computer. No single product catches everything.

I control third-party "cookies" and prevent the display of many third-party pop-up ads via MSIE 6 settings. I even check over cookies with the IE Cookies View. Nearly all cookies are "OK" ... there's some undeserved paranoia about cookies. Some cookies are, in fact, good for you (yum!). These type cookies can save your preferences for a particular site so that you don't have to choose them everyh time you visit that site. The few bad cookies that might harm your 'puter's digestion ruin it for the vast majority of "good cookies".

Internet Explorer 7 is supposed to add some Anti-Phishing capabilities. We'll see. Meanwhile, I try to stay very cautious about what messages I even open. And if I didn't ask for an attachment, I usually won't open it without checking with the alleged sender first.

Step right up and get your security suite for free:

Decrease browser cache

Here's another tip from Fred Langa's LangaList, 11/17/2005 ...

Avoid a large browser cache (10MB or so is all you need for a high-speed line). A large cache and a bazillion files in the Temp file areas can slow down your system. "The browser cache in particular may make your browser and OS work harder than they have to, with the side effect of making the connection seem slow," Fred says.

Add another reason: the cache could be retaining some nasties. Less cache, less chance bad stuff is in it. So change your browser preferences (IE calls them Internet Options) to lower the cache and to delete temporary internet files (clear the cache) when you exit the browser. That's added security. [Musing: Is flushing the cache a Johnny Cache?]

Dude's away; icons play!

Here's a fun Macromedia Flash movie about mischevious Windows desktop icons from "The Worst Site" (and they have a sense of humor).

Malicious software entices

Security awareness includes knowing that just because an email or web site says it has great software you can use for free, "it ain't necessarily so". Below is one recent example (excerpted from a recent "Security UPDATE" email newsletter from WindowsIT Pro):

Last week, a Trojan horse program that alleged to be a copy of a leaked MSN Messenger beta began to spread. The "leaked beta" supposedly boasts many new features, all of which are designed to entice people into downloading it. But no such beta exists. People who downloaded and installed the file infected their systems with a Trojan horse, which then sent IM [instant message] messages to other MSN Messenger users trying to coax them into installing the program. The Trojan horse program includes a proxy and remote command shell capabilities, can perform Denial of Service (DoS) attacks, connects the system to a botnet, and more. In short, it's a disaster on any computer."

Also, some recent attacks have tried to trick users into just visiting a web site, which then attacks their PC.


"Many of these [vulnerability exploits] try to coax users into visiting malicious Web sites, which can infect their systems even if they don't download any files. Other exploits might arrive via email, IM clients, or other inroads. A number of exploits related to this and other vulnerabilities rely on social engineering -- which is a nice way of saying that they rely on the ignorance of computer users."

It's OK to be a bit paranoid when the bad guys really are out to get you!

The Security UPDATE emailed newsletter is free, as is the online version.

Crucial computer security

Everyone is getting more concerned, out of self defense, about security your computer against infection and information theft. Fred Langa, author of the Langa Letter (also known as the Langa List) newsletter, recently wrote about "5 Essential Steps to PC Security." The "executive summary:"
  • Close the holes
  • Block the intruders
  • Stop infections
  • Prevent subversion
  • Lock it down
  • Test the security
  • Get defensive tools and information

The Langa Letter is a fine weekly publication. You can get it emailed (or online) free (with ads) or you can subscribe to the "Plus" edition (even more tips) for a measly sawbuck or so per year. Myself, after a few years of the free edition, I switched to the Plus edition and never looked back. (Renewal payment is coming soon, Fred!)