Sunday, November 26, 2006
Dig a hole through the earth
Find out with this very clever Google Maps mashup by a Brazillian developer.
Clever and fun.
Saturday, November 25, 2006
Zoom vs. text size in IE 7
First, let's be clear. "Zoom" is not the same as "Text size" in IE 7. Changing the text size does only that -- increases or decreases the size of the text on the page. If what looks like text is really part of an image, it does not change. "Zoom" make the entire page enlarge or shrink. That also means that as you enlarge the page, it will (usually) eventually exceed the window area and the left and right parts of the web page will be "cut off" in the view.
So text size and zoom each have their uses.
In the lower right of the (bottom area) status bar, you see a zoom percentage. You have several options to changing the "zoom": level
- Click on the zoom number. This rotates through a three zoom levels (125%, 150%, 100%).
- Click on the down-arrow to the right of the zoom percentage, then select one of the set levels you want to view or choose "Custom view".
- If you have a wheel mouse, hold down on the keyboard's "Control" key (often marked "Ctrl") and rotate the mouse wheel. Rolling toward your body decreases the zoom by 10%. Rotating the wheel away from your body increases the zoom by 10%.
- Hold down on the Control key and then press the plus (+) or minus (-) key to zoom in or out by 10%.
Friday, November 24, 2006
Family-proof your PC
- Create a separate user account for each family member.
- Only assign the type account really needed. Try to use "User" level for most. Assign "Power User" with caution.
- Never sign on and do normal work with an account that's a member of the "Administrators" group.
- Take the offensive against possible attackers. Install software that monitors and protects the computer. Many such basic software programs are free. The gamut includes general security monitors, security scanners, antivirus software, antispyware, and firewalls.
- Protect surfers. Configure privacy and security settings in the user's browser (each user has their own settings). Use a program like McAfee's SiteAdvisor, which gives sites a color-coded safety rating.
- Upgrade to the latest version of your browser. This is especially important if you use Microsoft Internet Explorer. Version 7 is more secure and nicer to use that prior versions.
- Use filtering software (aka Parental Controls) for your kids.
- Teach each user. Explain why opening messages from strangers is not a good idea, for example.
These tips are based on an excellent article, "How to family-proof your PC", by Jessica Dolcourt, CNET Download.com.
Tis the season ... to be paranoid
The attack arrives in your inbox as a message (perhaps looking like it's from a friend) with a link to a "Greeting Card". If you click on the link, you may even see some sort of online greeting. But along with the greeting comes a Trojan. You have been attacked.
Prevention tips:
- Don't open email messages from strangers
- Don't assume a message from a friend is really from that person, especially if it has links or an attachment you didn't expect to receive.
- If you get a message like above from a friend, send them a separate email and ask if they really sent the one with the link or attachment.
- Don't "reply" to a suspicious message -- you could be replying to the attacker.
- When in doubt, delete.
Saturday, November 04, 2006
Recent science-related news
- M.I.T. and Britain's University of Southampton plan to offer a research program in Web Sciences.
[Required free registration] - Commerce, NASA IGs investigate White House for muzzling scientists and altering scientific reports.
- Midterm elections may affect science.
Saturday, October 28, 2006
Neat gadgets
- 1GB Biometric flash drive (Sandisk Cruzer) -- swipe your fingerprint to access your data
- Microsoft Optical notebook mouse
- Flat speakers, USB-powered, with battery pack -- for notebook use?
- 1GB Compact Flash Card (SanDisk) for only $29
- Wireless PC headphones (Logitech)
- USB cup warmer -- so you can keep the Java hot while you surf
- Pantone Huey monitor color correction kit
- Notebook cooling stand, with fan, for lap or desk
If you like to check out new computer-related gadgets as much as I do, you may want to bookmark the "New items" page at Cyberguys . Happy online "windows shopping".
Friday, October 27, 2006
How to buy online more securely
- Make sure that you only buy products or services, pay bills, or provide personal data from a secure web page. This means the website encrypts the information.
- Check the web address in the browser's address bar. A secure web server address should start with "https://" ("s" for secure) rather than the normal "http://".
- Look for a "padlock" icon in the browser's status bar (in the lower right in Internet Explorer). Check the encryption level by hovering your mouse pointer over the icon.
tabs (General, Details, and Certification Path) in the pop-up.
By the way, just because a website uses encryption doesn't mean it's legit. Malicious sites can mimic "good" ones and use encryption too. Be cautious. Be paranoid. It's OK ... your money and identity is at risk.
Friday, October 06, 2006
Hold on to Windows XP?
- Desktop search: Windows Search
- AntiSpyware: Windows Defender
- Web browser: MSIE 7.0 (not yet in final release)
- Sidebar and Gadgets: Yahoo Widget Engine or Google Desktop
- Backup/Restore: Windows One-Care ($15-$20/yr)
- Email: Mozilla Thunderbird or Microsoft Windows Live Mail Desktop Beta
- Calendar: Mozilla Sunbird or Google Calendar
- Photo gallery, management, & sharing: Picasa 2 from Google.
- Digital Media Jukebox: Windows Media Player 11 for XP
- Digital movie editor: Windows Movie Maker 6
Saturday, September 23, 2006
Clean up Windows files and folders
- Basic cleanup for all versions of windows
- Advanced cleanup batch file (Win 9x)
- Advanced cleanup for other versions of Windows (including XP)
- Sageset tips
- Sagerun tips
- Cleaning of temporary files folders
- Advanced use of cleanup commands
Fred's LangaList newsletter comes in two versions -- free and an inexpensive paid ("Plus") version. It's available in varied emailed formats as well as on the web. The Plus version gets you even more juicy tips. Oh ... and despite coming from New Hampshire, Fred doesn't take anything for granite.
Friday, September 15, 2006
Google fun!
This unique book is available as a purchase or even as a free PDF or MS Word download. Just make sure you read the Creative Commons license.
Friday, September 08, 2006
HP printer power cord recall
- DeskJet 800 series
- DeskJet 900 series
- PhotoSmart 1000 series
- PhotoSmart 1100 series
- PhotoSmart 1200 series
- PhotoSmart 1300 series
Thursday, August 17, 2006
Share your firewall log
The DShield site puts received data into a database so they can analyze attacks. They also have a list of how to send the data for various firewalls. The site also has links to third-party solutions.
DShield describes this as a distributed intrusion detection system, since tons of people pitch in from all over the globe.
Wednesday, August 16, 2006
Create a healthy computer work environment
About.com has a series of pages with tips to reduce strain on your body while you use your computer. Give yourself a break (literally). Take these tips to heart and enjoy a happier, healthier life.
Please note that About.com has pop-ups on nearly every page. So if you don't want to see them, enable your pop-up blocker before clicking on a link below.
- Avoid computer vision syndrome.
- Prevent eye strain.
- Use eye-strengthening exercises. Here's some "Yoga exercises for the eyes" -- exercises that everyone can do!
- Adjust your monitor and lighting setup.
- Properly use your keyboard and mouse.
- Get a good chair and use good posture.
Wednesday, August 09, 2006
Intel Centrino Wireless driver security vulnerability
How do you tell if you need this? Use Device Manager:
- Select the Start Button
- RIGHT-click on "My Computer"
- Select "Properties" from the pop-up menu.
- Select the "Device Manager" button
- Expand the "Network adapters" section if it's not already expanded.
- If either of the above adapters shows in your list, RIGHT-click on the adapter and then select "Properties"
- Select the "Driver" tab and note the Driver version.
Saturday, August 05, 2006
Like emerging technology? Read a blog
- Tech & Space blog (Angela Gunn, USA Today)
- cNet Tech Blogs - an umbrella blog for all their tech blogs
- Gizmodo (gadgets)
- Engadget
- Wired News
- Technology News (Popular Mechanics)
- Reiter's Wireless Data Web Log
- PhysOrd Weblog (for science and tech buffs)
- Educational Technology
- Slashdot ("news for nerds")
- Techdirt
- TechE Blog (tech and gadget news)
- ZD Net Tech blogs - an umbrella blog for all their tech blogs
- SciFi Tech
- Tech blog
Friday, August 04, 2006
Fake Google toolbar spreads virus
Monday, July 31, 2006
More neat gadgets
- Plusdeck2c - converts cassette tapes to MP3 format. Put them on an MP3 player, computers, USB stick ... whatever. Music to go. And the sound doesn't get scratchier with age! Coming in September will be a similar type product for records, the Ion USB Turntable.
- Retractible USB file transfer tool. Transfer files directly from computer to computer (or notebook to PC). The included file transfer software automatically starts after both USB cables are plugged in. Just drag and drop files or folders.
- DVD/CD Carousel. Remember slide carousels? Same principle. The unit holds 150 CDs or DVDs. Inventory software uses a database to let you find and access files on any CD in the carousel. You can even stack carousels.
- Power Station Organizer. This handy unit gets you gang three charger units and hide the AC/DC converter and cord mess. It includes cable ties and allows for larger chargers. Got an iPod, handheld computer, cell phone, or similar? Charge any three of them all at one efficiently organized unit and use only one electrical wall outlet.
- Laptop as desktop unit. The laptop organizer lets you raise up your notebook to a better height for viewing its screen when you're using it on a desktop surface. If you use a notebook as your only computer, check this out.
I have only bought one item from them (so far), but the online ordering process was painless and it arrived quickly. You may opt in for emailed "flyers" of new and sale CyberGuys items ("exclusive email specials"). I chose to get them.
"Safety" reminder: Some sites might sell your email address. Others may have less than the best security and hackers capture client email addresses without the company knowing it. Use either a separate or a "throw away" email address to protect your main email address from spam accidentally (or deliberately) triggered by ordering online. This is an online "Best Practice", not a comment on the safety of the CyberGuys site. They say they do not sell or trade your email address.[No, I don't get any kickback for comments about CyberGuys, nor am I in any way affiliated with their company. I just think they have neat items.]
Friday, July 14, 2006
Lock down your USB drive!
No matter what you call it, those little suckers are very handy. Small, lightweight, and can hold a ton of data. We can use a USB flash drive to copy files to a friend or client's computer, to boot a computer, and even use as the source of a presentation at a conference or training session. But therein lies the rub. It's so easy to use that we tend to downplay the need to protect the data on it. And we forget that we need to protect that helpless USB drive from attack.
USB flash drives can get infected just like any other drive.
"Bah," you say. "My computer has Antivirus software -- it'll catch anything."
Think so? Read the scary but true article, " Social Engineering, the USB Way", which describes a security test by a Credit Union. Their consultant had a Trojan program made, added to USB flash drives along with some images, then seeded 20 of the little poisonous puppies in the Credit Union parking lot. Within a few days 15 of the 20 USB drives had been picked up and plugged into business computers. The result? The Trojan on the USB drive infected all 15 computers. And some of these infected other computers.
Remember, a new piece of malicious software will be able to attack thousands of computers before the Antivirus companies have time to get out an detection and disinfection update.
OK, so what security measures should you take with USB flash drives?
- Write-protect it. If all you need to do is copy files from the USB drive to another computer, write-protect it if possible. Many USB drives include a "lock" slide switch on the side.
- Encrypt data. In case it gets stolen or you lose it, does the USB drive have any information that other people shouldn't see? If so, check out encryption software that works with USB drives. Some USB flash drives come preloaded with encryption software, such as the Lexar JumpDrive Secure line.
- Physically secure it. Always, always physically protect a USB drive. If possible, keep it on your person. That's what the lanyard is for after all.
Thursday, July 13, 2006
Fast charge, long life battery
- Carbon nanotube (Wikipedia)
- Capacitor (Wikipedia)
Wednesday, July 12, 2006
Great site for digital photo nerds
If you enjoy using a digital camera for more than "snapshots", this site is for you.
Monday, July 10, 2006
Private Folders lets XP users protect data
Then there's file and folder encryption too using XP's Encrypting File System (EFS). The Federal Government will soon have to start using encryption on all its laptops, notebooks, tablets, ... (portable computers). Just remember -- encryption is not for files you need to share.
Wednesday, July 05, 2006
Cell phones = drunk driving
In the study, many cell phone users crashed into the pace car ahead of them, but none of the DUI ones did. Yikes!
A commenter at a CNET blog posting on this report says that the problem is "self-phones" -- phones used by people who are so self-centered that they forget even common courtesy to others while using the cell phones.
Monday, July 03, 2006
Other free PDF readers
[update 8/5/06] FoxIt Reader for Windows
Saturday, July 01, 2006
Mouse control software for shaky hands
- Related link: Free IBM utilities help seniors
Neat nerd stuff
- Optical "travel" mini-mouse with retractible cord -- for notebooks. (We ordered these at work)
- A flexible USB connector that rotates in two directions.
- USB PnP turntable - Digitize those old LP and even 45RPM records! Includes software to edit and "clean up" the audio.
Monday, June 26, 2006
Microsoft offers "full service" system check
- Viruses and other malware
- Wasted hard disk space
- Maintenance issues
- Internet connection security
- Invalid registry entries
You must download scanning tools, but that goes fast (at least on my broadband). Also, click on "Customize" and uncheck scan options you you don't need to perform.
Friday, June 23, 2006
Security risks you don't know about
Monday, June 19, 2006
Parents clueless about their internet role
The fact that postings in a blog or MySpace type web site are very public, not private, never crosses the minds of many youth. An aggravating problem is that their parents are often not well-versed in the dangers and how kids can cope.
A Technology Review article encourages parents and kids to talk more about safe use of the Internet. Parents need to learn much more about their role as guardians when it come to the Internet. They can learn a lot from their own kids!
Friday, June 16, 2006
cnet Deal of the Day
Thursday, June 15, 2006
Hackers already exploiting MS vulnerabilities
The moral? Don't wait -- update your computer when a software vendor offers new security patches. Apple computers are usually set to automatically update. Windows computers can also be set to automatically download updates. I prefer to have the system alert me when the updates are ready to install and let me actually start the installation.
The old maxim used to be to wait and carefully test patches or wait for someone else to test them. Then and only then did you install a security patch. In today's world of same-day exploits (called "zero-day exploits"), smart computer users don't wait. They keep data backed up and they patch as fast as they can.
I often force Microsoft Update (which checks for both Windows and Office updates) to check and update my PC even before Windows alerts me. I know that new updates usually come out on the second Tuesday each month, so I start checking that night.
Security-savvy computer users also keep their Antivirus, 2-way Firewall, and AntiSpyware software updated. It's OK to be paranoid when bad guys really are out to get you.
Improving wireless network security
Wednesday, June 14, 2006
Backup Outlook PST file
Tuesday, June 13, 2006
Laptop desks lower lap heat
A laptop desk can also let you work at a better angle to the keyboard.
Here are a couple of Froogle search results:
Cleaning the notebook (or laptop) also reduces heat.
Sunday, June 11, 2006
Free "zip" file compression utilities
Net Neutrality amendment fails to pass
Also read the news article on the net neutrality vote, "House ignores public, sells out internet".
Tuesday, May 30, 2006
Battle of the mappers
Of course, Microsoft Live Local has an added plus -- Traffic maps ( Atlanta traffic , for example) that show speed and construction. Georgia's DOT has such a map, too.
Monday, May 29, 2006
What you type can hurt you
If you mean to type "Google.com" but mistype it in your browser, you could surf to a site that installs a malicious Trojan program on your computer.
Thursday, May 25, 2006
Homeland security slams RFID use on humans
Saturday, May 20, 2006
Computer security blogs
- ComputerWorld security blogs
- Microsoft Security Response Center (a Technet blog)
- Security Matters (Windows IT Pro magazine)
- Security fix (Washington Post)
- Security Awareness for Ma, Pa, and the Corporate Clueless
- Security blog (CNET News.com)
- Spamroll (about Spam, Phishing, and more)
- Threat Chaos (ZDNet)
- Technorati's list of blog postings with "security" in them
Friday, May 19, 2006
RSI from tech could hurt kids
Tuesday, May 16, 2006
Evil lurks in search results
The real kicker is that "sponsored" links are nearly three times more likely to link to malicious sites than are regular search results. Search engine companies are taking steps to protect their users, though. These steps include tools for detecting and removing spyware, pop-up blockers, and anti-phishing filters. McAfee, for example, suggests you download and use their "SiteAdvisor" utility to make surfing safer.
Wednesday, May 10, 2006
Microsoft toobar now fights phishing
Friday, May 05, 2006
Shield your sockets for free
The aim is to prevent even opening a web page to a site that tries to do a "drive-by download" of some software. Some drive-bys are commercial ad-related, but some are malicious.
This program is one more to add in your computer defensive array. The total defense consists of:
- Two-way firewall
- Software updates
- Antivirus software
- AntiSpyware software
- AntiSpam software
- Socket monitoring software
Tuesday, May 02, 2006
More ways to read these postings
You can always come to this blog's web page to read the posts. That's my personal preference. But if you start subscribing to a "bunch o' blogs", the number of new articles may get large. One way to manage scanning them for what you really want to read is to use a " Feed Reader", which I've mentioned in prior posts.
Blog readers (a.k.a. feed readers or RSS readers) come in two basic forms -- web-based and ones installed on your PC. The web-based variety involves setting up an account at Google, Yahoo! or similar wites, then adding blogs to track. You log onto the Web site to see new headlines from the blogs in your list. The local install method gives you a program. When you run the program, many of which look similar to MS Outlook, you "subscribe" to blogs. The program then pulls down information about the blog postings and you read as you like.
Here are a few recently touted feed readers (blog readers):
- SharpReader (donationware)
- RSS Bandit (donationware)
Monday, May 01, 2006
Yahoo! Tech now online
Wednesday, April 26, 2006
Spyware can change Desktop
This is a reminder never to trust the truthfulness of such announcements, emails, or pop-up windows. In many cases it's a ploy to get you to buy some (often substandard) software. In other cases, it could be a trap to install malicious software or capture personal data.
Install AntiSpyware and keep it updated. One suggestion -- install Windows Defender, use Microsoft Update installed (not Windows Update), and keep the Windows Defender checking your system in real time in addition to periodic scans of your hard disk.
Saturday, April 22, 2006
Free Microsoft software, photo info
Microsoft also has a Digital Photography Center. You never know when you'll run across a tip that puts you on the path to better photos.
Wednesday, April 19, 2006
10 malware hoaxes
Tuesday, April 18, 2006
Mozilla products have vulnerabilities
If you use one of these products, upgrade now. The latest version of Firefox is 1.5.0.2.
- Firefox 1.5.0.2
- SeaMonkey 1.0.1 all-in-one internet application suite (formerly "Mozilla Application Suite")
Thursday, April 13, 2006
Blight of the zombies
Hmm, you say, not good. That's why being alert to possible malware and "scam" type links, windows, and email messages is so important.
- The "Invasion of the computer snatchers" article at the Washington Post describes an actual hacker's day.
Use easy, strong passwords
Sunday, April 09, 2006
Spin your text size
Just hold down on the "Control" key, then spin the mnouse wheel for ward or backward to change the font size. If your browser supports this feature yet the fonts don't change size, the web page author chose to specify a fixed font size (boo!).
Don't have a wheel mouse? Consider adding the "Text size" icon to your browser's toolbar. Firefox also lets you use Control+minus and Control+plus keys to do the same thing.
Preview IE 7 features
Friday, April 07, 2006
Strong passwords, weak memory?
Roboform can generate an extremely strong password, memorize passwords, encrypt the passwords, back up your passwords, and can even fill in a long registration form in one click. It can even synch passwords with your handheld computer. The basic version is free.
Free Spyware Defender
Thursday, April 06, 2006
Jetico firewall gets kudos
Sunday, April 02, 2006
Social Bookmarking booms
There are two basic advantages to this. First, you can access your bookmarks from any computer that has internet access. Second, you can check out other people's bookmark lists. You might find some treasures buried there. Of course, there is also the ability to search for others' bookmarks, making their bookmarks treasure easier to find.
The Berkman Center for Internet and Society at Harvard Law School has a nice "Social Bookmarking Resources " page with links to popular services as well as reviews of many of the services. "Look before you leap". You might also want to check out " Online Link Managers" (bookmark managers) at Prospect.com.
Saturday, April 01, 2006
Free MS Office 2003 guide
You can read or download up a free MS Office 2003 10-minute guide (eBook PDF) at Que Publishing.
Friday, March 31, 2006
Don't accept "home-grown" security fixes
Phishers attack smaller banks
Thursday, March 30, 2006
cnet news adds The Big Picture
Phish Fry starts
Hearing loss bites Apple
Throw-away email accounts
One way to combat this is to use a temporary email account when you order online. You wait for any needed emails to arrive (confirming the order, etc.), then you delete (throw away) the email account. You could, of course, keep the email account active until you actually start receiving spam or until it expires. Either way, it helps keep spam out of your normal, personal mailbox.
You can get a list of sites that offer free temporary email acounts at Prospector - Free Stuff. Make sure to check the free email account site's privacy policy first. You don't want to get spammed by signing up for the temporary account, do you?
Tuesday, March 28, 2006
Spam? Fight back!
Monday, March 27, 2006
Groups name Adware, Malware offenders
Tuesday, March 21, 2006
Security tips from Comcast
- How do I stop spam?
- How does a spammer get my email address?
- What's with an email I got but it's not my address listed?
- Home user's Computer Security Checklist
- How to handle ID Theft
- Online fraud risk test
Comcast also recommends reviewing "How do I get my email program to reveal the full headers?" at SpamCop.net.
Monday, March 20, 2006
Getting Podcasts
Friday, March 17, 2006
Obese pix need file size diet!
Many Windows XP users are in the bad habit of taking their photos and then attaching them to an email message without making any changes. It's not a big deal if you have broadband, right? Wrong. Consider that you may be sending your ultra-cool-gotta-see-it pix to people who really don't want to deal with huge images. The more megapixels your camera has, the more likely that you're a bloated pic offender.
The solution is to edit photos down to a reasonable file size before attaching to emails. Windows XP users can easily resize those images using Microsoft's free " Image Resizer" PowerToy. After you install the tool, just right-click on an image in Windows Explorer and choose to resize it to a smaller dimension better suited as an email picture or attachment.
If you have an image editor, it's a also good idea to improve the images where needed, then "optimize" them to further reduce file size before shipping them on to unsuspecting friends.
This information is based on a blurb by David Chernicoff in the "Windows UPDATE Client" email newsletter anyone get for free from Windows IT Pro. The magazine offers several of these free emailed newsletters. Drop by their site and make your choice.
Thursday, March 16, 2006
Blasting Web Ads
If you have a real need to reduce displayed advertising, consider taking the following actions:
- Turn on your browser's Pop-up blocker. Only allow pop-ups on sites you choose.
- Use FlashSwitch to toggle Flash off/on as you want, since some ads are now done in Flash.
Wednesday, March 15, 2006
Google Safe Browsing for Firefox
Tuesday, March 14, 2006
Fed site keeps you on guard
Sunday, March 12, 2006
Email scam pretends to be from IRS
Anti-Phishing, Pharming tips from Microsoft
Microsoft "Live" tools
Friday, March 10, 2006
Microsoft blogs
The Internet Explorer 7 blog lets you keep track of the latest news and comments about this upcoming major upgrade. In fact, there's even a more specialized IE 7 blog, ClearType in IE7. And speaking of fonts, you may find the Font Blog interesting.
Wednesday, March 08, 2006
Mac OS X attack succeeds in 30 min
Splogs and Blog comment spamming
After blogs got popular, spammers latched onto them too. This happened fast and seems to have caught Blogger.com (bought by Google) by surprise. Some spam blogs serve solely to drive traffic to other spam sites. The text of such sites may be nonsense, with the links being the only thing the spammer is really interested in having on the page.
Spam in Blogs is called comment spamming. To reduce automatic spam attacks of blog comments, Blogger now offers:
- Comment moderation -- the blog administrator has to approve a comment before it actually gets posted.
- Word verification. They added the option to require entry of some letters ("word verification") that are displayed as a graphic. Automatic ("bot") type processes can't cope with that.
- Screening of blogs that are included in the "Next Blog" feature of the Blogger NavBar (which some blogs hide).
- A "Flag" button on the Blogger NavBar. This lets a person "flag" a blog as questionable and ripe for review for elimination.
- Fight Splog
- Splog Reporter started on October, 2005 in response to spamming of blogs. Splog Reporter equates Splogs with terrorism of the blogosphere.
- Splog Reporter adds Firefox extension
- Spam of blogs (cnet news.com )
- Splog Spot bills itself as the world's largest splog database.
- Fight Splog! reports that 442 splogging servers have been identified as used in attacks.
- Blogging industry infected with splog flu
ProBlogger reports that Blog search engine owner Mark Cuban has criticised Google for not blocking sploggers, who are using its free blogspot.com to create tons of splogs daily. Cuban says that blog search engine sites may need to start deleting any blogs from offending domains such as blogspot.com or ones that end in ".info".
Tuesday, March 07, 2006
IE 7 will handle "feeds"
Sunday, March 05, 2006
Track down those trying to use your 'puter
Well, you can figure out who owns the source IP by looking at the Firewall logs. For example, my ZoneAlarm firewall "More info" option showed that the computer that had sent the data packet that caused an alert to be entered into the log was 70.224.246.43. OK, but exactly who owns that computer IP address and who should I email for details, assuming I want more information?
Luckily, the "WHOIS" database at ARIN (as well as some others) gives a free listing of such information, based on the registration of the IP address/web site. Just enter the IP address at their site and you get detailed information. Try the above IP address and see what you get.
If you have a web address (URL) instead of an IP address, you can get information via the general WHOIS database at whois.net or AllWhoIs.com. For example, enter umc.org into the AllWhoIs Search field and click on "Search". Scroll down through the results to see what data is available.
With such tools, you can often trace attempts to get into or out of your computer. It's important to check on these attempts periodically, if only for peace of mind. I do so every month or so.
And remember -- it's important to check who's trying to send information out of your computer as well as who's trying to get in. Check on both types of attempts.
Saturday, February 25, 2006
Calibrate your monitor!
Most people can benefit from adjusting their monitor in order to view online photos better. Here are two web pages that help you do this:
- Step wedge adjustment - a simple adjustment that can improve the photo looks a lot. You should be able to see each of the shades of gray.
- Monitor Calibration - Stanley Rowin Photography. This page includes a step wedge with even more intermediate shades of gray, making finer adjustment possible.
Also note that Stanley Rowin's page mentions that the gamma adjustment part of his page doesn't work for most flat panel monitors.
Tuesday, February 21, 2006
Feed Reader reviews
OK, OK, so now you're starting to get glassy-eyed and wondering about "feed". Well, a "feed" is the information about a posting here -- the title, date/time, and text of the post. You can access those via a "Feed Reader". Most are free.
Once you "subscribe" to a feed, your NewsReader automatically checks for new posts when you open it. Of course, you can still just check back here now and then.
cnet has reviews of several feed readers. An executive summary... if you use Internet Explorer, it looks like Pluck is a good one to try. [ Download Pluck ]
If you'd like to read blog feeds via a separate web page that collects "feeds" from different blogs for you, try the Google Reader or NewsGator.
If you are a FireFox user, you can "drag" a web address for a blog to your bookmark bar and it adds an orange "feed" icon. Clicking on that icon lets you see all current posts for that blog. Internet Explorer 7 is reported to also add this feature.
Sunday, February 19, 2006
Free PowerTools, PowerToys
Microsoft developers created the free (but unsupported -- go figure) PowerToys for Windows XP.
I personally also use an older PowerToy (for Windows 98) called "SendTo X" in XP Pro a lot, myself. Caution: SendTo breaks the "Desktop (shortcut)" in the SendTo context menu, but I rarely Send a file to Desktop anyway, and if I wanted to I could SendTo any folder and choose desktop.
Thursday, February 16, 2006
WiFi for Dummies
Scott Granneman, columnist for Security Focus, has some very simple tips to keep your WiFi network access secure.
Wednesday, February 15, 2006
Protect your PC from malware
- Practice Safe Browsing.
- Avoid unfamiliar or untrusted Web sites, especially Web sites that advertise "too good to be true" deals.
- Don't install unfamiliar third-party toolbars. WindowsIT Pro magazine recommends you use only the MSN toolbar or the Googletoolbar.
A few other tips from Windows IT Pro...
- Configure your email program to read messages in "Plain text", not HTML or Rich Text.
This avoids possibly activating malicious software - Use your browser or a browser add-in such as the Google Toolbar to block pop-ups.
Only allow pop-ups from pages where you really need them. - Only install updates from trusted sites.
Some people have been burned by installing an "update" that arrived by email. Don't. - Do keep your system and programs updated.
Many software programs need security-related updates too. - Use caution with IM -- bad guys abound. Don't automatically click on a link you receive, even if it seems to be form someone you know.
- Always run virus protection.
Monday, February 13, 2006
Clean your registry
That's where Registry cleaner utilities come in. Fred Langa's article in Information Week contains comments and evaluations of 10 Registry cleaners. Fred recommends JV16 Power Tools for a commercial product or EasyCleaner if you need a free one.
Read the whole article
Security: Upgrade Firefox to 1.5.0.1
ACTION: If you use Firefox, download and install version 1.5.0.1
http://www.mozilla.com/firefox/
Read the articles:
News.com (CNET News)
Information Week
ComputerWorld
Friday, February 10, 2006
Tech News Junkie highs
- ALPHA (CNET blog)
- Information Week
- CNET News.com
- ZDNet Blogs
- TECH_SPACE Blog (USA Today)
- TechNewsWorld
- Slashdot -- "News for Nerds. Stuff that matters."
- Wired News
- Sci/Tech News (Google)
Defender stays free
Some related sites:
Thursday, February 09, 2006
Suite security!
Isn't it disgusting what lengths we have to go to nowadays to just protect ourselves online:
- Anti-Virus software that even checks your email (outgoing as well as incoming)
- Cookie blockers
- Anti-Spam software
- Anti-Phishing software
- Anti-Spyware software
- Firewall software
Fred Langa has always recommeded a multi-pronged approach that even uses more than one AntiSpyware program. My current favorite is Microsoft's AntiSpyware (Beta). It has seemed to do the most thorough job of both detecting and cleaning our spyware. But I use Ad-Aware SE Personal and SpyBot as a backup. If I detect spyware with Microsoft's AntiSpyware, I then use Ad-Aware and SpyBot to do a second and third "sweep" of the computer. No single product catches everything.
I control third-party "cookies" and prevent the display of many third-party pop-up ads via MSIE 6 settings. I even check over cookies with the IE Cookies View. Nearly all cookies are "OK" ... there's some undeserved paranoia about cookies. Some cookies are, in fact, good for you (yum!). These type cookies can save your preferences for a particular site so that you don't have to choose them everyh time you visit that site. The few bad cookies that might harm your 'puter's digestion ruin it for the vast majority of "good cookies".
Internet Explorer 7 is supposed to add some Anti-Phishing capabilities. We'll see. Meanwhile, I try to stay very cautious about what messages I even open. And if I didn't ask for an attachment, I usually won't open it without checking with the alleged sender first.
Step right up and get your security suite for free:
- AVG Antivirus Free edition
- Zonealarm basic
- All the Anti-Spyware mentioned above is free
Decrease browser cache
Avoid a large browser cache (10MB or so is all you need for a high-speed line). A large cache and a bazillion files in the Temp file areas can slow down your system. "The browser cache in particular may make your browser and OS work harder than they have to, with the side effect of making the connection seem slow," Fred says.
Add another reason: the cache could be retaining some nasties. Less cache, less chance bad stuff is in it. So change your browser preferences (IE calls them Internet Options) to lower the cache and to delete temporary internet files (clear the cache) when you exit the browser. That's added security. [Musing: Is flushing the cache a Johnny Cache?]
Dude's away; icons play!
Malicious software entices
Last week, a Trojan horse program that alleged to be a copy of a leaked MSN Messenger beta began to spread. The "leaked beta" supposedly boasts many new features, all of which are designed to entice people into downloading it. But no such beta exists. People who downloaded and installed the file infected their systems with a Trojan horse, which then sent IM [instant message] messages to other MSN Messenger users trying to coax them into installing the program. The Trojan horse program includes a proxy and remote command shell capabilities, can perform Denial of Service (DoS) attacks, connects the system to a botnet, and more. In short, it's a disaster on any computer."
Also, some recent attacks have tried to trick users into just visiting a web site, which then attacks their PC.
"Many of these [vulnerability exploits] try to coax users into visiting malicious Web sites, which can infect their systems even if they don't download any files. Other exploits might arrive via email, IM clients, or other inroads. A number of exploits related to this and other vulnerabilities rely on social engineering -- which is a nice way of saying that they rely on the ignorance of computer users."
It's OK to be a bit paranoid when the bad guys really are out to get you!
The Security UPDATE emailed newsletter is free, as is the online version.
Crucial computer security
- Close the holes
- Block the intruders
- Stop infections
- Prevent subversion
- Lock it down
- Test the security
- Get defensive tools and information
The Langa Letter is a fine weekly publication. You can get it emailed (or online) free (with ads) or you can subscribe to the "Plus" edition (even more tips) for a measly sawbuck or so per year. Myself, after a few years of the free edition, I switched to the Plus edition and never looked back. (Renewal payment is coming soon, Fred!)