tag:blogger.com,1999:blog-8123803234775124262024-02-22T00:33:35.512-08:00techwalkerA blog about my favorite technology topics.Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.comBlogger57125tag:blogger.com,1999:blog-812380323477512426.post-29079004757177322082012-02-17T00:22:00.001-08:002012-02-17T00:24:38.833-08:00Malwarebytes Chameleon Works Great<p>I’ve been a fan of Malwarebytes for years. It’s always been one of the most effective tools against badware on the market. In fact, many other more expensive “security suites”, upper level technical support have been known to remote into a users machine, and install Malwarebytes to rid it of infections the antivirus was unable to get rid of. I’m not mentioning names (Symantec, Adaware), but actually I applaud tech support for doing what it takes to clean a machine.</p> <p>The good news is Malwarebytes has gotten even better. In the past I’d always rename Malwarebytes as well as other security programs when installing them on an infected machines. The reason is simple, many malware programs will prevent any code that might interfere with it’s nefarious purpose from running, especially Malwarebytes! Now Malwarebytes includes a great new feature, “Chameleon”. Chameleon provides a long list of alternative exe’s to run when your machine is already infected and the virus is preventing Malwarebytes from being started from the standard executable. </p> <p>To access Chameleon you need the latest version of Malwarebytes, available at <a href="http://www.malwarebytes">http://www.malwarebytes</a> .org. Go to the program in your start menu, right click on Malwarebytes and click on “Open File Location”. Chameleon will be visible, double click on Chameleon and a list of alternative installers appears. Double click on any of them and a command line appears asking you to “click any key to run”,  once started the command line tells you it’s “killing known malicious processes please wait”then it launches the Malwarebytes update which runs automatically. Once updated Malwarebytes launches and does a quick scan. This is usually enough to get your foot in the door so to speak. Then you can continue to run (multiple) full scans with Malwarebytes and your other favorite tools to finish the clean-up.</p> <p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCIs-7MlRyGzbcivcs0bhq1Vp28TKXd6P05gpUaCPh7zQbLc-RHZZn0r3k2bLkdK-29cIPAgWUX688s9UZdoVIMMV2bQEHD-M7x2zY8SceS3PnKUYnvInhBctzOZeqKFLMJXrDq6Abj0G-/s1600-h/chameleon%25255B2%25255D.png"><img style="background-image: none; border-right-width: 0px; margin: 0px 0px 5px; padding-left: 0px; padding-right: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px; padding-top: 0px" title="chameleon" border="0" alt="chameleon" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiunty2EUDEnxVc4_4brLytpNGScl07U0GEtvOfCPsIhFPMik9k6B7AlE23syCNORt72RoaZ4Wnf6dg-zt_RVlpZbER5rj49_fkHG2FOQjFyabUFDxQ18NIf6rKWJ6e6DBdbnnMTdyUPZ8x/?imgmax=800" width="244" height="135" /></a></p> <p>Running Malwarebytes from a USB drive as a portable app isn’t supported at this time but I’m working on that…</p> <p>So for now to use Chameleon, you need Malwarebytes already installed on your computer. Malwarebytes is a free program but a paid version is available for a lifetime single fee of 24.95 USD and they often offer generous discounts on their paid version if your patient.</p>Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com1tag:blogger.com,1999:blog-812380323477512426.post-56911450406435746142010-09-10T00:21:00.001-07:002010-10-15T19:59:33.488-07:00Disaster emphasizes the need for Offsite Backup<p>Right now I’m sitting at home watching the television coverage of a fire storm going on about 25 miles north of me. Hundreds of people  became homeless within minutes of a huge explosion from a natural gas line. The fire has destroyed at least 54 homes an damaged another 124 more. This horrible tragedy which at this time has taken at least one persons life, proves one very important lesson for computer users.</p> <p>Those houses were so violently consumed many people literally had to run out their front door with only the clothes on their back to save themselves. They certainly had no time to grab their computers or external hard drives, there simply was no time. So adding to the tragedy, many people affected in this no doubt also lost all their digital pictures, their business records, or their doctoral dissertation.  At this time no doubt data is the last thing on their minds, but once the fire is out and they begin to piece their lives together, the loss of pictures of their house and family outings or other precious memories will end up being just another burden to deal with.</p> <p>So how could this additional loss be avoided, offsite backup. Backing up your most precious or valuable data to “the cloud” is no longer an option. This tragedy has convinced me that  the external hard drive next to your computer is little better than not having any backup, should a huge fire or natural disaster occur. Backing up to a cloud based service can be remarkably easy, an automated system used by a commercial program such as Carbonite  can be very simple.  Others like Amazons S3 require other programs to move the data to safety.</p> <p>There a few free programs that will work, although the amount of storage is often limited. Mozy, Dropbox, and Windows Skydrive all offer free online storage. While free sounds good be careful, early on in the cloud storage era there were several free online backup services which disappeared suddenly leaving their clients unable to get data they thought was safe. It’s definitely best to stick with established names, like Dropbox or Amazon and maybe pay a little to backup your most precious memories or documents. </p> <p>Don’t have high speed internet, then take several external hard drives and rotate one to an offsite location that’s a ways off. Weekly change the drive out so no drive is more than a week out of date. While this method works, its often the type of thing people do for a while but then tend to slack off after time. This is why I feel the set it and forget it of an automated backup online is the best.</p> <p>Additional links: <a href="http://mozy.com/home">http://mozy.com/home</a>, <a href="https://www.jungledisk.com/personal/">https://www.jungledisk.com/personal/</a>, <a href="http://www.dropbox.com/">http://www.dropbox.com/</a>, <a href="http://windowslive.com/Online/SkyDrive">http://windowslive.com/Online/SkyDrive</a>, <a href="https://one.ubuntu.com/">https://one.ubuntu.com/</a>, <a href="http://www.carbonite.com/">http://www.carbonite.com/</a></p>Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com1tag:blogger.com,1999:blog-812380323477512426.post-70652385648592488252010-07-07T13:39:00.001-07:002010-07-30T10:43:24.198-07:00My Latest Malware kit<p>Over the the years I’ve found malware getting harder to defeat every time I try to disinfect a machine. A few years ago running AVG antivirus and Spybot Search and Destroy, pretty much did the job. But in the last 2 years or so I’ve had to refine my techniques as malware became more prevalent and harder to remove.  It seems organized criminals are now the driving force behind most of the “quality “ malware out there. There’s big bucks out there to be made stealing peoples identities, or turning their computers into spambots.</p> <p>Last year I blogged about turning away from my old reliable programs and how I had adopted some new tools for doing automated cleanups. This year I’ve picked up some new tools, largely in response to what I was seeing when trying to clean up some really horribly infected machines. </p> <p>My tools are similar to what I was using last year,Malwarebytes and Superantispyware   are still my favorite tools. Only one change there really, Superantispyware now is my primary malware tool. I was getting consistently better results with Super and it was removing many issues that Malwarebytes could find but not remove. Superantispyware also comes in a portable version, I keep a copy on a thumb drive for emergencies. For an antivirus I’m using Microsoft Security Essentials, its free, lightweight and effective which meets all my requirements. For a paid antivirus I like NOD32 from Eset, NOD32 is the best AV in my opinion and I will install it on users computers who are prone to getting infected. <a href="http://www.eset.com/">http://www.eset.com/</a>. NOD32 is reasonably priced and if you’re going to pay for an AV, this is the way to go. <a href="http://www.superantispyware.com/">http://www.superantispyware.com/</a> , <a href="http://www.malwarebytes.org/">http://www.malwarebytes.org/</a></p> <p>These tools are going to do a great job of protecting most peoples computers if they are reasonably competent online. If a computer comes to me that’s really badly infected, I’ll first run Kaspersky rescue boot CD. Kaspersky Rescue CD is a Linux based Live CD that runs the Kaspersky antivirus prior to trying to boot into Windows. This can be very time consuming, in one case it took 27 hours and Kaspersky found over 1500 infections, but afterwards I was able to boot into Windows and run my regular tools which found another 150+ after 3 reboots and scans. But in the end the machine was clean.</p> <p>Another program I use as a second opinion is called Hitman Pro.<a href="http://www.surfright.nl/en/hitmanpro">http://www.surfright.nl/en/hitmanpro</a>  Hitman Pro is cloud based scanner that uses Esets cloud based scan as well as 3 others to double check your computer after a cleanup. I just started using Hitman Pro, but so far I’m very impressed. Lastly I use Process Explorer and Autoruns from Sysinternals, now a Microsoft property. Learning to use the Sysinternal tools takes time, but its time well spent for anyone who wants to get serious about knowing what goes on, on their computer. <a href="http://technet.microsoft.com/en-us/sysinternals/default.aspx">http://technet.microsoft.com/en-us/sysinternals/default.aspx</a></p>Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com0tag:blogger.com,1999:blog-812380323477512426.post-13495551730837406242010-05-01T21:53:00.001-07:002010-05-01T21:53:28.859-07:00Palm saved by HP at the last minuteWell I may not exactly be competition for Engadget but I'm just ecstatic that HP has stepped up and bought Palm. Palm has been a great and innovative company since their inception and I would have hated to see them go away. The new Palm operating system has never gotten the popularity it deserved. The WebOS works great, it multitasks and just elegantly goes about its business doing things most mobile operating systems cant. <br />I admit I'm a bit biassed I own a Pre, I use it on the Verizon network and unlike the At&T network I don't have to drive for a half hour to get a signal. But best of all is the WiFi Hotspot application. To me its the one app "to rule them all and in the darkness bind them"(Sorry JRR). <br />So keep your 150,000 fart apps on the "Jesus phone", I'll take my Pre and now thanks to HP I'll soon have fart apps to buy on the Pre.Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com0tag:blogger.com,1999:blog-812380323477512426.post-81052541962330119552010-04-05T20:11:00.000-07:002010-04-05T20:14:59.263-07:00Another Day in the Trenches: killing XP Antivirus 2010I hate rouge antivirus programs. They seem to be getting more numerous and harder to get rid of all the time. Case in point: At work I noticed a shared computer suddenly popped up a Window announcing to me it was doing a scan and that I was infected with over 4,000 trojans and other forms of malware. Nice try I thought, so I used Control Alt Delete to start task manager and I closed Internet Explorer and all running processes involved. Fortunately it was a limited user account that was infected, and that turned out to be a important factor in removing it. I immediately ran Malwarebytes from that user and found a number of infections including the rogue antivirus product I was afflicted with.<br />These cretins that come up with this crap can’t even come up with something creative, we’ve seen XP Antivirus for a few years now, each year they just tack on a year to make it look current. Sad thing is I’m sure somewhere out there is someone who renews this crap every year, imagine paying yearly to be infected, oh right we already do that it’s called McAfee, but don’t get me started.<br /><br />Well back to the task at hand: I rebooted the machine and logged into an administrator account. And updated Malwarebytes and ran it again... and found more junk, actually the same junk. Malwarebytes found it but could not kill it. Next I downloaded Superantispyware, a great application that I always run at home but wasn’t on the work machine. The first thing I do now after I download a anti-malware application is rename the installer, I do this because I often find the malware knows to prevent anti-malware from installing, okay these guys aren’t creative but they re getting smarter To rename a file, right click on the file and select rename and type anything.exe and install the program. Superantispyware did its thing and found a ton of additional files. I removed the infected files and rebooted again, and ran both my programs again. I still found junk! I repeated the sequence two more times until nothing was found. I then ran a scan in all user accounts to confirm “the kill”. So far so good, until I went into the user account where the infection had started, now whenever I tried to launch any program from the desktop I’d get the “Choose what Program you want to use to Open this File” message. This means I had to fix file associations and a great site with XP file association fixes is. //www.dougknox.com/xp/file_assoc.htm I used the .exe file association fix and it worked great. The last thing I did was to run Process Explorer, and Autoruns from Syinternals, these utilities give a great in depth look at what is currently running and starting on your machine at boot-up. Finding nothing suspicious I deemed the computer clean for now.<br />So a few lessons I learned on that one: Don’t use IE this was caused by a flaw in Internet Explorer I believed it was just fixed this week. Second running as a limited user is still far safer than running as an administrator, even though its trivial to elevate to administrator level, most malware seldom does, and this makes cleaning an infected PC much easier. Next running your cleanup tools multiple times and rebooting after each scan is the only way to give the anti-malware tools a chance against the bad guys.<br />http://www.malwarebytes.org/<br />http://www.superantispyware.com/Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com2tag:blogger.com,1999:blog-812380323477512426.post-7604002305305284452010-03-25T23:13:00.000-07:002010-03-25T23:16:18.429-07:00Principles of Security:Keeping it SimpleComputing on the Windows platform today can be very rewarding .The problem with Windows applications is that as Microsoft has made improvements in patching security holes in Windows, the Black Hat hackers have begun to focus on third party applications to exploit the platform. Recent highly publicized exploits on the Adobe Acrobat PDF reader have been the tip of the iceberg. According to Secunia creators of PSI a security tool that scans your PC for out of date software, half their users had 66 or more programs on their PC's. Once all the programs and patches were tabulated it totaled over "75 patch incidents annually". per average PC. "That averages out to a patch every 4.9 days." (Source InfoWorld Security Central http://www.infoworld.com/d/security-central/typical-windows-user-patches-every-5-days-630?source=IFWNLE_nlt_firstlook_2010-03-04InfoWorld) This obviously puts the average user at risk. Many people do well just to keep their Windows OS patched much less check more than once a week for patches to their other applications. This leads to the crux of my point, keep it simple. Don't download every application you see or hear about. Pick a core of useful applications that allow you to use your computer in the way you need and stop! Your computer is a tool that can be very useful, so treat it seriously. You still can have fun with your computer, but you don't need 5 different media players, choose one and stick with it. If you find one you prefer uninstall the old one first. Many people use old out of date programs because they don't like the "feature creep" of many newer applications. This is a mistake, keep what programs you have up to date, this especially true with PDF readers, browsers, email clients, and media players. Keeping your flash player up to date is extremely important, Adobe Flash is a major exploit vector and I frequently run with it disabled.<br />Trying new applications can however be fun and rewarding, the best way to try new applications though is in a virtual machine. Using a program like Virtual Box from Oracle Systems is a great way to safely try new applications without committing yourself to a new program or loading your hard drive with a ton of unnecessary applications that need to be constantly updated. And lastly run Secunia’s free PSI it will help you keep your applications up to date and add another layer of security to your computer.http://download.cnet.com/1770-20_4-0.html?query=Secunia+Personal+Software+Inspector&searchtype=downloadsMarkhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com0tag:blogger.com,1999:blog-812380323477512426.post-24880133180463970682010-01-23T11:37:00.001-08:002010-01-23T11:37:03.894-08:00Kaspersky Rescue Disk<span xmlns=''><p>You find your computer getting slower and slower to boot, and when it finally does boot it's so slow everything runs at a crawl. So you try running the antivirus you have and just get a message that says the definitions are out of date and you can't connect to the update server. Or you may find an annoying pop-up coming up every time you boot telling you PC Antivirus has found 70,278 infections and for $49.99 they will remove them for you. Well my friend, you are hosed! Your machine is so badly infected that you have to try desperate measures. At this point you can try pulling your hard drive out of the machine and putting it in another mounting it as a slave and using your other machine to try to clean it.<br /></p><p> Another way to get this thing up and running is to try some kind of bootable rescue disk to clean it. Bootable rescue disks are bootable CD's/DVD's that contain small operating systems with some preinstalled tools contained for repairing your computer. When you turn on your computer hit F10 or F12, select your CD/DVD drive and your computer boots into an operating system contained on that CD. There are a lot of great rescue disks out there, the problem is most are very complicated and some take forever to boot. I found one great exception to this though. Kaspersky labs creator of the very capable Kaspersky Antivirus line of products has built a great free bootable rescue CD that is simple to use. Unlike many other bootable rescue disks it has one purpose, to clean your system. To create a Kaspersky Rescue Disk, download the ISO image from this link <a href='http://devbuilds.kaspersky-labs.com/devbuilds/RescueDisk/'>http://devbuilds.kaspersky-labs.com/devbuilds/RescueDisk/</a> then burn the image to a CD. Depending on what operating system you are using you may need to download a CD burning program if you don't already have one. If you are running Windows 7 it has a built in, burning program that's simple to use and works great. If you are running XP or Vista, I like Image Burn <a href='http://www.cdburnerxp.se/'>http://www.cdburnerxp.se/</a> or CD BurnerXP <a href='http://www.cdburnerxp.se/'>http://www.cdburnerxp.se/</a> both do a great job of burning .ISO images and are free.<br /></p><p>Once you have your rescue CD built, start your infected machine pushing F12/F10 to get it to the boot selection screen. Boot to the CD Rom drive as I stated earlier and relax, although faster than most rescue disks it's hardly fast. Follow the prompts and when it boots into the Kaspersky Rescue system you first need to update the virus definitions. Once updated do a scan, and go read the newspaper or get some coffee, it takes a while. Once it completes the scan go ahead and let it remove or quarantine all the files it has found. I've never had it delete anything that caused the machine it was fixing not to boot. But of course before you do anything like this, BACK UP YOUR DATA!!!!! But you already did that so proceed. Do the scan, remove the junk and log off Kaspersky. Just turning off your computer with the power button won't hurt anything when you are running a rescue CD. <br /></p><p>The reason rescue CD's are so effective, is you're not trying to disinfect a computer with an infected OS. When you boot to the hard drive of an infected machine, you're playing on the bad guy's home turf. They control the machine and in many cases they've hidden the infected files so your antivirus can't see them. The rescue CD can scan your boot sector, and you hard drives from the outside looking in. The malware doesn't have a chance to hide if it's not running. It's become the first step I now use when I'm dealing with an infected machine. There are other rescue disks out there and many are very complicated and take a very long time. The Kaspersky Rescue Disk is the fastest and easiest I've found to clean an infected machine enough to allow me to boot back into Windows and complete the process by adding my favorite automated antimalware tools to keep the system clean going forward.</p></span>Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com1tag:blogger.com,1999:blog-812380323477512426.post-48662801931138868852009-11-27T15:34:00.001-08:002009-11-27T15:34:02.120-08:00Login Security Tips<span xmlns=''><p>Today many of us live online, we bank, shop, and communicate with old friends via the internet. The problem with online life is that your identity is out there in so many places eventually one of the sites will be compromised. To protect ourselves we come up with passwords that supposedly only we know. Problem is people don't take the time to use properly secure passwords because they are too difficult to remember. How many people use the word "password" for their password? It happens all the time. So to combat this many sites require passwords of minimum lengths, this is fine except if you are using a word out of the dictionary, it is fairly trivial to crack. So to really get a secure password, we need to use a password with more than a few characters and it needs to include letters, numbers, and if the site allows it, symbols to make a decently secure password. Another problem then arises how do you remember your password? Security expert Bruce Schneier <a href='http://www.schneier.com/%20'>http://www.schneier.com/</a> recommends people can write them down and post them by their computer. This may sound crazy, but his point is simple, it's more important to have a secure password you'll never remember than one that's easily discovered by hackers. The fact is if someone has physical access to your computer all bets are off anyway.<br /></p><p>My only problem with this idea is many people need to access their secure information while they're away from home or the office. Having your passwords written down while you're on the road is not a good idea, so you need to devise a way to create secure passwords that can be remembered. Doing this isn't as difficult as it sounds, devise a method that makes sense for you and use it consistently. One method I've used is to take a line you remember from a song you like and take the first letter of the line and then add numbers or symbols to it that make sense to you. I use lines from old songs I remember and I add numbers of old addresses, birthdates, or a series of numbers I just picked at random but can remember. The important thing is that it be easy to remember and totally random. The length of the password is also important less than 8 characters is too short, ideally 20 characters are considered totally secure most people can come up with a 10 to 12 character password they can remember that will be very secure.<br /></p><p>Many people prefer to use a program to remember their passwords. A couple of very good programs I've used that are secure and easy to use are Roboform, <a href='http://www.roboform.com/%20%20'>http://www.roboform.com/ </a> and KeePass <a href='http://keepass.info/%20%20'>http://keepass.info/ </a> . While I don't use them anymore I think both offer a great service and should be considered by anyone looking for a simple way to manage your passwords in a secure fashion. <br /></p><p>Another and potentially more serious problem which I see everywhere online, is the vulnerability in resetting your passwords. Several public figures have had their accounts hacked by the use of poor authentication protocols that websites use to reset your password in case you forget, or lose it. Sara Palin the Vice Presidential candidate in last year's national election in the United States is a great example. Her Yahoo mail account was hacked into because the security question was easily guessable and available on Wikipedia. This problem is perhaps the single largest login security hole we are facing. Typically websites ask questions like your mother's maiden name, or your first home town. This information can be often found in publically available locations. A better protocol is for sites to have the user to set their own "secret question". This is better but you still need to be careful not to use questions which can be guessed or known by others. On a more delicate note people need to realize that identity theft occurs most frequently by people that you know personally. It's not a good feeling, but it's statistically a fact, and shouldn't be ignored.<br /></p><p> So how do you get around this problem of authentication? Simple, you lie. If you have to use your mother's maiden name, make up one you can remember. Use the name of someone else you may know or use a color you hate. There's no law that says your mom's maiden name isn't pink or you have to be truthful. Just make sure you remember the fake name you choose.<br /></p><p>Logging into websites we use is easy to take it for granted. The problem is once your identity is compromised it can be a nightmare to fix all issues that will arise. Take the time to use good, secure passwords and remember, that your security questions you are asked are just as important as your passwords. </p></span>Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com2tag:blogger.com,1999:blog-812380323477512426.post-58190519327151509962009-11-26T00:07:00.001-08:002009-11-26T00:07:48.936-08:00When it comes to malware removal use a shotgun not a rifle.<span xmlns=''><p>Cleaning an infected computer is a challenge, unfortunately the malware writers are getting talented which translates to real trouble if your machine gets infected. Many computers ship with large all in one security suites. These all in one programs look good on a checklist comparison in PC Magazine but I prefer to use a variety of programs from different vendors, each using a slightly different method of cleaning your machine to give you the best chance of finding all the of the bad files.<br /></p><p> Recently I had to deal with a Lenovo Thinkpad my daughter had been using. The laptop was recently given a clean install of Windows XP and is a spare machine I use only occasionally. After my daughter had finished using it, I did a routine scan using Malwarebytes a very good free anti-spyware program. The scan found 15 infections including some Rootkits, which can be very difficult to remove. So Malwarebytes told me I needed to reboot the computer to finish the removal, I complied and rescanned. Same results, same Trojans, same Rootkits, so I scanned with Microsoft's Security Essentials, a new free anti-virus Microsoft recently released. Security Essentials found nothing at all, so I tried a new (to me) website, virustotal.com. Virustotal allows you to upload suspicious files to scan to determine if they are a threat or possibly a false positive. I uploaded the file that was showing up the most frequently on the quick scans, virustotal scans the file using over 40 different malware removal engines, only one McAfee Virus scan found the file to be suspicious so I was beginning to think I might have a false positive. The fact that the file kept reappearing was very suspicious so I needed to get serious.<br /></p><p>The next step was to run CCleaner a very good registry, and temporary file cleaner. CCleaner will make virus scans faster and may delete files that are allowing a possible payload to reload when you restart the computer. After using CCleaner I installed Superantispyware, a program I always install as one as my primary tools to combat spyware. The fact that this computer was a fresh rebuild was the only reason I hadn't installed it yet. Installing and running Superantispyware goes very fast, it's a great program that is the favorite of many computer technicians. Super lived up to it reputation and found a number of problems including one Trojan with multiple registry entries. Rebooting the machine after Superantispyware finally yielded some results. Additional scans from Superantispyware and Malwarebytes came up clean. My next test is to run a HijackThis. HijackThis is a very powerful tool which must be handled with care. Installing HijackThis is simple, using it effectively is another story. The best way for most people is to run HijackThis which will create a log file. Next post this file to a web site where experts can parse your results and determine if you still have any suspicious files remaining. My preferred site is <a href='http://www.hijackthis.de/'>http://www.hijackthis.de/</a> the site is primarily in German, don't let that deter you though, they have a scanner that will scan your log file in real time and give you a good idea right away if HijackThis has found anything.<br /></p><p>If you have run and re-run your scanning tools run a HijackThis and everything comes up looking okay, you're probably malware free. But for the next few reboots you should continue to make sure your anti-malware programs are up to date and keep rescanning periodically. Most malware these days wants to hide in the background. You may be infected and never know your machine is stealing your passwords and draining your bank account. So stay safe, keep your data backed up and if you get infected use as many tools as it takes to get secure again. <br /></p><p><a href='http://www.malwarebytes.org/'>http://www.malwarebytes.org/</a><br /> </p><p><a href='http://www.microsoft.com/Security_Essentials/'>http://www.microsoft.com/Security_Essentials/</a><br /> </p><p><a href='http://www.superantispyware.com/'>http://www.superantispyware.com/</a><br /> </p><p><a href='http://www.virustotal.com/'>http://www.virustotal.com/</a><br /> </p><p><a href='http://free.antivirus.com/hijackthis/'>http://free.antivirus.com/hijackthis/</a></p></span>Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com1tag:blogger.com,1999:blog-812380323477512426.post-88626342251576561582009-11-08T23:41:00.001-08:002009-11-08T23:41:15.935-08:00Windows 7 Security Essentials<span xmlns=''><p>Windows 7 is a big deal, many people in the tech industry believe it will be the catalyst for the next tech boom in hardware sales. Could be, Windows 7 is a great OS. Staying secure in Windows 7 however still requires users to be careful. If you upgrade to Windows 7 one of the first things I recommend most users do is go to UAC in their start search click on "Change User Account Control Settings" . Once the UAC window appears use the new slider interface to move your security settings all the way to the top to "Always Notify Me", the most secure setting you can have. The reason is obvious the UAC is there for a reason, to protect you. There's no point in turning down your protection you have built in to your computer.<br /></p><p>To back up this point I found a post from Sophos, a security software company that found a random sample of 10 malware samples 7 infected Windows 7 running UAC at its default mode. It also ran the test on a machine running no security software. <a href='http://www.sophos.com/blogs/chetw/g/2009/11/03/windows-7-vulnerable'>http://www.sophos.com/blogs/chetw/g/2009/11/03/windows-7-vulnerable</a><br /> </p><p>Neowin a popular Windows blog however cried fowl, and ripped the methodology of the "study" and I admit Sophos sells sell security software so their motives might be questionable. But I still think it's prudent and wise to turn up your UAC. <a href='http://www.neowin.net/news/main/09/11/04/sophos-windows-7-vulnerable-to-810-viruses-fud-alert'>http://www.neowin.net/news/main/09/11/04/sophos-windows-7-vulnerable-to-810-viruses-fud-alert</a><br /> </p><p>So the next step after turning up UAC is to make sure you have an antivirus program. The free Microsoft Security Essentials is a fine, free program and I'm running it on several machines. I'd also get Malwarebytes anti Malware software and top it off with Superantispyware another great antispyware program. Another common item on the security checklist is to type "Folders" into the start search, open "Folder Options" and select "View". Uncheck "Hide Extensions for known File Types" this way when someone sends you a picture you normally see as a .jpg file you will see the jpg.exe it really is. Pictures don't normally have executables in them, and for some unknown reason Microsoft continues to hide known extensions by default.<br /></p><p>Security threats being what they are, a few quick techniques will help keep you safe, even with the latest and greatest from Microsoft.</p></span>Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com0tag:blogger.com,1999:blog-812380323477512426.post-58132889002920222012009-11-08T22:55:00.001-08:002009-11-08T22:55:03.063-08:00Upgrading to Windows 7<span xmlns=''><p>Windows 7 was finally released to the public on October 22<sup>nd</sup>. The release followed over a year of Pre-beta's, beta's, and release candidates all open for public consumption. The strategy of allowing the public plenty of access to Windows was a sign of confidence that was well placed. Windows 7 is a hit; it's a great improvement over Windows Vista and has received great reviews in the tech press.<br /></p><p> The one question that remained unanswered prior to the release was how the upgrade version would work. Would users be able to do a clean install with the upgrade media, and how would Windows 7 install on computers running Windows XP which isn't supported for doing in place upgrades?<br /></p><p>Fortunately the upgrade version of Windows 7 for any <em>legitimate </em>install works just fine. For my own use I installed 3 copies of Windows 7 which I purchased last June during the special half off sale Microsoft ran for a limited time.<em><br /> </em> The first install I did was a clean install using a hard drive that had Windows Vista already installed on it. Booting from the install media I was given the option of doing either a Upgrade Install or a Custom Install. Choosing the Custom Install, you then click on advanced options, and then choose which partition to install on. At this point you can choose, as I did to format the C drive and do a clean install over the previous version. The other option is to parallel install and end up with a windows.old folder on your C drive. Installing over the old version is useful if you're not sure you have a good backup of your data. The windows.old folder can be explored and files can be dragged into the new install with no problems. Once you're done with the windows.old folder it can be deleted with no problems.<br /></p><p>On this install the process went very fast, it took maybe a half hour to complete. This machine is running a Core i7 and a 10,000 RPM Western Digital Velociraptor Hard Drive, so a fast install wasn't surprising. Reinstalling my old applications took longer than the install but I was up and running at full steam in no time. The next install I did was an in place upgrade of a 2 year old Dell Inspiron 1420 laptop. This required a lot more time and work before and during the install. Prior to the install I ran the "Windows 7 Upgrade Advisor" available from Microsoft. This saves you from potential hardware and software conflicts when doing the install. The advisor indicated I needed to uninstall several programs including iTunes and NOD32 antivirus. This also turned out to be a good time to get rid of a few other programs I hadn't used for a while so once I had cleaned up my Program and Features in Vista I ran the install. The upgrade took about 2 hours and once completed I was able to reinstall iTunes and NOD32 and things have been running great ever since.<br /></p><p>My last upgrade was for my HP Mini 2140 Netbook running the standard Atom 1.6 GHZ Atom Processor. This was a fairly new computer and had little if anything to be backed up. So I just used the upgrade install disc to format my C drive and do a full clean install. Once again it went without any issues at all.<br /></p><p>Overall my experience with doing both clean installs and in place upgrades went great. Some issues have come up for some people though. When using a upgrade version of Windows 7 and installing it on a new or previously formatted hard drive you will not be able to get past the point in the install where you are prompted to enter the product key. Instead, you need to continue on without entering your key. Once the install is complete type activate in your Start Search and click on activate Windows. You will be prompted to either activate online or by phone, choose phone and then answer the questions you are asked. As long as your computer came with a copy of Windows you are entitled to the upgrade price.<br /></p><p>Some links for Windows 7 the upgrade advisor download: <a href='http://www.microsoft.com/downloads/details.aspx?FamilyID=1b544e90-7659-4bd9-9e51-2497c146af15&displayLang=en'>http://www.microsoft.com/downloads/details.aspx?FamilyID=1b544e90-7659-4bd9-9e51-2497c146af15&displayLang=en</a> and a great tutorial for upgrading XP to Windows 7: http://www.butterscotch.com/tutorial/Upgrading-From-XP-To-Windows-7-An-Overview-Of-Whats-In-Store<br /></p></span>Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com0tag:blogger.com,1999:blog-812380323477512426.post-69602183368887193722009-10-01T20:10:00.001-07:002009-10-04T07:52:31.987-07:00Superantispyware Pro Version<p>About a year ago I reviewed Malwarebytes  antispyware program and I gave it a great review. One of the comments I received was from Mike Duncan Director of Business Development from Superantispyware, a program I’ve used for a couple of years now. The representative offered me a free license for SuperAntispyware Professional Edition. I was delighted with the offer since I’ve always been pleased with free version. So I took him up on his offer and gave it a try, and that’s where my problems began. I installed the program put in the license and all seemed fine. It worked fine until the next reboot, at this point Superantispyware would ask me for a license key each and every time I restarted the computer. So I uninstalled the pro version and forgot about it.</p> <p>Eventually Mr. Duncan emailed to ask me how it was going. I let him know what happened and suggested try the latest version. So I gave it another shot and this time the program worked fine. With no issues with the license SuperAntispyware Pro began to show it stuff!</p> <p>SuperAntispyware free version had always impressed me with its low resource use, the Pro version carries on this behavior using only 4280K in memory when running in the background according to the “task Manager” for all users. Running a scan bumps ram use up to 6352k, on my Dell Inspiron 1420 with a 2.2 GHZ core 2 duo. The ram usage is very lightweight and impressive, as is the free version. The real time protection you get from the Pro version is very good. It can prevent you from getting into trouble when you go to a website that’s been compromised and it does a good job of cleaning a computer that’s been infected. The “quick scan” took a while, close to a half hour on a 320 gig hard drive with about 76 gigs free. The quick scan took a little too long for my tastes but it is really more of a full scan compared to the quick scan of other programs. </p> <p>SuperAntispyware Professional edition is an amazing value, for just 29.99 it provides the user a lifetime license. For this price its really hard to pass up the Pro license, no yearly subscription just a one time payment. It can be used with other antispyware programs and it makes a great combination with Malwarebytes.</p> <p>SuperAntispyware Professional is a great program for a terrific price, I consider it a great value and its definitely what I consider one of the best of the new breed of anti-malware programs available today.</p> <br />Get SuperAntispyware Professional at http://www.superantispyware.com/downloadfile.html?productid=SUPERANTISPYWAREMarkhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com0tag:blogger.com,1999:blog-812380323477512426.post-32750091831347866522009-07-19T17:48:00.001-07:002009-07-19T17:48:06.542-07:00HP Mini Note 2140<p>Recently I purchased a MSI Wind U115, this is a great little netbook with a very innovative hybrid hard drive that delivered incredibly fast boot times and very snappy performance in general. Unfortunately the keyboard was just to small for me to get use too, and I returned it.</p> <p>After looking around at the various retailers I realized that the HP netbooks all had one thing in common, great keyboards. The large sized keys and 92% full sized keyboards make typing much easier so I looked around for the model I wanted and found I wasn’t able to find the model I wanted anywhere locally so I ordered it online from CDW a large technology reseller. The service from CDW was awesome, they as good as you will get from an online retailer, enough said.</p> <p>The model I ordered was a HP Mini Note 2140 It has a 10 inch screen and the aforementioned keyboard and a great aluminum case that has a much nicer finished than many of the plastic netbooks  I looked at. The boot up times and performance aren’t bad at all, not quite as snappy as the U115 but quite acceptable. I am currently removing much of the trialware that comes with the computer and I expect performance to improve once I’ve replaced things like the McAfee’s security suite with an antivirus that will be lighter weight. Right now I’m pleased with the size and build quality, the keyboard is smaller than normal but for me useable, unlike the MSI Wind keyboard and its little tiny keys.</p> <p>So for initial impressions I’m quite happy I already find the size has me bringing the 2140 places I wouldn’t have bothered with before and I find it useful having it around. Netbooks don’t replace full sized desktops or laptops but they fill a niche I have wanted for some time.</p> Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com0tag:blogger.com,1999:blog-812380323477512426.post-10779354101136794532009-07-19T00:38:00.001-07:002009-07-19T17:46:46.504-07:00Free Cloning software Part 1: Easus Disk Copy<blockquote> <p>Upgrading your hard drive can be a rewarding and simple procedure for the everyday computer user. Cloning your hard drive or making a exact copy is the easiest way to get the new hard drive up and running quickly, It’s also a popular tool for many professional IT people to backup a computer setup to be instantly restored in case of a disaster. </p> <p>There is a number of paid commercial programs that serve this purpose, Norton Ghost is very popular as is my favorite, Acronis True Image. Both do a great job and have a number of useful options besides the cloning function. They are great programs but they cost money, and money is tight right now so I thought I try out a few free cloning programs that do the job just as well, albeit without the options the paid programs include.</p> <p>The first program I tried successfully was Easus Disk Copy.  Disk Copy allows a user to replicate their hard drive on to a external hard drive, the only option besides a full copy is to choose an individual partition a useful feature that I <em>didn’t</em> test.</p> <p>Easus Disk Copy is simple to use, you download the program and burn the iso image to a CD. You then boot to the CD and follow a simple set of windows guiding you through the process. Once your target disks are selected you simply wait for the process to take place. This is where Easus falls short of the paid programs I’ve used. The entire operation took over 3 hours to clone a drive with about 140GBs of data to the new drive, not a big deal for most situations but if you’re in a hurry you’ll want a different program.</p> <p>Another issue which was no big deal but could be for some people, was that out of the 3 drives I cloned 2 required me to repair the Windows Boot Loader using an install disk. No big deal for me but if you don’t have an install disk for the operating system you have or don’t feel comfortable doing this, it would be a real hassle.</p> <p>Overall I think Easus Disk Copy did a fine job, it’s free and relatively simple. Since hard drives have become so inexpensive it seems silly to pay for software if you’re only using it on rare occasions. I give it a conditional “fully recommend” rating’ the condition being the user knows how to burn an ISO file and is able to repair the boot loader if needed.</p> <p>Get Easus Disk Copy here <a title="http://download.cnet.com/Easeus-Disk-Copy/3000-2248_4-10867157.html" href="http://download.cnet.com/Easeus-Disk-Copy/3000-2248_4-10867157.html">http://download.cnet.com/Easeus-Disk-Copy/3000-2248_4-10867157.html</a></p></blockquote> Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com0tag:blogger.com,1999:blog-812380323477512426.post-54867527663872318242009-07-06T18:33:00.001-07:002009-07-17T23:57:09.153-07:00The MSI Wind U115<p>The MSI Wind U115 is in a class of its own in the world of netbooks. Unfortunately it’s destined to stay exclusives a few months after being released, MSI is discontinuing the U115 due to the nuances of Microsoft’s licensing policies. The Wind U115 features a bit of technology people have been asking for, for some time. The U115 has a combination of a solid state drive 8 gigabytes in size with a 160 gig spinning hard drive for data.</p> <p>This hybrid technology delivers a fast booting extremely responsive  little computer that gets up to 12 hours battery life running several applications at a time, wireless on, with the screen brightness turned up all the way. Right now I’ve got 81% battery life left after almost 4 hours of use showing 9:35 remaining.</p> <p>Like I mentioned this great little machine will not be available long, thanks to Microsoft. The guys from Redmond have decided that the standard netbook pricing for Windows won’t apply to models running the two drive hybrid configuration. Its a shame looking at the U115 no one would ever  aware of the quick launching of programs and the excellent battery life. </p> <p>The U115 works very well, but its 8 GB SSD drive is almost full when you get the machine. So you start getting nag screens telling you that your C drive is almost full after installing just a few applications to the C drive. The 8GB C drive is the U115’s biggest weakness, to make this design work the SSD needs to be at least 16GB and preferably 32. 32 would allow you to install Windows 7 and a number of applications without running into the space issues. The other negative to the little MSI is the keyboard, its just way to small for my hands. The keyboard is better than the early Eee PC’s but much smaller than some netbooks, and it may be the  deal breaker for me. The touchpad isn’t bad many netbooks do strange things with their touchpads, like sat them to one side and put the  buttons in the front, MSI keeps it conventional clicking is a bit stiff and requires a deliberate push to click on something.</p> <p>The finish quality of the Wind is quite good, it looks nice and has a solid feel to it. I really like the U115, but you have to be selective about the apps you install unless you want to put them on the D drive. If your going to install iTunes or the Zune software you have to put it on your D drive. I’ll continue to use the U115 but the time to return it for a refund is drawing near and I’ll have to seriously consider if I can live with the keyboard and C drive limitations.</p>Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com0tag:blogger.com,1999:blog-812380323477512426.post-40755636263198026022009-06-23T22:58:00.001-07:002009-06-23T23:15:28.216-07:00Extreme Tech Website and Podcast has been given the axe<span xmlns=''><p>Over the last few years Extreme Tech the great enthusiast website for computer builders and do it yourself guys and gals has been one of my top reads on a daily basis. Lloyd Case, Jason Cross, Joel Durham and Jim Lynch have done a great job over the last few years and they will be missed. PC Magazine which was the corporate parent (Under Ziff Davis) has been going downhill for some time. It started with the Departure of Bill Machrone former Editor in Chief a few years ago and ended up going to online only at the end of 2008. <br /></p><p>Also gone is the Extreme Tech podcast hosted by the same crew. The podcast was quite informative but it seems PC Mag has ended all its west coast content and is going to run entirely by the east coast branch. Too bad, from what I've seen of the PC Magcast lately they could use some substance. The new "After Dark" iteration of the show is a quick fast forward, once I figure out what it is. The regular show is fine but not really for enthusiast who build their own PC's or think slightly differently from "conventional wisdom". <br /></p><p>So it's quite disappointing to see where PC Magazine has gone, there's nothing there for me anymore, nothing I can't get in a million other places. Anandtech, Tom's Hardware, and Maximum PC all do a great job reviewing computer hardware, they don't do the "best bang for the buck" type articles in the same way Extremetech did but, they will have to do.<br /></p><p>So to Lloyd, Jason, Joel and the rest of the Extreme Tech crew, goodbye and good luck! And thanks for all the great information over the tears. I'm sure they'll all do fine as cream rises to the top, I look forward to visiting their new sites which I'm sure will be up soon.</p></span>Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com0tag:blogger.com,1999:blog-812380323477512426.post-84402847631384195302009-04-28T23:58:00.001-07:002009-04-29T20:37:24.182-07:00Troubleshooting a uninstall gone bad<p>Today I was doing a little maintenance on my daughters Gateway laptop, uninstalling one ant-spyware program and upgrading another to real-time protection. It seemed to go fine, I ran the Uninstall from Programs and Features in Vista and enabled the full time protection in Malwarebytes with the registration codes and rebooted. When the computer shut down I noticed it installing several updates, I didn’t think much of it at the time but when the machine restarted, the brown stuff hit the fan. I didn’t have any mouse! The trackpad was totally unresponsive so I plugged in a old USB trackball mouse, success! So I clicked on the admin account I keep on the machine and went to type my password, nope the keyboard didn’t work either. So I rebooted after plugging in my usb keyboard. Windows went through its usual routine and told me the keyboard had installed and was ready to use, except, it wasn’t. It wouldn’t work at all.</p> <p>Basically I was hosed, I couldn’t run the device manager from the limited account, or do a system restore. I had to get into the admin account or I was stuck. So I did what any red-blooded geek would do I Googled “resetting a password in Vista”. I came up with usual Microsoft solution, you know the one where you use the password reset CD you made when you set up the com-pu-ter, yep that one, the one no-one ever makes! Fortunately for me I also found a reference to TRK or the Trinity Rescue Kit. TRK is a Linux based bootable CD, that can be used for resetting passwords, recovering files and a few other things relating to Windows calamities. It took a few tries, TRK is command Line based tool and none of the instructions worked exactly as they said they would. Once the CD booted normally I ended up typing winkey u admin, this started TRK searching and mounting all the files in the system. I choose 2/enter in the next dialog then typed an * confirmed with a y, and this created a new administrator account with no password.</p> <p>I was able to log into the Administrator account and then began the next phase of fixing the corrupted drivers. This took a while longer than I anticipated, I tried deleting the trackpad and keyboard in Device Manager , both had the little caution signs next to them indicating a damaged or corrupted driver, rebooted but this didn’t work. I finally resolved the problem but using a restore point, fortunately you can get there with just a few clicks of the mouse. So I got lucky, the USB mouse worked and the TRK worked after some trial and error. Get the Trinity Rescue Kit here <a href="http://trinityhome.org/Home/index.php?wpid=1&front_id=12">http://trinityhome.org/Home/index.php?wpid=1&front_id=12</a>, I recommend it for your toolkit, it definitely saved my bacon.</p>Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com0tag:blogger.com,1999:blog-812380323477512426.post-37408129867030891692009-04-12T18:11:00.001-07:002009-04-22T21:59:11.870-07:00Repair Install in Vista<p>I’ve heard a number of tech experts including the esteemed Mr. Lloyd Case from Extreme Tech podcast as well as others like Steve from the Podnutz podcast state that there is no way to do “repair install” in Windows Vista similar to XP, or all recent editions of Windows for that matter. Actually Microsoft has given Vista users a way to repair Vista with the install DVD, they're just hiding it a little. And although Vista doesn’t make it obvious like it used to be, it still exists.</p> <p> So here’s where they're hiding it, you get a repair install in Vista by doing a “In-Place Upgrade”.</p> <p>1. Start the computer boot to Vista OS.</p> <p>2. Insert the Windows Vista DVD in the computer's DVD drive. </p> <p>3. Use one of the following procedures, as appropriate:</p> <p>If Windows automatically detects the DVD, the Install now screen appears. Click Install now. </p> <p>If Windows does not automatically detect the DVD, follow these steps:</p> <p>a. Click the Start Button, type Drive:\setup.exe in the start search box and then click OK.</p> <p>Note: Drive is the drive letter of the computer's DVD drive. </p> <p>b. Click Install now. </p> <p>4. When you reach the "Which type of installation do you want?" screen, click Upgrade to upgrade the current operating system to Windows Vista. Please make sure the edition of Windows Vista is selected correctly.</p> <p>I didn’t get these instructions by reading a 1000 page manual, I got them from Microsoft when I needed tech support installing SP1. I followed the instructions and it worked great for me. Of coarse if you’re doing anything this extreme make sure you have a full backup and are using the correct disk. If you have SP1 already installed you need have a SP1 disk to do what Microsoft calls an In-Place upgrade (Repair install) in Vista.</p>Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com4tag:blogger.com,1999:blog-812380323477512426.post-80432090690561349122009-04-09T22:12:00.001-07:002009-04-09T22:12:08.665-07:00Using Malwarebytes Antispyware Program<span xmlns=''><p>I spend a lot of my day listening to podcasts and one of favorites is Podnutz and Podnutz Daily hosted by Steve Cherubino. In his latest episode Steve talks to Bruce Harrison lead researcher for Malwarebytes which is the best antispyware product currently out there, in my humble opinion. The biggest eye opener for me was that Bruce kind of squashed two old habits I've had for running antimalware programs, since I started using them. Bruce stated that Malwarebytes should be run in normal user mode, not safe mode as I've done for ages. He also stated that for the vast majority of users need only run the "Quick Scan" and not the deep scan which can take hours, especially on my Terabyte desktop drive. Bruce stated that Malwarebytes concentrates on folders where malware is targeted these days and ignores folders not targeted in the quick scan. He also gives good advice about running as limited user, and actually sounds pretty optimistic about the war against the cretins who create this junk. For once someone not spreading FUD, it was refreshing.<br /></p><p>Check out Podnutz at http://podnutz.com/ and take a look at all of Steve's great content. He's a regular working stiff who still finds the time to put together an amazing amount of online audio and now video content for tech junkies interested in either fixing their own computers or people with their own computer repair business.</p></span>Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com2tag:blogger.com,1999:blog-812380323477512426.post-63296319621285486382009-03-21T11:25:00.001-07:002009-03-21T11:25:10.267-07:00PC-BSD Best Unix for Beginners?<p>I recently downloaded and installed the latest versions of PC-BSD <a title="http://www.pcbsd.org/" href="http://www.pcbsd.org/">http://www.pcbsd.org/</a> and I have to say I’m extremely impressed. The install went fast (18 minutes), and it was extremely simple and straight forward. I downloaded the 7.02 version using the DVD option. Downloading using http went fairly quickly, I tried to use bit-torrent and there were simply not enough seeders to make it reasonable. During the install you get the option of adding various additional components already on the DVD including Firefox 3.0, Thunderbird, and Open Office 3.0. Based on FreeBSD version 7.0 PC-BSD is stable and secure, the GUI is the new KDE 4.1.2 and I really enjoy it. Installing new apps is far easier and straight forward than Linux in my opinion and I’m comparing it side by side with Kubuntu 8.10 which also uses the new version of KDE.</p> <p>The secret to improving usability in PC-BSD is the PBI or Push button Installer or PC-BSD Installer. The .pbi extension has all the files needed to install the applications by simply double clicking the file, this is essentially the same as an setup.exe file in Windows or the .DMG file in OSX. The pbi applications can be found at <a title="http://pbidir.com/" href="http://pbidir.com/">http://pbidir.com/</a> where an great variety of programs can be had. For more hard core Unix geeks the FreeBSD Ports are also available. FreeBSD Ports are similar to the apt-get found in Linux systems and any FreeBSD Port can be downloaded with all their packages and dependencies to install them in PC-BSD. But for beginners everything you’ll need not on the install DVD will be found at pbi.dir.com site.</p> <p>The default browser in KDE is Konqueror which is what the Safari browser was originally based on, it’s a very fast browser but I vastly prefer Firefox. Firefox on PC-BSD came with all the plug-ins installed to play you tube video’s and to render most web pages as they were meant to be seen.</p> <p> PC-BSD seems like the perfect OS for a netbook, it’s lightweight and simple, and has great applications like the  Flock browser available which are perfect for social networking sites and cloud based email. Unfortunately a netbook isn’t in the budget right know  but I’d love to hear from anyone who’s installed it on one.</p> <p>I’ve tried at least a dozen different Linux distros over the past few years and although they all worked fine, I really feel PC-BSD has surpassed them in ease of use for the  beginner. There were a few issue’s though. Although it runs flawlessly on my desktop, PC-BSD did have a few problems on my Thinkpad R60. The Ati video card isn’t supported for 3D graphics and the proprietary driver available on Linux builds doesn’t work. It also had a issue with my wifi card, although it would connect it never showed better than a 25% signal despite being in the same room as the router. The signal would also occasionally drop out only to reappear shortly afterward. So It’s worth looking through their support page and checking to see if your hardware is supported. If your trying it on a laptop with network cards not supported I’d hold off. It’s main feature is simplicity, but that will go away quickly if your hardware has know issues, in that case Ubuntu or Kubuntu might be a better choice. </p> <p>Despite the few glitches I still recommend PC-BSD it’s well worth a try especially if your the sort of person who always like to try new Linux builds or are looking for a secure and stable operating system to put on your machine without shelling out for Windows.<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyhz2rjA3QTU2yjS1hiXNUsBVBHPkCurhYd71Z1-AmN_koaLJapbLC48Ey6WCAOXl6raNeZMoZypz8PSq_YnQwY9ruyLbzv2lxkUreytD88RopRROMCvFa2SMc_p5QwyzRyOw7OAewXAF6/s1600-h/pc-bsd%5B2%5D.png"><img style="border-bottom: 0px; border-left: 0px; display: inline; border-top: 0px; border-right: 0px" title="pc-bsd" border="0" alt="pc-bsd" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7C21awFzNBARhQeXbe41jncCHxm4Emd1IGpRTY4ui96b4zZE4zejaXUEvNFf8d4CkTddDYakBnq5wV62oeRc5U3xtCQ3V2qeZD4nWhH-cccHKMLOqWtr6F5wkI4YJfMKSLlITH8beDogH/?imgmax=800" width="244" height="184" /></a></p> Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com0tag:blogger.com,1999:blog-812380323477512426.post-3572519962599270462009-02-06T16:00:00.001-08:002009-02-06T16:00:19.249-08:00Windows 7 UAC Security Issue<span xmlns=''><p>Although generally lauded, Windows 7 the next version of Windows due out later this year has a potentially dangerous security flaw built into it. User Account Control (UAC) is a security feature first introduced in Windows Vista that has been a source of complaints from many long time Windows users. UAC in my opinion was a good idea, and does improve security in Vista compared to XP. Unfortunately in the beta version of Window 7 Microsoft has changed the UI in UAC allowing users to use a slide which determines the level of annoyance UAC will operate at. At the bottom of the slide UAC is essentially turned off, at the top of the slide UAC is in "Vista" mode which notifies you anytime you try to change anything about your system. By default Win 7 leaves the setting in a position were changes to Windows does not notify the user. This makes UAC less, "in your face", and is appropriate when you are off line and setting up your new operating system. It is however far less secure than many users think they are, as two independent Windows researchers recently discovered. Rafael Rivera and Long Zheng have found that running a basic script on your computer can turn UAC off without the user knowing it. http://www.withinwindows.com/2009/01/30/malware-can-turn-off-uac-in-windows-7-by-design-says-microsoft/.This would allow the computer to be completely compromised. This seems like the type of flaw beta releases are meant to find, Microsoft feels differently however. Seems this is one of those "it's not a bug, it's a feature" routines and Microsoft feels the feature is finished, locked into the final build, as is. The fix seems obvious, they could make changing the UAC level require administrative permission which would alleviate the problem. The least's they could do is to set the default level at the highest level so unsophisticated users are less likely to be bit by this.<br /></p><p>I understand UAC in Vista was the source of many complaints and at least one "I'm a Mac" Apple commercial which cleverly (albeit dishonestly) made fun of the feature in Vista. So Microsoft must feel it can't win on this one. Personally I felt UAC in Vista was a worthwhile and effective security measure, and I'd argue, well worth the minor inconvenience it caused. But many people complained and so in 7, Microsoft tried to allow the user to turn UAC down so people would complain less. So to a certain extent I feel users are getting what they asked for, and you can protect yourself by turning UAC all the way to the highest setting, essentially the same as the default Vista setting. <br /></p><p>The good thing is, Microsoft can change this, at least turn the default setting to fully protected. This is what Beta testing is for and it in no way takes away from the otherwise fantastic job the Windows 7 team has done. Windows 7 is fantastic and a ton of great features which I'll no doubt upgrade all my Vista machines because I believe it worthwhile upgrade. <br /></p><p><span style='font-size:14pt'>UPDATE<br /></span></p><p>Microsoft has come through and done the right thing. They will be modifying the UAC in 7 to require administrative rights to change UAC settings. Good for them and thanks to the Windows blogging community for holding their feet to the fire on this one.</p></span>Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com0tag:blogger.com,1999:blog-812380323477512426.post-27721490543483482632009-01-29T20:19:00.001-08:002009-01-29T20:19:18.306-08:00The Peasants are at the gate<span xmlns=''><p>Windows 7 is a hit. On January 10<sup>th</sup> Microsoft released the public beta of their next operating system Windows 7, and to say the least it is a hit. So much in fact, it has spawned a movement of Windows enthusiasts that want it released right now. The website <a href='http://www.releasewindows7.com/'>http://www.releasewindows7.com/</a> is trying to gain support for exactly that. Their argument, that Windows 7 is not only stable and well polished, but ready to be released immediately is founded on more than fanboi enthusiasm or wishful thinking. With the poor sales and the horrible perception of Windows Vista a reality, Windows 7 is being developed by an entirely different team at Microsoft. Their approach is to only include components of the OS that are fully baked for public consumption, and apparently it worked. I've yet to see a credible review of Windows 7 that doesn't give it high ratings. This is great news for Microsoft, the economy is the worst it's been in decades and the company needs a home run with the next operating system. I haven't seen this kind of enthusiasm for an OS from Microsoft since Windows 95 and it's about time.<br /></p><p>So as of now the peasants have armed themselves with broomsticks and pitchforks, and are beating on the doors in Redmond, demanding Windows 7 be released, and the captors couldn't be happier.</p></span>Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com0tag:blogger.com,1999:blog-812380323477512426.post-13441226394846466952009-01-23T10:07:00.000-08:002009-01-23T10:27:08.083-08:00Have Win32/Conflicker? No excuses for the infectedThe latest worm to plague Windows users the Win32/Conflicker, also known as "Downadup" is spreading like wildfire. Sadly there's no excuse for people catching this junk and joining the bot-net. Microsoft patched this hole on October 23rd 2008 in a out of cycle security patch. So, people who have their updates turned on automatically are protected, those who don't can get Microsoft's updated version of their Malicious Software Removal Tool here, at http://www.microsoft.com/downloads/details.aspx?FamilyID=ad724ae0-e72d-4f54-9ab3-75b8eb148356&displaylang=en<br />I imagine most anti-virus programs will find this as well, but if your anti-virus is expired and your updates aren't turned on, you're probably hosed by now anyway.Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com1tag:blogger.com,1999:blog-812380323477512426.post-39021427874880005832009-01-23T00:00:00.001-08:002009-01-23T09:53:47.253-08:00It’s All About the Data<p>Today’s computers are amazing, when you consider the processing power available, and the amount of storage you can have for incredibly little money, even the low end bargain computers today can do amazing things. You can easily build a $500 desktop computer that has a multi-core processor, and a terabyte of storage, with the power to edit video and photos, or play graphic intensive video games. But whether you’re running a $7000 custom high end gaming machine, or a $399 special from a sale at the local retailer the most important and precious thing in your computer is your data. Data is everything, it’s your kids baby pictures, your entire music collection, or possibly that book you've been writing for the last three years.</p> <p>The problem with data is, even though it’s the most important thing on your hard drive, it’s frequently the least considered. To protect your data generally isn’t very hard, but its very easy to put off. People rationalize that since the hard drive from that Windows 95 machine still runs that their current machine will be fine for now and I’ll just do that backup next week when I have time. Unfortunately just when you least expect it, your hard drive crashes the night before you finished the report your boss wanted first thing in the morning or you lose the pictures of family members that can’t be replaced. </p> <p>So now you know, backing up isn’t an option.  Backing up isn’t hard, and it doesn’t need to be complicated. If you’ve never backed up before it can be as simple as buying an external hard drive, or even a large thumb drive, and dragging your important files over to the external drive periodically. </p> <p>Saving your important files to a external drive is the first step. The next step will be to implement an automated system of backing up at least once a week. For that you need software. If you are running Windows Vista and you want to keep it simple the built in “Backup and Restore Center“ will help you set up weekly backups of all your important data. It’s very simple and works well, I’ve successfully used it to back up and restore all the important data on my daughters computer after a disaster. </p> <p>For a more thorough backup solutions I prefer third party programs. Acronis True Image Home, is an excellent program. <a href="http://www.acronis.com/homecomputing/">http://www.acronis.com/homecomputing/</a>It has more capabilities than some users may want, but it has the ability to make an entire image of your hard drive as well as do incremental backups periodically afterward. Programs that create an image, allow you to take the hard drive you backed up on, and put it in your computer and boot up like nothing ever happened. It saves your operating system, all of your programs, settings, and your data. The new version of Acronis has great new feature, it will perform dual backups to both a flash drive and a hard drive at the same time.<br /><br /> This leads me to my last point, backing up to more than one location is very important. A simple solutions is to use two separate external hard drives, swap out one and backup to the second while you keep the other off site. This could be at work, at a friends house or anywhere away from your home. Another effective off site backup is to do a backup to an online service of some kind. Microsoft offers a free 25 gigabyte storage service called “Skydrive” available to anyone with a Windows Live account.<a href="http://download.live.com/">http://download.live.com/</a>  Amazon S3 service is another reliable online backup service, S3 isn’t free but you pay only for the space you use, unlike some flat rate services.<a href="http://aws.amazon.com/s3/">http://aws.amazon.com/s3/</a></p> <p>Backing up is necessary inconvenience, developing a routine that fits your needs will make it relatively painless, and some day it will save you a lot of heartache. Remember there are two kinds of hard drives, those that have failed and those that will fail. Many people get serious about backing up only, after they've lost all their pictures or music on their hard drive. There are many very good programs for backing up, either to local storage, or to an online service. I mentioned two which I’ve had experience with and trust, but there are many, very good ones out there.<br /><br /> One last point.Some people using a new online backup services which offered “free” online storage from a relatively new and unknown company suddenly got a surprise when their online storage recently went offline forever. This left them with no backup at all. So staying with companies like Amazon for your online “cloud” storage feels like a safe bet. So backup early and often, because "it’s all about the data". </p>Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com4tag:blogger.com,1999:blog-812380323477512426.post-30880442065643701562008-11-28T00:44:00.001-08:002008-11-28T00:44:53.909-08:00Traditional Technology Media changing<p>Last week I learned that 2 of my favorite tech magazines, PC Magazine, and PC World have made immense changes, either in their staffing, or in their formats. PC Magazine has announced it will be ending its print edition altogether. The January 2009 edition of PC Mag. will be their last. I have to admit I’m bummed. PC Magazine has been one of favorite magazines for years, from their reviews on hardware, to their “Ask Lloyd” and Ask Neil” advise pages, the magazine has been a great source of technology news for more than 2 decades. The good news is, that they aren’t cutting any staff. According to the PC MAgcast podcast, they’ve been transitioning for the last few years to a digital only model, which will still be available for subscription. I’m looking forward to seeing how this works out, I wish them good luck. <a title="http://www.pcmag.com/" href="http://www.pcmag.com/">http://www.pcmag.com/</a></p> <p>I wish I was as enthusiastic about the changes going on at PC World. Apparently in an attempt to remain solvent, they’ve cut several of their highest paid, and in my opinion, best writers. Steve Bass has been writing a fantastic tech advise column for over 14 years and was the first place I’d turn to when a new issue arrived. Steve was let go without much ceremony, last month, without even an opportunity to say goodbye to his loyal readers.  Apparently he will be writing an occasional piece, but his old column is gone. Fortunately for his fans, Steve has started his own newsletter  which is available for email delivery. I encourage everyone to visit his new site at <a title="http://www.techbite.com/" href="http://www.techbite.com/">http://www.techbite.com/</a> and sign up and support this great tech writer.</p> Markhttp://www.blogger.com/profile/17217012952487948453noreply@blogger.com1