<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-762991721971296574</id><updated>2024-11-01T12:41:47.212+02:00</updated><category term="Tech News"/><category term="News"/><category term="pc security"/><category term="security"/><category term="pc tips"/><category term="spyware"/><category term="Registry"/><category term="error fix"/><category term="internet security"/><category term="Data recovery"/><category term="pc performance"/><category term="anti virus"/><category term="malware"/><category term="file recovery"/><category term="recover data"/><category term="virus"/><category term="Review"/><category term="deleted files"/><category term="software"/><category term="software tips"/><category term="Books"/><category term="Parental Control Software"/><category term="fix registry"/><category term="internet filter"/><category term="network scanner"/><category term="DVD Converter"/><category term="Data loss"/><category term="OS"/><category term="Skype"/><category term="Video Editing"/><category term="Windows 8"/><category term="content filter"/><category term="ebook"/><category term="internet web filtering"/><category term="office software"/><category term="recover files"/><category term="registry errors"/><category term="slow pc"/><category term="web filtering"/><category term="windows 7"/><category term="DVD to AVI"/><category term="PDF Writers"/><category term="Parental Control"/><category term="SMTP Server"/><category term="Tweet"/><category term="Tweet Traffic Rush"/><category term="Twitter"/><category term="USB"/><category term="VPN"/><category term="WLan"/><category term="bandwidth control"/><category term="email"/><category term="file archive"/><category term="file compression"/><category term="flash drive"/><category term="how to"/><category term="keyloggers"/><category term="network security"/><category term="office applications"/><category term="online security"/><category term="operating systems"/><category term="privacy eraser"/><category term="recover emails"/><category term="removed files"/><category term="tweaks"/><category term="unzip files"/><category term="webcam"/><category term="wif-fi tools"/><category term="winzip"/><category term="zip files"/><title type='text'>PC tools, Utilities and software</title><subtitle type='html'>PC Tools, Utilities, software downloads, tech news and software tips</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://computilities.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>106</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-2733819252758609050</id><published>2014-05-17T07:19:00.000+02:00</published><updated>2014-05-17T07:22:07.490+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Data recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="file recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="recover data"/><category scheme="http://www.blogger.com/atom/ns#" term="recover files"/><title type='text'>Recover Deleted Files</title><content type='html'>&lt;span class=&quot;itemprop=&amp;quot;articleBody&quot;&gt;Lost 
files can usually be recovered—if you discover the loss soon enough. But
 every time you write to the hard drive, you lower the likelihood of a 
successful recovery. So use that computer as little as possible until 
the files are recovered or you’ve given up hope.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;itemprop=&amp;quot;articleBody&quot;&gt;&lt;b&gt;Check the Recycle Bin&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;itemprop=&amp;quot;articleBody&quot;&gt;&lt;span class=&quot;itemprop=&amp;quot;articleBody&quot;&gt;Windows
 stores “deleted” files here as a safety measure. You’ll find the icon 
in the upper-left corner of your screen. if you find the files there, 
select them, right-click them, and choose&amp;nbsp;&lt;i&gt;Restore.&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;i&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&amp;nbsp;&lt;/i&gt;&lt;/h4&gt;
&lt;h4&gt;
&lt;i&gt;Use your backup&lt;/i&gt;&lt;/h4&gt;
&lt;i&gt;

If you back up your hard drive—or at least your libraries—on a regular 
basis, your files are probably preserved there. I don’t know which 
backup program you use, so I can’t tell you exactly how to search for 
and recover the files. It’s generally a pretty intuitive process.
&lt;br /&gt;


And if you don’t back up, maybe it’s time to &lt;a href=&quot;http://www.pcworld.com/article/2043692/introduction-to-backup.html&quot;&gt;get into the habit&lt;/a&gt;. It won’t help you this time, but it could the next.&lt;br /&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;h4&gt;
&lt;i&gt;
Try file recovery software&lt;/i&gt;&lt;/h4&gt;
&lt;i&gt;
Even a file that’s no longer in the Recycle Bin may still exist. Windows
 doesn’t overwrite the actual ones and zeros until another file needs 
the drive space. That’s why I told you to avoid using the PC as much as 
possible.
&lt;br /&gt;


There are several good file recovery programs available. I recommend &lt;a href=&quot;http://www.piriform.com/recuva/download/portable&quot;&gt;Recuva Portable&lt;/a&gt;.
 It’s easy to use and has a very good track record. And it sometimes 
shows you the images that it can recover. (I’ve seen it recover images 
that it could not preview.) It’s also free.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://images.techhive.com/images/article/2014/04/0505-recuva-100263247-large.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://images.techhive.com/images/article/2014/04/0505-recuva-100263247-large.jpg&quot; height=&quot;252&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;itemprop=&amp;quot;articleBody&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;itemprop=&amp;quot;articleBody&quot;&gt;&lt;/span&gt;&lt;br /&gt;

And, since it’s portable, which means that you don’t have to install it,
 you can use it on your PC without writing to the hard drive. Download 
the program on another computer, and unzip it to a folder on a flash 
drive. Then plug the flash drive into the PC with the missing files, and
 run it from there.
&lt;br /&gt;

&lt;h4&gt;
Hire a professional&lt;/h4&gt;
This is the last resort, if none of the above&amp;nbsp;suggestions work. There 
are many data recovery services available, and since your drive is still
 working, you probably don’t need one of the more expensive ones.&amp;nbsp;
&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;
Originally posted on &lt;a href=&quot;http://www.pcworld.com/article/2147668/how-to-recover-deleted-files.html#tk.nl_pwr&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;PCWorld&lt;/a&gt;&lt;br /&gt;
&amp;nbsp;&lt;/i&gt;&lt;b&gt; &lt;/b&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/2733819252758609050'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/2733819252758609050'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2014/05/recover-deleted-files.html' title='Recover Deleted Files'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-5902596728125463713</id><published>2014-04-13T06:52:00.004+02:00</published><updated>2014-04-13T06:54:47.701+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="OS"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows 8"/><title type='text'>Replace Windows 8 with Windows 7 or a look-alike</title><content type='html'>You can make Windows 8 &lt;span itemprop=&quot;articleBody description text&quot;&gt;behave very much like 
Windows 7. With far less work than it takes to reinstall an alternate 
operating system, you can create a reasonable facsimile of Microsoft’s 
best user interface. &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span itemprop=&quot;articleBody description text&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span itemprop=&quot;articleBody description text&quot;&gt;First, you need a third-party Start Menu program. There are many &lt;/span&gt;&lt;br /&gt;
&lt;span itemprop=&quot;articleBody description text&quot;&gt;out there, but my favorite is the free &lt;a href=&quot;http://www.classicshell.net/&quot;&gt;Classic Shell&lt;/a&gt;. It creates a very close approximation of the Windows 7 Start Menu, with all of the features in the right places.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span itemprop=&quot;articleBody description text&quot;&gt;&lt;span itemprop=&quot;articleBody description text&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
When you set up Classic Shell, go to the &lt;i&gt;Start Menu Settings&lt;/i&gt; tab and select &lt;i&gt;Windows 7 style&lt;/i&gt;. Near the bottom of the &lt;i&gt;Basic Settings&lt;/i&gt; tab, be sure to check &lt;i&gt;Skip Metro screen&lt;/i&gt;. You’ll never have to see that dumb home screen again.&lt;br /&gt;
&lt;br /&gt;
Classic Shell includes more than just a Start Menu replacement. It 
can also return Internet Explorer and File Explorer (the Windows 8 
equivalent to Windows Explorer) to their old selves.&lt;br /&gt;
What Classic Shell can’t do is turn off the charms that appear when 
you mouse too closely to the corners of your screen. Fortunately, there 
are other ways to do this.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://images.techhive.com/images/article/2014/03/0407-navigation-properties-cropped-100251232-medium.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://images.techhive.com/images/article/2014/03/0407-navigation-properties-cropped-100251232-medium.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
One such solution is built into Windows 8.1. Unfortunately, this solution doesn&#39;t disable the bottom-right corner.&lt;br /&gt;
&lt;br /&gt;
If that’s alright by you, right-click the taskbar and select &lt;i&gt;Properties. &lt;/i&gt;Click the &lt;i&gt;Navigation &lt;/i&gt;tab. Uncheck both &lt;i&gt;When I point to the upper-right corner, show the charms&lt;/i&gt; and &lt;i&gt;When I click the upper-left corner, switch between my recent apps.&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;span itemprop=&quot;articleBody description text&quot;&gt;To disable all of these corners, forget the instructions above and use the &lt;a href=&quot;http://winaero.com/comment.php?comment.news.219&quot;&gt;Winaero Charms Bar Killer&lt;/a&gt;. When you launch this free program, it goes directly to the notification area. Right-click the icon for options.&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;span itemprop=&quot;articleBody description text&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt; &lt;/i&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/5902596728125463713'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/5902596728125463713'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2014/04/replace-windows-8-with-windows-7-or.html' title='Replace Windows 8 with Windows 7 or a look-alike'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-4629127580849016760</id><published>2014-02-17T19:40:00.000+02:00</published><updated>2014-02-18T21:23:25.965+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="flash drive"/><category scheme="http://www.blogger.com/atom/ns#" term="how to"/><category scheme="http://www.blogger.com/atom/ns#" term="USB"/><title type='text'>How to format a write-protected USB flash drive</title><content type='html'>Some memory cards and USB pen drives have write protection switches, 
which allows you to prevent files from being deleted, or any new files 
being written to the device. It also prevents the drive or card from 
being formatted.&lt;br /&gt;
&lt;br /&gt;
Occasionally, you’ll find that a &lt;a href=&quot;http://www.pcadvisor.co.uk/reviews/usb-drives/47/&quot; rel=&quot;follow&quot; target=&quot;_self&quot; title=&quot;USB drive reviews&quot;&gt;USB flash drive&lt;/a&gt; will refuse to format and Windows will tell you that it is write protected, even though there is no switch.&lt;br /&gt;
Here are a couple of methods you can try to format the drive and 
remove the write protection. Bear in mind that there is no guarantee 
that they will work for you: your drive or memory card may be corrupt or
 broken and no utility or low-level formatting tool will make it work 
again. The only solution in this case is to buy a new drive.&lt;br /&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;h2&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;Removing write-protection in the Registry using Regedit.exe&lt;/h2&gt;
In any version of Windows from XP onwards, run Regedit.exe (searching
 regedit will usually show the program at the top of the list).&lt;br /&gt;
Navigate to the following key:&lt;br /&gt;
Computer\HKEY_LOCAL_MACHINE\SYSTEM\&lt;br /&gt;
CurrentControlSet\Control\StorageDevicePolicies&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://cdn3.pcadvisor.co.uk/cmsdata/features/3456666/Regedit_Storage_Device_Policies_thumb.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://cdn3.pcadvisor.co.uk/cmsdata/features/3456666/Regedit_Storage_Device_Policies_thumb.jpg&quot; height=&quot;222&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
Double-click on the WriteProtect value in the right-hand pane of 
Regedit.exe. Change the Value data from 1 to 0 and click OK to save the 
change. Close Regedit and restart your computer. Connect your USB drive 
again, and you should find it is no longer write protected. You can now 
format the drive as normal by right-clicking on it in My Computer and 
choosing Format.&lt;br /&gt;
If you can’t find StorageDevicePolicies, you can try creating a key 
by right-clicking in the white space in the Control folder and choosing 
New -&amp;gt; Key and carefully entering the name.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://cdn3.pcadvisor.co.uk/cmsdata/features/3456666/Regedit_new_Key_thumb.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://cdn3.pcadvisor.co.uk/cmsdata/features/3456666/Regedit_new_Key_thumb.jpg&quot; height=&quot;222&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Now double-click on the new key (folder) and right-click once again 
and choose New -&amp;gt; DWORD. Name it WriteProtect and set its value to 0.
 Click OK, exit Regedit and reboot your computer.&lt;br /&gt;
If this method doesn’t work, try the following:&lt;br /&gt;
&lt;h2&gt;
Removing write-protection using Diskpart&lt;/h2&gt;
With your USB drive plugged in, launch a command prompt. Do this by 
searching for cmd.exe in the Start menu (or Start screen in Windows 8). 
In Windows XP, click Start then Run, and type cmd.exe in the box.&lt;br /&gt;
NOTE: you may need to run Cmd.exe with administrator privileges if you see an “access is denied” message.&lt;br /&gt;
To do that, right-click on the shortcut and choose Run as administrator. In Windows 8, simply choose Command prompt (admin).&lt;br /&gt;
Now, type the following, pressing Enter after each command:&lt;br /&gt;
diskpart&lt;br /&gt;
list disk&lt;br /&gt;
select disk x (where x is the number of your USB flash drive – use the capacity to work out which one it is)&lt;br /&gt;
attributes disk clear readonly&lt;br /&gt;
clean&lt;br /&gt;
create partition primary&lt;br /&gt;
format fs=fat32&amp;nbsp; (you can swap fat32 for ntfs if you only need to use the drive with Windows computers)&lt;br /&gt;
exit&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://cdn3.pcadvisor.co.uk/cmsdata/features/3456666/Remove_write_protection_Diskpart_thumb.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://cdn3.pcadvisor.co.uk/cmsdata/features/3456666/Remove_write_protection_Diskpart_thumb.jpg&quot; height=&quot;320&quot; width=&quot;303&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/4629127580849016760'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/4629127580849016760'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2014/02/how-to-format-write-protected-usb-flash.html' title='How to format a write-protected USB flash drive'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-6735428163837788555</id><published>2014-01-19T08:07:00.000+02:00</published><updated>2014-04-13T06:56:02.193+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><title type='text'>Preventing ransomware and Malware infections</title><content type='html'>Avoiding ransomware is much the same as avoiding other types of other malware.&lt;br /&gt;
&lt;br /&gt;
Always run a good antivirus utility and keep Windows and browser-related components (Java, Adobe, and the like) updated. Keep your browser clean to prevent adware invasions that could lead to malware infections. Always, always be wary of unexpected email attachments and spam. (CryptoLocker spreads via .zip files sent as email attachments, for example.)&lt;br /&gt;
&lt;br /&gt;
And just to beat this dead horse one more time: Always have a good backup system in place, just in case your PC does become infected and you can’t recover your files. Yes, it’s that important.</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/6735428163837788555'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/6735428163837788555'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2014/01/preventing-ransomware-and-malware.html' title='Preventing ransomware and Malware infections'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-229516196177570833</id><published>2014-01-19T08:05:00.001+02:00</published><updated>2014-01-19T08:05:29.259+02:00</updated><title type='text'>Rescue your PC from ransomware</title><content type='html'>With the nasty CryptoLocker malware making the rounds—encrypting its victims’ files, and then refusing to provide the unlock key unless a payment of $300 is made via Bitcoin or a prepaid cash voucher—ransomware is back in the spotlight.&lt;br /&gt;
&lt;br /&gt;
You can remove many ransomware viruses without losing your files, but with some variants that isn’t the case. In the past I’ve discussed general steps for removing malware and viruses, but you need to apply some specific tips and tricks for ransomware. The process varies and depends on the type of invader. Some procedures involve a simple virus scan, while others require offline scans and advanced recovery of your files. I categorize ransomware into three varieties: scareware, lock-screen viruses, and the really nasty stuff.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Scareware:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The simplest type of ransomware, aka scareware, consists of bogus antivirus or clean-up tools that claim they’ve detected umpteen issues, and demand that you pay in order to fix them. Some specimens of this variety of ransomware may allow you to use your PC but bombard you with alerts and pop-ups, while others might prevent you from running any programs at all. Typically these invaders are the easiest type of ransomware to remove.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Lock-screen viruses:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Next is the ransomware variety I call lock-screen viruses, which don’t allow you to use your PC in any way. They display a full-size window after Windows starts up—usually with an FBI or Department of Justice logo—saying that you violated the law and that you must pay a fine.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The real nasty stuff:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Encrypting malware—such as CryptoLocker—is the worst variant, because it encrypts and locks your personal files until you pay up. But even if you haven’t backed up your files, you may have a chance to recover your data.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Removing Ransomware&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Before you can free your hostage PC, you have to eliminate the hostage taker.&lt;br /&gt;
&lt;br /&gt;
If you have the simplest kind of ransomware, such as a fake antivirus program or a bogus clean-up tool, you can usually remove it by following the steps in my previous malware removal guide. This procedure includes entering Windows’ Safe Mode and running an on-demand virus scanner such as &lt;a href=&quot;http://www.pcworld.com/article/188005/malwarebytes_antimalware_free_detects_and_removes_malware_on_command.html&quot;&gt;Malwarebytes&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
If the ransomware prevents you from entering Windows or running programs, as lock-screen viruses typically do, you can try to use System Restore to roll Windows back in time. Doing so doesn’t affect your personal files, but it does return system files and programs to the state they were in at a certain time. The System Restore feature must be enabled beforehand; Windows enables it by default.&lt;br /&gt;
&lt;br /&gt;
To try System Restore, shut down your PC and locate the F8 key on your PC’s keyboard. Turn the PC on, and as soon as you see anything on the screen, press the F8 key repeatedly. This action should bring up the Advanced Boot Options menu; there, select Repair Your Computer and press Enter. Next you’ll likely have to log on as a user; select your Windows account name. (If you don’t have a password set, leave that blank.) Once logged on, you’ll find shortcuts to a few tools; click System Restore.&lt;br /&gt;
&lt;br /&gt;
If you don’t see the Repair Your Computer option on the Advanced Boot Options menu, you can use your Windows disc (if you have that) to access the recovery tools. Click Repair your computer on the main menu before proceeding with the installation. Alternatively, you can create a Windows System Repair Disc on another PC running the same Windows version, and then boot to that disc on the infected PC to reach the same recovery tools.&lt;br /&gt;
&lt;br /&gt;
If System Restore doesn’t help and you still can’t get into Windows to remove the ransomware, try running a virus scanner from a bootable disc or USB drive; some people refer to this approach as an offline virus scan. My favorite bootable scanner is from Bitdefender, but more are available: Avast, AVG, Avira, Kaspersky, Norton, and Sophos all offer antivirus boot-disk software&lt;br /&gt;
&lt;br /&gt;
If you still have no luck after trying Safe Mode and an on-demand scanner, performing a System Restore, and running an offline virus scanner, your last resort is likely to perform a factory restore. Most ransomware isn’t that tenacious, however.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Recover hidden and encrypted files:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
With that out of the way, it’s time to repair the damage. If you’re lucky, your PC was infected by malware that didn’t encrypt your data, but merely hid your icons, shortcuts, and files.&lt;br /&gt;
&lt;br /&gt;
You can easily show hidden files: Open Computer, press the Alt key, select Tools, and click Folder Options. On the View tab, select Show hidden files, folders, and drives, and then click OK.&lt;br /&gt;
&lt;br /&gt;
If your data reappears after you elect to show hidden files, that’s great—it means there’s an easy fix for your woes. Open Computer, navigate to C:\Users\, and open the folder of your Windows account name. Then right-click each folder that’s hidden, open Properties, uncheck the Hidden attribute, and click OK. Boom! Done.&lt;br /&gt;
&lt;br /&gt;
If you still can’t find your data, and your files really have been malware-encrypted, you’re in trouble: Usually it isn’t possible to just decrypt or unlock your hostage files, because the decryption key is typically stored on the cybercriminal’s server. Some victimized users have reported that some pieces of malware will keep their promise, decrypting and returning your files once you pay (in particular, CryptoLocker’s handlers have been diligent about releasing the files of infected users who pay the ransom demand), but I don’t recommend paying. &lt;br /&gt;
&lt;br /&gt;
This is why we constantly tell you to back up your PC on a regular basis.&lt;br /&gt;
&lt;br /&gt;
If you previously set and created backups, scan them for viruses on another PC (one that is not infected) if at all possible. If all of your important files are backed up, you can proceed in removing the malware and then simply restoring your backed-up files.&lt;br /&gt;
&lt;br /&gt;
If you don’t have a backup system in place, you might be able to recover some files from Shadow Volume Copies—if the malware hasn’t deleted them. Shadow Volume Copies is part of Windows’ System Restore feature. Either right-click Select files/folders and open Properties to view the Previous Versions list, or use a program called Shadow Explorer to browse the snapshots.&lt;br /&gt;
&lt;br /&gt;
But don’t rely on that. Start backing up your PC today, and do it regularly.</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/229516196177570833'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/229516196177570833'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2014/01/rescue-your-pc-from-ransomware.html' title='Rescue your PC from ransomware'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-7971130284267380717</id><published>2013-04-20T15:41:00.000+02:00</published><updated>2013-04-20T15:44:10.105+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Data loss"/><category scheme="http://www.blogger.com/atom/ns#" term="Data recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="file recovery"/><title type='text'>Back up Your Data</title><content type='html'>Your computer is not  invulnerable. Hard-drive failures happen, as do floods, fires,  earthquakes, thefts, and other calamities. The hardware in your computer  is replaceable, but the data inside—whether critical business documents  or precious family photos—might not be. If you don’t want to face the  gut-wrenching realization that you’ve lost something important, you need  to have a backup plan. Here’s how you can protect yourself, right now. &lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
First, you need backup software. A number of perfectly fine  options—such as Carbonite and Mozy—are available, but for our purposes  here I’ll recommend &lt;a href=&quot;http://www.crashplan.com/&quot;&gt;CrashPlan&lt;/a&gt;,  which provides all of the functionality you need for local and offsite  backup absolutely free. To get started, just download and install the  CrashPlan software. When the program runs, you’ll see the  straightforward CrashPlan backup procedure: Select drives or folders to  back up, choose a location to back them up to, and click the &lt;i&gt;Start Backup&lt;/i&gt; button&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://images.techhive.com/images/article/2013/03/crashplan-100030804-large.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;243&quot; src=&quot;http://images.techhive.com/images/article/2013/03/crashplan-100030804-large.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span itemprop=&quot;articleBody description text&quot;&gt;The simplest form of  protection is to back up your files to another location in your  computer, to an external drive, or to other computers you own. This  approach allows for fast and easy transfers, but poses some risks—if  your house burns down or a robber breaks in, for instance, you could  lose your backup alongside the original data. That’s why it’s smart to  use offsite storage, as well. &lt;br /&gt;
&lt;br /&gt;
Fortunately, CrashPlan makes offsite backup easy. You can back up  your data—encrypted, no less—to a friend’s computer for free, as long as  that person is also running CrashPlan on their computer and can spare  the storage space. If you don’t have a friend with enough disk space  (and you don’t want to buy them a new external hard drive for the  purpose), you can sign up for CrashPlan’s online backup service, which  runs $33 per year for 10GB of storage or $60 per year for unlimited  space. &lt;br /&gt;
&lt;br /&gt;
Whether you’re stashing your data online or offline, CrashPlan’s  automatic-backup feature takes a lot of the headache out of backup  management. Even if you don’t want to bother with software utilities,  however, you owe it to yourself to back up your most critical files.  Manually slapping data onto a DVD or an external hard drive is a lot  better than doing nothing. &lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/7971130284267380717'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/7971130284267380717'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2013/04/back-up-your-data.html' title='Back up Your Data'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-6738263873090984647</id><published>2012-07-08T17:06:00.000+02:00</published><updated>2012-07-08T17:06:02.491+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>How to avoid Malware meltdown</title><content type='html'>&lt;b&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;Will YOU lose the internet on Monday?&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: left;&quot;&gt;Hundreds of thousands of PCs still at risk worldwide&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: left;&quot;&gt;FBI &#39;ring-fenced&#39; the virus late last year - but protection ends on Monday&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: left;&quot;&gt;See below for advice on checking if your computer has been infected&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
Tens of thousands of Americans whose computers are infected with malware will lose Internet service on Monday - but the meltdown is preventable by following a few simple steps.&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
The impending crash will affect those whose computers have been infected with the nasty &#39;Alureon/DNS Changer bot&#39; when the FBI takes down the servers at 12.01 a.m. on Monday, July 9.&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
To avoid the meltdown, users need to determine if their computer is&amp;nbsp;infected with DNS Changer. Antivirus software will not have offered protection, and Mac computers are also at risk.&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 10px; text-align: left;&quot;&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/span&gt;&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
To check, users can visit&amp;nbsp;&lt;a href=&quot;http://www.w.dns-ok.us/&quot; rel=&quot;nofollow&quot; style=&quot;color: #003580; cursor: pointer; font-weight: bold; margin: 0px; min-height: 1px; padding: 0px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;www.dns-ok.us&lt;/a&gt;. If you see a red background, your machine has been infected, and while green signals good news, you could still be at risk.&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
You can also go to&amp;nbsp;&lt;a href=&quot;http://www.dcwg.org/&quot; rel=&quot;nofollow&quot; style=&quot;color: #003580; cursor: pointer; font-weight: bold; margin: 0px; min-height: 1px; padding: 0px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;www.dcwg.org&lt;/a&gt;, run by the DNS Changer Working Group, a collection of experts the FBI recruited to help with the problem.&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 10px; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
The site includes links to commercial sites that will run a quick check on the computer, and it also lays out detailed instructions if users want to actually check the computer themselves.&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
Once there, click on &#39;Detect&#39; and scroll to &#39;Manually Checking if your DNS server have been Changed&#39;. Click on the option for your system and follow the step-by-step guide.&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 10px; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
Your Internet service provider might also be able to help if you think your computer could have been affected.&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
Scroll to the bottom of&lt;a href=&quot;http://www.dcwg.org/detect&quot; rel=&quot;nofollow&quot; style=&quot;color: #003580; cursor: pointer; margin: 0px; min-height: 1px; padding: 0px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&amp;nbsp;&lt;span style=&quot;font-weight: bold;&quot;&gt;www.dcwg.org/detect&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/a&gt;&amp;nbsp;to see a list of the pages set up by providers for users.&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
If you discover that your computer has been infected, you can follow the steps at&amp;nbsp;&lt;a href=&quot;http://www.dcwg.org/fix&quot; rel=&quot;nofollow&quot; style=&quot;color: #003580; cursor: pointer; font-weight: bold; margin: 0px; min-height: 1px; padding: 0px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;www.dcwg.org/fix&lt;/a&gt;. It is recommended to back up your files.&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
The cause of the crash is a piece of software, which was designed to redirect you from trusted websites to other sites in a bid to steal personal information and which found its way onto hundreds of thousands of computers last year.&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
When the attack was noticed, the FBI took the unusual step of setting up a &#39;safety-net&#39;, routing infected machines through their server to stop the &#39;spoof&#39; attacks.&amp;nbsp;&lt;span style=&quot;background-color: white;&quot;&gt;These servers will be taken down on 12.01 a.m. on Monday, July 9, and when this happens, people still infected are likely to lose their internet connection without warning.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;min-height: 1px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;The warnings about the problem have been splashed across Facebook and Google. Internet service providers have sent notices, and the FBI has set up its special website.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 10px;&quot;&gt;&lt;br class=&quot;Apple-interchange-newline&quot; /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://i.dailymail.co.uk/i/pix/2012/07/05/article-0-13EF61C4000005DC-204_634x826.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://i.dailymail.co.uk/i/pix/2012/07/05/article-0-13EF61C4000005DC-204_634x826.jpg&quot; width=&quot;245&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
Despite repeated alerts, the number of computers that probably are infected is more than 277,000 worldwide, down from about 360,000 in April.&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
Of those still infected, the FBI believes that about 64,000 are in the United States.&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
Users whose computers are still infected on Monday will lose their ability to go online, and they will have to call their service providers for help deleting the malware and reconnecting to the Internet.&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
According to Tom Grasso, an FBI supervisory special agent, many Internet providers are ready for the problem and have plans to try to help their customers.&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
Grasso said other Internet providers may come up with technical solutions that they will put in place on Monday that will either correct the problem or provide information to customers.&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
If the Internet providers correct the server problem, the Internet will work, but the malware will remain on victims&#39; computers and could pose future problems.&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; min-height: 1px; padding: 0px; text-align: left;&quot;&gt;
In addition to individual computer owners, about 50 Fortune 500 companies are still infected, Grasso said.&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 10px; text-align: left;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Read more:&amp;nbsp;&lt;a href=&quot;http://www.dailymail.co.uk/news/article-2170393/Malware-meltdown-Heres-avoid-losing-internet-Monday.html#ixzz202lg0zW4&quot; style=&quot;color: #003399; cursor: pointer; margin: 0px; min-height: 1px; padding: 0px; text-decoration: none;&quot;&gt;http://www.dailymail.co.uk/news/article-2170393/Malware-meltdown-Heres-avoid-losing-internet-Monday.html#ixzz202lg0zW4&lt;/a&gt;&lt;/span&gt;&amp;nbsp;&lt;br style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif; text-align: left;&quot; /&gt;&lt;br style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif; text-align: left;&quot; /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/6738263873090984647'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/6738263873090984647'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2012/07/how-to-avoid-malware-meltdown.html' title='How to avoid Malware meltdown'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-1233870019558139258</id><published>2012-05-22T17:49:00.000+02:00</published><updated>2013-04-20T15:42:36.660+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="network security"/><category scheme="http://www.blogger.com/atom/ns#" term="online security"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows 8"/><title type='text'>Windows 8 is a major OS overhaul</title><content type='html'>Here&#39;s a look at Windows 8&#39;s new security tools and features, but some of the most important additions might be the ones you can&#39;t see.&lt;br /&gt;
&lt;br /&gt;
When Windows 8 comes out later this year, the new Start screen and Metro-style apps will likely be the first changes you&#39;ll notice, but those aren&#39;t the only things that are new. Microsoft is also making some serious security enhancements to help keep your system safer and to improve Windows&#39; ability to combat viruses and malware. It just may be the biggest improvement to Windows security yet.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;b&gt;Antivirus Comes Preinstalled&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
For the first time in the history of Windows, you’ll enjoy protection from viruses, spyware, Trojan horses, rootkits, and other malware from the very first day you turn on your Windows PC--without spending a cent. Windows 8 comes with an updated version of Windows Defender that includes traditional antivirus functions in addition to the spyware protection and other security features that it has offered since Windows Vista. Windows Defender now provides similar protection--and a similar look and feel--to that of the free Microsoft Security Essentials antivirus program, which Microsoft has offered to users as an optional download since 2009.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;&quot;&gt;
&lt;b&gt;Better Download Screening&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
When Microsoft released Internet Explorer 9, it updated the browser&#39;s SmartScreen Filter to help detect and block unknown and potentially malicious programs that you download; the function complements IE&#39;s website filtering, which works to block phishing and malicious sites. Starting with Windows 8, the program-monitoring portion of the SmartScreen Filter is built into Windows itself, and it will work whether you’re using IE, Firefox, Chrome, or any other browser.&lt;br /&gt;
&lt;br /&gt;
In Windows 8, the first time you run a program that you downloaded from the Internet, the SmartScreen Filter checks it against a list of known safe applications, and alerts you if it’s unknown and therefore has the potential to be malware. If the alert does pop up, you could then further investigate the program (and the source where you downloaded it) before running it.&lt;br /&gt;
&lt;br /&gt;
Since Microsoft is adding the SmartScreen feature, the company is removing the previous Security Warning alerts that appeared when you first opened a downloaded program (the old alert would show the verification status of the program publisher and warn you about running programs downloaded from the Internet).&lt;br /&gt;
&lt;br /&gt;
This is a welcome change, as it cuts down on the number of alerts you have to click through--with Windows 8, you&#39;ll see an alert only when something&#39;s amiss.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;&quot;&gt;
&lt;b&gt;Faster, More Secure Startup&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
Starting with Windows 8, Microsoft will begin to promote a new type of boot method, UEFI (Unified Extensible Firmware Interface), which improves upon and replaces the archaic BIOS boot system that most PCs have been using for decades. I won&#39;t get into the technical details here, but UEFI offers better security, faster startup times, and a number of other benefits.&lt;br /&gt;
&lt;br /&gt;
Thanks to this new boot method (and other system enhancements), your PC will start up more quickly--in as little as 8 seconds, from the time you press the power button to when Windows fully loads to the desktop. But you&#39;re sure to appreciate the less noticeable improvements too. The Secure Boot feature of UEFI will prevent advanced malware (such as bootkits and rootkits) from causing damage, and it will stop other boot loader attacks (such as malware that loads unauthorized operating systems) as well.&lt;br /&gt;
&lt;br /&gt;
Though Windows 8 will work on PCs with the old BIOS boot system, Microsoft will require new PCs that carry the Windows 8 Certification to use the UEFI boot system with the Secure Boot feature enabled by default. This Secure Boot requirement is causing some concern within the PC industry and among power users, as it could complicate the process of using Linux distributions or dual-booting multiple operating systems. However, Microsoft has promised to keep boot control in users&#39; hands, and the company requires system makers participating in Windows 8 Certification to offer a way for users to disable the Secure Boot feature on PCs (but not on tablets).&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;&quot;&gt;
&lt;b&gt;Two New Password Types&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
Windows 8 introduces two new password types that you can use when logging in to your Windows account: a four-digit PIN and a &quot;picture password.&quot;&lt;br /&gt;
&lt;br /&gt;
For the picture password, you choose a photo or image and draw three gestures (a combination of circles, straight lines, or taps/clicks) in different places to create your “password.”&lt;br /&gt;
&lt;br /&gt;
Even if you decide to use these new password types, you still must set up a regular password. A PIN offers a faster way to log in, and a picture password gives you a more creative and fun way to do so. Sometimes you’ll have to enter the regular password, such as when you need administrative approval for changing system settings as a standard user, but you can log in to your account using the PIN, the picture, or your regular password.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;&quot;&gt;
&lt;b&gt;Other Noteworthy Defense Measures&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
The enhanced Windows Defender, SmartScreen, boot system, and password protection are the most noticeable security improvements in Windows 8. But the new OS has even more system enhancements that you won&#39;t see at all. A few core Windows components (such as the Windows kernel, ASLR, and heap) have been updated to help reduce common attacks and exploits even further.</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/1233870019558139258'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/1233870019558139258'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2012/05/windows-8-is-major-os-overhaul.html' title='Windows 8 is a major OS overhaul'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-6566841609828096930</id><published>2012-02-05T06:43:00.001+02:00</published><updated>2013-04-20T15:43:02.925+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Cyber Security</title><content type='html'>&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;articlesubheading&quot;&gt;Electronic communications networks must 
be ultra secure in order to build confidence, disposal of physical 
documents also poses a security risk&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;INFORMATION security experts last week urged businesses in SA that 
deal with personal information to review their cyber security and the 
disposal of physical documents practices constantly to protect clients’ 
and employees’ information. &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Data events such as hacking, data loss, unauthorised data 
use, and the physical disposal of documents all present risk to 
businesses and consumers.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;According to  &lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=762991721971296574&amp;amp;postID=6566841609828096930&quot; id=&quot;popupAnchor&quot; style=&quot;color: #b30616; cursor: pointer; text-decoration: underline;&quot;&gt;Metrofile&lt;/a&gt;
 , an information and records management firm, secure disposal of 
hardcopy documents is often overlooked and yet it is a crucial aspect of
 data protection.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Communications Minister Dina Pule said last week that cyber
 crime was a drawback that went with advances in technology. She said, 
&quot;our electronic communications networks must be ultra secure in order to
 build confidence amongst the users of e-commerce platforms&quot;. &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The Department of Communications plans to present the National Cyber Security Policy Framework to the Cabinet next month. &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Last Saturday was Data Privacy Day — an international 
awareness day aimed at educating governments, businesses, industries and
 citizens on the importance of protection of personal information. While
 the day was recognised globally by business, corporate SA was grappling
 with privacy legislation, Dean Chivers, a director of tax and legal 
affairs at Deloitte, said last week. &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;As the Protection of Personal Information (PPI) Bill looms,
 many companies are racing against time to grasp the compliance demands 
of the legislation, he said. &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&quot;The PPI bill is a natural progression for SA. At its most 
basic, the legislation reinforces every South African’s constitutional 
right to privacy,&quot; he said. &quot;At the other end of the scale, it brings 
the country into line with most of its significant international trading
 partners, a factor that builds confidence when information is 
transmitted across borders.&quot; &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Mr Chivers said: &quot;While companies will need to reassess 
their data management process, analyse their security, amend processes 
and change their contracts, companies should not look at the Protection 
of Personal Information Bill as purely an inconvenience. &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&quot;Rather, by aligning the requirements of the bill to 
existing projects and reporting structures, the bill can offer a 
sustainable and measurable return on investment&quot;. &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Gianmarco Lorenzi, the CEO of Cleardata, part of Metrofile,
 said it was ironic that most businesses would spend thousands of rands 
protecting their electronic data through the use of firewalls and 
high-tech information security, but would let their paper leave the 
building in the hands of a stranger. &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Mr Lorenzi said physical records containing personal 
information, including copies of identification documents, street 
addresses and banking details, must be destroyed in a manner that 
prevents reconstruction in an intelligible form if financial, 
reputational and legal repercussions are to be avoided. &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&quot;The shredding of unwanted documents remains the most 
effective way for businesses and industries to practice document 
reconstitution,&quot; he said. &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;articlesubheading&quot;&gt;Posted on &lt;a href=&quot;http://www.businessday.co.za/articles/Content.aspx?id=164008&quot;&gt;BusinessDay&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;ByLine&quot; style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;,Arial,Helvetica,sans-serif;&quot;&gt;THABISO MOCHIKO&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;articlesubheading&quot;&gt; &lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/6566841609828096930'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/6566841609828096930'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2012/02/cyber-security.html' title='Cyber Security'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-8113606254410021483</id><published>2011-11-06T08:16:00.000+02:00</published><updated>2013-04-20T15:43:41.244+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="pc tips"/><title type='text'>What&#39;s best for my computer: Hibernate, sleep, or shut down?</title><content type='html'>&lt;i&gt;Q: Does putting my computer to sleep help extend the battery life? What else can I do to save energy and make my new computer last?&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
A: We’ve all heard stories about what&#39;s best for a computer’s battery. That’s why I was excited to make friends with Fred Peters, president of Huntington Beach IT Services.&lt;br /&gt;
&lt;br /&gt;
In addition to teaching computing courses in Orange County, Calif., Peters happily makes house calls to revive frazzled computers and the people who rely on them.&lt;br /&gt;
&lt;br /&gt;
Here are his expert tips on how to keep your new laptop running smoothly.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
&lt;b&gt;Sleep mode vs. shutting down&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Peters notes that your work process will determine whether it’s more efficient to use “Sleep” mode or simply shut down the computer. “It is never fun to have to consistently wait any amount of time if the shut downs are too frequent,” he says. &quot;‘Sleep’ requires more power, but it boots up faster, while ‘Hibernate’ uses less power, but takes longer to come online.” That same logic applies to shutting off your computer completely.&lt;br /&gt;
&lt;br /&gt;
“Your computer will become obsolete before you wear out your computer by turning it on and off a lot,” he adds. “It also doesn&#39;t take more energy to start a computer than to keep it running.”&lt;br /&gt;
&lt;br /&gt;
Sleep mode requires a constant, though reduced use of power (0-6 watts). Peters also notes that colorful screensavers do nothing to conserve energy. Accessing your computer remotely with the Wake on LAN feature also can drain the power.&lt;br /&gt;
&lt;br /&gt;
To get the most for your money, Peters advises adjusting power settings so that it automatically goes into Sleep/Standby mode after about 15 minutes of inactivity, and then shut it down at the end of your day.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Bionic battery life&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
To get the most out of your computer battery, Peters says to you have to give it a workout. Don’t keep your machine plugged in to an outlet. Instead, discharge the battery daily.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Size does matter&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
By purchasing a laptop, Peters says that you are ahead in the energy-saving game. Laptops use about 15-60 watts, while desktops use 65-250 watts — plus another 15-80 watts for a monitor.&lt;br /&gt;
&lt;br /&gt;
He also adds that you can further conserve energy by using an LCD monitor and ditching the high-end video card unless it’s absolutely necessary. Also, turn off printers and other peripherals when they are not in use.&lt;br /&gt;
&lt;br /&gt;
To kill “vampire power,” TreeHugger.com suggests purchasing a power strip. With all peripherals connected to one source, it’s easy to simply flip the switch on power hogs any time.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Establish a backup process&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
In addition to Peters’ great advice about conserving energy, I discovered the hard way that it also pays to save backup versions of your work. Invest in an external hard drive to hold your digital music library, special photos, and other key documents. Frequent backups ensure that your data doesn’t die with your laptop.&lt;br /&gt;
&lt;br /&gt;
While you are in the process of backing things up, create an emergency file (on good old-fashioned paper) that contains your computer’s serial number along with other key data such as your credit card numbers and phone numbers to reach each company, along with contact info to your insurance company. Access to that information is vital, particularly in the event of an accident, fire, computer theft, or other catastrophe.&lt;br /&gt;
&lt;br /&gt;
Peters warns that those key pieces of information are not safe on your computer. If you are like me and absolutely need a digital holding space for those nuggets of information, he suggests sites like LastPass as your online vault.&lt;br /&gt;
&lt;br /&gt;
Originally posted on &lt;a href=&quot;http://green.yahoo.com/blog/guest_bloggers/107/what-s-best-for-my-computer-hibernate-sleep-or-shut-down.html;_ylt=As0oZM6_HLmSqf63xX2unR3DV8cX&quot;&gt;Yahoo Green &lt;/a&gt;&lt;br /&gt;
&lt;div class=&quot;zemanta-related&quot;&gt;
&lt;h6 class=&quot;zemanta-related-title&quot; style=&quot;font-size: 1em; margin: 1em 0pt 0pt;&quot;&gt;


Related articles&lt;/h6&gt;
&lt;ul class=&quot;zemanta-article-ul&quot;&gt;
&lt;li class=&quot;zemanta-article-ul-li&quot;&gt;&lt;a href=&quot;http://www.makeuseof.com/tag/windows-7-power-options-sleep-modes-explained/&quot;&gt;Windows 7 Power Options And Sleep Modes Explained&lt;/a&gt; (makeuseof.com)&lt;/li&gt;
&lt;li class=&quot;zemanta-article-ul-li&quot;&gt;&lt;a href=&quot;http://ask.metafilter.com/199563/Help-me-stop-my-computer-from-dozing-off&quot;&gt;Help me stop my computer from dozing off.&lt;/a&gt; (ask.metafilter.com)&lt;/li&gt;
&lt;li class=&quot;zemanta-article-ul-li&quot;&gt;&lt;a href=&quot;http://okphone.wordpress.com/2011/08/23/when-you-dont-want-your-laptop-to-go-to-sleep/&quot;&gt;When You Don&#39;t Want Your Laptop to Go to Sleep&lt;/a&gt; (okphone.wordpress.com)&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;zemanta-pixie&quot; style=&quot;height: 15px; margin-top: 10px;&quot;&gt;
&lt;a class=&quot;zemanta-pixie-a&quot; href=&quot;http://www.zemanta.com/&quot; title=&quot;Enhanced by Zemanta&quot;&gt;&lt;img alt=&quot;Enhanced by Zemanta&quot; class=&quot;zemanta-pixie-img&quot; src=&quot;http://img.zemanta.com/zemified_e.png?x-id=4651ed6a-55b9-421b-87f9-f501430ddec2&quot; style=&quot;border: medium none; float: right;&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/8113606254410021483'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/8113606254410021483'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2011/11/whats-best-for-my-computer-hibernate.html' title='What&#39;s best for my computer: Hibernate, sleep, or shut down?'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-7252418254510381487</id><published>2011-10-17T23:40:00.000+02:00</published><updated>2013-04-20T15:44:23.247+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>Cyber Threats Forecast for 2012</title><content type='html'>The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy. Those were the findings announced by the Georgia Tech Information Security Center (GTISC) and the &lt;a class=&quot;zem_slink&quot; href=&quot;http://maps.google.com/maps?ll=33.781093,-84.400421&amp;amp;spn=0.01,0.01&amp;amp;q=33.781093,-84.400421%20%28Georgia%20Tech%20Research%20Institute%29&amp;amp;t=h&quot; rel=&quot;geolocation&quot; title=&quot;Georgia Tech Research Institute&quot;&gt;Georgia Tech Research Institute&lt;/a&gt; (GTRI) in today&#39;s release of the Georgia Tech Emerging Cyber Threats Report for 2012. The report was released at the annual Georgia Tech Cyber Security Summit, a gathering of industry and academic leaders who have distinguished themselves in the field of cyber security.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
According to GTISC, GTRI and the experts cited in the report, specific threats to follow over the coming year include, among others:&lt;br /&gt;
&lt;br /&gt;
* &lt;b&gt;Search Poisoning &lt;/b&gt;-- Attackers will increasingly use SEO techniques to optimize malicious links among search results, so that users are more likely to click on a URL because it ranks highly on Google or other search engines.&lt;br /&gt;
&lt;br /&gt;
* &lt;b&gt;Mobile Web-based Attacks&lt;/b&gt; -- Expect increased attacks aimed specifically against mobile Web browsers as the tension between usability and security, along with device constraints (including small screen size), make it difficult to solve mobile Web browser security flaws.&lt;br /&gt;
&lt;br /&gt;
* &lt;b&gt;Stolen Cyber Data Use for Marketing&lt;/b&gt; -- The market for stolen cyber data will continue to evolve as botnets capture private user information shared by social media platforms and sell it directly to legitimate business channels such as lead-generation and marketing.&lt;br /&gt;
&lt;br /&gt;
&quot;We continue to witness cyber attacks of unprecedented sophistication and reach, demonstrating that malicious actors have the ability to compromise and control millions of computers that belong to governments, private enterprises and ordinary citizens,&quot; said Mustaque Ahamad, director of GTISC. &quot;If we are going to prevent motivated adversaries from attacking our systems, stealing our data and harming our critical infrastructure, the broader community of security researchers -- including academia, the private sector and government -- must work together to understand emerging threats and to develop proactive security solutions to safeguard the Internet and physical infrastructure that relies on it.&quot;&lt;br /&gt;
&lt;br /&gt;
Today&#39;s Georgia Tech Cyber Security Summit is one forum where the &lt;a class=&quot;zem_slink&quot; href=&quot;http://www.symantec.com/business/products/categories.jsp?pcid=pcat_security&quot; rel=&quot;symantec&quot; title=&quot;system security&quot;&gt;IT security&lt;/a&gt; ecosystem can gather together to discuss and debate the evolving nature of cyber threats, and to chart the course for creating solutions through collaborations among industry, government and academia. The Summit was keynoted by Admiral William J. Fallon, U.S. Navy (retired) and included a panel of security experts from Equifax, The Financial Services Roundtable, Mobile Active Defense, &lt;a href=&quot;http://reputation.com/&quot;&gt;Reputation.com&lt;/a&gt; and GTRI.&lt;br /&gt;
&lt;br /&gt;
&quot;Our adversaries, whether motivated by monetary gain, political/social ideology, or otherwise are becoming increasingly sophisticated and better funded,&quot; said Bo Rotoloni, director of GTRI&#39;s Cyber Technology and &lt;a class=&quot;zem_slink&quot; href=&quot;http://www.symantec.com/en/uk/business/theme.jsp?themeid=symantec-cloud&quot; rel=&quot;symantec&quot; title=&quot;hosted security&quot;&gt;Information Security&lt;/a&gt; Laboratory (CTISL). &quot;Acting as individuals or groups, these entities know no boundaries, making cyber security a global problem. We can no longer assume our data is safe sitting behind perimeter-protected networks. Attacks penetrate our systems through ubiquitous protocols, mobile devices and social engineering, circumventing the network perimeter. Our best defense on the growing cyber warfront is found in cooperative education and awareness, best-of-breed tools and robust policy developed collaboratively by industry, academia and government.&quot;&lt;br /&gt;
&lt;br /&gt;
The Georgia Institute of Technology is one of the nation&#39;s leading public research universities and the home of groundbreaking cyber security research and academic initiatives through GTISC, GTRI and other facilities across campus. These efforts are focused on producing technology and innovation that will help drive economic growth, while improving human life on a global scale.

The complete 2012 Cyber Threat Report is available at: &lt;a href=&quot;http://gtsecuritysummit.com/report.html&quot;&gt;http://gtsecuritysummit.com/report.html&lt;/a&gt;&lt;br /&gt;
&lt;div class=&quot;zemanta-related&quot;&gt;
&lt;h6 class=&quot;zemanta-related-title&quot; style=&quot;font-size: 1em; margin: 1em 0pt 0pt;&quot;&gt;



Related articles&lt;/h6&gt;
&lt;ul class=&quot;zemanta-article-ul&quot;&gt;
&lt;li class=&quot;zemanta-article-ul-li&quot;&gt;&lt;a href=&quot;http://scienceblog.com/48332/cyber-threats-forecast-for-2012/&quot;&gt;Cyber Threats Forecast for 2012&lt;/a&gt; (scienceblog.com)&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;zemanta-pixie&quot; style=&quot;height: 15px; margin-top: 10px;&quot;&gt;
&lt;a class=&quot;zemanta-pixie-a&quot; href=&quot;http://www.zemanta.com/&quot; title=&quot;Enhanced by Zemanta&quot;&gt;&lt;img alt=&quot;Enhanced by Zemanta&quot; class=&quot;zemanta-pixie-img&quot; src=&quot;http://img.zemanta.com/zemified_e.png?x-id=18d44f33-15d1-444f-9655-fc36c1dec6d1&quot; style=&quot;border: medium none; float: right;&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/7252418254510381487'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/7252418254510381487'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2011/10/cyber-threats-forecast-for-2012.html' title='Cyber Threats Forecast for 2012'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-223062354744862081</id><published>2011-10-16T08:13:00.000+02:00</published><updated>2013-04-20T15:44:48.494+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="pc performance"/><title type='text'>Speed Up Your Windows XP</title><content type='html'>Pursue Some tricks we can make our Windows more faster that never happen before and usually these all are unnecessary for each time. Some features are usually for only looking attractive.
Optimizing Display Settings
Windows XP mostly like for its visual interface. We do not interfere that but on this visualization has more extra feature that does not need ever without wasting system resource. Lets see how we can disable it-&lt;br /&gt;
1. Go to Start Menu&lt;br /&gt;
2. Click Setting.&lt;br /&gt;
3. Click Control Panel&lt;br /&gt;
4. Click System.&lt;br /&gt;
5. Go Advance Tab&lt;br /&gt;
6. Click Setting under Performance group&lt;br /&gt;
7. Off only the following ticked&lt;br /&gt;
* Show Shadows under Menu&lt;br /&gt;
* Show Shadows under Mouse Pointer.&lt;br /&gt;
* Show Translucent Selection Rectangle&lt;br /&gt;
* Use drop shadows for icons labels on desktop.&lt;br /&gt;
* Use visual style on windows and buttons&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;OPTIMISE YOUR PAGEFILE&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If you give your pagefile a fixed size it saves the operating system from needing to resize the page file.&lt;br /&gt;
1. Right click on My Computer and select Properties&lt;br /&gt;
2. Select the Advanced tab&lt;br /&gt;
3. Under Performance choose the Settings button&lt;br /&gt;
4. Select the Advanced tab again and under Virtual Memory select Change&lt;br /&gt;
5. Highlight the drive containing your page file and make the initial Size of the file the same as the Maximum Size of the file.
Windows XP sizes the page file to about 1.5X the amount of actual physical memory by default. While this is good for systems with smaller amounts of memory (under 512MB) it is unlikely that a typical XP desktop system will ever need 1.5 X 512MB or more of virtual memory. If you have less than 512MB of memory, leave the page file at its default size. If you have 512MB or more, change the ratio to 1:1 page file size to physical memory size.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;REMOVE THE DESKTOP PICTURE&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Your desktop background consumes a fair amount of memory and can slow the loading time of your system. Removing it will improve performance.&lt;br /&gt;
1. Right click on Desktop and select Properties&lt;br /&gt;
2. Select the Desktop tab&lt;br /&gt;
3. In the Background window select None&lt;br /&gt;
4. Click Ok&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;REMOVE FONTS FOR SPEED&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Fonts, especially TrueType fonts, use quite a bit of system resources. For optimal performance, trim your fonts down to just those that you need to use on a daily basis and fonts that applications may require.&lt;br /&gt;
1. Open Control Panel&lt;br /&gt;
2. Open Fonts folder&lt;br /&gt;
3. Move fonts you don’t need to a temporary directory (e.g. C:\FONTBKUP?) just in case you need or want to bring a few of them back. The more fonts you uninstall, the more system resources you will gain.&lt;br /&gt;
&lt;div class=&quot;zemanta-related&quot;&gt;
&lt;h6 class=&quot;zemanta-related-title&quot; style=&quot;font-size: 1em; margin: 1em 0pt 0pt;&quot;&gt;



Related articles&lt;/h6&gt;
&lt;ul class=&quot;zemanta-article-ul&quot;&gt;
&lt;li class=&quot;zemanta-article-ul-li&quot;&gt;&lt;a href=&quot;http://www.ghacks.net/2011/08/29/setting-the-windows-virtual-memory-why-you-need-to-and-what-about-ssds/&quot;&gt;Setting the Windows Virtual Memory, why you need to and what about SSDs?&lt;/a&gt; (ghacks.net)&lt;/li&gt;
&lt;li class=&quot;zemanta-article-ul-li&quot;&gt;&lt;a href=&quot;http://seattletimes.nwsource.com/html/businesstechnology/2016371015_ptmrsh01.html?syndication=rss&quot;&gt;Upgrade computer to avoid slow performance&lt;/a&gt; (seattletimes.nwsource.com)&lt;/li&gt;
&lt;li class=&quot;zemanta-article-ul-li&quot;&gt;&lt;a href=&quot;http://www.ghacks.net/2011/10/09/font-load-unload-load-fonts-without-installing-them/&quot;&gt;Font Load Unload, Load Fonts Without Installing Them&lt;/a&gt; (ghacks.net)&lt;/li&gt;
&lt;li class=&quot;zemanta-article-ul-li&quot;&gt;&lt;a href=&quot;http://lifehacker.com/5850173/bluepoison-downgrades-windows-8-features-you-dont-want-unlocks-hidden-features&quot;&gt;BluePoison Disables Windows 8 Immersive Start Menu, Unlocks Hidden Features&lt;/a&gt; (lifehacker.com)&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;zemanta-pixie&quot; style=&quot;height: 15px; margin-top: 10px;&quot;&gt;
&lt;a class=&quot;zemanta-pixie-a&quot; href=&quot;http://www.zemanta.com/&quot; title=&quot;Enhanced by Zemanta&quot;&gt;&lt;img alt=&quot;Enhanced by Zemanta&quot; class=&quot;zemanta-pixie-img&quot; src=&quot;http://img.zemanta.com/zemified_e.png?x-id=07e98ff8-4ba3-4774-a948-a8a74a14c19d&quot; style=&quot;border: medium none; float: right;&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/223062354744862081'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/223062354744862081'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2011/10/speed-up-your-windows-xp.html' title='Speed Up Your Windows XP'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-4549704247738067707</id><published>2011-10-12T13:43:00.000+02:00</published><updated>2011-10-12T13:43:07.206+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="anti virus"/><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>SA Symantec Intelligence Report</title><content type='html'>Johannesburg - &lt;a class=&quot;zem_slink&quot; href=&quot;http://www.symantec.com/&quot; rel=&quot;homepage&quot; title=&quot;Symantec&quot;&gt;Symantec&lt;/a&gt; on Tuesday announced the results of the September 2011 Symantec Intelligence Report, which saw phishing attacks in &lt;a class=&quot;zem_slink&quot; href=&quot;http://maps.google.com/maps?ll=-29.046,25.063&amp;amp;spn=10.0,10.0&amp;amp;q=-29.046,25.063%20%28South%20Africa%29&amp;amp;t=h&quot; rel=&quot;geolocation&quot; title=&quot;South Africa&quot;&gt;South Africa&lt;/a&gt; increase once again.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.iol.co.za/polopoly_fs/iol-scitech-oct-4-symantec-1.1150188%21/image/2017299746.jpg_gen/derivatives/box_300/2017299746.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.iol.co.za/polopoly_fs/iol-scitech-oct-4-symantec-1.1150188%21/image/2017299746.jpg_gen/derivatives/box_300/2017299746.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
The country is now positioned as the most targeted geography for phishing, with one in 133.1 emails.&lt;br /&gt;
&lt;br /&gt;
This month’s analysis also reveals that a deluge of malicious email-borne &lt;a class=&quot;zem_slink&quot; href=&quot;http://en.wikipedia.org/wiki/Malware&quot; rel=&quot;wikipedia&quot; title=&quot;Malware&quot;&gt;malware&lt;/a&gt; has left a clear mark on the threat landscape for September. Approximately 72 percent of all email-borne malware in September could be characterised as aggressive strains of generic polymorphic malware, first identified in the July Symantec Intelligence Report. At the end of July, this rate was 23.7 percent, in August it fell slightly to 18.5 percent before soaring to 72 percent in September.&lt;br /&gt;
&lt;br /&gt;
“This unprecedented high-water mark underlines the nature by which cyber criminals have escalated their assault on businesses in 2011, fully exploiting the weaknesses of more traditional security countermeasures,” said &lt;a class=&quot;zem_slink&quot; href=&quot;http://en.wikipedia.org/wiki/Paul_Wood&quot; rel=&quot;wikipedia&quot; title=&quot;Paul Wood&quot;&gt;Paul Wood&lt;/a&gt;, Senior Intelligence Analyst, Symantec.cloud.&lt;br /&gt;
&lt;br /&gt;
Further analysis reveals that the social engineering behind many of these attacks has accelerated with the adoption of a variety of new techniques, such as pretending to be an email from a smart printer/scanner being forwarded by a colleague in the same organisation has been detected.&lt;br /&gt;
&lt;br /&gt;
“The idea of an office printer sending malware is an unlikely one, as printers and scanners were not actually used in these attacks, but perhaps this sense of security is all that is required for such a socially engineered attack to succeed in the future,” Wood said.&lt;br /&gt;
&lt;br /&gt;
Although spam levels remained fairly stable during September, Symantec Intelligence observed the use of identified vulnerabilities in certain older versions of the popular &lt;a class=&quot;zem_slink&quot; href=&quot;http://wordpress.org/&quot; rel=&quot;homepage&quot; title=&quot;WordPress&quot;&gt;WordPress&lt;/a&gt; blogging software on a large number of &lt;a class=&quot;zem_slink&quot; href=&quot;http://en.wikipedia.org/wiki/Website&quot; rel=&quot;wikipedia&quot; title=&quot;Website&quot;&gt;web sites&lt;/a&gt; across the internet. Spam emails containing links to these compromised web sites are being spammed out. It is however important to note that blogs hosted by WordPress itself seem to be unaffected.&lt;br /&gt;
&lt;br /&gt;
Additional research reveals that &lt;a class=&quot;zem_slink&quot; href=&quot;http://en.wikipedia.org/wiki/JavaScript&quot; rel=&quot;wikipedia&quot; title=&quot;JavaScript&quot;&gt;JavaScript&lt;/a&gt; is becoming increasing popular as the programming language used by spammers and malware authors. Spammers use it to conceal where they are redirecting pages, and in some cases, to conceal entire web pages.&lt;br /&gt;
&lt;br /&gt;
“For spammers, hosting simple JavaScript obfuscation pages on free hosting sites can increase the lifetime of that site before the site operator realises the page is being used for malicious activity,” Wood said. “JavaScript is popularly used for redirecting visitors of a compromised web site to the spammer&#39;s landing page. While some of these techniques have been common in malware distribution for some time, spammers are increasingly using them.”&lt;br /&gt;
Originally posted on&lt;a href=&quot;http://www.iol.co.za/scitech/technology/security/sa-a-breeding-ground-for-phishing-1.1150190&quot;&gt; iol scitech &lt;/a&gt;

&lt;br /&gt;
&lt;div class=&quot;zemanta-pixie&quot; style=&quot;height: 15px; margin-top: 10px;&quot;&gt;
&lt;a class=&quot;zemanta-pixie-a&quot; href=&quot;http://www.zemanta.com/&quot; title=&quot;Enhanced by Zemanta&quot;&gt;&lt;img alt=&quot;Enhanced by Zemanta&quot; class=&quot;zemanta-pixie-img&quot; src=&quot;http://img.zemanta.com/zemified_e.png?x-id=024f7bed-d6d3-4ad2-8a02-13e4b4b8be39&quot; style=&quot;border: medium none; float: right;&quot; /&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/4549704247738067707'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/4549704247738067707'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2011/10/sa-symantec-intelligence-report.html' title='SA Symantec Intelligence Report'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-43122709533429550</id><published>2011-09-19T15:09:00.000+02:00</published><updated>2011-09-19T15:09:37.816+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="pc tips"/><title type='text'>Make Your Computer Energy Efficient</title><content type='html'>I know that my computer has&lt;a href=&quot;http://sites.google.com/site/solarsolutionsza&quot;&gt; energy-efficiency&lt;/a&gt; settings. Yours does, too. But I almost never mess with them.

For some reason, for a lot of us, messing with the settings is one of those things you hear about, and know about, but put off to take care of “later,” when you find yourself at the computer with “some free time.”

But let’s be honest—your free time at your computer (and mine!) is a lot more likely to be devoted to trolling gossip sites and Facebook than to fine-tuning your computer’s energy settings. So let’s take a minute and change that today.

Here’s some very simple advice—some of which you can put into action right now, while you read this entry. You’ll save energy going forward, and you’ll assuage that guilty conscience by finally taking some easy little steps toward a more efficient home or office.&lt;br /&gt;
&lt;br /&gt;
* &lt;b&gt;Hibernation:&lt;/b&gt; With winter dragging on and on, doesn’t hibernation sound so appealing right now? Well, your computer feels the same way. Allow it to take nice little naps during the day when you wander away on coffee breaks, lunch breaks, talk-to-your-coworkers-in-the-hallway breaks, or whatever it is you do when you’re not doing what you’re supposed to be doing.

      Ok, first, go into your computer’s power management panel… Seriously, do this right now! Now, set the display and the hard drive to both go to sleep after 10 minutes or less of inactivity. Next, make sure the entire system is set to go into standby/sleep mode within 20-30 minutes. The lower you can keep the numbers in these settings, the better. That was so easy, right?&lt;br /&gt;
&lt;br /&gt;



    * &lt;b&gt;Screen save&lt;/b&gt;r = energy waster: Can you believe it? Well, it’s true! Screen savers are a leftover idea from the early days of picture tube monitors, completely unnecessary for today’s monitors. They actually use a lot more energy than simply setting your monitor to dim itself before going to sleep would.

      So ditch the scrolling photos of frogs and blades of grass for some truly green action: Set your monitor to dim after 5 minutes or less of inactivity.&lt;br /&gt;
&lt;br /&gt;


    * &lt;b&gt;Dim your watts:&lt;/b&gt; The brightest setting on your monitor causes it to gobble up twice as much energy as the dimmest setting. Save those wasted watts by keeping the monitor running on a much dimmer setter all the time. As the daylight changes wherever you’re using your computer, adjust the brightness.&lt;br /&gt;
&lt;br /&gt;



    * &lt;b&gt;Strip smarter:&lt;/b&gt; Need we have the power strip conversation again? So, you know that it’s a good idea to plug electronics into a power strip to avoid that phantom load we’ve talked about before. This is an especially good idea when it comes to your computer, which tends to hang out with a lot of power-hungry friends like printers and speakers.

      The best solution of all is to get a smart plug strip, which will automatically cut the power flow when your computer and its posse aren’t in use. Automatic is good, because it’s one less thing for you to remember!</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/43122709533429550'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/43122709533429550'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2011/09/make-your-computer-energy-efficient.html' title='Make Your Computer Energy Efficient'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-674076627752035214</id><published>2011-08-31T23:34:00.000+02:00</published><updated>2011-08-31T23:34:39.960+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="office software"/><category scheme="http://www.blogger.com/atom/ns#" term="PDF Writers"/><category scheme="http://www.blogger.com/atom/ns#" term="software"/><title type='text'>BioPDF PDF Writer</title><content type='html'>&lt;b&gt;&lt;h&gt;BioPDF PDF Writer&lt;/h&gt;&lt;/b&gt;&lt;br /&gt;
&lt;h&gt;&lt;b&gt;Version:&lt;/b&gt;&lt;b&gt; &lt;/b&gt;6.0.6.745&amp;nbsp;&lt;/h&gt;&lt;br /&gt;
&lt;h&gt;&lt;b&gt;License Type:&lt;/b&gt; Free&lt;/h&gt;&lt;br /&gt;
&lt;h&gt;&lt;b&gt;Price:&lt;/b&gt; Free&lt;/h&gt;&lt;br /&gt;
&lt;h&gt;&lt;b&gt;OS: &lt;/b&gt;Windows 2000, Windows XP, Windows Vista, Windows Server 2003, Windows Server 2008&amp;nbsp;&lt;/h&gt;&lt;br /&gt;
&lt;h&gt;&lt;b&gt;File Size:&lt;/b&gt; 3987 KB&amp;nbsp;&lt;/h&gt;&lt;br /&gt;
&lt;h&gt;&lt;b&gt;Author:&lt;/b&gt; &lt;a href=&quot;http://www.biopdf.com/&quot;&gt;BioPDF&lt;/a&gt;&lt;/h&gt;&lt;br /&gt;
&lt;h&gt;&lt;br /&gt;&lt;/h&gt;&lt;br /&gt;
&lt;h&gt;&lt;a href=&quot;http://www.ziddu.com/download/16247536/bioPDFSetup_6_0_0_745.zip.html&quot; style=&quot;color: red;&quot;&gt;&lt;b&gt;Download Now&lt;/b&gt;&lt;/a&gt;&lt;/h&gt;&lt;br /&gt;
&lt;h&gt;&lt;br /&gt;&lt;/h&gt;&lt;br /&gt;
&lt;h&gt;&lt;/h&gt;BioPDF PDF Writer installs easily, automatically downloading and installing the Ghostscript Light PDF printer driver for which it&#39;s a front-end. It also offers the same watermarking, password protection, and merging. The only real differences seem to be a slight variation in the install routine and pricing. Where Bullzip is free but will accept donations via PayPal, BioPDF can be registered and paid for at the program&#39;s Web site.&lt;br /&gt;
&lt;br /&gt;
As downloaded, BioPDF PDF Writer is free for personal use.

No matter which version you opt for, opt for one. Bullzip and BioPDF PDF Writer are in a class of their own when it comes to ease of installation, ease of use, and features. Another big plus--no nags or ads.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://computilities.blogspot.com/&quot;&gt;&lt;img alt=&quot;BioPDF PDF&quot; border=&quot;0&quot; height=&quot;164&quot; src=&quot;http://www.biopdf.com/images/screenshot.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;
&lt;br /&gt;
&lt;br /&gt;
For admins, bioPDF is simple and flexible to adapt and deploy, with support for unattended setup scripts, Citrix Metaframe, and more. End-users find the PDF writer fast and intuitive to use, emboldened by the fact that the interface is localized into multiple languages. This leads to swift adoption and low support requirements. When all users can and do print to PDF, fewer potentially harmful or unreadable file formats are distributed and paper use is greatly reduced throughout the organization.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;How Does it Work? &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The bioPDF PDF Writer works as a Microsoft Windows printer and allows you to write PDF documents from virtually any Microsoft Windows application.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Feature Overview&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Print to PDF from almost any Windows application.&lt;/li&gt;
&lt;li&gt;Supports 64-bit operatings systems.&lt;/li&gt;
&lt;li&gt;Direct output to the same file each time or prompt for destination.&lt;/li&gt;
&lt;li&gt;Control if the printer should ask if you want to see the resulting PDF document.&lt;/li&gt;
&lt;li&gt;Control settings and prompts programmatically.&lt;/li&gt;
&lt;li&gt;Setup can run unattended.&lt;/li&gt;
&lt;li&gt;Graphical user interface.&lt;/li&gt;
&lt;li&gt;Password protect PDF documents.&lt;/li&gt;
&lt;li&gt; 128/40 bit encryption.&lt;/li&gt;
&lt;li&gt;Quality settings (screen, printer, ebook, prepress).&lt;/li&gt;
&lt;li&gt; Set document properties.&lt;/li&gt;
&lt;li&gt;Watermark text, size, rotation, and transparency.&lt;/li&gt;
&lt;li&gt; Superimpose/background documents.&lt;/li&gt;
&lt;li&gt;Appending/prepending documents.&lt;/li&gt;
&lt;li&gt; User interface control.&lt;/li&gt;
&lt;li&gt;Command line interface to all settings.&lt;/li&gt;
&lt;li&gt; COM/ActiveX API interface for programmatic control.&lt;/li&gt;
&lt;li&gt;Microsoft.NET API and command line API.&lt;/li&gt;
&lt;li&gt; Support for Citrix MetaFrame&lt;/li&gt;
&lt;li&gt;Support for Windows Terminal Server&lt;/li&gt;
&lt;li&gt; Create BMP, EPS, PS, PNG, PCX, JPEG, and TIFF files as alternative to PDF documents.&lt;/li&gt;
&lt;li&gt;Create linearized PDF files for optimized web viewing.&lt;/li&gt;
&lt;li&gt; Initial zoom settings.&lt;/li&gt;
&lt;li&gt;Page thumbnails.&lt;/li&gt;
&lt;li&gt; Create one PDF for all pages or one file per page.&lt;/li&gt;
&lt;li&gt;Individual horizontal and vertical resolution for image creation.&lt;/li&gt;
&lt;li&gt; Configure text and graphics alpha bits to support smooth edges in images.&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;http://www.ziddu.com/download/16247536/bioPDFSetup_6_0_0_745.zip.html&quot; style=&quot;color: red;&quot;&gt;&lt;b&gt;Download and See For Yourself &lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/674076627752035214'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/674076627752035214'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2011/08/biopdf-pdf-writer.html' title='BioPDF PDF Writer'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-5704483646501814490</id><published>2011-08-13T07:47:00.001+02:00</published><updated>2011-08-13T07:48:48.878+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>How safe are our Windows PCs from malware?</title><content type='html'>What percentage of PCs in the United States are infected with malware? If you’ve been following the mainstream press recently, you might have read an alarming statistic: “Nearly half of personal computers in the U.S. are compromised by malware.”&lt;br /&gt;
&lt;br /&gt;
That statement is an outright fabrication. It is not true. It is not even remotely accurate, based on objective data. The actual number varies, depending on where you are in the world, but for Windows users who have automatic updates turned on, the worldwide average is somewhere between 1% and 2%. In my opinion, if you practice the basics of online security, the likelihood that your Windows PC is infected by malware is a tiny fraction of 1%.&lt;br /&gt;
&lt;br /&gt;
And yet that alarming and bogus 50% number was stated as if it were a fact in a &lt;a href=&quot;http://money.cnn.com/2011/04/15/technology/gadget_care/index.htm&quot;&gt;feature story last week at CNNMoney.com&lt;/a&gt;. That story has so far been recommended by 371 people on Facebook. The same “fact” was repeated in a variety of other online sources, including thestreet.com, CNBC.com, businessweek.com, businessinsider.com, and boston.com, to name just a few.&lt;br /&gt;
&lt;br /&gt;
It hit my radar when I saw the number quoted in a &lt;a href=&quot;http://twitter.com/#%21/markrussinovich/status/60089491494408192&quot;&gt;tweet from Mark Russinovich&lt;/a&gt;, a Technical Fellow at Microsoft and one of the smartest people I know.&lt;br /&gt;
&lt;br /&gt;
My first reaction was “Oh really?”&lt;br /&gt;
&lt;br /&gt;
My second reaction was to do some research.

It took me less than 15 minutes to knock down this story, which is just the latest example of a depressing truism: If you give the mainstream press a computer story, you can usually count on them to get it wrong. If you give them a sexy press release with a provocative number, you can cinch the deal.&lt;br /&gt;
&lt;br /&gt;
This case starts with a&lt;a href=&quot;http://staples.newshq.businesswire.com/press-release/products-services/think-you-are-taking-good-care-your-computer-staples-it-iq-survey-sh#axzz1Jv20VpNM&quot;&gt; press release&lt;/a&gt; from Staples, dated April 5, 2011. Here’s the part that sucked in that CNN staff writer:&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;A common misconception uncovered in the IT IQ survey is that we falsely presume our computers are well-protected from the viruses, spyware, and other malware that put our personal information at risk and decrease performance. 83 percent of the survey respondents stated that they are somewhat or very confident their computer is free of malware. Yet, nearly half of personal computers in the U.S. are compromised by malware.*&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
That asterisk was in the original. It leads to this footnote at the bottom of the press release:&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;*According to findings released by PandaLabs in February 2011.&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
There’s no link to that study, but it took only seconds to find the &lt;a href=&quot;http://press.pandasecurity.com/news/in-january-50-percent-of-computers-worldwide-were-infected-with-some-type-of-computer-threat/&quot;&gt;original report from Panda Security&lt;/a&gt;:&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;According to data gathered by the free online antivirus Panda ActiveScan, 50 percent of scanned computers were infected with malware, mostly Trojans.&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
So, the sample consists of people from around the world who were suspicious that their computers were infected and went to an online virus scanner? That’s a far cry from “nearly half of all computers in the U.S.” (Amusingly, a commenter on the Panda blog points out that the sample is “highly flawed,” and a response from Panda Security acknowledges that fact: “The data are taken from our online scanner ActiveScan. … Some people may think that the result is biased because some of those users suspect that they could be infected, which in fact is true.”)&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Update 19-Apr: In response to this post, a spokeperson for Panda Security just contacted me. The company has edited the misleading headline on the press release to more accurately reflect its contents. The original headline read “In January, 50 percent of computers worldwide were infected with some type of computer threat.” The revised headline reads: “In January, 50 percent of computers scanned by Panda ActiveScan worldwide were infected with some type of computer threat.”&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
So why does Panda want to publish such an alarming and yet admittedly incorrect number? Because they’re trying to scare the crap out of you so they can sell antivirus software. Why does Staples want so spread that frightening but bogus statistic? Because they’re trying to scare the crap out of you so they can sell their EasyTech services. The original press release isn’t even subtle about it: “Our certified EasyTech associates are highly trained with expertise in diagnostics, repair, virus/malware removal and data back up solutions to name a few.”&lt;br /&gt;
&lt;br /&gt;
The best numbers I’ve seen from an independent source (i.e., one that isn’t trying to sell a security product) are in Microsoft’s annual&lt;a href=&quot;http://www.microsoft.com/security/sir&quot;&gt; Security Intelligence Report&lt;/a&gt;. The &lt;a href=&quot;http://www.microsoft.com/security/sir/keyfindings/default.aspx#section_4_2&quot;&gt;Malware Trends section&lt;/a&gt; of the most recent report contains telemetry data drawn from more than 600 million Windows computers worldwide by a number of different Microsoft security tools and services, including the Malicious Software Removal Tool (which is included with automatic Windows updates every month), the free Microsoft Security Essentials and Windows Defender programs, and Microsoft’s enterprise security software.&lt;br /&gt;
&lt;br /&gt;
According to the most recent data, covering a one-year period that ended in mid-2010, the five worst locations in the world (in terms of active malware infections that had to be cleaned) were Turkey, Spain, Korea, Taiwan, and Brazil. The infection rates for those regions varied from quarter to quarter, but they ranged from 30 to 60 infections per 1000 computers—worldwide, the number is roughly 10 infections cleaned per 1000 PCs. That’s about 1% on average, and about 6% in the worst cases. &lt;i&gt;Update: Although the MSRT doesn’t remove every species of malware, it covers every widespread family—more than 150 in all—so I expect its figures to be representative of general infection rates&lt;/i&gt;.&lt;br /&gt;
&lt;br /&gt;
If you use Windows and you have automatic updates turned on, you’re in that sample. If you’re even moderately cautious about how you use the Internet, your risk of infection is probably well below the midpoint of that sample.&lt;br /&gt;
&lt;br /&gt;
Obviously, the rate of malware infection is unknown (and probably considerably higher) for people who refuse to update their computers. But those people are unlikely to pay a tech at Staples to clean up their PC.&lt;br /&gt;
&lt;br /&gt;
Originally Posted on &lt;a href=&quot;http://www.zdnet.com/blog/bott/how-prevalent-is-malware-on-windows-pcs/3148?tag=content;siu-container&quot;&gt;ZDNET &lt;/a&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/5704483646501814490'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/5704483646501814490'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2011/08/how-safe-are-our-windows-pcs-from.html' title='How safe are our Windows PCs from malware?'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-5348107967249911290</id><published>2011-07-24T15:08:00.000+02:00</published><updated>2011-07-24T15:08:43.736+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>Google Warning - Two Million user&#39;s computers have been infected by a virus</title><content type='html'>&lt;span style=&quot;font-size: 1.2em;&quot;&gt;Google has started warning more than two million internet users that their PC has been infected with a virus.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 1.2em;&quot;&gt;The
 malicious software hijacks Google browser searches and redirects people
 to websites containing fake security programs that pay the scammers for
 traffic.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 1.2em;&quot;&gt;Those affected by the virus will be greeted with a yellow warning at the top of their search results.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: 1.2em;&quot;&gt;According to the company, the malware found its way onto computers via fake anti-virus software.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 1.2em;&quot;&gt;Then,
 when a Google search is entered it is sent to servers, controlled by 
the cyber criminals, which modify and redirect the traffic.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: 1.2em;&quot;&gt;Writing on Google&#39;s blog, security 
engineer Damian Menscher said: &#39;The malware appears to have gotten onto 
users&#39; computers from one of roughly a hundred variants of fake 
anti-virus, or &#39;fake AV&#39; software that has been in circulation for a 
while.&#39;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 1.2em;&quot;&gt;Google uncovered the mass scam while carrying out routine maintenance at a data centre.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: 1.2em;&quot;&gt;Customers affected by the malware are issued with instructions on how to remove the virus from their computer.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 1.2em;&quot;&gt;Google&#39;s swift response is further evidence that large internet firms are vulnerable to cyber crime.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 1.2em;&quot;&gt;Apple
 has long boasted of the Mac&#39;s immunity to viruses and malware - but 
online security experts recently warned that the computers are facing an
 increased threat from criminals because of their popularity.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 1.2em;&quot;&gt;They said that Macs are now a more attractive target for hackers due to the rising number of people who choose them over a PC.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;br /&gt;Originally posted on &lt;a href=&quot;http://www.dailymail.co.uk/sciencetech/article-2017359/Google-warns-TWO-MILLION-users-computers-infected-virus.html#ixzz1T1mZaRIC&quot;&gt;dailymail&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/5348107967249911290'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/5348107967249911290'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2011/07/google-warning-two-million-users.html' title='Google Warning - Two Million user&#39;s computers have been infected by a virus'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-76805627960796256</id><published>2011-05-27T07:48:00.000+02:00</published><updated>2011-05-27T07:48:16.818+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="pc tips"/><category scheme="http://www.blogger.com/atom/ns#" term="Skype"/><category scheme="http://www.blogger.com/atom/ns#" term="software tips"/><title type='text'>Skype stopped working Win XP</title><content type='html'>When skype stops working and crash on launch try the following to correct the problem.&lt;br /&gt;
&lt;br /&gt;
Do not just install &quot;over&quot; the old version
quite often some files are not updated correct.&lt;br /&gt;
&lt;br /&gt;
Please delete &lt;b&gt;config.xml&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
To be found in
C:
&lt;b&gt;Documents and settings&lt;/b&gt; →
&lt;b&gt;Your profile name&lt;/b&gt;
→ &lt;b&gt;Application data&lt;/b&gt;
→ &lt;b&gt;Skype&lt;/b&gt;
→&lt;b&gt; Skype User name&lt;/b&gt; → &lt;b&gt;delete config.xml&lt;/b&gt;
any changes manually edited in this config.xml will be lost.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This config.xml will be rebuilt without any data loss, but hopefully error free, with next start of Skype.
You only must log in newly and Skype will rebuilt a new and correct config.xml
and will download all your contacts.&lt;br /&gt;
&lt;br /&gt;
IF Still not working&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Reinstall Skype&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;&lt;b&gt;Control Panel&lt;/b&gt; → &lt;b&gt;Add/Remove Programs&lt;/b&gt; → &lt;b&gt;Use add/remove Skype&lt;/b&gt; → &lt;b&gt;Allow deleting personal data&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Now check, &lt;b&gt;C: Documents and settings &lt;/b&gt;→ &lt;b&gt;Your profile name&lt;/b&gt; → &lt;b&gt;Application data&lt;/b&gt; → There should be no more any folder called Skype.
If still exist→ &lt;b&gt;delete&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Go to &lt;b&gt;C:&lt;/b&gt; → &lt;b&gt;Documents and settings&lt;/b&gt; → &lt;b&gt;All Users&lt;/b&gt; → &lt;b&gt;Application data&lt;/b&gt; → there should be no more any folder called Skype.If still exist → &lt;b&gt;delete&lt;/b&gt;&lt;/li&gt;
&lt;/ol&gt;
Download RegSeeker (freeware)&lt;br /&gt;
&lt;a class=&quot;bbc_url&quot; href=&quot;http://www.hoverdesk.net/freeware.htm&quot; rel=&quot;nofollow&quot; title=&quot;External link&quot;&gt;http://www.hoverdesk.net/freeware.htm&lt;/a&gt;&lt;br /&gt;
Install
RegSeeker. Go to &quot;Search&quot; in Regseeker
Type &quot;Skype&quot;
delete ALL entries regseeker was finding.&lt;br /&gt;
&lt;br /&gt;
Install Skype and Reboot</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/76805627960796256'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/76805627960796256'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2011/05/skype-stopped-working-win-xp.html' title='Skype stopped working Win XP'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-5626643972731846795</id><published>2011-05-26T22:38:00.001+02:00</published><updated>2011-05-27T08:00:30.270+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="pc tips"/><category scheme="http://www.blogger.com/atom/ns#" term="Skype"/><category scheme="http://www.blogger.com/atom/ns#" term="software tips"/><title type='text'>Skype stopped working  Windows 7</title><content type='html'>&lt;br /&gt;
The whole world increasingly relies on Skype. Unfortunately, recently this causes for many of us big trouble. What’s going on? Is today’s downtime just another coincidence? Fortunately, for today’s issue a fix is now available.&lt;br /&gt;
&lt;br /&gt;
Around noon several people contacted us what was going wrong with their Skype. A little bit later it appeared Skype was facing serious trouble. Many users world wide were unable to use the service. It became clear we were not suffering alone.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Temporary fix available&lt;/b&gt;&lt;br /&gt;
A temporary fix has been announced on &lt;a href=&quot;http://heartbeat.skype.com/2011/05/problems_signing_into_skype_an.html&quot;&gt;Skype’s blog&lt;/a&gt;, follow them for more updates. The proposed fix can be found below. Update: We added some screen shots because we received several questions about the Windows procedure.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows&lt;/b&gt;&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Click Start&lt;b&gt; (Windows button left bottom corner), &lt;/b&gt;type run and press Enter.&lt;b&gt; (On Windows XP: Click Start and then Run.)&amp;nbsp; &lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Type&lt;b&gt; %appdata%\skype &lt;/b&gt;and click &lt;b&gt;OK&lt;/b&gt; (see image below).&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;b&gt;&lt;span id=&quot;goog_1208738214&quot;&gt;&lt;/span&gt;&lt;span id=&quot;goog_1208738215&quot;&gt;&lt;/span&gt; &lt;span id=&quot;goog_1208738216&quot;&gt;&lt;/span&gt;&lt;span id=&quot;goog_1208738217&quot;&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyzpk1qB6oXcUCv2U4a15HpI5tV2wXRStdj5qImsEFUUVLwpRFfnfsyqh-4tPa8o6WI12GgRBH6TCa9OlWjkL_lu_BMAoKFnEt1phP8SXmANOPchW6ttXmsokwOO2JuNxpsHQemGNSgcfv/s1600/skype-windows-fix1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;189&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyzpk1qB6oXcUCv2U4a15HpI5tV2wXRStdj5qImsEFUUVLwpRFfnfsyqh-4tPa8o6WI12GgRBH6TCa9OlWjkL_lu_BMAoKFnEt1phP8SXmANOPchW6ttXmsokwOO2JuNxpsHQemGNSgcfv/s320/skype-windows-fix1.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;zemanta-pixie&quot;&gt;
&lt;img alt=&quot;&quot; class=&quot;zemanta-pixie-img&quot; src=&quot;http://img.zemanta.com/pixy.gif&quot; /&gt;&lt;/div&gt;
&amp;nbsp;3.&amp;nbsp; Locate and delete the file shared.xml.
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhM2WwZM8ia4VyNId_KRu-AXNDkiU1c-gSOGwLHolQXjG93T9oeiEXFUlY2uDASrFKgOWtn1YAz34I9apk67AXYrUL561JKuxKj9355KxeSSTFG1ejxVHJ5H7NW-96zmcrxsyV_mtq2NVvi/s1600/skype-windows-fix2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;110&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhM2WwZM8ia4VyNId_KRu-AXNDkiU1c-gSOGwLHolQXjG93T9oeiEXFUlY2uDASrFKgOWtn1YAz34I9apk67AXYrUL561JKuxKj9355KxeSSTFG1ejxVHJ5H7NW-96zmcrxsyV_mtq2NVvi/s320/skype-windows-fix2.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
4.&amp;nbsp; If you cannot find this file:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Click &lt;b&gt;Start&lt;/b&gt;, type &lt;b&gt;run&lt;/b&gt; and press &lt;b&gt;Enter&lt;/b&gt;. (On Windows XP: Click Start and then Run.)&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Type the following and click OK.

control folders&amp;nbsp;&lt;/li&gt;
&lt;li&gt;In the &lt;b&gt;View&lt;/b&gt; tab, ensure that &lt;b&gt;Show hidden files and folders&lt;/b&gt; is enabled.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Repeat steps 1-3.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
5. Restart Skype.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;IF still not working &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
1. Reinstall skype&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Click &lt;b&gt;Start&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Control Panel&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Programs and Features&lt;/li&gt;
&lt;li&gt;Click &lt;b&gt;Skype&lt;/b&gt; in the list and &lt;b&gt;Uninstall&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
2. Click Start&lt;b&gt; (Windows button left bottom corner), &lt;/b&gt;type run and press Enter.&lt;b&gt; (On Windows XP: Click Start and then Run.)&amp;nbsp;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
3.&amp;nbsp; Type&lt;b&gt; %appdata%\skype &lt;/b&gt;and click &lt;b&gt;OK&lt;/b&gt;&lt;br /&gt;
4&lt;b&gt;. Delete &lt;/b&gt;all files in the window&lt;b&gt;.&lt;/b&gt;&lt;br /&gt;
5.&lt;b&gt; Reinstall &lt;/b&gt;Skype</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/5626643972731846795'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/5626643972731846795'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2011/05/skype-update-on-windows-7.html' title='Skype stopped working  Windows 7'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyzpk1qB6oXcUCv2U4a15HpI5tV2wXRStdj5qImsEFUUVLwpRFfnfsyqh-4tPa8o6WI12GgRBH6TCa9OlWjkL_lu_BMAoKFnEt1phP8SXmANOPchW6ttXmsokwOO2JuNxpsHQemGNSgcfv/s72-c/skype-windows-fix1.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-1186081178638432917</id><published>2011-05-25T08:01:00.000+02:00</published><updated>2011-05-25T08:01:03.042+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="pc performance"/><category scheme="http://www.blogger.com/atom/ns#" term="pc tips"/><category scheme="http://www.blogger.com/atom/ns#" term="tweaks"/><title type='text'>6 Registry Tweaks to Make Your PC Faster</title><content type='html'>&lt;b&gt;Registry tweaks to speed up boot times and make Windows a bit more responsive.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The Windows Registry is a database that holds your operating system&#39;s configurations and settings. This includes everything from how long your mouse must hover over a taskbar icon before the preview pops up (in Windows Vista and Windows 7) to performance settings.&lt;br /&gt;
&lt;br /&gt;
Windows 7 (and Vista) have more eye-candy features built into the operating system, but a number of Registry hacks and tweaks can speed up--or, at least, appear to speed up--the performance of your computer. Before we start mucking around with your PC&#39;s guts, however, we&#39;re going to make sure that you have a reliable backup of your Registry in case something goes sour.&lt;br /&gt;
&lt;br /&gt;
Though editing the Windows Registry is not nearly as scary as it sounds, making an incorrect change can cripple your system. To ensure that this doesn&#39;t happen, it&#39;s important to take the precaution of backing up part, or all, of the Registry before you proceed.&lt;br /&gt;
&lt;br /&gt;
Back Up the Entire Registry

To back up your Registry, you can use the free Registry-specific backup tool ERUNT (Emergency Recovery Utility NT). ERUNT is simple to use, more reliable than System Restore, and works with Windows XP, Vista, and 7 (even 64-bit versions). ERUNT also saves each restore point independently of the other points, unlike System Restore (in System Restore, all restore points are dependent on other points).

&lt;a href=&quot;http://www.pcworld.com/downloads/file/fid,30793-order,2-page,1-c,backup/description.html&quot;&gt;Download ERUNT here&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Back Up Part of the Registry&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If you&#39;re changing just one part of the Windows Registry, and you know which part that is, you don&#39;t have to back up the entire Registry. Instead, you can back up the part you plan on changing using the Registry&#39;s export feature.&lt;br /&gt;
&lt;br /&gt;
First, go to Start, Run, type &lt;b&gt;regedit&lt;/b&gt;, and press Yes. This will open the Registry Editor.&lt;br /&gt;
&lt;br /&gt;
Next, find the part of the Registry you&#39;re going to change. Right-click on the Registry key you plan on changing, and click &quot;Export.&quot; The Registry Editor will prompt you to save a .reg file to your hard drive.&lt;br /&gt;
&lt;br /&gt;
To undo Registry changes, just find your .reg file and double-click it. The .reg file will reset your Registry values to their existing values (but will not remove values that you&#39;ve added).&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Hack Your Registry&lt;/b&gt;&lt;br /&gt;
Now that you&#39;ve backed up your Registry--perhaps more than once--it&#39;s time to start hacking away. To get to the Windows Registry, go to Start &amp;gt; Run (in Windows Vista/7 you will have to type run into the Start menu search bar and press Enter). Type regedit, click Yes, and the Registry Editor will open.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Tweak 1: Speed Up Aero Peek&lt;/b&gt;&lt;br /&gt;
Windows 7&#39;s Aero Peek lets you see the desktop when you move your mouse cursor over to the &quot;show desktop&quot; button at the end of the taskbar. The standard delay time for the Aero Peek preview is 500 milliseconds, or half a second. Here&#39;s how to speed it up:&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Open the Registry Editor and go to HKEY_CURRENT_USER &amp;gt; Software &amp;gt; Microsoft &amp;gt; Windows &amp;gt; CurrentVersion &amp;gt; Explorer &amp;gt; Advanced.&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Right-click on the right pane and click New &amp;gt; DWORD (32-bit) Value. Name the new DWORD &quot;DesktopLivePreviewHoverTime.&quot;&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Double-click on DesktopLivePreviewHoverTime to open it. Under &quot;Base,&quot; 
click Decimal and then enter the delay time (in milliseconds) in the 
&quot;Value data&quot; field. Click OK, and your Aero Peek time will be set. You 
can set the value to higher (a longer delay time) if you&#39;re activating 
it too often by accident, or to lower (a shorter delay time) if half a 
second is just too long.&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Log off and log back on for the change to take effect.&lt;/li&gt;
&lt;/ol&gt;
&lt;b&gt;Tweak 2: Speed Up Taskbar Previews&lt;/b&gt;&lt;br /&gt;
When you roll over taskbar icons in Windows Vista and in Windows 7, little previews appear. The standard delay time for these previews is 400 milliseconds, or just under half a second. If this is too slow (or too fast) for you, you can adjust the delay time with an easy Registry hack.&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Open the Registry Editor and go to HKEY_CURRENT_USER &amp;gt; Software &amp;gt; Microsoft &amp;gt; Windows &amp;gt; CurrentVersion &amp;gt; Explorer &amp;gt; Advanced.&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Right-click on the right pane and click New &amp;gt; DWORD (32-bit) Value. Name the new DWORD &quot;ExtendedUIHoverTime.&quot;&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Double-click on ExtendedUIHoverTime to open it. Under &quot;Base,&quot; click 
Decimal and then enter in the delay time (in milliseconds) in the &quot;Value
 data&quot; field. Click OK to set the time (default is 400 milliseconds).&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Log off and then log back in for the change to take effect.&lt;/li&gt;
&lt;/ol&gt;
&lt;b&gt;Tweak 3: Speed Up Menus&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
If you&#39;d like to speed up the menus in Windows Vista or Windows 7, try this easy Registry tweak:&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Open the Registry Editor and go to HKEY_CURRENT_USER &amp;gt; Control Panel &amp;gt; Desktop.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Find MenuShowDelay and double-click to open. Adjust the value in milliseconds (the default is 400 milliseconds, or just under half a second).&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Log off and then log back on for the change to take effect.&amp;nbsp;&lt;/li&gt;
&lt;/ol&gt;
&lt;b&gt;Tweak 4: Prevent Reboots&lt;/b&gt;&lt;br /&gt;
If you have a habit of leaving your computer on all the time (as do I), you&#39;ll occasionally run into the problem of automatic system reboots. These usually happen after Windows downloads some sort of important update, and will usually be preceded by a notification (that gives you about 10 to 15 minutes warning, unless you click it away). If you&#39;re not around to see said notification, and you have a lot of windows or important documents open on your computer, these reboots can be a hassle.&lt;br /&gt;
&lt;br /&gt;
So here&#39;s how to keep your computer from automatically rebooting with an easy Registry hack. This hack works for Windows XP, Windows Vista, and Windows 7.&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Open the Registry Editor and go to HKEY_LOCAL_MACHINE &amp;gt; SOFTWARE &amp;gt; Policies &amp;gt; Microsoft &amp;gt; Windows.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Right-click in the right pane and select New &amp;gt; Key. This will create a new folder. Name the new folder &quot;WindowsUpdate.&quot;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Open WindowsUpdate and right-click in the right pane (there will be a value already in the pane called &quot;Default&quot;). Select New &amp;gt; DWORD (32-bit) Value. Name this DWORD &quot;NoAutoRebootWithLoggedOnUsers.&quot;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Open NoAutoRebootWithLoggedOnUsers and change the Value data to 1. Do not change the Base button to &quot;Decimal&quot;; instead, keep it at &quot;Hexadecimal.&quot; Click OK.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Exit the Registry Editor and log off and log back in for the settings to take effect. Your system will now never force a reboot without your explicit permission.&amp;nbsp;&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;b&gt;Tweak 5: Disable Notification Balloons&lt;/b&gt;&lt;br /&gt;
If you hate pop-up notification balloons on your Windows Vista or Windows 7 taskbar, you can disable them using a simple Registry tweak:&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Open the Registry Editor and go to HKEY_CURRENT_USER &amp;gt; Software &amp;gt; Microsoft &amp;gt; Windows &amp;gt; CurrentVersion &amp;gt; Explorer &amp;gt; Advanced. &amp;nbsp;&lt;/li&gt;
&lt;li&gt;Right-click on the right pane and select New &amp;gt; DWORD (32-bit) Value. Name your new DWORD &quot;EnableBalloonTips.&quot;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Double-click on EnableBalloonTips and set the Value data to 0. It doesn&#39;t matter if you have Decimal or Hexadecimal clicked under &quot;Base,&quot; because 0 is 0 in both decimal and hexadecimal.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Log off and log back on for the change to take effect. You&#39;ll no longer see any annoying notification balloons from the taskbar.&amp;nbsp;&lt;/li&gt;
&lt;/ol&gt;
&lt;b&gt;Tweak 6: Boot XP Faster&lt;/b&gt;&lt;br /&gt;
Is Windows XP booting too slowly? Here&#39;s how to speed up your boot-time with a quick Registry tweak.&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Open the Registry Editor and go to HKEY_LOCAL_MACHINE &amp;gt; SYSTEM &amp;gt; CurrentControlSet &amp;gt; Control &amp;gt; ContentIndex.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;In the right pane will be a value called &quot;StartupDelay.&quot; Double-click on StartupDelay to open it. Change the &quot;Base&quot; from Hexadecimal to Decimal, and enter 40,000 (the default setting is 480,000).&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Exit the Registry Editor and restart your computer. Your computer should boot up considerably faster--while this worked for me on my Windows XP laptop, values lower than 40,000 didn&#39;t produce a noticeable difference.&amp;nbsp;&lt;/li&gt;
&lt;/ol&gt;
&amp;nbsp;Originally posted &lt;a href=&quot;http://www.pcworld.com/article/228071/6_registry_hacks_to_make_your_pc_faster.html#tk.nl_wvx_h_cbintro&quot;&gt;PCWorld&lt;/a&gt;&lt;br /&gt;
&lt;ol&gt;
&lt;/ol&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/1186081178638432917'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/1186081178638432917'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2011/05/6-registry-tweaks-to-make-your-pc.html' title='6 Registry Tweaks to Make Your PC Faster'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-2441752084956077782</id><published>2011-03-16T08:35:00.000+02:00</published><updated>2011-03-16T08:35:02.290+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="internet security"/><category scheme="http://www.blogger.com/atom/ns#" term="network scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>Surf Safer With IE9</title><content type='html'>Throughout the beta testing phase of Internet Explorer, and the days and weeks leading up to its official launch, much has been made of the blazing performance of IE9&#39;s hardware accelerated graphics, and the overall immersive experience of the new browser. Another facet of IE9, though--which has received less attention--is the improved security of the browser. Here are four features of IE9 that make it safer and more secure:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1. Tracking Protection.&lt;/b&gt; If you are concerned with the privacy of your online browsing activities, Microsoft&#39;s hybrid approach to the &quot;do not track&quot; dilemma seems to be the best option currently on the table. Microsoft combines Tracking Protection Lists in IE9--which essentially blacklist specific sites to block them from gathering tracking data--with the more proactive approach of alerting sites to your privacy wishes using information in the HTTP header of your Web traffic. Between the two approaches, unwanted tracking of your browsing session should be minimized.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2. SmartScreen Application Reputation.&lt;/b&gt; You have probably seen at one time or another the Microsoft warning that &quot;this type of file may harm your computer&quot; when downloading files from your browser. The problem is that the warning is too generic and applies to virtually all downloads. With IE9, Microsoft strives to reduce the number of frivolous warnings, and provide more information for downloads that are truly potential threats. The SmartScreen Application Reputation protection assesses the reputation of a given file or download based on whether it has been signed by its author, the established reputation of the author, and the number of times it has been previously downloaded by others to determine the relative trust the file should be given.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3. Browser Segregation.&lt;/b&gt; When you use the pinned sites feature of IE9 and Windows 7 to access a website, the site opens in its own browser session, independent of the desktop browser. The browser session segregation means that session cookies are not accessible by other tabs or windows in the main desktop browser, and are safe from any compromise or abuse from other sites.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;4. Stripped Down&lt;/b&gt;. Another function of running a site as a pinned site in IE9 and Windows 7 is that the browser session opens without any browser helper objects (BHO) or add-on toolbars that might be installed in the desktop browser. With fewer extraneous apps running within and alongside the browser session, the potential attack surface is minimized and there are fewer opportunities for malicious exploits to attack.&lt;br /&gt;
&lt;br /&gt;
There are other features and functions of Internet Explorer 9 that provide a safer and more secure Web surfing experience. IE9 also includes protection such as DEP and ASLR which have been proven to be vulnerable, but still provide additional layers of protection that can prevent the vast majority of Web-based attacks.&lt;br /&gt;
&lt;br /&gt;
Orignal posted on &lt;a href=&quot;http://news.yahoo.com/s/pcworld/20110315/tc_pcworld/fourwaysie9letsyousurfsafer;_ylt=At7BW7r.bjo0A..A7J0CQ6r6VbIF;_ylu=X3oDMTM3N212N2w0BGFzc2V0A3Bjd29ybGQvMjAxMTAzMTUvZm91cndheXNpZTlsZXRzeW91c3VyZnNhZmVyBHBvcwMyMARzZWMDeW5fcGFnaW5hdGVfc3VtbWFyeV9saXN0BHNsawNmb3Vyd2F5c2llOWw-&quot;&gt;yahoo.news &lt;/a&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/2441752084956077782'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/2441752084956077782'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2011/03/surf-safer-with-ie9.html' title='Surf Safer With IE9'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-291174001636460013</id><published>2011-01-12T08:37:00.000+02:00</published><updated>2011-01-12T08:37:11.485+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="pc performance"/><category scheme="http://www.blogger.com/atom/ns#" term="pc tips"/><title type='text'>Tips to Troubleshoot a slow pc</title><content type='html'>If your PC is running a bit more slowly than when you first bought it, you’re not alone. And, luckily you don’t have to just accept a slow computer. During this week’s TR Dojo episode, I explore five common culprits of system slowdowns and tell you how to address them.&lt;br /&gt;
&lt;br /&gt;
&lt;object data=&quot;http://image.com.com/gamespot/images/cne_flash/production/media_player/proteus/one/proteus2.swf&quot; height=&quot;362&quot; type=&quot;application/x-shockwave-flash&quot; width=&quot;432&quot;&gt;&lt;param name=&quot;FlashVars&quot; value=&quot;playerMode=embedded&amp;allowFullScreen=1&amp;flavor=EmbeddedPlayerVersion&amp;showOptions=0&amp;skin=http://image.com.com/gamespot/images/cne_flash/production/media_player/proteus/one/skins/proteus-tr.png&amp;autoPlay=false&amp;movieAspect=4.3&amp;embeddingAllowed=true&amp;clockColor=0x3b3b3b&amp;paramsURI=http%3A%2F%2Fvideo.techrepublic.com.com%2F2461-1_11-484429.xml%3Fwidth%3D432%26height%3D362%26ptype%3D6475%26mode%3Dembedded%26autoplay%3Dfalse%26siteId%3D11%26site%3D%26ttag%3DBill%2BDetwiler%26assetId%3D192642%26conttypid%3D26%26nc%3D1294809786828%26nodeId%3D13625&quot; /&gt;

&lt;param name=&quot;movie&quot; value=&quot;http://image.com.com/gamespot/images/cne_flash/production/media_player/proteus/one/proteus2.swf&quot; /&gt;

&lt;param name=&quot;wmode&quot; value=&quot;transparent&quot; /&gt;

&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;

&lt;/object&gt;&lt;br /&gt;
&lt;br /&gt;
For those who prefer text to video, you can click the Transcript link that appears below the video player window or check out Debra Littlejohn Shinder’s article, “&lt;a href=&quot;http://blogs.techrepublic.com.com/10things/?p=1834&quot;&gt;10 tips for troubleshooting PC system slowdowns&lt;/a&gt;.”</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/291174001636460013'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/291174001636460013'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2011/01/tips-to-troubleshoot-slow-pc.html' title='Tips to Troubleshoot a slow pc'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-774896745802038243</id><published>2010-12-17T07:04:00.001+02:00</published><updated>2010-12-17T07:05:11.462+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>Rogue Utilities</title><content type='html'>This week the Rogue Blog reports a strong surge in a different type of rogue, one that pretends to be a system utility. Typical scareware pretends to be antivirus software, &quot;finds&quot; all kinds of threats, and demands that you pay before it will clean up the pretend problems it found. Utility-style scareware follows a similar pattern. It pretends to find errors on your system such as disk fragmentation or file system integrity problems. Naturally the scan is free; naturally you have to pay if you want to fix the alleged system problems.&lt;br /&gt;
&lt;br /&gt;
The Rogue Blog post pointing out this trend includes numerous screenshots and identifies many of the culprits by name. UltraDefragger, ScanDisk, and WinHDD are among the real-sounding names used by current fraudulent system utilities.&lt;br /&gt;
&lt;br /&gt;
How can you distinguish a fake optimization tool from a real one? If you see a report from a utility that you never installed and never launched, it&#39;s probably a fraud. If the utility comes advertised in a spam message, Sunbelt suggests you avoid it. The rogues invariably display dire warnings about system problems, but don&#39;t reject every warning. A legitimate disk utility might do the same if your system is truly failing.&lt;br /&gt;
&lt;br /&gt;
Here&#39;s an odd one: apparently these rogue utilities will often tell you that you must update your browser to a version earlier than what you&#39;re actually running.

If you&#39;re careful you can avoid getting burned. Don&#39;t ever rely on a third-party system utility that you didn&#39;t install or launch, as it&#39;s almost certainly a fraud.&lt;br /&gt;
&lt;br /&gt;
Your &lt;a href=&quot;http://computilities.blogspot.com/p/anti-virus.html&quot;&gt;antivirus software&lt;/a&gt; or security suite should protect you from rogues of any kind, providing you keep it up to date. And when you go shopping for disk tools do a little research to make sure they&#39;re legitimate. Check PCMag.com for reviews, to start, and Google the name to see if others are reporting problems. If you&#39;re still not sure, a visit to the Rogue Blog should clear up any confusion.&lt;br /&gt;
&lt;br /&gt;
Originally posted on &lt;a href=&quot;http://news.yahoo.com/s/zd/20101216/tc_zd/258162;_ylt=Akv9n9tGQE2rjAVzQ92tJR2DzdAF;_ylu=X3oDMTJjdTk2ZGdzBGFzc2V0A3pkLzIwMTAxMjE2LzI1ODE2MgRwb3MDOQRzZWMDeW5fcGFnaW5hdGVfc3VtbWFyeV9saXN0BHNsawNnZmktc3VuYmVsdHI-&quot;&gt;Yahoo News &lt;/a&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/774896745802038243'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/774896745802038243'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2010/12/rogue-utilities.html' title='Rogue Utilities'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-4212543015034586375</id><published>2010-11-25T15:00:00.000+02:00</published><updated>2010-11-25T15:00:46.218+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>Tech Scams to Avoid This Holiday</title><content type='html'>The holiday shopping season is a great time to get tech products at discounted prices, but it also creates a golden opportunity for the Web&#39;s scam artists. The FBI, McAfee, the Better Business Bureau and F-Secure  are all warning about cybercriminals who will try to take you for a ride this holiday season. Here are their most pertinent warnings and tips for staying safe:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The Infamous Free iPad&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Bogus free iPad offers started popping up immediately after Apple&#39;s tablet went on sale, and they&#39;ve since been banned from Facebook. Still, you might see similar offers around the Web, McAfee says, prompting you to buy other products as a condition of getting the free iPad. By now, you should realize it&#39;s too good to be true.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Gift Card Scams&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
That free $1,000 gift card offer you saw on Facebook? Bogus, of course. McAfee says that cybercrooks lure people into giving away their personal information or taking quizzes in exchange for these cards, which never arrive. The information is then sold to marketers or used for identity theft.&lt;br /&gt;
&lt;br /&gt;
The FBI also says to use caution when purchasing gift cards through auction sites or classified ads. These can be fraudulent, and you won&#39;t get your money back. Buy directly from retailers instead.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Bogus Auctions and Classifieds&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Here&#39;s a particularly tricky scheme pointed out by the FBI: On auction and classified sites, fraudsters use their own order forms to get payment details from holiday gift buyers. Then, they charge the victim&#39;s credit card and use a stolen credit card to buy the actual item, which is sent directly to the victim. In other words, you&#39;ll still get the product, but you might be liable for receiving stolen goods. To avoid this scam, be sure to use legitimate payment services like Paypal instead of providing money directly to the seller.&lt;br /&gt;
&lt;br /&gt;
The feds also warn of a related scam for free or reduced-price shipping offered on auction and classified sites. The fraudsters provide fake shipping labels to the victim, and the product ends up being intercepted in transit, never delivered to its destination.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Malicious websites&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
For cybercriminals, spamming Google with bogus holiday gift pages is a yearly tradition. These pages could be loaded with malware or payment forms intended to steal your identity. F-Secure has created a list of what it thinks will be the highly targeted search terms this year, including Kinect for Xbox, Call of Duty: Black Ops, Amazon Kindle and Apple iPad.&lt;br /&gt;
&lt;br /&gt;
Visit retailers&#39; websites directly when possible, use Internet security software if you must and always check for &quot;https&quot; in the URL bar before ordering online to ensure that the page is secure.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Wi-Fi Hackers&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Public Wi-Fi networks will get a workout this holiday season as people travel, McAfee notes. This is especially true with Google offering free Wi-Fi on domestic flights from three major airlines. Check out our security tips from Google&#39;s free Wi-Fi offer at airports last year, most of which are still relevant in the skies. Number one tip: Avoid shopping and paying bills over a public network.ls over a public network.&lt;br /&gt;
&lt;div class=&quot;zemanta-related&quot;&gt;
&lt;h6 class=&quot;zemanta-related-title&quot; style=&quot;font-size: 1em; margin: 1em 0pt 0pt;&quot;&gt;








Related articles&lt;/h6&gt;
&lt;ul class=&quot;zemanta-article-ul&quot;&gt;
&lt;li class=&quot;zemanta-article-ul-li&quot;&gt;&lt;a href=&quot;http://www.helpwithdebtnow.com/latest-mcafee-warns-of-%25e2%2580%259cthe-12-scams-of-christmas.html&quot;&gt;Latest McAfee warns of &quot;The 12 scams of Christmas&quot;&lt;/a&gt; (helpwithdebtnow.com)&lt;/li&gt;
&lt;li class=&quot;zemanta-article-ul-li&quot;&gt;&lt;a href=&quot;http://www.cultofmac.com/bogus-ipads-top-12-scams-of-christmas/69577&quot;&gt;Bogus iPads Top 12 Scams of Christmas&lt;/a&gt; (cultofmac.com)&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
Originally posted on &lt;span id=&quot;goog_914399231&quot;&gt;&lt;/span&gt;&lt;a href=&quot;http://www.blogger.com/goog_914399233&quot;&gt;&lt;span id=&quot;goog_914399234&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;a href=&quot;http://news.yahoo.com/s/pcworld/20101124/tc_pcworld/5holidaytechscamstoavoid;_ylt=Ag3G8eOjxOkwxXsK_6aNFmwjtBAF;_ylu=X3oDMTMyYXNmaG00BGFzc2V0A3Bjd29ybGQvMjAxMDExMjQvNWhvbGlkYXl0ZWNoc2NhbXN0b2F2b2lkBHBvcwM4BHNlYwN5bl9hcnRpY2xlX3N1bW1hcnlfbGlzdARzbGsDNWhvbGlkYXl0ZWNo&quot;&gt;&lt;span id=&quot;goog_914399238&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;a href=&quot;http://news.yahoo.com/s/pcworld/20101124/tc_pcworld/5holidaytechscamstoavoid;_ylt=Ag3G8eOjxOkwxXsK_6aNFmwjtBAF;_ylu=X3oDMTMyYXNmaG00BGFzc2V0A3Bjd29ybGQvMjAxMDExMjQvNWhvbGlkYXl0ZWNoc2NhbXN0b2F2b2lkBHBvcwM4BHNlYwN5bl9hcnRpY2xlX3N1bW1hcnlfbGlzdARzbGsDNWhvbGlkYXl0ZWNo&quot;&gt;&lt;span id=&quot;goog_914399239&quot;&gt;PCWorld&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div class=&quot;zemanta-pixie&quot; style=&quot;height: 15px; margin-top: 10px;&quot;&gt;
&lt;a class=&quot;zemanta-pixie-a&quot; href=&quot;http://www.zemanta.com/&quot; title=&quot;Enhanced by Zemanta&quot;&gt;&lt;img alt=&quot;Enhanced by Zemanta&quot; class=&quot;zemanta-pixie-img&quot; src=&quot;http://img.zemanta.com/zemified_e.png?x-id=9c5fcf02-9dec-4169-b6bd-54e863e732e9&quot; style=&quot;border: medium none; float: right;&quot; /&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/4212543015034586375'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/4212543015034586375'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2010/11/tech-scams-to-avoid-this-holiday.html' title='Tech Scams to Avoid This Holiday'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry><entry><id>tag:blogger.com,1999:blog-762991721971296574.post-8310487912850292550</id><published>2010-11-19T13:44:00.002+02:00</published><updated>2010-11-19T13:48:06.032+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="pc security"/><category scheme="http://www.blogger.com/atom/ns#" term="spyware"/><title type='text'>Smart Online Behavior Prevents Malware</title><content type='html'>Malware is a term used to describe a broad category of damaging software that includes viruses, worms, trojan horses, rootkits, spyware, and adware. The effects of malware range from brief annoyance to computer crashes and identity theft. Malware is easier to avoid than it is to remove. Avoiding malware involves a two-part strategy. Follow these guidelines for staying safe.&lt;br /&gt;
&lt;br /&gt;
The single biggest factor in preventing a malware infection on your PC is you. You don&#39;t need expert knowledge or special training. You just need vigilance to avoid downloading and installing anything you do not understand or trust, no matter how tempting, from the following sources:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;From a website:&lt;/b&gt; If you are unsure, leave the site and research the software you are being asked to install. If it is OK, you can always come back to site and install it. If it is not OK, you will avoid a malware headache.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;From e-mail:&lt;/b&gt; Do not trust anything associated with a spam e-mail. Approach e-mail from people you know with caution when the message contains links or attachments. If you are suspicious of what you are being asked to view or install, don&#39;t do it.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;From physical media:&lt;/b&gt; Your friends, family, and associates may unknowingly give you a disc or flash drive with an infected file on it. Don&#39;t blindly accept these files; scan them with security software. If you are still unsure, do not accept the files.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;From a pop-up window:&lt;/b&gt; Some pop-up windows or boxes will attempt to corner you into downloading software or accepting a free &quot;system scan&quot; of some type. Often these pop-ups will employ scare tactics to make you believe you need what they are offering in order to be safe. Close the pop-up without clicking anything inside it (including the X in the corner). Close the window via Windows Task Manager (press Ctrl-Alt-Delete).&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;From another piece of software:&lt;/b&gt; Some programs attempt to install malware as a part of their own installation process. When installing software, pay close attention to the message boxes before clicking Next, OK, or I Agree. Scan the user agreement for anything that suggests malware may be a part of the installation. If you are unsure, cancel the installation, check up on the program, and run the installation again if you determine it is safe.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;From illegal file-sharing services:&lt;/b&gt; You&#39;re on your own if you enter this realm. There is little quality control in the world of illegal software, and it is easy for an attacker to name a piece of malware after a popular movie, album, or program to tempt you into downloading it.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Remove Malware With the Right Software&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Chances are that no matter how careful you are, you will be infected some day. That&#39;s because malware is designed to sneak onto your computer in ways you can&#39;t possibly foresee. Enlist the help of the following software:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;An updated operating system:&lt;/b&gt; Use Windows Update. Take advantage of its ability to automatically notify you of updates, or better yet, to automatically download and install updates.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;An updated browser:&lt;/b&gt; No matter which browser you use, keeping it current is vital to preventing infection. Take advantage of your browser&#39;s pop-up blocking, download screening, and automatic update features.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;http://www.blogger.com/goog_114614226&quot;&gt;Antivirus software&lt;/a&gt;&lt;/b&gt;&lt;a href=&quot;http://computilities.blogspot.com/p/anti-virus.html&quot;&gt;:&lt;/a&gt; You must run an antivirus program to be safe. Keep it updated, turned on, and schedule a scan to run at least once a month. (Don&#39;t run two antivirus programs; they will interfere with one another.)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;http://www.blogger.com/goog_114614231&quot;&gt;Anti-malware&lt;/a&gt;&lt;/b&gt;&lt;a href=&quot;http://computilities.blogspot.com/p/anti-virus.html&quot;&gt;:&lt;/a&gt; Also called anti-spyware, many antivirus applications include an anti-malware component. If yours does not, install and use a standalone anti-malware program that does not conflict with your antivirus program. Keep it updated.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Firewall:&lt;/b&gt; If you aren&#39;t running a third-party firewall, use Windows Firewall. (Don&#39;t run two firewalls at once; they will interfere with one another.)&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Spam filter:&lt;/b&gt; If your e-mail program is not adequately filtering spam from your in-box, consider additional spam filtering software. If your security software is a security suite, spam filtering may be a feature that you need to switch on.</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/8310487912850292550'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762991721971296574/posts/default/8310487912850292550'/><link rel='alternate' type='text/html' href='http://computilities.blogspot.com/2010/11/smart-online-behavior-prevents-malware.html' title='Smart Online Behavior Prevents Malware'/><author><name>inettools</name><uri>http://www.blogger.com/profile/02349732326795269614</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OBlyADicSZ7jOw2qTA2qIlvgt0QYfcemehUtuSLOuGr6b9xaqNFjYYf83H79xoZKG2J1pYrRFlpjBHVNP-RTS7TO7RC3N8_VOuDid2dURxQZ7l5muMMHfdqZBBl1IB8/s220/computers.png'/></author></entry></feed>